2017-03-07
H 7 , 2 0 1 7 Report No. DODIG-2017-062 The Army Did Not Effectively Monitor Contractor Performance for the Kuwait Base Operations and Security...The Army Did Not Effectively Monitor Contractor Performance for the Kuwait Base Operations and Security Support Services Contract March 7, 2017... contractor performance for the Kuwait Base Operations and Security Support Services (KBOSSS) contract. The KBOSSS contract is a cost-plus-award-fee
49 CFR 1542.215 - Law enforcement support.
Code of Federal Regulations, 2011 CFR
2011-10-01
..., DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.215 Law enforcement support. (a) In accordance with § 1542.217, each airport operator required to have a security... system. (b) Each airport required to have a security program under § 1542.103(c) must ensure that: (1...
49 CFR 1542.215 - Law enforcement support.
Code of Federal Regulations, 2013 CFR
2013-10-01
..., DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.215 Law enforcement support. (a) In accordance with § 1542.217, each airport operator required to have a security... system. (b) Each airport required to have a security program under § 1542.103(c) must ensure that: (1...
49 CFR 1542.215 - Law enforcement support.
Code of Federal Regulations, 2012 CFR
2012-10-01
..., DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.215 Law enforcement support. (a) In accordance with § 1542.217, each airport operator required to have a security... system. (b) Each airport required to have a security program under § 1542.103(c) must ensure that: (1...
49 CFR 1542.215 - Law enforcement support.
Code of Federal Regulations, 2014 CFR
2014-10-01
..., DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.215 Law enforcement support. (a) In accordance with § 1542.217, each airport operator required to have a security... system. (b) Each airport required to have a security program under § 1542.103(c) must ensure that: (1...
Code of Federal Regulations, 2010 CFR
2010-10-01
... ENFORCEMENT SYSTEMS § 307.13 Security and confidentiality for computerized support enforcement systems in... systems in operation after October 1, 1997. (a) Information integrity and security. Have safeguards... 45 Public Welfare 2 2010-10-01 2010-10-01 false Security and confidentiality for computerized...
45 CFR 303.30 - Securing medical support information.
Code of Federal Regulations, 2013 CFR
2013-10-01
... 45 Public Welfare 2 2013-10-01 2012-10-01 true Securing medical support information. 303.30... (CHILD SUPPORT ENFORCEMENT PROGRAM), ADMINISTRATION FOR CHILDREN AND FAMILIES, DEPARTMENT OF HEALTH AND HUMAN SERVICES STANDARDS FOR PROGRAM OPERATIONS § 303.30 Securing medical support information. (a) If...
45 CFR 303.30 - Securing medical support information.
Code of Federal Regulations, 2011 CFR
2011-10-01
... 45 Public Welfare 2 2011-10-01 2011-10-01 false Securing medical support information. 303.30... (CHILD SUPPORT ENFORCEMENT PROGRAM), ADMINISTRATION FOR CHILDREN AND FAMILIES, DEPARTMENT OF HEALTH AND HUMAN SERVICES STANDARDS FOR PROGRAM OPERATIONS § 303.30 Securing medical support information. (a) If...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-07-02
... Standards and Technology's (NIST) Computer Security Division maintains a Computer Security Resource Center... Regarding Driver History Record Information Security, Continuity of Operation Planning, and Disaster... (SDLAs) to support their efforts at maintaining the security of information contained in the driver...
45 CFR 303.30 - Securing medical support information.
Code of Federal Regulations, 2014 CFR
2014-10-01
... 45 Public Welfare 2 2014-10-01 2012-10-01 true Securing medical support information. 303.30 Section 303.30 Public Welfare Regulations Relating to Public Welfare OFFICE OF CHILD SUPPORT ENFORCEMENT... HUMAN SERVICES STANDARDS FOR PROGRAM OPERATIONS § 303.30 Securing medical support information. (a) If...
Multicore Architectures for Multiple Independent Levels of Security Applications
2012-09-01
to bolster the MILS effort. However, current MILS operating systems are not designed for multi-core platforms. They do not have the hardware support...current MILS operating systems are not designed for multi‐core platforms. They do not have the hardware support to ensure that the separation...the availability of information at different security classification levels while increasing the overall security of the computing system . Due to the
Leveraging Safety Programs to Improve and Support Security Programs
DOE Office of Scientific and Technical Information (OSTI.GOV)
Leach, Janice; Snell, Mark K.; Pratt, R.
2015-10-01
There has been a long history of considering Safety, Security, and Safeguards (3S) as three functions of nuclear security design and operations that need to be properly and collectively integrated with operations. This paper specifically considers how safety programmes can be extended directly to benefit security as part of an integrated facility management programme. The discussion will draw on experiences implementing such a programme at Sandia National Laboratories’ Annular Research Reactor Facility. While the paper focuses on nuclear facilities, similar ideas could be used to support security programmes at other types of high-consequence facilities and transportation activities.
20 CFR 416.1133 - What is a pro rata share of household operating expenses.
Code of Federal Regulations, 2010 CFR
2010-04-01
... operating expenses. 416.1133 Section 416.1133 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY INCOME FOR THE AGED, BLIND, AND DISABLED Income In-Kind Support and Maintenance § 416... receiving in-kind support and maintenance from anyone else in the household. The one-third reduction...
78 FR 42101 - Boston Area Maritime Security Advisory Committee; Vacancies
Federal Register 2010, 2011, 2012, 2013, 2014
2013-07-15
...: Identifying critical port infrastructure and operations; Identifying risks (threats, vulnerabilities, and... years of experience related to maritime or port security operations. AMSC Membership The Boston AMSC has... security industries. In support of the USCG policy on gender and ethnic nondiscrimination, we encourage...
77 FR 39249 - Boston Area Maritime Security Advisory Committee; Vacancies
Federal Register 2010, 2011, 2012, 2013, 2014
2012-07-02
...: Identifying critical port infrastructure and operations; Identifying risks (threats, vulnerabilities, and... years of experience related to maritime or port security operations. AMSC Membership The Boston AMSC has... security industries. In support of the USCG policy on gender and ethnic diversity, we encourage qualified...
Review of the Literature Related to Screening Airline Passenger Baggage.
1994-10-01
11 billion passengers and their carry-on items have passed through airport security checkpoints. According to the Federal Aviation Administration...Aviation Security establishes security requirements, inspects airline and airport security operations, and issues civil penalties for noncompliance with...operations areas and provide law enforcement support for the screening system and overall airport security requirements (FAA, 1991). The FAA’s role in aviation
Roles for international military medical services in stability operations (security sector reform).
Bricknell, M C M; Thompson, D
2007-06-01
This is the second in a series of three papers that examine the role of international military medical services in stability operations in unstable countries. The paper discusses security sector reform in general terms and highlights the interdependency of the armed forces, police, judiciary and penal systems in creating a 'secure environment'. The paper then looks at components of a local military medical system for a counter-insurgency campaign operating on interior lines and the contribution and challenges faced by the international military medical community in supporting the development of this system. Finally the paper highlights the importance of planning the medical support of the international military personnel who will be supporting wider aspects of security sector reform. The paper is based on background research and my personal experience as Medical Director in the Headquarters of the NATO International Stability Assistance Force in Afghanistan in 2006.
49 CFR 1542.215 - Law enforcement support.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 49 Transportation 9 2010-10-01 2010-10-01 false Law enforcement support. 1542.215 Section 1542.215..., DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.215 Law... program under § 1542.103(a) or (b) must provide: (1) Law enforcement personnel in the number and manner...
System security in the space flight operations center
NASA Technical Reports Server (NTRS)
Wagner, David A.
1988-01-01
The Space Flight Operations Center is a networked system of workstation-class computers that will provide ground support for NASA's next generation of deep-space missions. The author recounts the development of the SFOC system security policy and discusses the various management and technology issues involved. Particular attention is given to risk assessment, security plan development, security implications of design requirements, automatic safeguards, and procedural safeguards.
LANL continuity of operations plan
DOE Office of Scientific and Technical Information (OSTI.GOV)
Senutovitch, Diane M
2010-12-22
The Los Alamos National Laboratory (LANL) is a premier national security research institution, delivering scientific and engineering solutions for the nation's most crucial and complex problems. Our primary responsibility is to ensure the safety, security, and reliability of the nation's nuclear stockpile. LANL emphasizes worker safety, effective operational safeguards and security, and environmental stewardship, outstanding science remains the foundation of work at the Laboratory. In addition to supporting the Laboratory's core national security mission, our work advances bioscience, chemistry, computer science, earth and environmental sciences, materials science, and physics disciplines. To accomplish LANL's mission, we must ensure that the Laboratorymore » EFs continue to be performed during a continuity event, including localized acts of nature, accidents, technological or attack-related emergencies, and pandemic or epidemic events. The LANL Continuity of Operations (COOP) Plan documents the overall LANL COOP Program and provides the operational framework to implement continuity policies, requirements, and responsibilities at LANL, as required by DOE 0 150.1, Continuity Programs, May 2008. LANL must maintain its ability to perform the nation's PMEFs, which are: (1) maintain the safety and security of nuclear materials in the DOE Complex at fixed sites and in transit; (2) respond to a nuclear incident, both domestically and internationally, caused by terrorist activity, natural disaster, or accident, including mobilizing the resources to support these efforts; and (3) support the nation's energy infrastructure. This plan supports Continuity of Operations for Los Alamos National Laboratory (LANL). This plan issues LANL policy as directed by the DOE 0 150.1, Continuity Programs, and provides direction for the orderly continuation of LANL EFs for 30 days of closure or 60 days for a pandemic/epidemic event. Initiation of COOP operations may be required to support an allhazards event, including a national security emergency, major fire, catastrophic natural disaster, man-made disaster, terrorism event, or technological disaster by rendering LANL buildings, infrastructure, or Technical Areas unsafe, temporarily unusable, or inaccessible.« less
Operational Contract Support: Economic Impact Evaluation and Measures of Effectiveness
2017-12-01
NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA MBA PROFESSIONAL REPORT OPERATIONAL CONTRACT SUPPORT: ECONOMIC IMPACT EVALUATION AND MEASURES...DATES COVERED MBA professional report 4. TITLE AND SUBTITLE OPERATIONAL CONTRACT SUPPORT: ECONOMIC IMPACT EVALUATION AND MEASURES OF EFFECTIVENESS 5...evaluation, expeditionary economics , operational contract support, measure of effectiveness 15. NUMBER OF PAGES 89 16. PRICE CODE 17. SECURITY
Federal Security Laboratory Governance Panels: Observations and Recommendations
2013-01-01
operates under a sole-source, cost-plus-fixed-fee contract administered by the U.S. Navy’s Naval Sea Systems Command. There are currently 14 UARCs, 13... system of research organizations that support science and technology for U.S. national security. Within this system , the Departments of Defense, Energy...and Homeland Security support about 80 laboratories that focus predominantly on national security matters. These laboratories have different
Secure Remote Access Issues in a Control Center Environment
NASA Technical Reports Server (NTRS)
Pitts, Lee; McNair, Ann R. (Technical Monitor)
2002-01-01
The ISS finally reached an operational state and exists for local and remote users. Onboard payload systems are managed by the Huntsville Operations Support Center (HOSC). Users access HOSC systems by internet protocols in support of daily operations, preflight simulation, and test. In support of this diverse user community, a modem security architecture has been implemented. The architecture has evolved over time from an isolated but open system to a system which supports local and remote access to the ISS over broad geographic regions. This has been accomplished through the use of an evolved security strategy, PKI, and custom design. Through this paper, descriptions of the migration process and the lessons learned are presented. This will include product decision criteria, rationale, and the use of commodity products in the end architecture. This paper will also stress the need for interoperability of various products and the effects of seemingly insignificant details.
Secure Payload Access to the International Space Station
NASA Technical Reports Server (NTRS)
Pitts, R. Lee; Reid, Chris
2002-01-01
The ISS finally reached an operational state and exists for local and remote users. Onboard payload systems are managed by the Huntsville Operations Support Center (HOSC). Users access HOSC systems by internet protocols in support of daily operations, preflight simulation, and test. In support of this diverse user community, a modem security architecture has been implemented. The architecture has evolved over time from an isolated but open system to a system which supports local and remote access to the ISS over broad geographic regions. This has been accomplished through the use of an evolved security strategy, PKI, and custom design. Through this paper, descriptions of the migration process and the lessons learned are presented. This will include product decision criteria, rationale, and the use of commodity products in the end architecture. This paper will also stress the need for interoperability of various products and the effects of seemingly insignificant details.
Organizational Culture for Safety, Security, and Safeguards in New Nuclear Power Countries
DOE Office of Scientific and Technical Information (OSTI.GOV)
Kovacic, Donald N
2015-01-01
This chapter will contain the following sections: Existing international norms and standards for developing the infrastructure to support new nuclear power programs The role of organizational culture and how it supports the safe, secure, and peaceful application of nuclear power Identifying effective and efficient strategies for implementing safety, security and safeguards in nuclear operations Challenges identified in the implementation of safety, security and safeguards Potential areas for future collaboration between countries in order to support nonproliferation culture
Specification and Verification of Secure Concurrent and Distributed Software Systems
1992-02-01
primitive search strategies work for operating systems that contain relatively few operations . As the number of operations increases, so does the the...others have granted him access to, etc . The burden of security falls on the operating system , although appropriate hardware support can minimize the...Guttag, J. Horning, and R. Levin. Synchronization primitives for a multiprocessor: a formal specification. Symposium on Operating System Principles
2003-01-01
OPSEC), military deception, psychological operations (PSYOPS), special information operations (IO), information assurance, physical security...nonlethal effects, such as operational 8 Network Centric Warfare Case Study security (OPSEC), military deception, psychological operations (PSYOP...Support Operations Group ASR Alternate Supply Route; or, Ammunition Supply Rate ATACMS Army Tactical Missile System ATARS Advanced
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hadley, Mark D.; Clements, Samuel L.
2009-01-01
Battelle’s National Security & Defense objective is, “applying unmatched expertise and unique facilities to deliver homeland security solutions. From detection and protection against weapons of mass destruction to emergency preparedness/response and protection of critical infrastructure, we are working with industry and government to integrate policy, operational, technological, and logistical parameters that will secure a safe future”. In an ongoing effort to meet this mission, engagements with industry that are intended to improve operational and technical attributes of commercial solutions that are related to national security initiatives are necessary. This necessity will ensure that capabilities for protecting critical infrastructure assets aremore » considered by commercial entities in their development, design, and deployment lifecycles thus addressing the alignment of identified deficiencies and improvements needed to support national cyber security initiatives. The Secure Firewall (Sidewinder) appliance by Secure Computing was assessed for applicable use in critical infrastructure control system environments, such as electric power, nuclear and other facilities containing critical systems that require augmented protection from cyber threat. The testing was performed in the Pacific Northwest National Laboratory’s (PNNL) Electric Infrastructure Operations Center (EIOC). The Secure Firewall was tested in a network configuration that emulates a typical control center network and then evaluated. A number of observations and recommendations are included in this report relating to features currently included in the Secure Firewall that support critical infrastructure security needs.« less
2017-05-25
operate independently without external nation support; (3) a custom approach is necessary in security forces development based on political requirements...independently without external nation support; (3) a custom approach is necessary in security forces development based on political requirements...interventions both successful and unsuccessful, that an external country must craft a custom approach to develop local security forces based on the
Peace-enforcement: Mission, strategy, and doctrine. Monograph report
DOE Office of Scientific and Technical Information (OSTI.GOV)
Kohler, J.B.
This monograph examines a new military mission-peace-enforcement. It does so through a five part strategic process that links national interests and national security strategy to tactical operations. it asserts that US national security strategy is evolving as a result of the end of the Cold War and that a new strategy will lead to new military missions. The monograph first describes a limited spectrum of military operations that comprise a peace-enforcement mission. Next, it reviews enduring US national interests then analyzes evolving national security strategy to determine if these elements of strategy support the need for a peace-enforcement mission. Themore » monograph then examines national military strategy, operational level strategy and joint guidance, and finally, US tactical doctrine to determine if peace-enforcement is a mission the US military can execute today. The monograph concludes that national interests and evolving national security strategy will emphasize promotion of democracy and stability in lieu of Cold War deterrence. The national military strategy partially supports this shift; support should increase as the Clinton administration clarifies its policy and solidifies the shift from containment. Lastly, the monograph finds there is sufficient operational and tactical level guidance to conduct the mission and recommends formal acceptance of the peace-enforcement mission into joint doctrine.« less
76 FR 64966 - Re-Accreditation and Re-Approval of Intertek Caleb Brett as a Commercial Gauger
Federal Register 2010, 2011, 2012, 2013, 2014
2011-10-19
....gov/xp/cgov/import/operations_support/labs_scientific_svcs/org_and_operations.xml . DATES: The re... DEPARTMENT OF HOMELAND SECURITY Bureau of Customs and Border Protection Re-Accreditation and Re..., Department of Homeland Security. ACTION: Notice of re-approval of Intertek Caleb Brett, Ponce, Puerto Rico...
Semiannual Report to Congress on the Effectiveness of the Civil Aviation Security Program.
1987-12-31
This report also provides data on the initiatives being implemented as a result of the review of domestic airport security by the Secretary’s Safety...enforcement support for airline and airport security measures. Finally, the passengers-the ultimate beneficiaries of the security program--pay for...of these airports is required to implement a security program which provides a secure operating environment for these air carriers. Airport security programs
2015-06-12
Security Strategy to integrate government security agency participation for increased national security.33 Morris , Morris , and Jones posit ICA occurs...New National Strategy Takes Whole-of-Government Approach,” American Forces Press Services (Washington, DC: DoD News, 2010), 1. 34 John C. Morris ...Elizabeth D. Morris , and Dale M. Jones, “Reaching for the Philosopher’s Stone: Contingent Coordination and the Military’s Response to Hurricane Katrina
The doctrinal basis for medical stability operations.
Baker, Jay B
2010-01-01
This article describes possible roles for the military in the health sector during stability operations, which exist primarily when security conditions do not permit the free movement of civilian actors. This article reviews the new U.S. Army Field Manuals (FMs) 3-24, Counterinsurgency and FM 3-07, Stability Operations, in the context of the health sector. Essential tasks in medical stability operations are identified for various logical lines of operation including information operations, civil security, civil control, support to governance, support to economic development, and restoration of essential services. Restoring essential services is addressed in detail including coordination, assessment, actions, and metrics in the health sector. Coordination by the military with other actors in the health sector including host nation medical officials, other United States governmental agencies, international governmental organizations (IGOs), and nongovernment organizations (NGOs) is key to success in medical stability operations.
2016-12-01
relating to security force assistance activities and readiness of U.S. Special Operations Forces. • Increased Use of Contractors and Personnel on...Temporary Duty. DOD relies on contractors to support a wide range of military operations and free up uniformed personnel to directly support mission...needs. During operations in Afghanistan and Iraq contractor personnel played a critical role in supporting U.S. troops and sometimes exceeded the
1999-02-01
Actions to Study Responsibilities and Funding for Airport Security and to Certify Screening Companies DISTRIBUTION STATEMENT A Approved for...local law enforcement support relating to air carrier and airport security measures. The funding of the security operations is divided among FAA, the...generally agreed with the current division of airport security responsibilities. These officials stated that the continuity of screening would be
Operational support considerations in Space Shuttle prelaunch processing
NASA Technical Reports Server (NTRS)
Schuiling, Roelof L.
1991-01-01
This paper presents an overview of operational support for Space Shuttle payload processing at the John F. Kennedy Space Center. The paper begins with a discussion of the Shuttle payload processing operation itself. It discusses the major organizational roles and describes the two major classes of payload operations: Spacelab mission payload and vertically-installed payload operations. The paper continues by describing the Launch Site Support Team and the Payload Processing Test Team. Specific areas of operational support are then identified including security and access, training, transport and handling, documentation and scheduling. Specific references for further investigatgion are included.
Developing a Standard Method for Link-Layer Security of CCSDS Space Communications
NASA Technical Reports Server (NTRS)
Biggerstaff, Craig
2009-01-01
Communications security for space systems has been a specialized field generally far removed from considerations of mission interoperability and cross-support in fact, these considerations often have been viewed as intrinsically opposed to security objectives. The space communications protocols defined by the Consultative Committee for Space Data Systems (CCSDS) have a twenty-five year history of successful use in over 400 missions. While the CCSDS Telemetry, Telecommand, and Advancing Orbiting Systems protocols for use at OSI Layer 2 are operationally mature, there has been no direct support within these protocols for communications security techniques. Link-layer communications security has been successfully implemented in the past using mission-unique methods, but never before with an objective of facilitating cross-support and interoperability. This paper discusses the design of a standard method for cryptographic authentication, encryption, and replay protection at the data link layer that can be integrated into existing CCSDS protocols without disruption to legacy communications services. Integrating cryptographic operations into existing data structures and processing sequences requires a careful assessment of the potential impediments within spacecraft, ground stations, and operations centers. The objective of this work is to provide a sound method for cryptographic encapsulation of frame data that also facilitates Layer 2 virtual channel switching, such that a mission may procure data transport services as needed without involving third parties in the cryptographic processing, or split independent data streams for separate cryptographic processing.
Semiannual Report to Congress on the Effectiveness of the Civil Aviation Security Program
1988-11-01
secure Zround environment and for providing local law enforcement support for airline and airport security measures. Finally, the passengers, the...operating environment for these air carriers. Airport security programs are designed to meet the threat to the specific airport. Of the 402 airports...assistance during this project. Responding to urgent requests from the Government of Liberia for onsite training of its airport security forces, FAA
Preventing War: Special Operations Engagement in Support of Security Sector Reform
2014-12-04
This study analyzes recent special operations engagement in Mali and the Philippines . Through that analysis, enduring engagement, special......recent special operations engagement in Mali and the Philippines . Through that analysis, enduring engagement, special operation engagement campaigns
Kirtland Operations progress report, April--June 1991
DOE Office of Scientific and Technical Information (OSTI.GOV)
Not Available
Kirtland Operations (KO) is an integral part of EG G Energy Measurements, Inc., whose primary mission is to support the US Department of Energy's (DOE's) programs in weapons development and testing and in nuclear safeguards and security. KO performs much of its work in close coordination with and often at the technical direction of Sandia National Laboratories. In addition to aiding Sandia's weapons programs, KO provides a wide spectrum of technical support to other Sandia activities, particularly their safeguards, security, and treaty verification programs. Support is also provided to other elements of the Department of Energy community and to othermore » federal agencies, primarily in weapons testing and safeguards. This report documents our support to these programs from April to June 1991.« less
Kirtland Operations progress report, January--March 1991
DOE Office of Scientific and Technical Information (OSTI.GOV)
None
Kirtland Operations (KO) is an integral part of EG G Energy Measurements, Inc., whose primary mission is to support the US Department of Energy's (DOE's) programs in weapons development and testing and in nuclear safeguards and security. KO performs much of its work in close coordination with and often at the technical direction of Sandia National Laboratories. In addition to aiding Sandia's weapons programs, KO provides a wide spectrum of technical support to other Sandia activities, particularly their safeguards, security, and treaty verification programs. Support is also provided to other elements of the Department of Energy community and to othermore » federal agencies, primarily in weapons testing and safeguards. This report documents our support to these porgrams from January to March 1991.« less
Kirtland Operations progress report, October--December 1991
DOE Office of Scientific and Technical Information (OSTI.GOV)
Not Available
Kirtland Operations (KO) is an integral part of EG G Energy Measurements, Inc., whose primary mission is to support the US Department of Energy's (DOE's) programs in weapons development and testing and in nuclear safeguards and security. KO performs much of its work in close coordination with and often at the technical direction of Sandia National Laboratories. In addition to aiding Sandia's weapons programs, KO provides a wide spectrum of technical support to other Sandia activities, particularly their safeguards, security, and treaty verification programs. Support is also provided to other elements of the Department of Energy community and to othermore » federal agencies, primarily in weapons testing and safeguards. This report documents our support to these programs from October to December 1991.« less
Assessment of the Office of Security Cooperation-Iraq Mission Capabilities
2013-09-18
and report and other activities conducted by the Office of Special Plans & Operations to spo@dodig.mil Defense Hotline, The Pentagon ... Defense for Policy, U.S. Cenh·al Command, Joint Staff, and Defense Security Cooperation Agency responses when preparing the final repmt. Please...of Department of Defense support for executing security cooperation programs in Iraq and whether the Office of Security
Organizing NORTHCOM for Success: A Theater Special Operations Command
2003-05-22
90 U.S. FORSCOM, "Olympic and Paralympic Games Operations Plan for Emergency Contingency Support," (Ft. McPherson: U.S...Army Forces Command. "Olympic and Paralympic Games Operations Plan for Emergency Contingency Support." Ft. McPherson: Georgia, 1996. ———. "HQ FORSCOM and...Atlanta Organizing Committee for the Olympic Games for the purpose of planning for security and logistical support that the Department of Defense may
Automated Support for Rapid Coordination of Joint UUV Operation
2015-03-01
automata , dead-reckoning, static plan, nmtime plan, rapid deployment, GPS 17. SECURITY CLASSIFICATION OF REPORT Unclassified 18. SECURITY...STATE MACHINES, MOORE AUTOMATA ..........................................9 A. MOORE AUTOMATA ...9 B. UUV PLANS AS MOORE AUTOMATA ...................................................11 C. SAMPLING RATE
EOC serves as the response operational focal point. A communication and coordination hub designed to increase data management and coordination abilities, provides communication support for Watch Officer, Homeland Security, regional and field assets.
2001-01-01
operator. (d) Prohibited usage. (1) Equipment shall not be used in a manner that exerts sideloading stresses upon the crane or derrick boom. (2) No crane ... hooks shall be latched or otherwise secured to prevent accidental load disengagement. (f) General. (1) Operating controls. (i) Crane and derrick...when the boom is supported on a dolly. The empty hook or other attachment shall be secured. (4) Unattended cranes . The following steps shall be taken
Kirtland Operations progress report, October--December 1991
DOE Office of Scientific and Technical Information (OSTI.GOV)
Not Available
Kirtland Operations (KO) is an integral part of EG&G Energy Measurements, Inc., whose primary mission is to support the US Department of Energy`s (DOE`s) programs in weapons development and testing and in nuclear safeguards and security. KO performs much of its work in close coordination with and often at the technical direction of Sandia National Laboratories. In addition to aiding Sandia`s weapons programs, KO provides a wide spectrum of technical support to other Sandia activities, particularly their safeguards, security, and treaty verification programs. Support is also provided to other elements of the Department of Energy community and to other federalmore » agencies, primarily in weapons testing and safeguards. This report documents our support to these programs from October to December 1991.« less
Kirtland Operations progress report, April--June 1991
DOE Office of Scientific and Technical Information (OSTI.GOV)
Not Available
Kirtland Operations (KO) is an integral part of EG&G Energy Measurements, Inc., whose primary mission is to support the US Department of Energy`s (DOE`s) programs in weapons development and testing and in nuclear safeguards and security. KO performs much of its work in close coordination with and often at the technical direction of Sandia National Laboratories. In addition to aiding Sandia`s weapons programs, KO provides a wide spectrum of technical support to other Sandia activities, particularly their safeguards, security, and treaty verification programs. Support is also provided to other elements of the Department of Energy community and to other federalmore » agencies, primarily in weapons testing and safeguards. This report documents our support to these programs from April to June 1991.« less
Extending the Thin Blue Line: Constabulary Police Development in Phase Zero Operations
2015-05-16
procure intelligence and support from local nationals. This participatory community approach to policing promotes a lasting sense of security and safety...conflict by posturing the Germans to establish law and order and internal and border security.92 The participatory police partnership also resulted in...host nation police forces supported the expansion of democracy and promoted safe overseas economic transactions. Consequently, government officials
The remodeling of Army Special Operations Forces (ARSOF) support to Colombian Security Forces during the transition phase of the Revolutionary Armed ...Forces of Colombia needs to be revised at to retain stability in the country. The Fuerzas Armadas Revolucionarias Colombianas (Revolutionary Armed
Biometrics in support of special forces medical operations.
Kershner, Michael R
2012-01-01
Recommendations on ways in which the ODA can leverage biometrics in medical operations to improve their security, improve relations with indigenous personnel, and contribute to the larger theater biometrics program. 2012.
2012-12-01
order, SPMAGTF–12.1 con - ducted staff planning and developed several courses of action in support of anticipated scenarios. Though the need for U.S...response capability is limited to providing evacuation con - trol center support for a noncombatant evacuation, and security in support to foreign...Vision and Strategy 2025, The Long War operational employment con - cept, and AfriCom Theater Campaign Plan (May 2009) and submitted it to Headquarters
Wireless networks of opportunity in support of secure field operations
NASA Astrophysics Data System (ADS)
Stehle, Roy H.; Lewis, Mark
1997-02-01
Under funding from the Defense Advanced Research Projects Agency (DARPA) for joint military and law enforcement technologies, demonstrations of secure information transfer in support of law enforcement and military operations other than war, using wireless and wired technology, were held in September 1996 at several locations in the United States. In this paper, the network architecture, protocols, and equipment supporting the demonstration's scenarios are presented, together with initial results, including lessons learned and desired system enhancements. Wireless networks of opportunity encompassed in-building (wireless-LAN), campus-wide (Metricom Inc.), metropolitan (AMPS cellular, CDPD), and national (one- and two-way satellite) systems. Evolving DARPA-sponsored packet radio technology was incorporated. All data was encrypted, using multilevel information system security initiative (MISSI)FORTEZZA technology, for carriage over unsecured and unclassified commercial networks. The identification and authentication process inherent in the security system permitted logging for database accesses and provided an audit trail useful in evidence gathering. Wireless and wireline communications support, to and between modeled crisis management centers, was demonstrated. Mechanisms for the guarded transport of data through the secret-high military tactical Internet were included, to support joint law enforcement and crisis management missions. A secure World Wide Web (WWW) browser forms the primary, user-friendly interface for information retrieval and submission. The WWW pages were structured to be sensitive to the bandwidth, error rate, and cost of the communications medium in use (e.g., the use of and resolution for graphical data). Both still and motion compressed video were demonstrated, along with secure voice transmission from laptop computers in the field. Issues of network bandwidth, airtime costs, and deployment status are discussed.
Information Dominance: Special Operations Forces in MOOTW.
1997-04-15
threats to our national security. In a rapidly changing world, S0F must be affordable yet technologically advanced to fully support emerging operational concepts and achieve critical information dominance for America in MOOTW.
15 CFR Supplement No. 5 to Part 742 - Encryption Registration
Code of Federal Regulations, 2013 CFR
2013-01-01
... registration, i.e., the information as described in this Supplement, submitted as a support documentation... (h) Smartcards or other identity management (i) Computer or network forensics (j) Software (i) Operating systems (ii) Applications (k) Toolkits/ASICs/components (l) Information security including secure...
15 CFR Supplement No. 5 to Part 742 - Encryption Registration
Code of Federal Regulations, 2011 CFR
2011-01-01
... registration, i.e., the information as described in this Supplement, submitted as a support documentation... (h) Smartcards or other identity management (i) Computer or network forensics (j) Software (i) Operating systems (ii) Applications (k) Toolkits/ASICs/components (l) Information security including secure...
15 CFR Supplement No. 5 to Part 742 - Encryption Registration
Code of Federal Regulations, 2014 CFR
2014-01-01
... registration, i.e., the information as described in this Supplement, submitted as a support documentation... (h) Smartcards or other identity management (i) Computer or network forensics (j) Software (i) Operating systems (ii) Applications (k) Toolkits/ASICs/components (l) Information security including secure...
15 CFR Supplement No. 5 to Part 742 - Encryption Registration
Code of Federal Regulations, 2012 CFR
2012-01-01
... registration, i.e., the information as described in this Supplement, submitted as a support documentation... (h) Smartcards or other identity management (i) Computer or network forensics (j) Software (i) Operating systems (ii) Applications (k) Toolkits/ASICs/components (l) Information security including secure...
How Space - The Fourth Operational Medium - Supports Operational Maneuver.
1987-05-17
51981 87-3044 87 9 18 014 UNCLASSIFIED SECURITY CLASSIFICATION OF THIS PAGE Form Approved REPORT DOCUMENTATION PAGE OMB No. 0704-0188 la. REPORT...P. J anecek (14213 AT L_ aCd) ZL-wI DO Form 1473, JUN 86 Previous editions are obsolete. SECURITY CLASSIFICATION OF THIS PAGE UNCLASSIFIED . ~18...Space technology, superior and enhanced weapons, and space systems combine to form spacepower that can be exploited to enhance ground force mission
2009-06-12
and 2004 National Military Strategy (NMS) continue to germinate . Discussions surrounding the spread of effective democracies and alternate...additional civil-military operation capabilities such as enhanced engineering, additional medical and dental support, and transportation tailored for
1991-10-01
patient names by lexicographical ordering b) patient by social security number c) patient by local institution id d) anatomy by hierarchical anatomical...names, social security or other id numbers, etc. should support partial matches, be case insensitive and accept all possible standard syntaxes (e.g...capabilities (or phobias ), and the uses that output information is put to. Assumptions: The developer has access to view and analyze operational
Big data, little security: Addressing security issues in your platform
NASA Astrophysics Data System (ADS)
Macklin, Thomas; Mathews, Joseph
2017-05-01
This paper describes some patterns for information security problems that consistently emerge among traditional enterprise networks and applications, both with respect to cyber threats and data sensitivity. We draw upon cases from qualitative studies and interviews of system developers, network operators, and certifiers of military applications. Specifically, the problems discussed involve sensitivity of data aggregates, training efficacy, and security decision support in the human machine interface. While proven techniques can address many enterprise security challenges, we provide additional recommendations on how to further improve overall security posture, and suggest additional research thrusts to address areas where known gaps remain.
Cyber Safety and Security for Reduced Crew Operations (RCO)
NASA Technical Reports Server (NTRS)
Driscoll, Kevin
2017-01-01
NASA and the Aviation Industry is looking into reduced crew operations (RCO) that would cut today's required two-person flight crews down to a single pilot with support from ground-based crews. Shared responsibility across air and ground personnel will require highly reliable and secure data communication and supporting automation, which will be safety-critical for passenger and cargo aircraft. This paper looks at the different types and degrees of authority delegation given from the air to the ground and the ramifications of each, including the safety and security hazards introduced, the mitigation mechanisms for these hazards, and other demands on an RCO system architecture which would be highly invasive into (almost) all safety-critical avionics. The adjacent fields of unmanned aerial systems and autonomous ground vehicles are viewed to find problems that RCO may face and related aviation accident scenarios are described. The paper explores possible data communication architectures to meet stringent performance and information security (INFOSEC) requirements of RCO. Subsequently, potential challenges for RCO data communication authentication, encryption and non-repudiation are identified. The approach includes a comprehensive safety-hazard analysis of the RCO system to determine top level INFOSEC requirements for RCO and proposes an option for effective RCO implementation. This paper concludes with questioning the economic viability of RCO in light of the expense of overcoming the operational safety and security hazards it would introduce.
32 CFR 182.2 - Applicability and scope.
Code of Federal Regulations, 2014 CFR
2014-07-01
... by the DoD-Department of Homeland Security Memorandum of Agreement for Department of Defense Support to the United States Coast Guard for Maritime Homeland Security. (7) Aircraft piracy operations... 32 National Defense 1 2014-07-01 2014-07-01 false Applicability and scope. 182.2 Section 182.2...
32 CFR 182.2 - Applicability and scope.
Code of Federal Regulations, 2013 CFR
2013-07-01
... by the DoD-Department of Homeland Security Memorandum of Agreement for Department of Defense Support to the United States Coast Guard for Maritime Homeland Security. (7) Aircraft piracy operations... 32 National Defense 1 2013-07-01 2013-07-01 false Applicability and scope. 182.2 Section 182.2...
2013-05-20
territorial and resource disputes, violent extremism, natural disasters , proliferation, illicit trafficking and more. This complex security...killed by natural disasters annually. Those figures represent 90% and 65% of the world totals, respectively.” 32 The benefits of having two operational...demand …We train to a 5 full range of missions, from humanitarian assistance and disaster relief, to maritime security operations, to amphibious
1988-03-31
MARCI 1988 iAm U m WI 4EUnclT CLSIIAION OF THIS PAGE REPORT DOCUMENTATION PAGE is REPORT SECURITY CLASSIFICATION lb. RESTRICTIVE MARKINGS 2.. SECUR ...logistics system of the future more capable of supporting the full spectrumn of war 20 OISTRIaSUTION.’AVAILAeILiTY 0" ABSTRACT 21 ABSTRACT SECURITY ... SECURITY CLASSIFICATION OT: THIS PAGF Unclas ’SCUFUTY Cý= I!FICATION OF THIS PAGE 1,Qwcont.) scenarios. Today’s logistics processes assume wartime
Joint Command Decision Support System
2011-06-01
2010 Olympics and Paralympics games , about a hundred agencies and organizations were involved with the safety and security of the games . Accordingly...Joint Task Force Games (JTFG) staff members were augmented with other Command Staff from Canada Command and Canadian Operational Support Command...CANOSCOM) to create an operational HQ. The scenario used for demonstration was based on fictitious Olympic Games (Breton and Guitouni 2008). The scenario
Code of Federal Regulations, 2011 CFR
2011-10-01
... information such as social security numbers, names, dates of birth, home addresses and mailing addresses... enable the Office to monitor State operations and assess program performance through the audit conducted...
2015-05-21
lie outside their span of control. This monograph therefore assumes no significant changes to whole-of- government collaboration, legislated ...with several other military and whole-of-government BPC efforts. Security cooperation and security assistance (SA) are legislated portfolios of...Plan Colombia, the campaign proposed in 1999 by the Colombian President to reduce internal conflict, led to increased US confidence and support for
ERIC Educational Resources Information Center
Fleming, E. Scott
2000-01-01
Examines the concept of shared-use facilities to help financially support and meet the demand for athletic facilities. Shared-use considerations are explored including cost sharing of ongoing operations, aesthetics, locker rooms, support facilities, parking and site access, and building access and security. (GR)
75 FR 8508 - Computerized Tribal IV-D Systems and Office Automation
Federal Register 2010, 2011, 2012, 2013, 2014
2010-02-25
...This rule enables Tribes and Tribal organizations currently operating comprehensive Tribal Child Support Enforcement programs under Title IV-D of the Social Security Act (the Act) to apply for and receive direct Federal funding for the costs of automated data processing. This rule addresses the Secretary's commitment to provide instructions and guidance to Tribes and Tribal organizations on requirements for applying for, and upon approval, securing Federal Financial Participation (FFP) in the costs of installing, operating, maintaining, and enhancing automated data processing systems.
RESPONSIBILITY CENTCOM COALITION MEDIA SOCIAL MEDIA NEWS ARTICLES PRESS RELEASES IMAGERY VIDEOS TRANSCRIPTS VISITORS AND PERSONNEL FAMILY CENTER FAMILY READINESS CENTCOM WEBMAIL SOCIAL MEDIA SECURITY ACCOUNTABILITY CENTCOM Coalition Operations And Exercises Operation Inherent Resolve Resolute Support Media Social Media
RESPONSIBILITY CENTCOM COALITION MEDIA SOCIAL MEDIA NEWS ARTICLES PRESS RELEASES IMAGERY VIDEOS TRANSCRIPTS VISITORS AND PERSONNEL FAMILY CENTER FAMILY READINESS CENTCOM WEBMAIL SOCIAL MEDIA SECURITY ACCOUNTABILITY Operations And Exercises Operation Inherent Resolve Resolute Support Media Social Media News Articles Press
DOT National Transportation Integrated Search
2009-07-01
As part of its more than $$24 billion Deepwater program to replace aging vessels and aircraft with new or upgraded assets, the Coast Guard is preparing the National Security Cutter (NSC) for service. GAO previously reported on Deepwater assets' deplo...
Cyber Safety and Security for Reduced Crew Operations (RCO)
NASA Technical Reports Server (NTRS)
Driscoll, Kevin R.; Roy, Aloke; Ponchak, Denise S.; Downey, Alan N.
2017-01-01
NASA and the Aviation Industry is looking into reduced crew operations (RCO) that would cut today's required two-person flight crews down to a single pilot with support from ground-based crews. Shared responsibility across air and ground personnel will require highly reliable and secure data communication and supporting automation, which will be safety-critical for passenger and cargo aircraft. This paper looks at the different types and degrees of authority delegation given from the air to the ground and the ramifications of each, including the safety and security hazards introduced, the mitigation mechanisms for these hazards, and other demands on an RCO system architecture which would be highly invasive into (almost) all safety-critical avionics. The adjacent fields of unmanned aerial systems and autonomous ground vehicles are viewed to find problems that RCO may face and related aviation accident scenarios are described. The paper explores possible data communication architectures to meet stringent performance and information security (INFOSEC) requirements of RCO. Subsequently, potential challenges for RCO data communication authentication, encryption and non-repudiation are identified.
NATO Transformation and Operational Support in the Canadian Forces: Part 1: The Political Dimension
2010-11-01
David Rudd; DRDC CORA TR 2010-244; R & D pour la défense Canada –CARO; Novembre 2010. Contexte: L’Organisation du Traité de l’Atlantique Nord (OTAN...Alliance as a tool through which it pursues a globalized security strategy. 13 At the 2010 Munich Conference on Security Policy, Defense Secretary... 13 National Security Strategy May 2010, p. 41. http://www.whitehouse.gov/sites/default/files
ERIC Educational Resources Information Center
Health Resources and Services Administration (DHHS/PHS), Washington, DC. Maternal and Child Health Bureau.
The Maternal and Child Health (MCH) Services Block Grant (Title V of the Social Security Act) has operated as a federal-state partnership since the Social Security Act was passed in 1935. Through Title V, the federal government pledged its support of state efforts to extend health and welfare services for mothers and children. Title V has been…
The Flask Security Architecture: System Support for Diverse Security Policies
2006-01-01
Flask microkernel -based operating sys tem, that successfully overcomes these obstacles to pol- icy flexibility. The cleaner separation of mechanism and...other object managers in the system to en- force those access control decisions. Although the pro totype system is microkernel -based, the security...mecha nisms do not depend on a microkernel architecture and will easily generalize beyond it. The resulting system provides policy flexibility. It sup
Cyber Security Testing and Training Programs for Industrial Control Systems
DOE Office of Scientific and Technical Information (OSTI.GOV)
Daniel Noyes
2012-03-01
Service providers rely on industrial control systems (ICS) to manage the flow of water at dams, open breakers on power grids, control ventilation and cooling in nuclear power plants, and more. In today's interconnected environment, this can present a serious cyber security challenge. To combat this growing challenge, government, private industry, and academia are working together to reduce cyber risks. The Idaho National Laboratory (INL) is a key contributor to the Department of Energy National SCADA Test Bed (NSTB) and the Department of Homeland Security (DHS) Control Systems Security Program (CSSP), both of which focus on improving the overall securitymore » posture of ICS in the national critical infrastructure. In support of the NSTB, INL hosts a dedicated SCADA testing facility which consists of multiple control systems supplied by leading national and international manufacturers. Within the test bed, INL researchers systematically examine control system components and work to identify vulnerabilities. In support of the CSSP, INL develops and conducts training courses which are designed to increase awareness and defensive capabilities for IT/Control System professionals. These trainings vary from web-based cyber security trainings for control systems engineers to more advanced hands-on training that culminates with a Red Team/ Blue Team exercise that is conducted within an actual control systems environment. INL also provides staffing and operational support to the DHS Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) Security Operations Center which responds to and analyzes control systems cyber incidents across the 18 US critical infrastructure sectors.« less
Architecture of security management unit for safe hosting of multiple agents
NASA Astrophysics Data System (ADS)
Gilmont, Tanguy; Legat, Jean-Didier; Quisquater, Jean-Jacques
1999-04-01
In such growing areas as remote applications in large public networks, electronic commerce, digital signature, intellectual property and copyright protection, and even operating system extensibility, the hardware security level offered by existing processors is insufficient. They lack protection mechanisms that prevent the user from tampering critical data owned by those applications. Some devices make exception, but have not enough processing power nor enough memory to stand up to such applications (e.g. smart cards). This paper proposes an architecture of secure processor, in which the classical memory management unit is extended into a new security management unit. It allows ciphered code execution and ciphered data processing. An internal permanent memory can store cipher keys and critical data for several client agents simultaneously. The ordinary supervisor privilege scheme is replaced by a privilege inheritance mechanism that is more suited to operating system extensibility. The result is a secure processor that has hardware support for extensible multitask operating systems, and can be used for both general applications and critical applications needing strong protection. The security management unit and the internal permanent memory can be added to an existing CPU core without loss of performance, and do not require it to be modified.
Computerized procedures system
Lipner, Melvin H.; Mundy, Roger A.; Franusich, Michael D.
2010-10-12
An online data driven computerized procedures system that guides an operator through a complex process facility's operating procedures. The system monitors plant data, processes the data and then, based upon this processing, presents the status of the current procedure step and/or substep to the operator. The system supports multiple users and a single procedure definition supports several interface formats that can be tailored to the individual user. Layered security controls access privileges and revisions are version controlled. The procedures run on a server that is platform independent of the user workstations that the server interfaces with and the user interface supports diverse procedural views.
Securing co-operation from persons supplying statistical data
Aubenque, M. J.; Blaikley, R. M.; Harris, F. Fraser; Lal, R. B.; Neurdenburg, M. G.; Hernández, R. de Shelly
1954-01-01
Securing the co-operation of persons supplying information required for medical statistics is essentially a problem in human relations, and an understanding of the motivations, attitudes, and behaviour of the respondents is necessary. Before any new statistical survey is undertaken, it is suggested by Aubenque and Harris that a preliminary review be made so that the maximum use is made of existing information. Care should also be taken not to burden respondents with an overloaded questionnaire. Aubenque and Harris recommend simplified reporting. Complete population coverage is not necessary. Neurdenburg suggests that the co-operation and support of such organizations as medical associations and social security boards are important and that propaganda should be directed specifically to the groups whose co-operation is sought. Informal personal contacts are valuable and desirable, according to Blaikley, but may have adverse effects if the right kind of approach is not made. Financial payments as an incentive in securing co-operation are opposed by Neurdenburg, who proposes that only postage-free envelopes or similar small favours be granted. Blaikley and Harris, on the other hand, express the view that financial incentives may do much to gain the support of those required to furnish data; there are, however, other incentives, and full use should be made of the natural inclinations of respondents. Compulsion may be necessary in certain instances, but administrative rather than statutory measures should be adopted. Penalties, according to Aubenque, should be inflicted only when justified by imperative health requirements. The results of surveys should be made available as soon as possible to those who co-operated, and Aubenque and Harris point out that they should also be of practical value to the suppliers of the information. Greater co-operation can be secured from medical persons who have an understanding of the statistical principles involved; Aubenque and Neurdenburg suggest that a course in elementary statistical methodology be introduced in the curriculum of medical schools. Methods for improving co-operation, and thus the compilation of statistics, in particular countries are discussed by Lal and de Shelly Hernández, who deal with India and Venezuela respectively. PMID:13199667
ESnet authentication services and trust federations
NASA Astrophysics Data System (ADS)
Muruganantham, Dhivakaran; Helm, Mike; Genovese, Tony
2005-01-01
ESnet provides authentication services and trust federation support for SciDAC projects, collaboratories, and other distributed computing applications. The ESnet ATF team operates the DOEGrids Certificate Authority, available to all DOE Office of Science programs, plus several custom CAs, including one for the National Fusion Collaboratory and one for NERSC. The secure hardware and software environment developed to support CAs is suitable for supporting additional custom authentication and authorization applications that your program might require. Seamless, secure interoperation across organizational and international boundaries is vital to collaborative science. We are fostering the development of international PKI federations by founding the TAGPMA, the American regional PMA, and the worldwide IGTF Policy Management Authority (PMA), as well as participating in European and Asian regional PMAs. We are investigating and prototyping distributed authentication technology that will allow us to support the "roaming scientist" (distributed wireless via eduroam), as well as more secure authentication methods (one-time password tokens).
ERIC Educational Resources Information Center
Armstead, Stanley K.
2017-01-01
In today's dynamic military environment, information technology plays a crucial role in the support of mission preparedness and operational readiness. This research examined the effectiveness of information technology security simulation and awareness training on U.S. military personnel in Iraq and Afghanistan. Also, the study analyzed whether…
Essentials for Attorneys in Child Support Enforcement.
ERIC Educational Resources Information Center
Henry, Michael R.; And Others
This handbook presents a course developed to provide a national perspective for attorneys who represent state and local child support enforcement agencies operating under Title IV-D of the Social Security Act. The introduction provides an overview of the child support problem in the United States, citing causes and effects of the problem and…
Defense Infrastructure: Department of Defense Renewable Energy Initiatives
2010-04-26
Operational 2005 No 2009 10 280 Dept Navy NAVFAC Hawaii HI Solar Water Heating Systems, Fort Kamehameha WWTF Solar Thermal Fully Operational 2006 Yes... Kamehameha WWTF 0.00 50.00 Reduces fossil fuel use, increases energy security Supports 10 USC 2911 renewable energy goal Supports 10 USC 2911...renewable energy goal Solar Water Heating Systems, Fort Kamehameha WWTF 281 Dept Navy NAVFAC Hawaii HI Solar Water Heating System, Building X-11
Information Security and Integrity Systems
NASA Technical Reports Server (NTRS)
1990-01-01
Viewgraphs from the Information Security and Integrity Systems seminar held at the University of Houston-Clear Lake on May 15-16, 1990 are presented. A tutorial on computer security is presented. The goals of this tutorial are the following: to review security requirements imposed by government and by common sense; to examine risk analysis methods to help keep sight of forest while in trees; to discuss the current hot topic of viruses (which will stay hot); to examine network security, now and in the next year to 30 years; to give a brief overview of encryption; to review protection methods in operating systems; to review database security problems; to review the Trusted Computer System Evaluation Criteria (Orange Book); to comment on formal verification methods; to consider new approaches (like intrusion detection and biometrics); to review the old, low tech, and still good solutions; and to give pointers to the literature and to where to get help. Other topics covered include security in software applications and development; risk management; trust: formal methods and associated techniques; secure distributed operating system and verification; trusted Ada; a conceptual model for supporting a B3+ dynamic multilevel security and integrity in the Ada runtime environment; and information intelligence sciences.
Information Assurance Tasks Supporting the Processing of Electronic Records Archives
2007-03-01
3 Table 2. OpenVPN evaluation results...........................................................................................10 iv 1...operation of necessary security features and compare the network performance under OpenVPN (openvpn.net) operation with the network performance under no...VPN operation (non-VPN) in a gigabit network environment. The reason for selecting OpenVPN product was based on the previous findings of Khanvilkar
The Department of Homeland Security’s Pursuit of Data-Driven Decision Making
2015-12-01
agencies’ information management systems pertaining to mission support and business operations 1 KT...Directorate’s operating environment. xviii managed . Meanwhile, adding to the intrinsic organizational change management challenges is the idea that...a timely manner. The lack of a single, enterprise-wide information management system has resulted in numerous, disparate systems operating within
DOE Office of Scientific and Technical Information (OSTI.GOV)
Schanfein, Mark J.; Mladineo, Stephen V.
2015-07-07
Over the last few years, significant attention has been paid to both encourage application and provide domestic and international guidance for designing in safeguards and security in new facilities.1,2,3 However, once a facility is operational, safeguards, security, and safety often operate as separate entities that support facility operations. This separation is potentially a serious weakness should insider or outsider threats become a reality.Situations may arise where safeguards detects a possible loss of material in a facility. Will they notify security so they can, for example, check perimeter doors for tampering? Not doing so might give the advantage to an insidermore » who has already, or is about to, move nuclear material outside the facility building. If outsiders break into a facility, the availability of any information to coordinate the facility’s response through segregated alarm stations or a failure to include all available radiation sensors, such as safety’s criticality monitors can give the advantage to the adversary who might know to disable camera systems, but would most likely be unaware of other highly relevant sensors in a nuclear facility.This paper will briefly explore operational safeguards, safety, and security by design (3S) at a high level for domestic and State facilities, identify possible weaknesses, and propose future administrative and technical methods, to strengthen the facility system’s response to threats.« less
2014-04-01
important data structures of RTEMS are introduced. Section 3.2.2 discusses the problems we found in RTEMS that may cause security vulnerabilities...the important data structures in RTEMS: Object, which is a critical data structure in the SCORE, tasks threads. Approved for Public Release...these important system codes. The example code shows a possibility that a user can delete a system thread. Therefore, in order to protect system
Waterside Security 2010 (WSS 2010) Conference: Post Conference Report
2011-02-01
Memorandum Report NURC-MR-2011-002 Waterside Security 2010 (WSS2010) Conference: post conference report Ronald Kessel and...in NATO, NURC conducts maritime research in support of NATO’s operational and transformation requirements. Reporting to the Supreme Allied Commander...independent business process certification. Copyright © NURC 2011. NATO member nations have unlimited rights to use, modify, reproduce, release
The Land Component Role in Maritime Security
2016-12-31
U.S. Army Pacific (USARPAC) is designated as the Theater Joint Force Land Component Command (TJFLCC) and endeavors to support the PACOM Theater ...security. 1 Mike Wall , “What 11 Billion People Mean for Space Travel,” November 27, 2013...human outcomes that are a prerequisite for achieving national objectives”18. These are land-based operations designed to create stability in human
Integrating Partner Nations into Coalition Operations
2006-01-01
of United Nations (UN) Security Council Resolu- tion 1529, Chile , Canada, France, and the United States established a multinational force...of restabi- lization. Chile continues to deploy forces as a member of the UN Stabilization Force Haiti (MINUSTAH), led by Brazil and comprised...supporting a tailored exercise and theater security cooperation program that has encouraged partners such as Chile , Brazil, and El Salvador to develop
Nevada National Security Site Environmental Report 2016
DOE Office of Scientific and Technical Information (OSTI.GOV)
Wills
This Nevada National Security Site Environmental Report (NNSSER) was prepared to satisfy DOE Order DOE O 231.1B, “Environment, Safety and Health Reporting.” Its purpose is to (1) report compliance status with environmental standards and requirements, (2) present results of environmental monitoring of radiological and nonradiological effluents, (3) report estimated radiological doses to the public from releases of radioactive material, (4) summarize environmental incidents of noncompliance and actions taken in response to them, (5) describe the National Nuclear Security Administration Nevada Field Office (NNSA/NFO) Environmental Management System and characterize its performance, and (6) highlight significant environmental programs and efforts. This NNSSERmore » summarizes data and compliance status for calendar year 2016 at the Nevada National Security Site (NNSS) and its two Nevada-based support facilities, the North Las Vegas Facility (NLVF) and the Remote Sensing Laboratory–Nellis (RSL-Nellis). It also addresses environmental restoration (ER) projects conducted at the Tonopah Test Range (TTR) and the Nevada Test and Training Range (NTTR). NNSA/NFO directs the management and operation of the NNSS and six sites across the nation. In addition to the NNSA itself, the six sites include two in Nevada (NLVF and RSL-Nellis) and four in other states (RSL-Andrews in Maryland, Livermore Operations in California, Los Alamos Operations in New Mexico, and Special Technologies Laboratory in California). Los Alamos, Lawrence Livermore, and Sandia National Laboratories are the principal organizations that sponsor and implement the nuclear weapons programs at the NNSS. National Security Technologies, LLC (NSTec), is the current Management and Operating contractor accountable for the successful execution of work and ensuring that work is performed in compliance with environmental regulations. The six sites all provide support to enhance the NNSS as a location for its multiple missions. The three major NNSS missions include National Security/Defense, Environmental Management, and Nondefense. The major programs that support these missions are Stockpile Stewardship and Management, Nonproliferation and Counterterrorism, Nuclear Emergency Response, Strategic Partnership Projects, Environmental Restoration, Waste Management, Conservation and Renewable Energy, Other Research and Development, and Infrastructure. The major facilities that support the programs include the U1a Facility, Big Explosives Experimental Facility (BEEF), Device Assembly Facility, Dense Plasma Focus Facility, Joint Actinide Shock Physics Experimental Research Facility, Radiological/Nuclear Countermeasures Test and Evaluation Complex, Nonproliferation Test and Evaluation Complex (NPTEC), Radiological/Nuclear Weapons of Mass Destruction Incident Exercise Site, the Area 5 Radioactive Waste Management Complex (RWMC), and the Area 3 Radioactive Waste Management Site (RWMS).« less
Android Protection Mechanism: A Signed Code Security Mechanism for Smartphone Applications
2011-03-01
status registers, exceptions, endian support, unaligned access support, synchronization primitives , the Jazelle Extension, and saturated integer...supports comprehensive non-blocking shared-memory synchronization primitives that scale for multiple-processor system designs. This is an improvement... synchronization . Memory semaphores can be loaded and altered without interruption because the load and store operations are atomic. Processor
vWorld Capability Development Support: Literature Survey
2014-06-24
support of system development for: Navy operations, Navy training, other military operations and training, real-time defence and security (e.g...vWorlds. The conclusions of this work are: a. Several vWorld platforms are available that could be and are being applied to military domains (at...that vWorlds endure (as- is) when powered off and on again without the need for a user to explicitly save the vWorld state. For specific military
2002-03-01
sections consists of four units, the Domestic Terrorism Operations Unit, the WMD Operations Unit, the WMD Countermeasures Unit, and Special Events Management Unit...Countermeasures Unit Chief Special Events Management Unit Chief Domestic Terrorism/ Counterterrorism Section Chief International Terrorism Section Asstistant
NASA Astrophysics Data System (ADS)
Ferriere, D.; Rucinski, A.; Jankowski, T.
2007-04-01
Establishing a Virtual Sea Border by performing a real-time, satellite-accessible Internet-based bio-metric supported threat assessment of arriving foreign-flagged cargo ships, their management and ownership, their arrival terminal operator and owner, and rewarding proven legitimate operators with an economic incentive for their transparency will simultaneously improve port security and maritime transportation efficiencies.
Comprehensive Civil Information Management: How to Provide It
2012-04-04
5f. WORK UNIT NUMBER 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) AND ADDRESS(ES) 8. PERFORMING ORGANIZATION REPORT NUMBER...Management, Non-Government Organizations , International Organizations , Interagency 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT 18...Information Support Operations, Psychological Operations, Flat Technology, Knowledge Management, Non-Government Organizations , International
2012-12-01
flows, diversity, emergence, networks, fusion, strategic planning, information sharing, ecosystem, hierarchy, NJ Regional Operations Intelligence ...Related Information...........................................................................79 viii 3. Production of Disaster Intelligence for... Intelligence for Field Personnel .................80 5. Focused Collection Efforts to Support FEMA and NJ OEM Operations
DOE Office of Scientific and Technical Information (OSTI.GOV)
Petru, Ernest Frank
The Human Resources (HR) Division is a critical part of Los Alamos National Laboratory, an internationally recognized science and R&D facility with a specialized workforce of more than 10,000. The Laboratory’s mission is to solve national security challenges through scientific excellence. The HR Division partners with employees and managers to support the Laboratory in hiring, retaining, and motivating an exceptional workforce. The Laboratory is owned by the U.S. Department of Energy (DOE), with oversight by the DOE’s National Nuclear Security Administration (NNSA). In 2006, NNSA awarded the contract for managing and operating the Laboratory to Los Alamos National Security, LLCmore » (LANS), and a for-profit consortium. This report expounds on performance excellence efforts, presenting a strategic plan and operations.« less
Walker, T; Edge, D; Shaw, J; Wilson, H; McNair, L; Mitchell, H; Gutridge, K; Senior, J; Sutton, M; Meacock, R; Abel, K
2017-11-01
WHAT IS KNOWN ON THE SUBJECT?: Three pilot UK-only Women's Enhanced Medium Secure Services (WEMSS) was opened in 2007 to support women's movement from high secure care and provide a bespoke, women-only service. Evidence suggests that women's secure services are particularly challenging environments to work in and staffing issues (e.g., high turnover) can cause difficulties in establishing a therapeutic environment. Research in this area has focused on the experiences of service users. Studies which have examined staff views have focused on their feelings towards women in their care and the emotional burden of working in women's secure services. No papers have made a direct comparison between staff working in different services. WHAT DOES THIS STUDY ADD TO EXISTING KNOWLEDGE?: This is the first study to explore the views and experiences of staff in the three UK WEMSS pilot services and contrast them with staff from women's medium secure services. Drawing upon data from eighteen semi-structured interviews (nine WEMSS, nine non-WEMSS), key themes cover staff perceptions of factors important for women's recovery and their views on operational aspects of services. This study extends our understanding of the experiences of staff working with women in secure care and bears relevance for staff working internationally, as well as in UK services. WHAT ARE THE IMPLICATIONS FOR PRACTICE?: The study reveals the importance of induction and training for bank and agency staff working in women's secure services. Further, regular clinical supervision should be mandatory for all staff so they are adequately supported. Introduction Women's Enhanced Medium Secure Services (WEMSS) is bespoke, gender-sensitive services which opened in the UK in 2007 at three pilot sites. This study is the first of its kind to explore the experiences of WEMSS staff, directly comparing them to staff in a standard medium secure service for women. The literature to date has focused on the experiences of service users or staff views on working with women in secure care. Aim This qualitative study, embedded in a multimethod evaluation of WEMSS, aimed to explore the views and experiences of staff in WEMSS and comparator medium secure services. Methods Qualitative interviews took place with nine WEMSS staff and nine comparator medium secure staff. Interviews focused on factors important for recovery, barriers to facilitating recovery and operational aspects of the service. Discussion This study provides a rare insight into the perspectives of staff working in UK women's secure services, an under-researched area in the UK and internationally. Findings suggest that the success of services, including WEMSS, is compromised by operational factors such as the use of bank staff. Implications for practice Comprehensive training and supervision should be mandatory for all staff, so best practice is met and staff adequately supported. © 2017 John Wiley & Sons Ltd.
Mission Assurance Modeling and Simulation: A Cyber Security Roadmap
NASA Technical Reports Server (NTRS)
Gendron, Gerald; Roberts, David; Poole, Donold; Aquino, Anna
2012-01-01
This paper proposes a cyber security modeling and simulation roadmap to enhance mission assurance governance and establish risk reduction processes within constrained budgets. The term mission assurance stems from risk management work by Carnegie Mellon's Software Engineering Institute in the late 19905. By 2010, the Defense Information Systems Agency revised its cyber strategy and established the Program Executive Officer-Mission Assurance. This highlights a shift from simply protecting data to balancing risk and begins a necessary dialogue to establish a cyber security roadmap. The Military Operations Research Society has recommended a cyber community of practice, recognizing there are too few professionals having both cyber and analytic experience. The authors characterize the limited body of knowledge in this symbiotic relationship. This paper identifies operational and research requirements for mission assurance M&S supporting defense and homeland security. M&S techniques are needed for enterprise oversight of cyber investments, test and evaluation, policy, training, and analysis.
The Double-System Architecture for Trusted OS
NASA Astrophysics Data System (ADS)
Zhao, Yong; Li, Yu; Zhan, Jing
With the development of computer science and technology, current secure operating systems failed to respond to many new security challenges. Trusted operating system (TOS) is proposed to try to solve these problems. However, there are no mature, unified architectures for the TOS yet, since most of them cannot make clear of the relationship between security mechanism and the trusted mechanism. Therefore, this paper proposes a double-system architecture (DSA) for the TOS to solve the problem. The DSA is composed of the Trusted System (TS) and the Security System (SS). We constructed the TS by establishing a trusted environment and realized related SS. Furthermore, we proposed the Trusted Information Channel (TIC) to protect the information flow between TS and SS. In a word, the double system architecture we proposed can provide reliable protection for the OS through the SS with the supports provided by the TS.
Provision of healthcare in a remote base of operations in southern Chad.
Hickey, J P
2010-09-01
The Irish Defence Forces maintained a presence in south eastern Chad under the authority of the United Nations Security Council from January 2008 until May 2010, operating in a peace support role as the lead contingent in a multinational battalion. In September 2009 the task of establishing a forward operating base in a remote location within the area of operations was ordered by mission headquarters. Irish and Finnish troops duly deployed and began the task of establishing a safe and secure base from which to operate. This involved securing the location, installing accommodation, electricity, lighting and facilities for ablutions, removing natural hazards, establishing secure communications and ensuring rapid access and egress in the event of hostile contact or emergency. The incidence of disease at this location was low, with the notable exception of a limited outbreak of gastroenteritis. The high standard of engineering work carried out around the camp, especially the latrines, washing facilities and other hygiene measures, significantly contributed to minimising the transmission of infectious disease. The past experiences of the Defence Forces in Congo, Lebanon, East Timor, Eritrea and Liberia have led to a high standard of forward planning and logistical awareness within the organisation which served personnel well in this latest mission. Copyright © 2010 Elsevier Ltd. All rights reserved.
33 CFR 105.200 - Owner or operator.
Code of Federal Regulations, 2010 CFR
2010-07-01
... organizational structure and provide each person exercising security duties and responsibilities within that structure the support needed to fulfill those obligations; (2) Designate, in writing, by name or by title, a...
Analysis for Non-Traditional Security Challenges: Methods and Tools
2006-11-20
PMESII Modeling Challenges modeling or where data is not available to support the model, would aid decision Domain is large, nebulous, complex, and...traditional challenges . This includes enlisting the aid of the inter-agency and alliance/coalition communities. Second, we need to realize this...20 November 2006 MILITARY OPERATIONS RESEARCH SOCIETY MIFh MORS Workshop Analysis for Non-Traditional Security Challenges : Methods and Tools 21-23
Server-Based and Server-Less Byod Solutions to Support Electronic Learning
2016-06-01
Knowledge Online NSD National Security Directive OS operating system OWA Outlook Web Access PC personal computer PED personal electronic device PDA...mobile devices, institute mobile device policies and standards, and promote the development and use of DOD mobile and web -enabled applications” (DOD...with an isolated BYOD web server, properly educated system administrators must carry out and execute the necessary, pre-defined network security
Design of real-time encryption module for secure data protection of wearable healthcare devices.
Kim, Jungchae; Lee, Byuck Jin; Yoo, Sun K
2013-01-01
Wearable devices for biomedical instrumentation could generate the medical data and transmit to a repository on cloud service through wireless networks. In this process, the private medical data will be disclosed by man in the middle attack. Thus, the archived data for healthcare services would be protected by non-standardized security policy by healthcare service provider (HSP) because HIPAA only defines the security rules. In this paper, we adopted the Advanced Encryption Standard (AES) for security framework on wearable devices, so healthcare applications using this framework could support the confidentiality easily. The framework developed as dynamic loadable module targeted for lightweight microcontroller such as msp430 within embedded operating system. The performance was shown that the module can support the real-time encryption using electrocardiogram and photoplethysmogram. In this regard, the processing load for enabling security is distributed to wearable devices, and the customized data protection method could be composed by HSP for a trusted healthcare service.
77 FR 37881 - 36(b)(1) Arms Sales Notification
Federal Register 2010, 2011, 2012, 2013, 2014
2012-06-25
... and humanitarian operations have made a significant impact on regional political and economic stability and have served U.S. national security interests. Norway intends to use these aircraft in support...
Draft secure medical database standard.
Pangalos, George
2002-01-01
Medical database security is a particularly important issue for all Healthcare establishments. Medical information systems are intended to support a wide range of pertinent health issues today, for example: assure the quality of care, support effective management of the health services institutions, monitor and contain the cost of care, implement technology into care without violating social values, ensure the equity and availability of care, preserve humanity despite the proliferation of technology etc.. In this context, medical database security aims primarily to support: high availability, accuracy and consistency of the stored data, the medical professional secrecy and confidentiality, and the protection of the privacy of the patient. These properties, though of technical nature, basically require that the system is actually helpful for medical care and not harmful to patients. These later properties require in turn not only that fundamental ethical principles are not violated by employing database systems, but instead, are effectively enforced by technical means. This document reviews the existing and emerging work on the security of medical database systems. It presents in detail the related problems and requirements related to medical database security. It addresses the problems of medical database security policies, secure design methodologies and implementation techniques. It also describes the current legal framework and regulatory requirements for medical database security. The issue of medical database security guidelines is also examined in detailed. The current national and international efforts in the area are studied. It also gives an overview of the research work in the area. The document also presents in detail the most complete to our knowledge set of security guidelines for the development and operation of medical database systems.
Analysis of Security Contractors in Deployed Environments
2006-12-01
35 2. Proper Training and Education .......................................................36 3. Improve Overall Contract Visibility...like to acknowledge the work of P. W. Singer , author of the book titled “Corporate Warriors,” whose dedicated research and thorough analysis on the...skills, including combat operations, strategic planning, intelligence, risk assessment, operational support, training , and technical skills.”3 CPFF
Federal Register 2010, 2011, 2012, 2013, 2014
2012-12-26
... Radiological Emergency Response Plans and Preparedness in Support of Nuclear Power Plants, and Nuclear Energy... 10 CFR 51.22. Therefore, pursuant to 10 CFR 51.22(b), no environmental impact statement or... cyber security controls only. The operational and management controls, as described in Nuclear Energy...
Hurricane risk mitigation - Emergency Operations Center
2008-07-29
Construction work on a new Emergency Operations Center at Stennis Space Center is nearing completion. Construction is expected to be complete by February 2009, with actual occupancy of the building planned for later that year. The new building will house fire, medical and security teams and will provide a top-grade facility to support storm emergency responder teams and emergency management operations for the south Mississippi facility.
What It Takes. Air Force Command of Joint Operations
2009-01-01
Iraq Assistance Group IDE intermediate developmental education IO international organization ISAF International Security and Assistance Force ISR...Operations Table A.1—Continued Joint Task Force Mission/Operation Start End Service Command Rank JTF–Joint Area Support Group (JASG) Iraqi Freedom...be of interest to a wide group of Air Force personnel involved in the development and func- tion of the service’s command organizations, including
On a simulation study for reliable and secured smart grid communications
NASA Astrophysics Data System (ADS)
Mallapuram, Sriharsha; Moulema, Paul; Yu, Wei
2015-05-01
Demand response is one of key smart grid applications that aims to reduce power generation at peak hours and maintain a balance between supply and demand. With the support of communication networks, energy consumers can become active actors in the energy management process by adjusting or rescheduling their electricity usage during peak hours based on utilities pricing incentives. Nonetheless, the integration of communication networks expose the smart grid to cyber-attacks. In this paper, we developed a smart grid simulation test-bed and designed evaluation scenarios. By leveraging the capabilities of Matlab and ns-3 simulation tools, we conducted a simulation study to evaluate the impact of cyber-attacks on demand response application. Our data shows that cyber-attacks could seriously disrupt smart grid operations, thus confirming the need of secure and resilient communication networks for supporting smart grid operations.
The Effects of Doctrine on International Security Assistance Force Operations
2008-04-04
Article 5 collective defense.34 These operations can be described as: Such operations are normally known as Peace Support Operations ( PSO ). They are...diplomatic and humanitarian agencies. PSO are designed to achieve a long-term political settlement or other specified conditions. They include...December 2006), ix. 42 Gallis. 43 Ann Scott Tyson and Josh White, “Gates Hits NATO Allies’ Role in Afghanistan,” Washington Post, 7 February 2008, sec
WEDDS: The WITS Encrypted Data Delivery System
NASA Technical Reports Server (NTRS)
Norris, J.; Backes, P.
1999-01-01
WEDDS, the WITS Encrypted Data Delivery System, is a framework for supporting distributed mission operations by automatically transferring sensitive mission data in a secure and efficient manner to and from remote mission participants over the internet.
NASA Technical Reports Server (NTRS)
Takamura, Eduardo; Mangum, Kevin
2016-01-01
The National Aeronautics and Space Administration (NASA) invests millions of dollars in spacecraft and ground system development, and in mission operations in the pursuit of scientific knowledge of the universe. In recent years, NASA sent a probe to Mars to study the Red Planet's upper atmosphere, obtained high resolution images of Pluto, and it is currently preparing to find new exoplanets, rendezvous with an asteroid, and bring a sample of the asteroid back to Earth for analysis. The success of these missions is enabled by mission assurance. In turn, mission assurance is backed by information assurance. The information systems supporting NASA missions must be reliable as well as secure. NASA - like every other U.S. Federal Government agency - is required to manage the security of its information systems according to federal mandates, the most prominent being the Federal Information Security Management Act (FISMA) of 2002 and the legislative updates that followed it. Like the management of enterprise information technology (IT), federal information security management takes a "one-size fits all" approach for protecting IT systems. While this approach works for most organizations, it does not effectively translate into security of highly specialized systems such as those supporting NASA missions. These systems include command and control (C&C) systems, spacecraft and instrument simulators, and other elements comprising the ground segment. They must be carefully configured, monitored and maintained, sometimes for several years past the missions' initially planned life expectancy, to ensure the ground system is protected and remains operational without any compromise of its confidentiality, integrity and availability. Enterprise policies, processes, procedures and products, if not effectively tailored to meet mission requirements, may not offer the needed security for protecting the information system, and they may even become disruptive to mission operations. Certain protective measures for the general enterprise may not be as efficient within the ground segment. This is what the authors have concluded through observations and analysis of patterns identified from the various security assessments performed on NASA missions such as MAVEN, OSIRIS-REx, New Horizons and TESS, to name a few. The security audits confirmed that the framework for managing information system security developed by the National Institute of Standards and Technology (NIST) for the federal government, and adopted by NASA, is indeed effective. However, the selection of the technical, operational and management security controls offered by the NIST model - and how they are implemented - does not always fit the nature and the environment where the ground system operates in even though there is no apparent impact on mission success. The authors observed that unfit controls, that is, controls that are not necessarily applicable or sufficiently effective in protecting the mission systems, are often selected to facilitate compliance with security requirements and organizational expectations even if the selected controls offer minimum or non-existent protection. This paper identifies some of the standard security controls that can in fact protect the ground system, and which of them offer little or no benefit at all. It offers multiple scenarios from real security audits in which the controls are not effective without, of course, disclosing any sensitive information about the missions assessed. In addition to selection and implementation of controls, the paper also discusses potential impact of recent legislation such as the Federal Information Security Modernization Act (FISMA) of 2014 - aimed at the enterprise - on the ground system, and offers other recommendations to Information System Owners (ISOs).
DOE Office of Scientific and Technical Information (OSTI.GOV)
Fisher, R. E.; Buehring, W. A.; Whitfield, R. G.
2009-10-14
The US Department of Homeland Security (DHS) has directed its Protective Security Advisors (PSAs) to form partnerships with the owners and operators of assets most essential to the Nation's well being - a subclass of critical infrastructure and key resources (CIKR) - and to conduct site visits for these and other high-risk assets as part of the Enhanced Critical Infrastructure Protection (ECIP) Program. During each such visit, the PSA documents information about the facility's current CIKR protection posture and overall security awareness. The primary goals for ECIP site visits (DHS 2009) are to: (1) inform facility owners and operators ofmore » the importance of their facilities as an identified high-priority CIKR and the need to be vigilant in light of the ever-present threat of terrorism; (2) identify protective measures currently in place at these facilities, provide comparisons of CIKR protection postures across like assets, and track the implementation of new protective measures; and (3) enhance existing relationships among facility owners and operators; DHS; and various Federal, State, local tribal, and territorial partners. PSAs conduct ECIP visits to assess overall site security; educate facility owners and operators about security; help owners and operators identify gaps and potential improvements; and promote communication and information sharing among facility owners and operators, DHS, State governments, and other security partners. Information collected during ECIP visits is used to develop metrics; conduct sector-by-sector and cross-sector vulnerability comparisons; identify security gaps and trends across CIKR sectors and subsectors; establish sector baseline security survey results; and track progress toward improving CIKR security through activities, programs, outreach, and training (Snyder 2009). The data being collected are used in a framework consistent with the National Infrastructure Protection Plan (NIPP) risk criteria (DHS 2009). The NIPP framework incorporates consequence, threat, and vulnerability components and addresses all hazards. The analysis of the vulnerability data needs to be reproducible, support risk analysis, and go beyond protection. It also needs to address important security/vulnerability topics, such as physical security, cyber security, systems analysis, and dependencies and interdependencies. This report provides an overview of the approach being developed to estimate vulnerability and provide vulnerability comparisons for sectors and subsectors. the information will be used to assist DHS in analyzing existing protective measures and vulnerability at facilities, to identify potential ways to reduce vulnerabilities, and to assist in preparing sector risk estimates. The owner/operator receives an analysis of the data collected for a specific asset, showing a comparison between the facility's protection posture/vulnerability index and those of DHS sector/subsector sites visited. This comparison gives the owner/operator an indication of the asset's security strengths and weaknesses that may be contributing factors to its vulnerability and protection posture. The information provided to the owner/operator shows how the asset compares to other similar assets within the asset's sector or subsector. A 'dashboard' display is used to illustrate the results in a convenient format. The dashboard allows the owner/operator to analyze the implementation of additional protective measures and to illustrate how such actions would impact the asset's Protective Measures Index (PMI) or Vulnerability Index (VI).« less
Telemedicine Platform Enhanced visiophony solution to operate a Robot-Companion
NASA Astrophysics Data System (ADS)
Simonnet, Th.; Couet, A.; Ezvan, P.; Givernaud, O.; Hillereau, P.
Nowadays, one of the ways to reduce medical care costs is to reduce the length of patients hospitalization and reinforce home sanitary support by formal (professionals) and non formal (family) caregivers. The aim is to design and operate a scalable and secured collaborative platform to handle specific tools for patients, their families and doctors.
2014-05-22
Contingency Operations Training and Assistance (ACOTA) with training support for the United Nations - African Union Mission in Darfur (UNAMID) in FY14.183...Initiative (GPOI) when GPOI activated in 2004.The United Nations established the African Union/UN Hybrid operation in Darfur on July 31, 2007 with the
Recommendations for Secure Initialization Routines in Operating Systems
2004-12-01
monolithic design is used. This term is often used to distinguish the operating system from supporting software, e.g. “The Linux kernel does not specify...give the operating system structure and organization. Yet the overall monolithic design of the kernel still falls under Tannenbaum and Woodhull’s “Big...modules that handle initialization tasks. Any further subdivision would complicate interdependencies that are a result of having a monolithic kernel
Beyond Line-of-Sight Information Dissemination for Force Protection
2012-11-01
utilize ad hoc, mesh networks to support data-in-motion and remote data storage and access. These types of sensors are common among Force Protection...Operations and Forward Operating Base security . Current Force Protection Kits include a rich set of sensors that can be monitored from a core operator...and tactical war fighters in tactical network environments . Marti has the potential to improve situation awareness and Force Protection for
49 CFR 1542.203 - Security of the air operations area (AOA).
Code of Federal Regulations, 2013 CFR
2013-10-01
...) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.203 Security of the air operations area (AOA). (a) Each airport operator required to have a... 49 Transportation 9 2013-10-01 2013-10-01 false Security of the air operations area (AOA). 1542...
49 CFR 1542.203 - Security of the air operations area (AOA).
Code of Federal Regulations, 2010 CFR
2010-10-01
...) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.203 Security of the air operations area (AOA). (a) Each airport operator required to have a... 49 Transportation 9 2010-10-01 2010-10-01 false Security of the air operations area (AOA). 1542...
49 CFR 1542.203 - Security of the air operations area (AOA).
Code of Federal Regulations, 2011 CFR
2011-10-01
...) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.203 Security of the air operations area (AOA). (a) Each airport operator required to have a... 49 Transportation 9 2011-10-01 2011-10-01 false Security of the air operations area (AOA). 1542...
49 CFR 1542.203 - Security of the air operations area (AOA).
Code of Federal Regulations, 2012 CFR
2012-10-01
...) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.203 Security of the air operations area (AOA). (a) Each airport operator required to have a... 49 Transportation 9 2012-10-01 2012-10-01 false Security of the air operations area (AOA). 1542...
49 CFR 1542.203 - Security of the air operations area (AOA).
Code of Federal Regulations, 2014 CFR
2014-10-01
...) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.203 Security of the air operations area (AOA). (a) Each airport operator required to have a... 49 Transportation 9 2014-10-01 2014-10-01 false Security of the air operations area (AOA). 1542...
Code of Federal Regulations, 2014 CFR
2014-10-01
... are only authorized to use deadly force in self-defense. (ii) Contractor personnel performing security... Department of Defense, or the contract relates to supporting the mission of the Department of Defense outside... Defense has primary responsibility for recovering DoD contract service employees and, when requested, will...
Code of Federal Regulations, 2012 CFR
2012-10-01
... are only authorized to use deadly force in self-defense. (ii) Contractor personnel performing security... Department of Defense, or the contract relates to supporting the mission of the Department of Defense outside... Defense has primary responsibility for recovering DoD contract service employees and, when requested, will...
Code of Federal Regulations, 2013 CFR
2013-10-01
... are only authorized to use deadly force in self-defense. (ii) Contractor personnel performing security... Department of Defense, or the contract relates to supporting the mission of the Department of Defense outside... Defense has primary responsibility for recovering DoD contract service employees and, when requested, will...
NASA Astrophysics Data System (ADS)
Babik, M.; Chudoba, J.; Dewhurst, A.; Finnern, T.; Froy, T.; Grigoras, C.; Hafeez, K.; Hoeft, B.; Idiculla, T.; Kelsey, D. P.; López Muñoz, F.; Martelli, E.; Nandakumar, R.; Ohrenberg, K.; Prelz, F.; Rand, D.; Sciabà, A.; Tigerstedt, U.; Traynor, D.; Wartel, R.
2017-10-01
IPv4 network addresses are running out and the deployment of IPv6 networking in many places is now well underway. Following the work of the HEPiX IPv6 Working Group, a growing number of sites in the Worldwide Large Hadron Collider Computing Grid (WLCG) are deploying dual-stack IPv6/IPv4 services. The aim of this is to support the use of IPv6-only clients, i.e. worker nodes, virtual machines or containers. The IPv6 networking protocols while they do contain features aimed at improving security also bring new challenges for operational IT security. The lack of maturity of IPv6 implementations together with the increased complexity of some of the protocol standards raise many new issues for operational security teams. The HEPiX IPv6 Working Group is producing guidance on best practices in this area. This paper considers some of the security concerns for WLCG in an IPv6 world and presents the HEPiX IPv6 working group guidance for the system administrators who manage IT services on the WLCG distributed infrastructure, for their related site security and networking teams and for developers and software engineers working on WLCG applications.
Multi-view Decision Making (MVDM) Workshop
2009-02-01
reflect the realities of system-of-systems development, acquisition, fielding and support: multi-view decision making (MVDM). MVDM addresses the...including mission risk, interoperable acquisition, and operational security and survivability. Hence, a multi-view approach to decision making is
Federal Register 2010, 2011, 2012, 2013, 2014
2010-03-12
... Assistance in Support of Southern Sudan Security Sector Transformation Program Pursuant to the authority... Government of Southern Sudan of non-lethal military assistance, military education and training, and defense...
Space station needs, attributes and architectural options: Midterm main briefing
NASA Technical Reports Server (NTRS)
1982-01-01
Space station missions, their requirements, and architectural solutions are presented. Analyses of the following five mission categories are summarized: (1) science/applications, (2) commercial, (3) national security, (4) operational support, and (5) technology development.
DOE Office of Scientific and Technical Information (OSTI.GOV)
VIGIL, FRANCINE S.; SANCHEZ, REBECCA D.; WAGNER, KATRINA
2002-09-01
Sandia National Laboratories, New Mexico (SNL/NM) is a government-owned, contractor-operated facility overseen by the U.S. Department of Energy (DOE), National Nuclear Security Administration (NNSA) through the Albuquerque Operations Office (AL), Office of Kirtland Site Operations (OKSO). Sandia Corporation, a wholly-owned subsidiary of Lockheed Martin Corporation, operates SNL/NM. Work performed at SNL/NM is in support of the DOE and Sandia Corporation's mission to provide weapon component technology and hardware for the needs of the nation's security. Sandia Corporation also conducts fundamental research and development (R&D) to advance technology in energy research, computer science, waste management, microelectronics, materials science, and transportation safetymore » for hazardous and nuclear components. In support of Sandia Corporation's mission, the Integrated Safety and Security (ISS) Center and the Environmental Restoration (ER) Project at SNL/NM have established extensive environmental programs to assist Sandia Corporation's line organizations in meeting all applicable local, state, and federal environmental regulations and DOE requirements. This annual report summarizes data and the compliance status of Sandia Corporation's environmental protection and monitoring programs through December 31, 2001. Major environmental programs include air quality, water quality, groundwater protection, terrestrial surveillance, waste management, pollution prevention (P2), environmental remediation, oil and chemical spill prevention, and the National Environmental Policy Act (NEPA). Environmental monitoring and surveillance programs are required by DOE Order 5400.1, General Environmental Protection Program (DOE 1990) and DOE Order 231.1, Environment, Safety, and Health Reporting (DOE 1996).« less
UTM UAS Service Supplier Specification
NASA Technical Reports Server (NTRS)
Rios, Joseph Lucio
2017-01-01
Within the Unmanned Aircraft Systems (UAS) Traffic Management (UTM) system, the UAS Service Supplier (USS) is a key component. The USS serves several functions. At a high level, those include the following: Bridging communication between UAS Operators and Flight Information Management System (FIMS) Supporting planning of UAS operations Assisting strategic deconfliction of the UTM airspace Providing information support to UAS Operators during operations Helping UAS Operators meet their formal requirements This document provides the minimum set of requirements for a USS. In order to be recognized as a USS within UTM, successful demonstration of satisfying the requirements described herein will be a prerequisite. To ensure various desired qualities (security, fairness, availability, efficiency, maintainability, etc.), this specification relies on references to existing public specifications whenever possible.
Transitions to Peace: Effects on Internal Security Forces in Nicaragua, El Salvador and Guatemala
2008-12-01
and the National Guard, which operated in rural areas.”133 A National Intelligence Directorate supported the 60,000 strong security personnel in...Londoño, Juan Luis, Alejandro Gaviria, and Rodrigo Guerrero eds., Asalto al Desarrollo (Washington, D.C.: Inter-American Development Bank, 2000...Guerrero eds., Asalto al desarrollo . Washington, D.C.: Inter-American Development Bank, 2000. “Saca unimpressed with size of U.S. funding.” Latin
Gone to Fiddler’s Green: Reconnaissance and Security for the Corps
2011-05-01
based reconnaissance and security organization. A U.S. corps in major combat operations must contend with an enemy’s armored advance guard or...screen, guard, and cover. Andrew D. Goldin, “ Ruminations on Modular Cavalry,” Armor Magazine, (September-October 2006): 14. 22 Goldin, “ Ruminations ...on Modular Cavalry,” 15. 23 Goldin, “ Ruminations on Modular Cavalry,” 16. 10 capabilities compared to modular force brigade combat teams in support
The New Wild West: Military Support in Border Security Operations
2012-06-08
military service members from being used to enforce the laws of the United States unless expressly authorized by the United States Constitution or the...cartels constitute a significant threat to United States national security that cannot be defeated or deterred by law enforcement methods alone in order...Arlington, VA 22202-4302. Respondents should be aware that notwithstanding any other provision of law , no person shall be subject to any penalty for
2012-10-01
support for various aspects of CI resilience in BC since 2008, initially for the Vancouver 2010 Olympic and Paralympic Winter Games and, subsequently... Paralympic Winter Games (V2010). Under this project, DRDC provided critical infrastructure (CI) support to two groups: the Integrated Security Unit (ISU...BC since 2008, initially for the Vancouver 2010 Olympic and Paralympic Winter Games and, subsequently, for the development of Emergency Management
Routing architecture and security for airborne networks
NASA Astrophysics Data System (ADS)
Deng, Hongmei; Xie, Peng; Li, Jason; Xu, Roger; Levy, Renato
2009-05-01
Airborne networks are envisioned to provide interconnectivity for terrestial and space networks by interconnecting highly mobile airborne platforms. A number of military applications are expected to be used by the operator, and all these applications require proper routing security support to establish correct route between communicating platforms in a timely manner. As airborne networks somewhat different from traditional wired and wireless networks (e.g., Internet, LAN, WLAN, MANET, etc), security aspects valid in these networks are not fully applicable to airborne networks. Designing an efficient security scheme to protect airborne networks is confronted with new requirements. In this paper, we first identify a candidate routing architecture, which works as an underlying structure for our proposed security scheme. And then we investigate the vulnerabilities and attack models against routing protocols in airborne networks. Based on these studies, we propose an integrated security solution to address routing security issues in airborne networks.
Selection, training and retention of an armed private security department.
Hollar, David B
2009-01-01
To arm or not to arm security officers? One hospital which has opted for arming its officers is Cook Children's Healthcare System, Fort Worth, TX, an integrated pediatric healthcare facility with over 4000 employees. Because of its location in a major metropolitan area and based on several factors including demographics, exterior risk assessments and crime statistics, the hospital's Administration and its Risk Manager supported the decision to operate as an armed security force, according to the author. In this article he shares its current program and presents some thoughts and ideas that may benefit others who are considering this important step.
49 CFR 1542.201 - Security of the secured area.
Code of Federal Regulations, 2013 CFR
2013-10-01
... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.201 Security of the secured area. (a) Each airport operator required to have a security... posted by each airport operator in accordance with its security program not later than November 14, 2003. ...
49 CFR 1542.201 - Security of the secured area.
Code of Federal Regulations, 2010 CFR
2010-10-01
... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.201 Security of the secured area. (a) Each airport operator required to have a security... posted by each airport operator in accordance with its security program not later than November 14, 2003. ...
49 CFR 1542.201 - Security of the secured area.
Code of Federal Regulations, 2011 CFR
2011-10-01
... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.201 Security of the secured area. (a) Each airport operator required to have a security... posted by each airport operator in accordance with its security program not later than November 14, 2003. ...
49 CFR 1542.201 - Security of the secured area.
Code of Federal Regulations, 2012 CFR
2012-10-01
... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.201 Security of the secured area. (a) Each airport operator required to have a security... posted by each airport operator in accordance with its security program not later than November 14, 2003. ...
49 CFR 1542.201 - Security of the secured area.
Code of Federal Regulations, 2014 CFR
2014-10-01
... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.201 Security of the secured area. (a) Each airport operator required to have a security... posted by each airport operator in accordance with its security program not later than November 14, 2003. ...
The Fatal Five? Five Factors That Enhance Effectiveness of Stability Operations
2014-05-22
Conflict METL Mission Essential Task List MSG Military Support Group NSS National Security Strategy OOTW Operations Other Than War PDF...Revolutionary War. However, despite the propensity for the military to conduct this type of operation, the U.S. Army has a mixed record of executing stability...the U.S. Army has a mixed record of executing stability tasks. This monograph identifies five factors that contribute to the effectiveness of
A layered trust information security architecture.
de Oliveira Albuquerque, Robson; Villalba, Luis Javier García; Orozco, Ana Lucila Sandoval; Buiati, Fábio; Kim, Tai-Hoon
2014-12-01
Information can be considered the most important asset of any modern organization. Securing this information involves preserving confidentially, integrity and availability, the well-known CIA triad. In addition, information security is a risk management job; the task is to manage the inherent risks of information disclosure. Current information security platforms do not deal with the different facets of information technology. This paper presents a layered trust information security architecture (TISA) and its creation was motivated by the need to consider information and security from different points of view in order to protect it. This paper also extends and discusses security information extensions as a way of helping the CIA triad. Furthermore, this paper suggests information representation and treatment elements, operations and support components that can be integrated to show the various risk sources when dealing with both information and security. An overview of how information is represented and treated nowadays in the technological environment is shown, and the reason why it is so difficult to guarantee security in all aspects of the information pathway is discussed.
Remotely Monitored Sealing Array Software
DOE Office of Scientific and Technical Information (OSTI.GOV)
2012-09-12
The Remotely Monitored Sealing Array (RMSA) utilizes the Secure Sensor Platform (SSP) framework to establish the fundamental operating capabilities for communication, security, power management, and cryptography. In addition to the SSP framework the RMSA software has unique capabilities to support monitoring a fiber optic seal. Fiber monitoring includes open and closed as well as parametric monitoring to detect tampering attacks. The fiber monitoring techniques, using the SSP power management processes, allow the seals to last for years while maintaining the security requirements of the monitoring application. The seal is enclosed in a tamper resistant housing with software to support activemore » tamper monitoring. New features include LED notification of fiber closure, the ability to retrieve the entire fiber optic history via translator command, separate memory storage for fiber optic events, and a more robust method for tracking and resending failed messages.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
Gonder, J.; Burton, E.; Murakami, E.
2014-11-01
During the past 15 years, increasing numbers of organizations and planning agencies have begun collecting high-resolution Global Positioning System (GPS) travel data. Despite the significant effort and expense to collect it, privacy concerns often lead to underutilization of the data. To address this dilemma of providing data access while preserving privacy, the National Renewable Energy Laboratory, with support from the U.S. Department of Transportation and U.S. Department of Energy, established the Transportation Secure Data Center (TSDC). Lessons drawn from best-practice examples from other data centers have helped shape the structure and operating procedures for the TSDC, which functions under themore » philosophy of first and foremost preserving privacy, but doing so in a way that balances security with accessibility and usability of the data for legitimate research. This paper provides details about the TSDC approach toward achieving these goals, which has included creating a secure enclave with no external access for backing up and processing raw data, a publicly accessible website for downloading cleansed data, and a secure portal environment through which approved users can work with detailed spatial data using a variety of tools and reference information. This paper also describes lessons learned from operating the TSDC with respect to improvements in GPS data handling, processing, and user support, along with plans for continual enhancements to better support the needs of both data providers and users and to thus advance the research value derived from such valuable data.« less
2017-06-09
structures constantly arise in firefights and skirmishes on the battlefield. Source: Andrew Ilachinski, Artificial War: Multiagent- Based Simulation of...Alternative Methods of Analysis and Innovative Organizational Structures .” Conference, Rome, Italy March 31-April 2. ...Intelligence Analysis, Joint Operational Planning, Cellular Automata, Agent- Based Modeling 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT 18
Thermal barrier and support for nuclear reactor fuel core
Betts, Jr., William S.; Pickering, J. Larry; Black, William E.
1987-01-01
A thermal barrier/core support for the fuel core of a nuclear reactor having a metallic cylinder secured to the reactor vessel liner and surrounded by fibrous insulation material. A top cap is secured to the upper end of the metallic cylinder that locates and orients a cover block and post seat. Under normal operating conditions, the metallic cylinder supports the entire load exerted by its associated fuel core post. Disposed within the metallic cylinder is a column of ceramic material, the height of which is less than that of the metallic cylinder, and thus is not normally load bearing. In the event of a temperature excursion beyond the design limits of the metallic cylinder and resulting in deformation of the cylinder, the ceramic column will abut the top cap to support the fuel core post.
Optimizing Security of Cloud Computing within the DoD
2010-12-01
information security governance and risk management; application security; cryptography; security architecture and design; operations security; business ...governance and risk management; application security; cryptography; security architecture and design; operations security; business continuity...20 7. Operational Security (OPSEC).........................................................20 8. Business Continuity Planning (BCP) and Disaster
DICOM image secure communications with Internet protocols IPv6 and IPv4.
Zhang, Jianguo; Yu, Fenghai; Sun, Jianyong; Yang, Yuanyuan; Liang, Chenwen
2007-01-01
Image-data transmission from one site to another through public network is usually characterized in term of privacy, authenticity, and integrity. In this paper, we first describe a general scenario about how image is delivered from one site to another through a wide-area network (WAN) with security features of data privacy, integrity, and authenticity. Second, we give the common implementation method of the digital imaging and communication in medicine (DICOM) image communication software library with IPv6/IPv4 for high-speed broadband Internet by using open-source software. Third, we discuss two major security-transmission methods, the IP security (IPSec) and the secure-socket layer (SSL) or transport-layer security (TLS), being used currently in medical-image-data communication with privacy support. Fourth, we describe a test schema of multiple-modality DICOM-image communications through TCP/IPv4 and TCP/IPv6 with different security methods, different security algorithms, and operating systems, and evaluate the test results. We found that there are tradeoff factors between choosing the IPsec and the SSL/TLS-based security implementation of IPv6/IPv4 protocols. If the WAN networks only use IPv6 such as in high-speed broadband Internet, the choice is IPsec-based security. If the networks are IPv4 or the combination of IPv6 and IPv4, it is better to use SSL/TLS security. The Linux platform has more security algorithms implemented than the Windows (XP) platform, and can achieve better performance in most experiments of IPv6 and IPv4-based DICOM-image communications. In teleradiology or enterprise-PACS applications, the Linux operating system may be the better choice as peer security gateways for both the IPsec and the SSL/TLS-based secure DICOM communications cross public networks.
2011-10-24
Operations Management Track in the established B.S. in Global Security and Intelligence Studies Degree offered at Embry-Riddle Aeronautical University...and a model 4 -year college curriculum for a BS degree in Security Operations Management
NASA Technical Reports Server (NTRS)
Ivancic, William; Stewart, Dave; Shell, Dan; Wood, Lloyd; Paulsen, Phil; Jackson, Chris; Hodgson, Dave; Notham, James; Bean, Neville; Miller, Eric
2005-01-01
This report documents the design of network infrastructure to support operations demonstrating the concept of network-centric operations and command and control of space-based assets. These demonstrations showcase major elements of the Transformal Communication Architecture (TCA), using Internet Protocol (IP) technology. These demonstrations also rely on IP technology to perform the functions outlined in the Consultative Committee for Space Data Systems (CCSDS) Space Link Extension (SLE) document. A key element of these demonstrations was the ability to securely use networks and infrastructure owned and/or controlled by various parties. This is a sanitized technical report for public release. There is a companion report available to a limited audience. The companion report contains detailed networking addresses and other sensitive material and is available directly from William Ivancic at Glenn Research Center.
NASA Astrophysics Data System (ADS)
Morgan, John S.
2005-05-01
Law enforcement agencies play a key role in protecting the nation from and responding to terrorist attacks. Preventing terrorism and promoting the nation"s security is the Department of Justice"s number one strategic priority. This is reflected in its technology development efforts, as well as its operational focus. The National Institute of Justice (NIJ) is the national focal point for the research, development, test and evaluation of technology for law enforcement. In addition to its responsibilities in supporting day-to-day criminal justice needs in areas such as less lethal weapons and forensic science, NIJ also provides critical support for counter-terrorism capacity improvements in state and local law enforcement in several areas. The most important of these areas are bomb response, concealed weapons detection, communications and information technology, which together offer the greatest potential benefit with respect to improving the ability to law enforcement agencies to respond to all types of crime including terrorist acts. NIJ coordinates its activities with several other key federal partners, including the Department of Homeland Security"s Science and Technology Directorate, the Technical Support Working Group, and the Department of Defense.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Gaponov, Yu.A.; Igarashi, N.; Hiraki, M.
2004-05-12
An integrated controlling system and a unified database for high throughput protein crystallography experiments have been developed. Main features of protein crystallography experiments (purification, crystallization, crystal harvesting, data collection, data processing) were integrated into the software under development. All information necessary to perform protein crystallography experiments is stored (except raw X-ray data that are stored in a central data server) in a MySQL relational database. The database contains four mutually linked hierarchical trees describing protein crystals, data collection of protein crystal and experimental data processing. A database editor was designed and developed. The editor supports basic database functions to view,more » create, modify and delete user records in the database. Two search engines were realized: direct search of necessary information in the database and object oriented search. The system is based on TCP/IP secure UNIX sockets with four predefined sending and receiving behaviors, which support communications between all connected servers and clients with remote control functions (creating and modifying data for experimental conditions, data acquisition, viewing experimental data, and performing data processing). Two secure login schemes were designed and developed: a direct method (using the developed Linux clients with secure connection) and an indirect method (using the secure SSL connection using secure X11 support from any operating system with X-terminal and SSH support). A part of the system has been implemented on a new MAD beam line, NW12, at the Photon Factory Advanced Ring for general user experiments.« less
32 CFR 383a.5 - Responsibilities and functions.
Code of Federal Regulations, 2013 CFR
2013-07-01
... Defense (Production and Logistics) (ASD(P&L)) shall: (1) Recommend to the Secretary and the Deputy... following areas: (i) Funding. (ii) Commissary establishment/disestablishment. (iii) Pricing and surcharges... security, logistics, and administrative support as required for effective operation of the military...
32 CFR 383a.5 - Responsibilities and functions.
Code of Federal Regulations, 2012 CFR
2012-07-01
... Defense (Production and Logistics) (ASD(P&L)) shall: (1) Recommend to the Secretary and the Deputy... following areas: (i) Funding. (ii) Commissary establishment/disestablishment. (iii) Pricing and surcharges... security, logistics, and administrative support as required for effective operation of the military...
32 CFR 383a.5 - Responsibilities and functions.
Code of Federal Regulations, 2010 CFR
2010-07-01
... Defense (Production and Logistics) (ASD(P&L)) shall: (1) Recommend to the Secretary and the Deputy... following areas: (i) Funding. (ii) Commissary establishment/disestablishment. (iii) Pricing and surcharges... security, logistics, and administrative support as required for effective operation of the military...
32 CFR 383a.5 - Responsibilities and functions.
Code of Federal Regulations, 2014 CFR
2014-07-01
... Defense (Production and Logistics) (ASD(P&L)) shall: (1) Recommend to the Secretary and the Deputy... following areas: (i) Funding. (ii) Commissary establishment/disestablishment. (iii) Pricing and surcharges... security, logistics, and administrative support as required for effective operation of the military...
32 CFR 383a.5 - Responsibilities and functions.
Code of Federal Regulations, 2011 CFR
2011-07-01
... Defense (Production and Logistics) (ASD(P&L)) shall: (1) Recommend to the Secretary and the Deputy... following areas: (i) Funding. (ii) Commissary establishment/disestablishment. (iii) Pricing and surcharges... security, logistics, and administrative support as required for effective operation of the military...
Western Hemisphere Defense Policy Statement
2012-10-01
El Salvador , Guatemala, Honduras, Paraguay, Peru and Uruguay have contributed to or led multi-national security operations and United Nations (UN...critical support during the initial stages of the Haiti earthquake relief effort. As military forces often have a unique capability to respond
The Use of Special Operations Forces in Support of American Strategic Security Strategies
2013-01-28
Operations Command (USSOCOM) global threats have morphed. The world has evolved from a bi-polar conflict characterized by the Cold War through what may be...the community of nations and create a more stable and thus, prosperous, world . This paper sets the strategic context for future operations, defines...transported gamers into the world of SOF on daring missions to save humanity from rogue states and international terrorists. While each is entertaining
2012-05-16
MEC Ministerio de Educacion y Cultura (Minister of Education and Culture) METT-TC Mission, Enemy, Time, Troops Available, & Civil Considerations...interests. Moreover, the QDR calls for an expansion of civil affairs capacity especially in the face of Counterinsurgency and Counterterrorism operations...07, Department of Defense Joint Publication 3-57, and annual US Special Operations Command (USSOCOM) Posture Statements ( especially 2008) before
Spatial Thinking: Precept for Understanding Operational Environments
2016-06-10
A Computer Movie Simulating Urban Growth in the Detroit Region,” 236. 29 U.S. National Research Council, Learning to Think Spatially: GIS as a... children and spatial language, the article focuses on the use of geospatial information systems (GIS) as a support mechanism for learning to think...Thinking, Cognition, Learning , Geospatial, Operating Environment, Space Perception 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT 18
Establishment of CDC Global Rapid Response Team to Ensure Global Health Security.
Stehling-Ariza, Tasha; Lefevre, Adrienne; Calles, Dinorah; Djawe, Kpandja; Garfield, Richard; Gerber, Michael; Ghiselli, Margherita; Giese, Coralie; Greiner, Ashley L; Hoffman, Adela; Miller, Leigh Ann; Moorhouse, Lisa; Navarro-Colorado, Carlos; Walsh, James; Bugli, Dante; Shahpar, Cyrus
2017-12-01
The 2014-2016 Ebola virus disease epidemic in West Africa highlighted challenges faced by the global response to a large public health emergency. Consequently, the US Centers for Disease Control and Prevention established the Global Rapid Response Team (GRRT) to strengthen emergency response capacity to global health threats, thereby ensuring global health security. Dedicated GRRT staff can be rapidly mobilized for extended missions, improving partner coordination and the continuity of response operations. A large, agencywide roster of surge staff enables rapid mobilization of qualified responders with wide-ranging experience and expertise. Team members are offered emergency response training, technical training, foreign language training, and responder readiness support. Recent response missions illustrate the breadth of support the team provides. GRRT serves as a model for other countries and is committed to strengthening emergency response capacity to respond to outbreaks and emergencies worldwide, thereby enhancing global health security.
The Impact of Network Performance on Warfighter Effectiveness
2006-01-01
SECURITY TRANSPORTATION AND INFRASTRUCTURE WORKFORCE AND WORKPLACE The RAND Corporation is a nonprofit research organization providing objective...Support Es- tablishment, Auckland , New Zealand), 2000. Lauren, M., R. Stephen, and N. Hore, “Application of the MANA Model to Operations in East Timor
75 FR 29395 - National Maritime Day, 2010
Federal Register 2010, 2011, 2012, 2013, 2014
2010-05-26
... America's leadership in the global marketplace, and to our security. Civilian mariners and their ships... continues today. Merchant mariners support military operations in Iraq and Afghanistan, as well as.... They help strengthen our Nation's economy; bolster job-creating businesses; and, along with the...
Cloud Computing in Support of Synchronized Disaster Response Operations
2010-09-01
scalable, Web application based on cloud computing technologies to facilitate communication between a broad range of public and private entities without...requiring them to compromise security or competitive advantage. The proposed design applies the unique benefits of cloud computing architectures such as
ERIC Educational Resources Information Center
Kincaid, Douglas W.; Dillinger, Eric T.; Clayton, Michael
2006-01-01
Maintenance and operations (M&O) requirements dominate the life-cycle cost of a school facility. Historically, facility managers have struggled to secure funding to meet these requirements. Many deferred-maintenance issues result directly from M&O underfunding. However, new approaches and technologies now enable facility managers to use…
EMERGENCY PREPAREDNESS CONTACT REQUEST A SPEAKER REQUEST A COLOR GUARD OPERATIONAL CONTRACT SUPPORT every two years and makes recommendations to the President, through the Secretary of Defense, on changes Preparedness Contact Request A Speaker Request A Color Guard Stay Connected Privacy & Security Inspector
NASA Technical Reports Server (NTRS)
2002-01-01
When fully developed for NASA, Vanguard Enforcer(TM) software-which emulates the activities of highly technical security system programmers, auditors, and administrators-was among the first intrusion detection programs to restrict human errors from affecting security, and to ensure the integrity of a computer's operating systems, as well as the protection of mission critical resources. Vanguard Enforcer was delivered in 1991 to Johnson Space Center and has been protecting systems and critical data there ever since. In August of 1999, NASA granted Vanguard exclusive rights to commercialize the Enforcer system for the private sector. In return, Vanguard continues to supply NASA with ongoing research, development, and support of Enforcer. The Vanguard Enforcer 4.2 is one of several surveillance technologies that make up the Vanguard Security Solutions line of products. Using a mainframe environment, Enforcer 4.2 achieves previously unattainable levels of automated security management.
INcreasing Security and Protection through Infrastructure REsilience: The INSPIRE Project
NASA Astrophysics Data System (ADS)
D'Antonio, Salvatore; Romano, Luigi; Khelil, Abdelmajid; Suri, Neeraj
The INSPIRE project aims at enhancing the European potential in the field of security by ensuring the protection of critical information infrastructures through (a) the identification of their vulnerabilities and (b) the development of innovative techniques for securing networked process control systems. To increase the resilience of such systems INSPIRE will develop traffic engineering algorithms, diagnostic processes and self-reconfigurable architectures along with recovery techniques. Hence, the core idea of the INSPIRE project is to protect critical information infrastructures by appropriately configuring, managing, and securing the communication network which interconnects the distributed control systems. A working prototype will be implemented as a final demonstrator of selected scenarios. Controls/Communication Experts will support project partners in the validation and demonstration activities. INSPIRE will also contribute to standardization process in order to foster multi-operator interoperability and coordinated strategies for securing lifeline systems.
Report on Sensor Technology for Battlefield and Physical Security Applications.
1977-07-01
IS BEING PURSUED TO MEET AN URGENT OPERATIONAL REQUIREMENT. ALSO, IN THIS CATEGORY SUPPORT IS PROVIDED TO THE DRUG Et.FORCEMENT AGENCY AND THE SINAI...ASSOCIATED WITH THIS NEW OSD INITIATIVE IN THE PHYSICAL SECURITY EQUIPMENT AREA. I’M SURE MOST OF YOU ARE AWARE THAF THE SERVICES HAVE HAD STRUCTURED...AND EXCITING POSSIBILITIES. AT PRESENT WE ARE BOOKED THROUGH AUGUST 9T, OfT I WOULD LIKE FOR EAMH OF YOU TO KNOW 71AT THE ACTION ROUP WOLD LE.o THE
Naval Expeditionary Logistics. Enabling Operational Maneuver From the Sea
1999-01-01
of the core objectives of the President’s national security strategy is to "enhance our [the nation’s] security with effective diplomacy and with... effect on logistics requirements, and some interpretations of OMFTS assume that the concept applies to a future force much lighter than today’s. Others...addition to, or in lieu of, today’s capabilities? The answer has a profound effect on the future combat service support structure of both the Marine
2014-12-01
Federal Bureau of Investigation (FBI), The FBI: A Centennial History, 1908–2008, 2nd ed. (Washington, DC: U.S. Government Printing Office, 2008), http...www.fbi.gov/about-us/history/a- centennial -history. 240 “This Day in History, July 26, 1908, FBI Founded.” 56...liberties would be secure into the future.255 The requirement that all operations be 250 Ibid.. 251 Ibid. 252 Ibid. 253 FBI, The FBI: A Centennial
2010-06-22
Congress has generally accepted the concept of using unarmed contractors to carry out support functions in military operations, such as providing food and...countries where stability generally is not an issue. 3 According to one report, “Not since the 17th century has there been such a reliance on private...Institution has estimated that citizens of some 30 countries have worked as security contractors in Iraq.6 PSC employees are generally divided by
Perceived demands during modern military operations.
Boermans, Sylvie M; Kamphuis, Wim; Kamhuis, Wim; Delahaij, Roos; Korteling, J E Hans; Euwema, Martin C
2013-07-01
Using a cross-sectional design, this study explored operational demands during the International Security Assistance Force for Afghanistan (2009-2010) across distinct military units. A total of 1,413 Dutch soldiers, nested within four types of units (i.e., combat, combat support, service support, and command support units) filled out a 23-item self-survey in which they were asked to evaluate the extent to which they experienced operational characteristics as demanding. Exploratory factor analysis identified six underlying dimensions of demands. Multivariate analysis of variance revealed that distinct units are characterized by their own unique constellation of perceived demands, even after controlling for previous deployment experience. Most notable findings were found when comparing combat units to other types of units. These insights can be used to better prepare different types of military units for deployment, and support them in the specific demands they face during deployment. Reprint & Copyright © 2013 Association of Military Surgeons of the U.S.
Utilizing Regional Centers in Sustaining Upgraded Russian Federation Ministry of Defense Sites
DOE Office of Scientific and Technical Information (OSTI.GOV)
Kaldenbach, Karen Yvonne; Chainikov, General Vladimir; Fedorov, General Victor
2010-01-01
Since the mid-1990s the governments of the United States (U.S.) and the Russian Federation (RF) have been collaborating on nonproliferation projects, particularly in the protection of nuclear material through the Department of Energy's (DOE) National Nuclear Security Administration (NNSA). To date, this collaboration has resulted in upgrades to more than 72 RF Ministry of Defense (MOD) sensitive sites and facilities. These upgrades include physical protection systems (PPS), facilities to ensure material remains secure in various configurations, and infrastructure to support, maintain, and sustain upgraded sites. Significant effort on the part of both governments has also been expended to ensure thatmore » personnel obtain the necessary skills and training to both operate and maintain the security systems, thereby ensuring long term sustainability. To accomplish this, initial vendor training on physical protection systems was provided to key personnel, and an approved training curriculum was developed to teach the skills of operating, managing, administering, and maintaining the installed physical protection systems. This approach also included documentation of the processes and procedures to support infrastructure, requisite levels of maintenance and testing of systems and equipment, lifecycle management support, inventory systems and spare parts caches. One of the core components in the U.S. exit strategy and full transition to the RF MOD is the development and utilization of regional centers to facilitate centralized training and technical support to upgraded MOD sites in five regions of the RF. To date, two regional centers and one regional classroom facility are functional, and two additional regional centers are currently under construction. This paper will address the process and logistics of regional center establishment and the future vision for integrated regional center support by the RF MOD.« less
NATO, Greece and the 2004 Summer Olympics
2004-12-01
supportive of the Hellenic government, while Greece retained full responsibility for overall security operations for the Olympic and Paralympic Games ...both the Olympic and Paralympic Games with specific NATO support to Greece as follows: • AWACS deployment for airspace surveillance • Maritime...safe conduct of the 2004 Olympic and Paralympic Games .135 Several more “Factsheets” followed adding to the scope of coordinated NATO and Greek
VAST Challenge 2016: Streaming Visual Analytics
2016-10-25
understand rapidly evolving situations. To support such tasks, visual analytics solutions must move well beyond systems that simply provide real-time...received. Mini-Challenge 1: Design Challenge Mini-Challenge 1 focused on systems to support security and operational analytics at the Euybia...Challenge 1 was to solicit novel approaches for streaming visual analytics that push the boundaries for what constitutes a visual analytics system , and to
Development and Demonstration of a Security Core Component
DOE Office of Scientific and Technical Information (OSTI.GOV)
Turke, Andy
In recent years, the convergence of a number of trends has resulted in Cyber Security becoming a much greater concern for electric utilities. A short list of these trends includes: · Industrial Control Systems (ICSs) have evolved from depending on proprietary hardware and operating software toward using standard off-the-shelf hardware and operating software. This has meant that these ICSs can no longer depend on “security through obscurity. · Similarly, these same systems have evolved toward using standard communications protocols, further reducing their ability to rely upon obscurity. · The rise of the Internet and the accompanying demand for more datamore » about virtually everything has resulted in formerly isolated ICSs becoming at least partially accessible via Internet-connected networks. · “Cyber crime” has become commonplace, whether it be for industrial espionage, reconnaissance for a possible cyber attack, theft, or because some individual or group “has something to prove.” Electric utility system operators are experts at running the power grid. The reality is, especially at small and mid-sized utilities, these SCADA operators will by default be “on the front line” if and when a cyber attack occurs against their systems. These people are not computer software, networking, or cyber security experts, so they are ill-equipped to deal with a cyber security incident. Cyber Security Manager (CSM) was conceived, designed, and built so that it can be configured to know what a utility’s SCADA/EMS/DMS system looks like under normal conditions. To do this, CSM monitors log messages from any device that uses the syslog standard. It can also monitor a variety of statistics from the computers that make up the SCADA/EMS/DMS: outputs from host-based security tools, intrusion detection systems, SCADA alarms, and real-time SCADA values – even results from a SIEM (Security Information and Event Management) system. When the system deviates from “normal,” CSM can alert the operator in language that they understand that an incident may be occurring, provide actionable intelligence, and informing them what actions to take. These alarms may be viewed on CSM’s built-in user interface, sent to a SCADA alarm list, or communicated via email, phone, pager, or SMS message. In recognition of the fact that “real world” training for cyber security events is impractical, CSM has a built-in Operator Training Simulator capability. This can be used stand alone to create simulated event scenarios for training purposes. It may also be used in conjunction with the recipient’s SCADA/EMS/DMS Operator Training Simulator. In addition to providing cyber security situational awareness for electric utility operators, CSM also provides tools for analysts and support personnel; in fact, the majority of user interface displays are designed for use in analyzing current and past security events. CSM keeps security-related information in long-term storage, as well as writing any decisions it makes to a (syslog) log for use forensic or other post-event analysis.« less
A Layered Trust Information Security Architecture
de Oliveira Albuquerque, Robson; García Villalba, Luis Javier; Sandoval Orozco, Ana Lucila; Buiati, Fábio; Kim, Tai-Hoon
2014-01-01
Information can be considered the most important asset of any modern organization. Securing this information involves preserving confidentially, integrity and availability, the well-known CIA triad. In addition, information security is a risk management job; the task is to manage the inherent risks of information disclosure. Current information security platforms do not deal with the different facets of information technology. This paper presents a layered trust information security architecture (TISA) and its creation was motivated by the need to consider information and security from different points of view in order to protect it. This paper also extends and discusses security information extensions as a way of helping the CIA triad. Furthermore, this paper suggests information representation and treatment elements, operations and support components that can be integrated to show the various risk sources when dealing with both information and security. An overview of how information is represented and treated nowadays in the technological environment is shown, and the reason why it is so difficult to guarantee security in all aspects of the information pathway is discussed. PMID:25470490
DOE Office of Scientific and Technical Information (OSTI.GOV)
Johnson, Stephanie R.; Koehler, Theresa M.; Boyd, Brian K.
2014-05-31
This report summarizes the results of an energy and water conservation assessment of the Radiochemical Processing Laboratory (RPL) at Pacific Northwest National Laboratory (PNNL). The assessment was performed in October 2013 by engineers from the PNNL Building Performance Team with the support of the dedicated RPL staff and several Facilities and Operations (F&O) department engineers. The assessment was completed for the Facilities and Operations (F&O) department at PNNL in support of the requirements within Section 432 of the Energy Independence and Security Act (EISA) of 2007.
The national operational environment model (NOEM)
NASA Astrophysics Data System (ADS)
Salerno, John J.; Romano, Brian; Geiler, Warren
2011-06-01
The National Operational Environment Model (NOEM) is a strategic analysis/assessment tool that provides insight into the complex state space (as a system) that is today's modern operational environment. The NOEM supports baseline forecasts by generating plausible futures based on the current state. It supports what-if analysis by forecasting ramifications of potential "Blue" actions on the environment. The NOEM also supports sensitivity analysis by identifying possible pressure (leverage) points in support of the Commander that resolves forecasted instabilities, and by ranking sensitivities in a list for each leverage point and response. The NOEM can be used to assist Decision Makers, Analysts and Researchers with understanding the inter-workings of a region or nation state, the consequences of implementing specific policies, and the ability to plug in new operational environment theories/models as they mature. The NOEM is built upon an open-source, license-free set of capabilities, and aims to provide support for pluggable modules that make up a given model. The NOEM currently has an extensive number of modules (e.g. economic, security & social well-being pieces such as critical infrastructure) completed along with a number of tools to exercise them. The focus this year is on modeling the social and behavioral aspects of a populace within their environment, primarily the formation of various interest groups, their beliefs, their requirements, their grievances, their affinities, and the likelihood of a wide range of their actions, depending on their perceived level of security and happiness. As such, several research efforts are currently underway to model human behavior from a group perspective, in the pursuit of eventual integration and balance of populace needs/demands within their respective operational environment and the capacity to meet those demands. In this paper we will provide an overview of the NOEM, the need for and a description of its main components. We will also provide a detailed discussion of the model and sample use cases.
A Hand-in-Hand Approach for Security and Development in Sub-Saharan Africa
2010-06-15
peacekeeping operations and large contingents deployed in Democratic Republic of the Congo (DRC), the Darfur region of Sudan, Lebanon , Liberia...several SSA countries improve their ability to investigate, prosecute, and adjudicate gender -based violence and provide support to victims. 19
Technologies for Networked Enabled Operations
NASA Technical Reports Server (NTRS)
Glass, B.; Levine, J.
2005-01-01
Current point-to-point data links will not scale to support future integration of surveillance, security, and globally-distributed air traffic data, and already hinders efficiency and capacity. While the FAA and industry focus on a transition to initial system-wide information management (SWIM) capabilities, this paper describes a set of initial studies of NAS network-enabled operations technology gaps targeted for maturity in later SWIM spirals (201 5-2020 timeframe).
Air Force IT System Security Compliance with Law and Policy
2016-04-01
production /1/saf_cio_a6/publication/afpd33-2/afpd33-2.pdf 21 AFI33-210, Air Force Certification and Accreditation Program (AFCAP), October 2014: http...cyber systems for support and operation. Today’s system certification and compliancy tracking methods are very costly, time intensive, unrealistic...and often lag behind operational and test requirements. However, with changes to policy and implementation requirements, the IT system certification
2014-02-01
object that may present a threat to his or h er satellites must still provide direction that responds to that threat This article discusses a dilemma...space-based threats .ŕ The Air Force achieves space superiority by conducting operations that support the war fighter (space force enhancement); by...the space era, threats and issues have arisen to chal- lenge US operations in these areas. Indeed, as declared in the National Security Space Strategy
Copernicus Earth observation programme
NASA Astrophysics Data System (ADS)
Žlebir, Silvo
European Earth observation program Copernicus is an EU-wide programme that integrates satellite data, in-situ data and modeling to provide user-focused information services to support policymakers, researchers, businesses and citizens. Land monitoring service and Emergency service are fully operational already, Atmosphere monitoring service and Marine environment monitoring service are preoperational and will become fully operational in the following year, while Climate change service and Security service are in an earlier development phase. New series of a number of dedicated satellite missions will be launched in the following years, operated by the European Space Agency and EUMETSAT, starting with Sentinel 1A satellite early this year. Ground based, air-borne and sea-borne in-situ data are provided by different international networks and organizations, EU member states networks etc. European Union is devoting a particular attention to secure a sustainable long-term operational provision of the services. Copernicus is also stated as a European Union’s most important contribution to Global Earth Observation System of Systems (GEOSS). The status and the recent development of the Copernicus programme will be presented, together with its future perspective. As Copernicus services have already demonstrated their usability and effectiveness, some interesting cases of their deployment will be presented. Copernicus free and open data policy, supported by a recently adopted EU legislative act, will also be presented.
2007-05-01
business processes and services. 4. Security operations management addresses the day-to-day activities that the organization performs to protect the...Management TM – Technology Management Security Operations Management SOM – Security Operations Management 5.7.2 Important Operations Competency...deals with the provision of access rights to informa- tion and technical assets SOM – Security Operations Management , which addresses the fundamental
Nuclear reactor pressure vessel support system
Sepelak, George R.
1978-01-01
A support system for nuclear reactor pressure vessels which can withstand all possible combinations of stresses caused by a postulated core disrupting accident during reactor operation. The nuclear reactor pressure vessel is provided with a flange around the upper periphery thereof, and the flange includes an annular vertical extension formed integral therewith. A support ring is positioned atop of the support ledge and the flange vertical extension, and is bolted to both members. The plug riser is secured to the flange vertical extension and to the top of a radially outwardly extension of the rotatable plug. This system eliminates one joint through which fluids contained in the vessel could escape by making the fluid flow path through the joint between the flange and the support ring follow the same path through which fluid could escape through the plug risers. In this manner, the sealing means to prohibit the escape of contained fluids through the plug risers can also prohibit the escape of contained fluid through the securing joint.
Navigation Ground Data System Engineering for the Cassini/Huygens Mission
NASA Technical Reports Server (NTRS)
Beswick, R. M.; Antreasian, P. G.; Gillam, S. D.; Hahn, Y.; Roth, D. C.; Jones, J. B.
2008-01-01
The launch of the Cassini/Huygens mission on October 15, 1997, began a seven year journey across the solar system that culminated in the entry of the spacecraft into Saturnian orbit on June 30, 2004. Cassini/Huygens Spacecraft Navigation is the result of a complex interplay between several teams within the Cassini Project, performed on the Ground Data System. The work of Spacecraft Navigation involves rigorous requirements for accuracy and completeness carried out often under uncompromising critical time pressures. To support the Navigation function, a fault-tolerant, high-reliability/high-availability computational environment was necessary to support data processing. Configuration Management (CM) was integrated with fault tolerant design and security engineering, according to the cornerstone principles of Confidentiality, Integrity, and Availability. Integrated with this approach are security benchmarks and validation to meet strict confidence levels. In addition, similar approaches to CM were applied in consideration of the staffing and training of the system administration team supporting this effort. As a result, the current configuration of this computational environment incorporates a secure, modular system, that provides for almost no downtime during tour operations.
NASA Astrophysics Data System (ADS)
Chang, Yan; Zhang, Shi-Bin; Yan, Li-Li; Han, Gui-Hua
2015-08-01
Higher channel capacity and security are difficult to reach in a noisy channel. The loss of photons and the distortion of the qubit state are caused by noise. To solve these problems, in our study, a hyperentangled Bell state is used to design faithful deterministic secure quantum communication and authentication protocol over collective-rotation and collective-dephasing noisy channel, which doubles the channel capacity compared with using an ordinary Bell state as a carrier; a logical hyperentangled Bell state immune to collective-rotation and collective-dephasing noise is constructed. The secret message is divided into several parts to transmit, however the identity strings of Alice and Bob are reused. Unitary operations are not used. Project supported by the National Natural Science Foundation of China (Grant No. 61402058), the Science and Technology Support Project of Sichuan Province, China (Grant No. 2013GZX0137), the Fund for Young Persons Project of Sichuan Province, China (Grant No. 12ZB017), and the Foundation of Cyberspace Security Key Laboratory of Sichuan Higher Education Institutions, China (Grant No. szjj2014-074).
75 FR 22151 - National Maritime Security Advisory Committee; Vacancies
Federal Register 2010, 2011, 2012, 2013, 2014
2010-04-27
... field are encouraged to apply: Port Operations Management/Port Authorities. Maritime Security Operations and Training. Marine Salvage Operations. Maritime Security Related Academics/Public Policy. Marine Facilities and Terminals Security Management. Vessel Owners/Operators. Maritime Labor. International and...
Portable weighing system with alignment features
Abercrombie, Robert Knox; Richardson, Gregory David; Scudiere, Matthew Bligh; Sheldon, Frederick T.
2012-11-06
A system for weighing a load is disclosed. The weighing system includes a pad having at least one transducer for weighing a load disposed on the pad. In some embodiments the pad has a plurality of foot members and the weighing system may include a plate that disposed underneath the pad for receiving the plurality of foot member and for aligning the foot members when the weighing system is installed. The weighing system may include a spacer disposed adjacent the pad and in some embodiments, a spacer anchor operatively secures the spacer to a support surface, such as a plate, a railway bed, or a roadway. In some embodiments the spacer anchor operatively secures both the spacer and the pad to a roadway.
2014-11-05
including suggestions for reducing this burden, to Washington headquarters Services, Directorate for Information Operations and Reports, 1215...necessary. Bloom writes that this support can come in several forms: Food, safe houses, recruits, financial support for weapons, remuneration of families...Virginia 2. Dudley Knox Library Naval Postgraduate School Monterey, California 3. Mark Sullivan, Director United States Secret Service Washington, DC
Military Review. Volume 90, Number 2, March-April 2000
2000-04-01
additional safety and security concerns and re- quirements for workers� and drivers� life support. Integration. Integration went smoothly at Puerto Quetzal ...the SPOD for initial deployment in Gua- temala. Quetzal was only 10 kilome- ters from the forward operating base and was collocated with the main
45 CFR 2552.25 - What are a sponsor's administrative responsibilities?
Code of Federal Regulations, 2010 CFR
2010-10-01
...) Assume full responsibility for securing maximum and continuing community financial and in-kind support to operate the project successfully. (b) Provide levels of staffing and resources appropriate to accomplish the purposes of the project and carry out its project management responsibilities. (c) Employ a full...
Joint Targeting and Air Support in Counterinsurgency: How to Move to Mission Command
2012-10-01
pdf. 39. Rhodesia fought a COIN against communist guerillas in 1964–79. Under crushing sanctions and with little manpower, the Rhodesians developed a...Rhodesian Forces Anti Terrorist Operations Counter Insurgency Manuals (Salisbury, Rhodesia : Rhodesian Security Forces, 1975), 212. 41. Darling and
Federal Register 2010, 2011, 2012, 2013, 2014
2013-12-10
... design feature associated with the architecture and connectivity capabilities of the airplanes' computer... vulnerabilities to the airplanes' systems. The proposed network architecture includes the following connectivity.... Operator business and administrative support systems, and 3. Passenger entertainment systems, and access by...
High speed and adaptable error correction for megabit/s rate quantum key distribution.
Dixon, A R; Sato, H
2014-12-02
Quantum Key Distribution is moving from its theoretical foundation of unconditional security to rapidly approaching real world installations. A significant part of this move is the orders of magnitude increases in the rate at which secure key bits are distributed. However, these advances have mostly been confined to the physical hardware stage of QKD, with software post-processing often being unable to support the high raw bit rates. In a complete implementation this leads to a bottleneck limiting the final secure key rate of the system unnecessarily. Here we report details of equally high rate error correction which is further adaptable to maximise the secure key rate under a range of different operating conditions. The error correction is implemented both in CPU and GPU using a bi-directional LDPC approach and can provide 90-94% of the ideal secure key rate over all fibre distances from 0-80 km.
High speed and adaptable error correction for megabit/s rate quantum key distribution
Dixon, A. R.; Sato, H.
2014-01-01
Quantum Key Distribution is moving from its theoretical foundation of unconditional security to rapidly approaching real world installations. A significant part of this move is the orders of magnitude increases in the rate at which secure key bits are distributed. However, these advances have mostly been confined to the physical hardware stage of QKD, with software post-processing often being unable to support the high raw bit rates. In a complete implementation this leads to a bottleneck limiting the final secure key rate of the system unnecessarily. Here we report details of equally high rate error correction which is further adaptable to maximise the secure key rate under a range of different operating conditions. The error correction is implemented both in CPU and GPU using a bi-directional LDPC approach and can provide 90–94% of the ideal secure key rate over all fibre distances from 0–80 km. PMID:25450416
Power grid operation risk management: V2G deployment for sustainable development
NASA Astrophysics Data System (ADS)
Haddadian, Ghazale J.
The production, transmission, and delivery of cost--efficient energy to supply ever-increasing peak loads along with a quest for developing a low-carbon economy require significant evolutions in the power grid operations. Lower prices of vast natural gas resources in the United States, Fukushima nuclear disaster, higher and more intense energy consumptions in China and India, issues related to energy security, and recent Middle East conflicts, have urged decisions makers throughout the world to look into other means of generating electricity locally. As the world look to combat climate changes, a shift from carbon-based fuels to non-carbon based fuels is inevitable. However, the variability of distributed generation assets in the electricity grid has introduced major reliability challenges for power grid operators. While spearheading sustainable and reliable power grid operations, this dissertation develops a multi-stakeholder approach to power grid operation design; aiming to address economic, security, and environmental challenges of the constrained electricity generation. It investigates the role of Electric Vehicle (EV) fleets integration, as distributed and mobile storage assets to support high penetrations of renewable energy sources, in the power grid. The vehicle-to-grid (V2G) concept is considered to demonstrate the bidirectional role of EV fleets both as a provider and consumer of energy in securing a sustainable power grid operation. The proposed optimization modeling is the application of Mixed-Integer Linear Programing (MILP) to large-scale systems to solve the hourly security-constrained unit commitment (SCUC) -- an optimal scheduling concept in the economic operation of electric power systems. The Monte Carlo scenario-based approach is utilized to evaluate different scenarios concerning the uncertainties in the operation of power grid system. Further, in order to expedite the real-time solution of the proposed approach for large-scale power systems, it considers a two-stage model using the Benders Decomposition (BD). The numerical simulation demonstrate that the utilization of smart EV fleets in power grid systems would ensure a sustainable grid operation with lower carbon footprints, smoother integration of renewable sources, higher security, and lower power grid operation costs. The results, additionally, illustrate the effectiveness of the proposed MILP approach and its potentials as an optimization tool for sustainable operation of large scale electric power systems.
HIPAA-compliant automatic monitoring system for RIS-integrated PACS operation
NASA Astrophysics Data System (ADS)
Jin, Jin; Zhang, Jianguo; Chen, Xiaomeng; Sun, Jianyong; Yang, Yuanyuan; Liang, Chenwen; Feng, Jie; Sheng, Liwei; Huang, H. K.
2006-03-01
As a governmental regulation, Health Insurance Portability and Accountability Act (HIPAA) was issued to protect the privacy of health information that identifies individuals who are living or deceased. HIPAA requires security services supporting implementation features: Access control; Audit controls; Authorization control; Data authentication; and Entity authentication. These controls, which proposed in HIPAA Security Standards, are Audit trails here. Audit trails can be used for surveillance purposes, to detect when interesting events might be happening that warrant further investigation. Or they can be used forensically, after the detection of a security breach, to determine what went wrong and who or what was at fault. In order to provide security control services and to achieve the high and continuous availability, we design the HIPAA-Compliant Automatic Monitoring System for RIS-Integrated PACS operation. The system consists of two parts: monitoring agents running in each PACS component computer and a Monitor Server running in a remote computer. Monitoring agents are deployed on all computer nodes in RIS-Integrated PACS system to collect the Audit trail messages defined by the Supplement 95 of the DICOM standard: Audit Trail Messages. Then the Monitor Server gathers all audit messages and processes them to provide security information in three levels: system resources, PACS/RIS applications, and users/patients data accessing. Now the RIS-Integrated PACS managers can monitor and control the entire RIS-Integrated PACS operation through web service provided by the Monitor Server. This paper presents the design of a HIPAA-compliant automatic monitoring system for RIS-Integrated PACS Operation, and gives the preliminary results performed by this monitoring system on a clinical RIS-integrated PACS.
NASA Technical Reports Server (NTRS)
Doggett, William R.; Dorsey, John T.; Jones, Thomas C.; King, Bruce D.; Mikulas, Martin M.
2011-01-01
Efficient handling of payloads destined for a planetary surface, such as the moon or mars, requires robust systems to secure the payloads during transport on the ground, in space and on the planetary surface. In addition, mechanisms to release the payloads need to be reliable to ensure successful transfer from one vehicle to another. An efficient payload handling strategy must also consider the devices available to support payload handling. Cranes used for overhead lifting are common to all phases of payload handling on Earth. Similarly, both recent and past studies have demonstrated that devices with comparable functionality will be needed to support lunar outpost operations. A first generation test-bed of a new high performance device that provides the capabilities of both a crane and a robotic manipulator, the Lunar Surface Manipulation System (LSMS), has been designed, built and field tested and is available for use in evaluating a system to secure payloads to transportation vehicles. A payload handling approach must address all phases of payload management including: ground transportation, launch, planetary transfer and installation in the final system. In addition, storage may be required during any phase of operations. Each of these phases requires the payload to be lifted and secured to a vehicle, transported, released and lifted in preparation for the next transportation or storage phase. A critical component of a successful payload handling approach is a latch and associated carrier system. The latch and carrier system should minimize requirements on the: payload, carrier support structure and payload handling devices as well as be able to accommodate a wide range of payload sizes. In addition, the latch should; be small and lightweight, support a method to apply preload, be reusable, integrate into a minimal set of hard-points and have manual interfaces to actuate the latch should a problem occur. A latching system which meets these requirements has been designed and fabricated and will be described in detail. This latching system works in conjunction with a payload handling device such as the LSMS, and the LSMS has been used to test first generation latch and carrier hardware. All tests have been successful during the first phase of operational evaluations. Plans for future tests of first generation latch and carrier hardware with the LSMS are also described.
NASA Technical Reports Server (NTRS)
Doggett, William R.; Dorsey, John T.; Jones, Thomas C.; King, Bruce D.; Mikulas, Martin M.
2010-01-01
Efficient handling of payloads destined for a planetary surface, such as the moon or Mars, requires robust systems to secure the payloads during transport on the ground, in-space and on the planetary surface. In addition, mechanisms to release the payloads need to be reliable to ensure successful transfer from one vehicle to another. An efficient payload handling strategy must also consider the devices available to support payload handling. Cranes used for overhead lifting are common to all phases of payload handling on Earth. Similarly, both recent and past studies have demonstrated that devices with comparable functionality will be needed to support lunar outpost operations. A first generation test-bed of a new high performance device that provides the capabilities of both a crane and a robotic manipulator, the Lunar Surface Manipulation System (LSMS), has been designed, built and field tested and is available for use in evaluating a system to secure payloads to transportation vehicles. National Institute of Aerospace, Hampton Va 23662 A payload handling approach must address all phases of payload management including: ground transportation, launch, planetary transfer and installation in the final system. In addition, storage may be required during any phase of operations. Each of these phases requires the payload to be lifted and secured to a vehicle, transported, released and lifted in preparation for the next transportation or storage phase. A critical component of a successful payload handling approach is a latch and associated carrier system. The latch and carrier system should minimize requirements on the: payload, carrier support structure and payload handling devices as well as be able to accommodate a wide range of payload sizes. In addition, the latch should; be small and lightweight, support a method to apply preload, be reusable, integrate into a minimal set of hard-points and have manual interfaces to actuate the latch should a problem occur. A latching system which meets these requirements has been designed and fabricated and will be described in detail. This latching system works in conjunction with a payload handling device such as the LSMS, and the LSMS has been used to test first generation latch and carrier hardware. All tests have been successful during the first phase of operational evaluations. Plans for future tests of first generation latch and carrier hardware with the LSMS are also described.
Joint Communications Support Element: The Voice Heard Round the World
2013-01-01
Initial Entry Package ( IEP ), Early Entry Package (EEP), and Joint Mobil- ity Package provide secure and nonsecure voice, video, and data to small mobile...teams operating worldwide. The IEP and EEP can be rapidly scaled to meet force surge require- ments from small dismounted teams up to an advance
76 FR 81807 - Operational Contract Support
Federal Register 2010, 2011, 2012, 2013, 2014
2011-12-29
... economy; productivity; competition; jobs; the environment; public health or safety; or State, local, or...'' It has been certified that 32 CFR part 158 does not contain a Federal mandate that may result in... facilities, security, and food when necessary) when performing their jobs in the direct vicinity of U.S...
45 CFR 2551.25 - What are a sponsor's administrative responsibilities?
Code of Federal Regulations, 2014 CFR
2014-10-01
... project and carry out its project management responsibilities. (c) Employ a full-time project director to... the sponsor organization and/or project service area. (f) Establish risk management policies and... responsibility for securing maximum and continuing community financial and in-kind support to operate the project...
45 CFR 2551.25 - What are a sponsor's administrative responsibilities?
Code of Federal Regulations, 2012 CFR
2012-10-01
... project and carry out its project management responsibilities. (c) Employ a full-time project director to... the sponsor organization and/or project service area. (f) Establish risk management policies and... responsibility for securing maximum and continuing community financial and in-kind support to operate the project...
45 CFR 2551.25 - What are a sponsor's administrative responsibilities?
Code of Federal Regulations, 2013 CFR
2013-10-01
... project and carry out its project management responsibilities. (c) Employ a full-time project director to... the sponsor organization and/or project service area. (f) Establish risk management policies and... responsibility for securing maximum and continuing community financial and in-kind support to operate the project...
45 CFR 2551.25 - What are a sponsor's administrative responsibilities?
Code of Federal Regulations, 2011 CFR
2011-10-01
... project and carry out its project management responsibilities. (c) Employ a full-time project director to... the sponsor organization and/or project service area. (f) Establish risk management policies and... responsibility for securing maximum and continuing community financial and in-kind support to operate the project...
Air Base Squadron Joint Security Forces Medical Element (MEDEL) JSB / ARFOR En Español Noticias Hojas to provide medical care in Waspam Call to Duty - Senior Airman Nicholas Carssow Operations Support JTF-Bravo partners with Nicaragua to provide medical care in Waspam JTF-Bravo partners with Nicaragua
State Funding of Higher Education: A New Formula.
ERIC Educational Resources Information Center
Edirisooriya, Gunapala
2003-01-01
Asserts that heavy dependence on state support is quite detrimental to operational viability of higher education institutions, and that securing financial stability of higher education institutions should be a major priority among higher education policymakers. Presents a new funding formula that can be adopted by any state. (EV)
12 CFR 615.5454 - Creation of participant's security entitlement; security interests.
Code of Federal Regulations, 2010 CFR
2010-01-01
... effect of perfection and priority of the security interest. A Federal Reserve Bank Operating Circular... SYSTEM FUNDING AND FISCAL AFFAIRS, LOAN POLICIES AND OPERATIONS, AND FUNDING OPERATIONS Book-Entry... has priority over any other interest in the securities. Where a security interest in favor of the...
NASA Astrophysics Data System (ADS)
Shoop, Brian; Johnston, Michael; Goehring, Richard; Moneyhun, Jon; Skibba, Brian
2006-05-01
MDARS is a Semi-autonomous unmanned ground vehicle with intrusion detection & assessment, product & barrier assessment payloads. Its functions include surveillance, security, early warning, incident first response and product and barrier status primarily focused on a depot/munitions security mission at structured/semi-structured facilities. MDARS is in Systems Development and Demonstration (SDD) under the Product Manager for Force Protection Systems (PM-FPS). MDARS capabilities include semi-autonomous navigation, obstacle avoidance, motion detection, day and night imagers, radio frequency tag inventory/barrier assessment and audio challenge and response. Four SDD MDARS Patrol Vehicles have been undergoing operational evaluation at Hawthorne Army Depot, NV (HWAD) since October 2004. Hawthorne personnel were trained to administer, operate and maintain the system in accordance with the US Army Military Police School (USAMPS) Concept of Employment and the PM-FPS MDARS Integrated Logistic Support Plan. The system was subjected to intensive periods of evaluation under the guidance and control of the Army Test and Evaluation Center (ATEC) and PM-FPS. Significantly, in terms of User acceptance, the system has been under the "operational control" of the installation performing security and force protection missions in support of daily operations. This evaluation is intended to assess MDARS operational effectiveness in an operational environment. Initial observations show that MDARS provides enhanced force protection, can potentially reduce manpower requirements by conducting routine tasks within its design capabilities and reduces Soldier exposure in the initial response to emerging incidents and situations. Success of the MDARS program has been instrumental in the design and development of two additional robotic force protection programs. The first was the USAF Force Protection Battle Lab sponsored Remote Detection Challenge & Response (REDCAR) concept demonstration executed by the Air Force Robotics Lab (AFRL). The REDCAR used an MDARS PUV as the central robotic technology and expanded the concept to incorporate a smaller high speed platform (SCOUT) equipped with lethal, non-lethal and challenge components as an engagement platform and, in a marsupial configuration on the MDARS, a small UGV that can be deployed to investigate close quarters areas. The Family of Integrated Rapid Response Equipment (FIRRE) program further expands these concepts by incorporating and adapting other mobile/tactical force protection equipment with a more robust Unmanned Ground Vehicle into an "Expeditionary" configuration to provide the current force with a rapidly deployable force protection system that can operate in austere less structured and protected environments. A USAMPS/ MANCEN sponsored "FIRRE System Demonstration" in Iraq is scheduled to begin in FY '07.
Practical somewhat-secure quantum somewhat-homomorphic encryption with coherent states
NASA Astrophysics Data System (ADS)
Tan, Si-Hui; Ouyang, Yingkai; Rohde, Peter P.
2018-04-01
We present a scheme for implementing homomorphic encryption on coherent states encoded using phase-shift keys. The encryption operations require only rotations in phase space, which commute with computations in the code space performed via passive linear optics, and with generalized nonlinear phase operations that are polynomials of the photon-number operator in the code space. This encoding scheme can thus be applied to any computation with coherent-state inputs, and the computation proceeds via a combination of passive linear optics and generalized nonlinear phase operations. An example of such a computation is matrix multiplication, whereby a vector representing coherent-state amplitudes is multiplied by a matrix representing a linear optics network, yielding a new vector of coherent-state amplitudes. By finding an orthogonal partitioning of the support of our encoded states, we quantify the security of our scheme via the indistinguishability of the encrypted code words. While we focus on coherent-state encodings, we expect that this phase-key encoding technique could apply to any continuous-variable computation scheme where the phase-shift operator commutes with the computation.
Habriielian, A V; Smorzhevs'kyĭ, V I; Onishchenko, V F; Beleĭovych, V V; Topchu, Ie I; Domans'kyĭ, T M; Myroniuk, O I
2011-07-01
Comparative analysis of the results of plastic operations performance on a tricuspid valve (TV) in patients, suffering cardiac insufficiency in terminal stage, was conducted. In late postoperative period the indices of intracardial hemodynamics (cardiac output fraction, regurgitation on TV) and clinical features (severity of symptoms, quality of life) after plastic operations, using a support ring, have differed significantly from those after performance of a sutured plasty. The valve function during five years was secured in 91.1% of patients.
A Real-Time Decision Support System for Voltage Collapse Avoidance in Power Supply Networks
NASA Astrophysics Data System (ADS)
Chang, Chen-Sung
This paper presents a real-time decision support system (RDSS) based on artificial intelligence (AI) for voltage collapse avoidance (VCA) in power supply networks. The RDSS scheme employs a fuzzy hyperrectangular composite neural network (FHRCNN) to carry out voltage risk identification (VRI). In the event that a threat to the security of the power supply network is detected, an evolutionary programming (EP)-based algorithm is triggered to determine the operational settings required to restore the power supply network to a secure condition. The effectiveness of the RDSS methodology is demonstrated through its application to the American Electric Power Provider System (AEP, 30-bus system) under various heavy load conditions and contingency scenarios. In general, the numerical results confirm the ability of the RDSS scheme to minimize the risk of voltage collapse in power supply networks. In other words, RDSS provides Power Provider Enterprises (PPEs) with a viable tool for performing on-line voltage risk assessment and power system security enhancement functions.
49 CFR 1542.303 - Security Directives and Information Circulars.
Code of Federal Regulations, 2014 CFR
2014-10-01
...) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY... Information Circular to notify airport operators of security concerns. When TSA determines that additional... aviation, TSA issues a Security Directive setting forth mandatory measures. (b) Each airport operator must...
49 CFR 1542.303 - Security Directives and Information Circulars.
Code of Federal Regulations, 2011 CFR
2011-10-01
...) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY... Information Circular to notify airport operators of security concerns. When TSA determines that additional... aviation, TSA issues a Security Directive setting forth mandatory measures. (b) Each airport operator must...
49 CFR 1542.303 - Security Directives and Information Circulars.
Code of Federal Regulations, 2012 CFR
2012-10-01
...) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY... Information Circular to notify airport operators of security concerns. When TSA determines that additional... aviation, TSA issues a Security Directive setting forth mandatory measures. (b) Each airport operator must...
49 CFR 1542.303 - Security Directives and Information Circulars.
Code of Federal Regulations, 2013 CFR
2013-10-01
...) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY... Information Circular to notify airport operators of security concerns. When TSA determines that additional... aviation, TSA issues a Security Directive setting forth mandatory measures. (b) Each airport operator must...
Integrity Verification for Multiple Data Copies in Cloud Storage Based on Spatiotemporal Chaos
NASA Astrophysics Data System (ADS)
Long, Min; Li, You; Peng, Fei
Aiming to strike for a balance between the security, efficiency and availability of the data verification in cloud storage, a novel integrity verification scheme based on spatiotemporal chaos is proposed for multiple data copies. Spatiotemporal chaos is implemented for node calculation of the binary tree, and the location of the data in the cloud is verified. Meanwhile, dynamic operation can be made to the data. Furthermore, blind information is used to prevent a third-party auditor (TPA) leakage of the users’ data privacy in a public auditing process. Performance analysis and discussion indicate that it is secure and efficient, and it supports dynamic operation and the integrity verification of multiple copies of data. It has a great potential to be implemented in cloud storage services.
VAB Platform K(2) Lift & Install into Highbay 3
2016-03-07
Work is underway to secure the second half of the K-level work platforms for NASA’s Space Launch System (SLS) rocket in High Bay 3 inside the Vehicle Assembly Building at NASA's Kennedy Space Center in Florida. The platform is being secured into position on tower E, about 86 feet above the floor. The K work platforms will provide access to NASA's Space Launch System (SLS) core stage and solid rocket boosters during processing and stacking operations on the mobile launcher. The Ground Systems Development and Operations Program is overseeing upgrades and modifications to High Bay 3 to support processing of the SLS and Orion spacecraft. A total of 10 levels of new platforms, 20 platform halves altogether, will surround the SLS rocket and Orion spacecraft.
NASA Technical Reports Server (NTRS)
Branch, Drew A.
2014-01-01
Security is one of the most if not the most important areas today. After the several attacks on the United States, security everywhere has heightened from airports to the communication among the military branches legionnaires. With advanced persistent threats (APT's) on the rise following Stuxnet, government branches and agencies are required, more than ever, to follow several standards, policies and procedures to reduce the likelihood of a breach. Attack vectors today are very advanced and are going to continue to get more and more advanced as security controls advance. This creates a need for networks and systems to be in an updated and secured state in a launch control system environment. FISMA is a law that is mandated by the government to follow when government agencies secure networks and devices. My role on this project is to ensure network devices and systems are in compliance with NIST, as outlined in FISMA. I will achieve this by providing assistance with security plan documentation and collection, system hardware and software inventory, malicious code and malware scanning, and configuration of network devices i.e. routers and IDS's/IPS's. In addition, I will be completing security assessments on software and hardware, vulnerability assessments and reporting, and conducting patch management and risk assessments. A guideline that will help with compliance with NIST is the SANS Top 20 Critical Controls. SANS Top 20 Critical Controls as well as numerous security tools, security software and the conduction of research will be used to successfully complete the tasks given to me. This will ensure compliance with FISMA and NIST, secure systems and a secured network. By the end of this project, I hope to have carried out the tasks stated above as well as gain an immense knowledge about compliance, security tools, networks and network devices, as well as policies and procedures.
NASA Technical Reports Server (NTRS)
Branch, Drew
2013-01-01
Security is one of the most if not the most important areas today. After the several attacks on the United States, security everywhere was heightened from Airports to the communication among the military branches legionnaires. With advanced persistent threats (APTs) on the rise following Stuxnet, government branches and agencies are required, more than ever, to follow several standards, policies and procedures to reduce the likelihood of a breach. Attack vectors today are very advanced and are going to continue to get more and more advanced as security controls advance. This creates a need for networks and systems to be in an updated and secured state in a launch control system environment. FISMA is a law that is mandated by the government to follow when government agencies secure networks and devices. My role on this project is to ensure network devices and systems are in compliance with NIST, as outlined in FISMA. I will achieve this by providing assistance with security plan documentation and collection, system hardware and software inventory, malicious code and malware scanning and configuration of network devices i.e. routers and IDSsIPSs. In addition I will be completing security assessments on software and hardware, vulnerability assessments and reporting, conducting patch management and risk assessments. A guideline that will help with compliance with NIST is the SANS Top 20 Critical Controls. SANS Top 20 Critical Controls as well as numerous security tools, security software and the conduction of research will be used to successfully complete the tasks given to me. This will ensure compliance with FISMA and NIST, secure systems and a secured network. By the end of this project, I hope to have carried out stated above as well as gain an immense knowledge about compliance, security tools, networks and network devices, policies and procedures.
Defense Logistical Support Contracts in Iraq and Afghanistan: Issues for Congress
2009-06-24
on Wartime Contracting in Iraq and Afghanistan; • Section 852 calls for the Army Audit Agency, the Navy Audit Services, and the Air Force Audit...reporting requirements for contractors that perform security functions in areas of combat operations and are involved in the discharge of a weapon or other...hand in dealing with industry. As an example, Secretary of the Navy Donald C. Winter and Chief of Naval Operations Adm. Michael G. Mullen have reported
Air Base Ground Defense Wargame: Study of a Security Police Training Device.
1987-09-01
different locations of the air base under siege. Therefore, AFOSP supports the development of a board wargame training device to compensate for the...commercial wargames available on the market . Eight games were identified as having application to this study due to their use of modern weapons and the...operation under his operational control (9:23). Concentration of MIR Efforts. This principle is a restatement of the universally accepted principle of mass (9
A specialist team of A&E doctors and nurses establish emergency care units in Kosovo.
Hodgetts, Lieutenant Colonel Tim; Kenward, Gary
2000-02-01
On June 12, 1999 NATO troops led by British paratroopers of 5 Airborne Brigade entered Kosovo and secured key military sites. This multinational operation (code named 'OP AGRICOLA') was in response to the ethnic cleansing of Kosovo-Albanians, and followed a sustained period of aerial attack in Kosovo and Serbia. The ground operation required substantial medical support, and the British hospital element was provided by 22 Field Hospital RAMC.
2008-03-01
Postgraduate School’s COASTS international field- testing and thesis research program. B. COASTS 2007 Indonesia, Malaysia , Singapore, Thailand, and the...software tools available for monitoring and testing network throughput. One Dell Laptop was loaded with the IxChariot console as shown in Figure 32...91 J. LAPTOP COMPUTERS As mentioned in the previous section, one dell laptop was loaded with the IxChariot console. Two additional laptop
NASA Astrophysics Data System (ADS)
Xie, Chang; Wen, Jing; Liu, Wenying; Wang, Jiaming
With the development of intelligent dispatching, the intelligence level of network control center full-service urgent need to raise. As an important daily work of network control center, the application of maintenance scheduling intelligent arrangement to achieve high-quality and safety operation of power grid is very important. By analyzing the shortages of the traditional maintenance scheduling software, this paper designs a power grid maintenance scheduling intelligence arrangement supporting system based on power flow forecasting, which uses the advanced technologies in maintenance scheduling, such as artificial intelligence, online security checking, intelligent visualization techniques. It implements the online security checking of maintenance scheduling based on power flow forecasting and power flow adjusting based on visualization, in order to make the maintenance scheduling arrangement moreintelligent and visual.
Security and Policy for Group Collaboration
DOE Office of Scientific and Technical Information (OSTI.GOV)
Ian Foster; Carl Kesselman
2006-07-31
“Security and Policy for Group Collaboration” was a Collaboratory Middleware research project aimed at providing the fundamental security and policy infrastructure required to support the creation and operation of distributed, computationally enabled collaborations. The project developed infrastructure that exploits innovative new techniques to address challenging issues of scale, dynamics, distribution, and role. To reduce greatly the cost of adding new members to a collaboration, we developed and evaluated new techniques for creating and managing credentials based on public key certificates, including support for online certificate generation, online certificate repositories, and support for multiple certificate authorities. To facilitate the integration ofmore » new resources into a collaboration, we improved significantly the integration of local security environments. To make it easy to create and change the role and associated privileges of both resources and participants of collaboration, we developed community wide authorization services that provide distributed, scalable means for specifying policy. These services make it possible for the delegation of capability from the community to a specific user, class of user or resource. Finally, we instantiated our research results into a framework that makes it useable to a wide range of collaborative tools. The resulting mechanisms and software have been widely adopted within DOE projects and in many other scientific projects. The widespread adoption of our Globus Toolkit technology has provided, and continues to provide, a natural dissemination and technology transfer vehicle for our results.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
Not Available
1994-03-01
This document outlines the activities necessary to conduct a Remedial Investigation (RI) of the Chestnut Ridge Security Pits (CRSP) at the Oak Ridge Y-12 Plant. The CRSP, also designated Chestnut Ridge Operable Unit (OU) 1, is one of four OUs along Chestnut Ridge on the Oak Ridge Reservation (ORR). The purpose of the RI is to collect data to (1) evaluate the nature and extent of known and suspected contaminants, (2) support an Ecological Risk Assessment (ERA) and a Human Health Risk Assessment (HHRA), (3) support the feasibility study in the development and analysis of remedial alternatives, and (4) ultimately,more » develop a Record of Decision (ROD) for the site. This chapter summarizes the regulatory background of environmental investigation on the ORR and the approach currently being followed and provides an overview of the RI to be conducted at the CRSP. Subsequent chapters provide details on site history, sampling activities, procedures and methods, quality assurance (QA), health and safety, and waste management related to the RI.« less
49 CFR 1544.231 - Airport-approved and exclusive area personnel identification systems.
Code of Federal Regulations, 2013 CFR
2013-10-01
... (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRCRAFT OPERATOR SECURITY: AIR CARRIERS AND COMMERCIAL OPERATORS Operations § 1544.231 Airport-approved... 49 Transportation 9 2013-10-01 2013-10-01 false Airport-approved and exclusive area personnel...
Yeh, Kenneth B; Adams, Martin; Stamper, Paul D; Dasgupta, Debanjana; Hewson, Roger; Buck, Charles D; Richards, Allen L; Hay, John
2016-01-01
Strategic laboratory planning in limited resource areas is essential for addressing global health security issues. Establishing a national reference laboratory, especially one with BSL-3 or -4 biocontainment facilities, requires a heavy investment of resources, a multisectoral approach, and commitments from multiple stakeholders. We make the case for donor organizations and recipient partners to develop a comprehensive laboratory operations roadmap that addresses factors such as mission and roles, engaging national and political support, securing financial support, defining stakeholder involvement, fostering partnerships, and building trust. Successful development occurred with projects in African countries and in Azerbaijan, where strong leadership and a clear management framework have been key to success. A clearly identified and agreed management framework facilitate identifying the responsibility for developing laboratory capabilities and support services, including biosafety and biosecurity, quality assurance, equipment maintenance, supply chain establishment, staff certification and training, retention of human resources, and sustainable operating revenue. These capabilities and support services pose rate-limiting yet necessary challenges. Laboratory capabilities depend on mission and role, as determined by all stakeholders, and demonstrate the need for relevant metrics to monitor the success of the laboratory, including support for internal and external audits. Our analysis concludes that alternative frameworks for success exist for developing and implementing capabilities at regional and national levels in limited resource areas. Thus, achieving a balance for standardizing practices between local procedures and accepted international standards is a prerequisite for integrating new facilities into a country's existing public health infrastructure and into the overall international scientific community.
49 CFR 1542.109 - Alternate means of compliance.
Code of Federal Regulations, 2011 CFR
2011-10-01
... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Airport Security Program § 1542.109 Alternate means of compliance. If in TSA's judgment, the overall safety and security of the airport, and aircraft operator or foreign air carrier operations are not diminished, TSA...
49 CFR 1542.109 - Alternate means of compliance.
Code of Federal Regulations, 2013 CFR
2013-10-01
... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Airport Security Program § 1542.109 Alternate means of compliance. If in TSA's judgment, the overall safety and security of the airport, and aircraft operator or foreign air carrier operations are not diminished, TSA...
49 CFR 1542.109 - Alternate means of compliance.
Code of Federal Regulations, 2014 CFR
2014-10-01
... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Airport Security Program § 1542.109 Alternate means of compliance. If in TSA's judgment, the overall safety and security of the airport, and aircraft operator or foreign air carrier operations are not diminished, TSA...
49 CFR 1542.109 - Alternate means of compliance.
Code of Federal Regulations, 2010 CFR
2010-10-01
... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Airport Security Program § 1542.109 Alternate means of compliance. If in TSA's judgment, the overall safety and security of the airport, and aircraft operator or foreign air carrier operations are not diminished, TSA...
49 CFR 1542.109 - Alternate means of compliance.
Code of Federal Regulations, 2012 CFR
2012-10-01
... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Airport Security Program § 1542.109 Alternate means of compliance. If in TSA's judgment, the overall safety and security of the airport, and aircraft operator or foreign air carrier operations are not diminished, TSA...
14 CFR 121.538 - Aircraft security.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 14 Aeronautics and Space 3 2014-01-01 2014-01-01 false Aircraft security. 121.538 Section 121.538..., FLAG, AND SUPPLEMENTAL OPERATIONS Flight Operations § 121.538 Aircraft security. Certificate holders conducting operations under this part must comply with the applicable security requirements in 49 CFR chapter...
14 CFR 121.538 - Aircraft security.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 14 Aeronautics and Space 3 2010-01-01 2010-01-01 false Aircraft security. 121.538 Section 121.538..., FLAG, AND SUPPLEMENTAL OPERATIONS Flight Operations § 121.538 Aircraft security. Certificate holders conducting operations under this part must comply with the applicable security requirements in 49 CFR chapter...
14 CFR 121.538 - Aircraft security.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 14 Aeronautics and Space 3 2012-01-01 2012-01-01 false Aircraft security. 121.538 Section 121.538..., FLAG, AND SUPPLEMENTAL OPERATIONS Flight Operations § 121.538 Aircraft security. Certificate holders conducting operations under this part must comply with the applicable security requirements in 49 CFR chapter...
Layered virus protection for the operations and administrative messaging system
NASA Technical Reports Server (NTRS)
Cortez, R. H.
2002-01-01
NASA's Deep Space Network (DSN) is critical in supporting the wide variety of operating and plannedunmanned flight projects. For day-to-day operations it relies on email communication between the three Deep Space Communication Complexes (Canberra, Goldstone, Madrid) and NASA's Jet Propulsion Laboratory. The Operations & Administrative Messaging system, based on the Microsoft Windows NTand Exchange platform, provides the infrastructure that is required for reliable, mission-critical messaging. The reliability of this system, however, is threatened by the proliferation of email viruses that continue to spread at alarming rates. A layered approach to email security has been implemented across the DSN to protect against this threat.
Controlling multiple security robots in a warehouse environment
NASA Technical Reports Server (NTRS)
Everett, H. R.; Gilbreath, G. A.; Heath-Pastore, T. A.; Laird, R. T.
1994-01-01
The Naval Command Control and Ocean Surveillance Center (NCCOSC) has developed an architecture to provide coordinated control of multiple autonomous vehicles from a single host console. The multiple robot host architecture (MRHA) is a distributed multiprocessing system that can be expanded to accommodate as many as 32 robots. The initial application will employ eight Cybermotion K2A Navmaster robots configured as remote security platforms in support of the Mobile Detection Assessment and Response System (MDARS) Program. This paper discusses developmental testing of the MRHA in an operational warehouse environment, with two actual and four simulated robotic platforms.
49 CFR 1544.221 - Carriage of prisoners under the control of armed law enforcement officers.
Code of Federal Regulations, 2010 CFR
2010-10-01
... Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRCRAFT OPERATOR SECURITY: AIR CARRIERS AND COMMERCIAL OPERATORS Operations § 1544.221 Carriage... custody of an armed law enforcement officer aboard an aircraft for which screening is required unless, in...
14 CFR 298.33 - Security requirements.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 14 Aeronautics and Space 4 2013-01-01 2013-01-01 false Security requirements. 298.33 Section 298... on Exemptions and Operations § 298.33 Security requirements. In conducting operations under this part, an air taxi operator or a commuter air carrier is required to adhere to all security requirements...
14 CFR 298.33 - Security requirements.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 14 Aeronautics and Space 4 2010-01-01 2010-01-01 false Security requirements. 298.33 Section 298... on Exemptions and Operations § 298.33 Security requirements. In conducting operations under this part, an air taxi operator or a commuter air carrier is required to adhere to all security requirements...
14 CFR 298.33 - Security requirements.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 14 Aeronautics and Space 4 2014-01-01 2014-01-01 false Security requirements. 298.33 Section 298... on Exemptions and Operations § 298.33 Security requirements. In conducting operations under this part, an air taxi operator or a commuter air carrier is required to adhere to all security requirements...
14 CFR 298.33 - Security requirements.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 14 Aeronautics and Space 4 2012-01-01 2012-01-01 false Security requirements. 298.33 Section 298... on Exemptions and Operations § 298.33 Security requirements. In conducting operations under this part, an air taxi operator or a commuter air carrier is required to adhere to all security requirements...
M and S supporting unmanned autonomous systems (UAxS) concept development and experimentation
NASA Astrophysics Data System (ADS)
Biagini, Marco; Scaccianoce, Alfio; Corona, Fabio; Forconi, Sonia; Byrum, Frank; Fowler, Olivia; Sidoran, James L.
2017-05-01
The development of the next generation of multi-domain unmanned semi and fully autonomous C4ISR systems involves a multitude of security concerns and interoperability challenges. Conceptual solutions to capability shortfalls and gaps can be identified through Concept Development and Experimentation (CD and E) cycles. Modelling and Simulation (M and S) is a key tool in supporting unmanned autonomous systems (UAxS) CD and E activities and addressing associated security challenges. This paper serves to illustrate the application of M and S to UAxS development and highlight initiatives made by the North Atlantic Treaty Organization (NATO) M and S Centre of Excellence (CoE) to facilitate interoperability. The NATO M and S CoE collaborates with other NATO and Nations bodies in order to develop UAxS projects such as the Allied Command for Transformation Counter Unmanned Autonomous Systems (CUAxS) project or the work of Science and Technology Organization (STO) panels. Some initiatives, such as Simulated Interactive Robotics Initiative (SIRI) made the baseline for further developments and to study emerging technologies in M and S and robotics fields. Artificial Intelligence algorithm modelling, Robot Operating Systems (ROS), network operations, cyber security, interoperable languages and related data models are some of the main aspects considered in this paper. In particular, the implementation of interoperable languages like C-BML and NIEM MilOps are discussed in relation to a Command and Control - Simulation Interoperability (C2SIM) paradigm. All these technologies are used to build a conceptual architecture to support UAxS CD and E.In addition, other projects that the NATO M and S CoE is involved in, such as the NATO Urbanization Project could provide credible future operational environments and benefit UAxS project development, as dual application of UAxS technology in large urbanized areas.In conclusion, this paper contains a detailed overview regarding how applying Modelling and Simulation to support CD and E activities is a valid approach to develop and validate future capabilities requirements in general and next generation UAxS.
Towards optimizing two-qubit operations in three-electron double quantum dots
NASA Astrophysics Data System (ADS)
Frees, Adam; Gamble, John King; Mehl, Sebastian; Friesen, Mark; Coppersmith, S. N.
The successful implementation of single-qubit gates in the quantum dot hybrid qubit motivates our interest in developing a high fidelity two-qubit gate protocol. Recently, extensive work has been done to characterize the theoretical limitations and advantages in performing two-qubit operations at an operation point located in the charge transition region. Additionally, there is evidence to support that single-qubit gate fidelities improve while operating in the so-called ``far-detuned'' region, away from the charge transition. Here we explore the possibility of performing two-qubit gates in this region, considering the challenges and the benefits that may present themselves while implementing such an operational paradigm. This work was supported in part by ARO (W911NF-12-0607) (W911NF-12-R-0012), NSF (PHY-1104660), ONR (N00014-15-1-0029). The authors gratefully acknowledge support from the Sandia National Laboratories Truman Fellowship Program, which is funded by the Laboratory Directed Research and Development (LDRD) Program. Sandia is a multi-program laboratory managed and operated by Sandia Corporation, a wholly owned subsidiary of Lockheed Martin Corporation, for the US Department of Energy's National Nuclear Security Administration under Contract No. DE-AC04-94AL85000.
2006-08-16
invasive weeds present in lower densities. In addition, cogon grass , melaleuca, mistletoe (Phoradendron serotinum), and small populations of thistles...area. Adverse impacts to indigos are not expected since the area consists of mowed grass only. To ensure potential impacts are reduced, the 45 SW...inside the Trident Basin, is primarily grass with rock revetment. The security activities would require boat operations in other areas of the Port as
Signals Intelligence Support to U.S. Military Commanders: Past and Present
1991-04-10
Campaigns 33-38 Invasion of Sicily 39-41 Invasion of the Italian Mainland 41-45 European Theater of Operations 45 Northern Europe 45-55 Pacific Theater...for example, permitted 1,560,000 per- mutations for each encrypted character. Additional security was provided by daily-changing keys and a plugboard...bombe and one operator c~n be seen in Figure 7. BRITISH AND U.S. SIGINT COOPERATION The U.S. Army contijigent in Europe , known as a Special
Military Unmanned Aircraft Systems in Support of Homeland Security
2007-03-30
14 CFR) part 91.1131, Right-of-Way Rules , there would be no UA flights in civil airspace.31 To meet this need, the FAA and DoD have agreed on an... rules , vice the current operations which are centered on combat operations. A step-by-step approach needs to be adopted now to introduce UAS into a...H-1. 45 Peter La Franchi , “US Industry Calls for National UAV in Controlled Airspace Initiative,” Flight International, 31 March 2006 [journal on
Not an Idea We Have to Shun’: Chinese Overseas Basing Requirements in the 21st Century
2014-10-01
Inter Services Public Relations /HO) “Not an Idea We Have to Shun” Center for the Study of Chinese Military Affairs Institute for National Strategic... relations . Chinese operations in support of regional stability and to address nontraditional security threats would not necessarily conflict with U.S...cate U.S. relations with China and with the countries of the region, compel U.S. naval and military forces to operate in closer proximity with PLA
49 CFR 1542.207 - Access control systems.
Code of Federal Regulations, 2010 CFR
2010-10-01
... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.207 Access control... original access medium, if the airport operator follows measures and procedures in the security program...
49 CFR 1542.207 - Access control systems.
Code of Federal Regulations, 2013 CFR
2013-10-01
... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.207 Access control... original access medium, if the airport operator follows measures and procedures in the security program...
49 CFR 1542.207 - Access control systems.
Code of Federal Regulations, 2014 CFR
2014-10-01
... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.207 Access control... original access medium, if the airport operator follows measures and procedures in the security program...
49 CFR 1542.207 - Access control systems.
Code of Federal Regulations, 2011 CFR
2011-10-01
... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.207 Access control... original access medium, if the airport operator follows measures and procedures in the security program...
49 CFR 1542.207 - Access control systems.
Code of Federal Regulations, 2012 CFR
2012-10-01
... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.207 Access control... original access medium, if the airport operator follows measures and procedures in the security program...
Secure data aggregation in heterogeneous and disparate networks using stand off server architecture
NASA Astrophysics Data System (ADS)
Vimalathithan, S.; Sudarsan, S. D.; Seker, R.; Lenin, R. B.; Ramaswamy, S.
2009-04-01
The emerging global reach of technology presents myriad challenges and intricacies as Information Technology teams aim to provide anywhere, anytime and anyone access, for service providers and customers alike. The world is fraught with stifling inequalities, both from an economic as well as socio-political perspective. The net result has been large capability gaps between various organizational locations that need to work together, which has raised new challenges for information security teams. Similar issues arise, when mergers and acquisitions among and between organizations take place. While integrating remote business locations with mainstream operations, one or more of the issues including the lack of application level support, computational capabilities, communication limitations, and legal requirements cause a serious impediment thereby complicating integration while not violating the organizations' security requirements. Often resorted techniques like IPSec, tunneling, secure socket layer, etc. may not be always techno-economically feasible. This paper addresses such security issues by introducing an intermediate server between corporate central server and remote sites, called stand-off-server. We present techniques such as break-before-make connection, break connection after transfer, multiple virtual machine instances with different operating systems using the concept of a stand-off-server. Our experiments show that the proposed solution provides sufficient isolation for the central server/site from attacks arising out of weak communication and/or computing links and is simple to implement.
1998-06-25
KENNEDY SPACE CENTER, FLA. -- Sgt. Mark Hines, of Kennedy Space Center (KSC) Security, checks out equipment used to operate the Forward Looking Infrared Radar (FLIR) installed on NASA's Huey UH-1 helicopter. The helicopter has also been outfitted with a portable global positioning satellite (GPS) system to support Florida's Division of Forestry as they fight the brush fires which have been plaguing the state as a result of extremely dry conditions and lightning storms. The FLIR includes a beach ball-sized infrared camera that is mounted on the helicopter's right siderail and a real-time television monitor and recorder installed inside. While the FLIR collects temperature data and images, the GPS system provides the exact coordinates of the fires being observed and transmits the data to the firefighters on the ground. KSC's security team routinely uses the FLIR equipment prior to Shuttle launch and landing activities to ensure that the area surrounding the launch pad and runway are clear of unauthorized personnel. KSC's Base Operations Contractor, EG&G Florida, operates the NASA-owned helicopter
1998-06-25
KENNEDY SPACE CENTER, FLA. -- NASA's Huey UH-1 helicopter lands at the Shuttle Landing Facility to pick up Kennedy Space Center (KSC) Security personnel who operate the Forward Looking Infrared Radar (FLIR) installed on board. The helicopter has also been outfitted with a portable global positioning satellite (GPS) system to support Florida's Division of Forestry as they fight the brush fires which have been plaguing the state as a result of extremely dry conditions and lightning storms. The FLIR includes a beach ball-sized infrared camera that is mounted on the helicopter's right siderail and a real-time television monitor and recorder installed inside. While the FLIR collects temperature data and images, the GPS system provides the exact coordinates of the fires being observed and transmits the data to the firefighters on the ground. KSC's security team routinely uses the FLIR equipment prior to Shuttle launch and landing activities to ensure that the area surrounding the launch pad and runway are clear of unauthorized personnel. KSC's Base Operations Contractor, EG&G Florida, operates the NASA-owned helicopter
Distributed Operations Planning
NASA Technical Reports Server (NTRS)
Fox, Jason; Norris, Jeffrey; Powell, Mark; Rabe, Kenneth; Shams, Khawaja
2007-01-01
Maestro software provides a secure and distributed mission planning system for long-term missions in general, and the Mars Exploration Rover Mission (MER) specifically. Maestro, the successor to the Science Activity Planner, has a heavy emphasis on portability and distributed operations, and requires no data replication or expensive hardware, instead relying on a set of services functioning on JPL institutional servers. Maestro works on most current computers with network connections, including laptops. When browsing down-link data from a spacecraft, Maestro functions similarly to being on a Web browser. After authenticating the user, it connects to a database server to query an index of data products. It then contacts a Web server to download and display the actual data products. The software also includes collaboration support based upon a highly reliable messaging system. Modifications made to targets in one instance are quickly and securely transmitted to other instances of Maestro. The back end that has been developed for Maestro could benefit many future missions by reducing the cost of centralized operations system architecture.
Quantum cascade lasers for defense and security
NASA Astrophysics Data System (ADS)
Day, Timothy; Pushkarsky, Michael; Caffey, Dave; Cecchetti, Kristen; Arp, Ron; Whitmore, Alex; Henson, Michael; Takeuchi, Eric B.
2013-10-01
Quantum cascade laser (QCL) systems are mature and at the vanguard of a new generation of products that support military applications such as Infrared Countermeasures (IRCM) and targeting. The demanding product requirements for aircraft platforms that include reduced size, weight, power consumption and cost (SWaP-C) extends to portable, battery powered handheld products. QCL technology operates throughout the mid-wave (MWIR) and long-wave (LWIR) infrared to provide new capabilities that leverage existing thermal imaging cameras. In addition to their suitability for aircraft platforms, QCL products are a natural fit to meet operator demands for small, lightweight pointer and beacon capabilities. Field-testing of high power, lightweight, battery operated devices has demonstrated their utility across a range of air and ground applications. This talk will present an overview of QCL technology and the Defense and Security products and capabilities that are enabled by it. This talk will also provide an overview of the extensive environmental and performance testing associated with products based on QCL technology.
2010-10-27
central to the enemy‟s operational design, defense and industry efforts to counter the IED with technology have been aggressive. The US has spent...and industry efforts to counter the IED with technology have been aggressive. The US has spent billions of dollars to mitigate the effects of IEDs...2001 has claimed the lives of over 1,700 United States and Coalition Force (CF) service men and women ; over six times that many have been wounded.1
Federal Register 2010, 2011, 2012, 2013, 2014
2010-08-16
... DEPARTMENT OF HOMELAND SECURITY Transportation Security Administration New Agency Information Collection Activity Under OMB Review: Pipeline System Operator Security Information AGENCY: Transportation... INFORMATION CONTACT: Joanna Johnson, Office of Information Technology, TSA-11, Transportation Security...
Hidden Costs of the Campus Security Force.
ERIC Educational Resources Information Center
Temple, Charles M.
1981-01-01
Information on the security operations of public four-year colleges and universities is examined, and the case of the University of Tennessee, Chattanooga (UTC), which saved $66,000 a year from the security unit's operational budget, is noted. Of 561 questionnaires sent to public institutions regarding the general operation of security units,…
The Evolution of the Federal Monitoring and Assessment Center
DOE Office of Scientific and Technical Information (OSTI.GOV)
NSTec Aerial Measurement System
2012-07-31
The Federal Radiological Monitoring and Assessment Center (FRMAC) is a federal emergency response asset whose assistance may be requested by the Department of Homeland Security (DHS), the Department of Defense (DoD), the Environmental Protection Agency (EPA), the Nuclear Regulatory Commission (NRC), and state and local agencies to respond to a nuclear or radiological incident. It is an interagency organization with representation from the Department of Energy’s National Nuclear Security Administration (DOE/NNSA), the Department of Defense (DoD), the Environmental Protection Agency (EPA), the Department of Health and Human Services (HHS), the Federal Bureau of Investigation (FBI), and other federal agencies. FRMAC,more » in its present form, was created in 1987 when the radiological support mission was assigned to the DOE’s Nevada Operations Office by DOE Headquarters. The FRMAC asset, including its predecessor entities, was created, grew, and evolved to function as a response to radiological incidents. Radiological emergency response exercises showed the need for a coordinated approach to managing federal emergency monitoring and assessment activities. The mission of FRMAC is to coordinate and manage all federal radiological environmental monitoring and assessment activities during a nuclear or radiological incident within the United States in support of state,local, tribal governments, DHS, and the federal coordinating agency. Radiological emergency response professionals with the DOE’s national laboratories support the Radiological Assistance Program (RAP), National Atmospheric Release Advisory Center (NARAC), the Aerial MeasuringSystem (AMS), and the Radiation Emergency Assistance Center/Training Site (REAC/TS). These teams support the FRMAC to provide: Atmospheric transport modeling; Radiation monitoring; Radiological analysis and data assessments; and Medical advice for radiation injuries In support of field operations, the FRMAC provides geographic information systems, communications, mechanical, electrical, logistics, and administrative support. The size of the FRMAC is tailored to the incident and is comprised of emergency response professionals drawn from across the federal government. State and local emergency response teams may also integrate their operations with FRMAC, but are not required to.« less
Secure provision of reactive power ancillary services in competitive electricity markets
NASA Astrophysics Data System (ADS)
El-Samahy, Ismael
The research work presented in this thesis discusses various complex issues associated with reactive power management and pricing in the context of new operating paradigms in deregulated power systems, proposing appropriate policy solutions. An integrated two-level framework for reactive power management is set forth, which is both suitable for a competitive market and ensures a secure and reliable operation of the associated power system. The framework is generic in nature and can be adopted for any electricity market structure. The proposed hierarchical reactive power market structure comprises two stages: procurement of reactive power resources on a seasonal basis, and real-time reactive power dispatch. The main objective of the proposed framework is to provide appropriate reactive power support from service providers at least cost, while ensuring a secure operation of the power system. The proposed procurement procedure is based on a two-step optimization model. First, the marginal benefits of reactive power supply from each provider, with respect to system security, are obtained by solving a loadability-maximization problem subject to transmission security constraints imposed by voltage and thermal limits. Second, the selected set of generators is determined by solving an optimal power flow (OPF)-based auction. This auction maximizes a societal advantage function comprising generators' offers and their corresponding marginal benefits with respect to system security, and considering all transmission system constraints. The proposed procedure yields the selected set of generators and zonal price components, which would form the basis for seasonal contracts between the system operator and the selected reactive power service providers. The main objective of the proposed reactive power dispatch model is to minimize the total payment burden on the Independent System Operator (ISO), which is associated with reactive power dispatch. The real power generation is decoupled and assumed to be fixed during the reactive power dispatch procedures; however, the effect of reactive power on real power is considered in the model by calculating the required reduction in real power output of a generator due to an increase in its reactive power supply. In this case, real power generation is allowed to be rescheduled, within given limits, from the already dispatched levels obtained from the energy market clearing process. The proposed dispatch model achieves the main objective of an ISO in a competitive electricity market, which is to provide the required reactive power support from generators at least cost while ensuring a secure operation of the power system. The proposed reactive power procurement and dispatch models capture both the technical and economic aspects of power system operation in competitive electricity markets; however, from an optimization point of view, these models represent non-convex mixed integer non-linear programming (MINLP) problems due to the presence of binary variables associated with the different regions of reactive power operation in a synchronous generator. Such MINLP optimization problems are difficult to solve, especially for an actual power system. A novel Generator Reactive Power Classification (GRPC) algorithm is proposed in this thesis to address this issue, with the advantage of iteratively solving the optimization models as a series of non-linear programming (NLP) sub-problems. The proposed reactive power procurement and dispatch models are implemented and tested on the CIGRE 32-bus system, with several case studies that represent different practical operating scenarios. The developed models are also compared with other approaches for reactive power provision, and the results demonstrate the robustness and effectiveness of the proposed model. The results clearly reveal the main features of the proposed models for optimal provision of reactive power ancillary service, in order to suit the requirements of an ISO under today's stressed system conditions in a competitive market environment.
2012-06-01
technology originally developed on the Java platform. The Hibernate framework supports rapid development of a data access layer without requiring a...31 viii 2. Hibernate ................................................................................ 31 3. Database Design...protect from security threats; o Easy aggregate management operations via file tags; 2. Hibernate We recommend using Hibernate technology for object
Of What Benefit and to Whom? Linking Australian Humanities Research with Its "End Users"
ERIC Educational Resources Information Center
Pitman, Tim; Berman, Judith E.
2009-01-01
There is increasing pressure for university researchers to secure "end-user" support for their research projects. Yet the ways in which this imperative affects humanities researchers, operating in a science-centric funding environment, have not yet been fully explored. This paper presents the findings of an empirical study into the…
2015 Enterprise Strategic Vision
DOE Office of Scientific and Technical Information (OSTI.GOV)
None
2015-08-01
This document aligns with the Department of Energy Strategic Plan for 2014-2018 and provides a framework for integrating our missions and direction for pursuing DOE’s strategic goals. The vision is a guide to advancing world-class science and engineering, supporting our people, modernizing our infrastructure, and developing a management culture that operates a safe and secure enterprise in an efficient manner.
Perspective on 2015 DoD Cyber Strategy
2015-09-29
Testimony View document details Support RAND Browse Reports & Bookstore Make a charitable contribution Limited Electronic Distribution Rights This...AGING PUBLIC SAFETY SCIENCE AND TECHNOLOGY TERRORISM AND HOMELAND SECURITY Report Documentation Page Form ApprovedOMB No. 0704-0188 Public reporting ...Directorate for Information Operations and Reports , 1215 Jefferson Davis Highway, Suite 1204, Arlington VA 22202-4302. Respondents should be aware
Code of Federal Regulations, 2010 CFR
2010-10-01
...; (ii) Social security numbers; (iii) Dates of birth; (iv) Case identification numbers; (v) Other... collected amounts; (v) The birth date and, beginning no later than October 1, 1999, the name and social... orders through an automated information network in meeting paragraph (e)(2)(ii) of this section provided...
2016-09-07
Daniel Glavin, OSIRIS-REx co-investigator at NASA’s Goddard Space Flight Center in Greenbelt, Maryland, talks to social media followers during a NASA Social in the Operations Support Building II at the agency’s Kennedy Space Center in Florida. The presentation took place before launch of the agency’s Origins, Spectral Interpretation, Resource Identification, Security-Regolith Explorer, or OSIRIS-REx spacecraft.
2016-09-07
Tim Linn, chief system engineer with Lockheed Martin, discusses the unique design of the OSIRIS-REx spacecraft during a NASA Social with social media followers in the Operations Support Building II at NASA’s Kennedy Space Center in Florida. The presentation took place before launch of the agency’s Origins, Spectral Interpretation, Resource Identification, Security-Regolith Explorer, or OSIRIS-REx spacecraft.
Space station needs, attributes and architectural options. Volume 3, task 1: Mission requirements
NASA Technical Reports Server (NTRS)
1983-01-01
The mission requirements of the space station program are investigated. Mission parameters are divided into user support from private industry, scientific experimentation, U.S. national security, and space operations away from the space station. These categories define the design and use of the space station. An analysis of cost estimates is included.
Ontology for Life-Cycle Modeling of Electrical Distribution Systems: Model View Definition
2013-06-01
building information models ( BIM ) at the coordinated design stage of building construction. 1.3 Approach To...standard for exchanging Building Information Modeling ( BIM ) data, which defines hundreds of classes for common use in software, currently supported by...specifications, Construction Operations Building in- formation exchange (COBie), Building Information Modeling ( BIM ) 16. SECURITY CLASSIFICATION OF:
49 CFR 1542.205 - Security of the security identification display area (SIDA).
Code of Federal Regulations, 2010 CFR
2010-10-01
... area (SIDA). 1542.205 Section 1542.205 Transportation Other Regulations Relating to Transportation... AIRPORT SECURITY Operations § 1542.205 Security of the security identification display area (SIDA). (a... one SIDA, as follows: (1) Each secured area must be a SIDA. (2) Each part of the air operations area...
49 CFR 1542.205 - Security of the security identification display area (SIDA).
Code of Federal Regulations, 2014 CFR
2014-10-01
... area (SIDA). 1542.205 Section 1542.205 Transportation Other Regulations Relating to Transportation... AIRPORT SECURITY Operations § 1542.205 Security of the security identification display area (SIDA). (a... one SIDA, as follows: (1) Each secured area must be a SIDA. (2) Each part of the air operations area...
49 CFR 1542.205 - Security of the security identification display area (SIDA).
Code of Federal Regulations, 2013 CFR
2013-10-01
... area (SIDA). 1542.205 Section 1542.205 Transportation Other Regulations Relating to Transportation... AIRPORT SECURITY Operations § 1542.205 Security of the security identification display area (SIDA). (a... one SIDA, as follows: (1) Each secured area must be a SIDA. (2) Each part of the air operations area...
49 CFR 1542.205 - Security of the security identification display area (SIDA).
Code of Federal Regulations, 2011 CFR
2011-10-01
... area (SIDA). 1542.205 Section 1542.205 Transportation Other Regulations Relating to Transportation... AIRPORT SECURITY Operations § 1542.205 Security of the security identification display area (SIDA). (a... one SIDA, as follows: (1) Each secured area must be a SIDA. (2) Each part of the air operations area...
49 CFR 1542.205 - Security of the security identification display area (SIDA).
Code of Federal Regulations, 2012 CFR
2012-10-01
... area (SIDA). 1542.205 Section 1542.205 Transportation Other Regulations Relating to Transportation... AIRPORT SECURITY Operations § 1542.205 Security of the security identification display area (SIDA). (a... one SIDA, as follows: (1) Each secured area must be a SIDA. (2) Each part of the air operations area...
Virtualized Multi-Mission Operations Center (vMMOC) and its Cloud Services
NASA Technical Reports Server (NTRS)
Ido, Haisam Kassim
2017-01-01
His presentation will cover, the current and future, technical and organizational opportunities and challenges with virtualizing a multi-mission operations center. The full deployment of Goddard Space Flight Centers (GSFC) Virtualized Multi-Mission Operations Center (vMMOC) is nearly complete. The Space Science Mission Operations (SSMO) organizations spacecraft ACE, Fermi, LRO, MMS(4), OSIRIS-REx, SDO, SOHO, Swift, and Wind are in the process of being fully migrated to the vMMOC. The benefits of the vMMOC will be the normalization and the standardization of IT services, mission operations, maintenance, and development as well as ancillary services and policies such as collaboration tools, change management systems, and IT Security. The vMMOC will also provide operational efficiencies regarding hardware, IT domain expertise, training, maintenance and support.The presentation will also cover SSMO's secure Situational Awareness Dashboard in an integrated, fleet centric, cloud based web services fashion. Additionally the SSMO Telemetry as a Service (TaaS) will be covered, which allows authorized users and processes to access telemetry for the entire SSMO fleet, and for the entirety of each spacecrafts history. Both services leverage cloud services in a secure FISMA High and FedRamp environment, and also leverage distributed object stores in order to house and provide the telemetry. The services are also in the process of leveraging the cloud computing services elasticity and horizontal scalability. In the design phase is the Navigation as a Service (NaaS) which will provide a standardized, efficient, and normalized service for the fleet's space flight dynamics operations. Additional future services that may be considered are Ground Segment as a Service (GSaaS), Telemetry and Command as a Service (TCaaS), Flight Software Simulation as a Service, etc.
Search for supporting methodologies - Or how to support SEI for 35 years
NASA Technical Reports Server (NTRS)
Handley, Thomas H., Jr.; Masline, Richard C.
1991-01-01
Concepts relevant to the development of an evolvable information management system are examined in terms of support for the Space Exploration Initiative. The issues of interoperability within NASA and industry initiatives are studied including the Open Systems Interconnection standard and the operating system of the Open Software Foundation. The requirements of partitioning functionality into separate areas are determined with attention given to the infrastructure required to ensure system-wide compliance. The need for a decision-making context is a key to the distributed implementation of the program, and this environment is concluded to be next step in developing an evolvable, interoperable, and securable support network.
Security aspects of space operations data
NASA Technical Reports Server (NTRS)
Schmitz, Stefan
1993-01-01
This paper deals with data security. It identifies security threats to European Space Agency's (ESA) In Orbit Infrastructure Ground Segment (IOI GS) and proposes a method of dealing with its complex data structures from the security point of view. It is part of the 'Analysis of Failure Modes, Effects Hazards and Risks of the IOI GS for Operations, including Backup Facilities and Functions' carried out on behalf of the European Space Operations Center (ESOC). The security part of this analysis has been prepared with the following aspects in mind: ESA's large decentralized ground facilities for operations, the multiple organizations/users involved in the operations and the developments of ground data systems, and the large heterogeneous network structure enabling access to (sensitive) data which does involve crossing organizational boundaries. An IOI GS data objects classification is introduced to determine the extent of the necessary protection mechanisms. The proposal of security countermeasures is oriented towards the European 'Information Technology Security Evaluation Criteria (ITSEC)' whose hierarchically organized requirements can be directly mapped to the security sensitivity classification.
Charliecloud: Unprivileged containers for user-defined software stacks in HPC
DOE Office of Scientific and Technical Information (OSTI.GOV)
Priedhorsky, Reid; Randles, Timothy C.
Supercomputing centers are seeing increasing demand for user-defined software stacks (UDSS), instead of or in addition to the stack provided by the center. These UDSS support user needs such as complex dependencies or build requirements, externally required configurations, portability, and consistency. The challenge for centers is to provide these services in a usable manner while minimizing the risks: security, support burden, missing functionality, and performance. We present Charliecloud, which uses the Linux user and mount namespaces to run industry-standard Docker containers with no privileged operations or daemons on center resources. Our simple approach avoids most security risks while maintaining accessmore » to the performance and functionality already on offer, doing so in less than 500 lines of code. Charliecloud promises to bring an industry-standard UDSS user workflow to existing, minimally altered HPC resources.« less
In the Face of Cybersecurity: How the Common Information Model Can Be Used
DOE Office of Scientific and Technical Information (OSTI.GOV)
Skare, Paul; Falk, Herbert; Rice, Mark
2016-01-01
Efforts are underway to combine smart grid information, devices, networking, and emergency response information to create messages that are not dependent on specific standards development organizations (SDOs). This supports a future-proof approach of allowing changes in the canonical data models (CDMs) going forward without having to perform forklift replacements of solutions that use the messages. This also allows end users (electric utilities) to upgrade individual components of a larger system while keeping the message payload definitions intact. The goal is to enable public and private information sharing securely in a standards-based approach that can be integrated into existing operations. Wemore » provide an example architecture that could benefit from this multi-SDO, secure message approach. This article also describes how to improve message security« less
A Lightweight Protocol for Secure Video Streaming
Morkevicius, Nerijus; Bagdonas, Kazimieras
2018-01-01
The Internet of Things (IoT) introduces many new challenges which cannot be solved using traditional cloud and host computing models. A new architecture known as fog computing is emerging to address these technological and security gaps. Traditional security paradigms focused on providing perimeter-based protections and client/server point to point protocols (e.g., Transport Layer Security (TLS)) are no longer the best choices for addressing new security challenges in fog computing end devices, where energy and computational resources are limited. In this paper, we present a lightweight secure streaming protocol for the fog computing “Fog Node-End Device” layer. This protocol is lightweight, connectionless, supports broadcast and multicast operations, and is able to provide data source authentication, data integrity, and confidentiality. The protocol is based on simple and energy efficient cryptographic methods, such as Hash Message Authentication Codes (HMAC) and symmetrical ciphers, and uses modified User Datagram Protocol (UDP) packets to embed authentication data into streaming data. Data redundancy could be added to improve reliability in lossy networks. The experimental results summarized in this paper confirm that the proposed method efficiently uses energy and computational resources and at the same time provides security properties on par with the Datagram TLS (DTLS) standard. PMID:29757988
A Lightweight Protocol for Secure Video Streaming.
Venčkauskas, Algimantas; Morkevicius, Nerijus; Bagdonas, Kazimieras; Damaševičius, Robertas; Maskeliūnas, Rytis
2018-05-14
The Internet of Things (IoT) introduces many new challenges which cannot be solved using traditional cloud and host computing models. A new architecture known as fog computing is emerging to address these technological and security gaps. Traditional security paradigms focused on providing perimeter-based protections and client/server point to point protocols (e.g., Transport Layer Security (TLS)) are no longer the best choices for addressing new security challenges in fog computing end devices, where energy and computational resources are limited. In this paper, we present a lightweight secure streaming protocol for the fog computing "Fog Node-End Device" layer. This protocol is lightweight, connectionless, supports broadcast and multicast operations, and is able to provide data source authentication, data integrity, and confidentiality. The protocol is based on simple and energy efficient cryptographic methods, such as Hash Message Authentication Codes (HMAC) and symmetrical ciphers, and uses modified User Datagram Protocol (UDP) packets to embed authentication data into streaming data. Data redundancy could be added to improve reliability in lossy networks. The experimental results summarized in this paper confirm that the proposed method efficiently uses energy and computational resources and at the same time provides security properties on par with the Datagram TLS (DTLS) standard.
49 CFR 1542.1 - Applicability of this part.
Code of Federal Regulations, 2014 CFR
2014-10-01
..., DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY General § 1542.1 Applicability of this part. This part describes aviation security rules governing: (a) The operation of airports.... (c) Each airport operator that receives a Security Directive or Information Circular and each person...
49 CFR 1542.1 - Applicability of this part.
Code of Federal Regulations, 2010 CFR
2010-10-01
..., DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY General § 1542.1 Applicability of this part. This part describes aviation security rules governing: (a) The operation of airports.... (c) Each airport operator that receives a Security Directive or Information Circular and each person...
49 CFR 1542.1 - Applicability of this part.
Code of Federal Regulations, 2011 CFR
2011-10-01
..., DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY General § 1542.1 Applicability of this part. This part describes aviation security rules governing: (a) The operation of airports.... (c) Each airport operator that receives a Security Directive or Information Circular and each person...
49 CFR 1542.1 - Applicability of this part.
Code of Federal Regulations, 2012 CFR
2012-10-01
..., DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY General § 1542.1 Applicability of this part. This part describes aviation security rules governing: (a) The operation of airports.... (c) Each airport operator that receives a Security Directive or Information Circular and each person...
49 CFR 1542.1 - Applicability of this part.
Code of Federal Regulations, 2013 CFR
2013-10-01
..., DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY General § 1542.1 Applicability of this part. This part describes aviation security rules governing: (a) The operation of airports.... (c) Each airport operator that receives a Security Directive or Information Circular and each person...
Yehualashet, Yared G; Wadda, Alieu; Agblewonu, Koffi B; Zhema, Theophilus; Ibrahim, Al-Asi A; Corr, Alhagie; Linkins, Jennifer; Mkanda, Pascal; Vaz, Rui G; Nsubuga, Peter; Ashogbon, Daniel
2016-05-01
Following the 1988 World Health Assembly resolution to eradicate polio, the government of Nigeria, with support from partners, has been implementing several rounds of supplementary immunization activities (SIAs) each year. In addition to the technical requirements, the success of the polio eradication initiative depends on timely provision of adequate financial resources. Disbursement of funds for SIAs and payment of allowances to numerous vaccination personnel at the grassroots level are enormous operational challenges in a country the size of Nigeria. Upon donors' request for a transparent and effective payment mechanism, the World Health Organization (WHO), in consultation with national counterparts, created the innovative direct disbursement mechanism (DDM) in 2004. The objective of the DDM was to timely deploy operational funds at the field level and directly pay vaccination personnel allowances at the grassroots level. A detailed operational guideline for funds disbursement was developed in close consultation with central and field stakeholders. Multiyear financial resource requirements and operational budgets for every campaign were produced by an interagency-coordinated finance subcommittee. The WHO engaged a bank and an accounting firm as DDM partners to support disbursement of and accounting for the SIA funds, respectively. The 37 WHO field offices were equipped with electronic financial systems to support the DDM process, and temporary payment sites were set up to facilitate payment to vaccination personnel at the grassroots level. Coordination meetings among DDM partners were held regularly to reconcile financial records and address operational challenges. Between 2004 and 2014, DDM supported 99 polio and nonpolio vaccination campaigns, disbursing more than $370 million to about 16 million beneficiaries across 280 temporary payment sites. To mitigate security risks and reduce operational costs, the WHO and DDM partners introduced mobile payment to vaccination personnel in May 2015 in compliance with national regulations. A total of 97% of the targeted 1871 beneficiaries in 2 pilot sites were successfully paid through mobile payment, although some challenges remain to be addressed. The DDM has met its objectives with a high rate of financial accountability and transparency, despite persistent operational and security challenges. With support from Nigeria, the Pakistan polio vaccination program successfully adopted the DDM. The DDM continues to play an important role in effective implementation of the polio endgame strategy and the national immunization strategic plan. As part of polio legacy planning, we recommend the DDM as a model for other opportunities that involve the engagement of large field-level teams as new vaccines are introduced in Nigeria and elsewhere. © 2016 World Health Organization; licensee Oxford Journals.
Local Integration of the National Atmospheric Release Advisory Center with Cities (LINC)
DOE Office of Scientific and Technical Information (OSTI.GOV)
Ermak, D L; Tull, J E; Mosley-Rovi, R
The objective of the ''Local Integration of the National Atmospheric Release Advisory Center with Cities'' (LINC) program is to demonstrate the capability for providing local government agencies with an advanced operational atmospheric plume prediction capability, which can be seamlessly integrated with appropriate federal agency support for homeland security applications. LINC is a Domestic Demonstration and Application Program (DDAP) funded by the Chemical and Biological National Security Program (CBNP), which is part of the Department of Energy's (DOE) National Nuclear Security Administration (NNSA). LINC will make use of capabilities that have been developed the CBNP, and integrated into the National Atmosphericmore » Release Advisory Center (NARAC) at Lawrence Livermore National Laboratory (LLNL). NARAC tools services will be provided to pilot study cities and counties to map plumes from terrorism threats. Support to these local agencies will include training and customized support for exercises, special events, and general emergencies. NARAC provides tools and services that map the probable spread of hazardous material which have been accidentally or intentionally released into the atmosphere. Primarily supported by the DOE, NARAC is a national support and resource center for planning, real-time assessment and detailed studies of incidents involving a wide variety of hazards, including radiological, chemical, or biological releases. NARAC is a distributed system, providing modeling and geographical information tools for use on an end user's computer system, as well as real-time access to global meteorological and geographical databases and advanced three-dimensional model predictions.« less
Code of Federal Regulations, 2014 CFR
2014-10-01
... Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY OPERATIONS IN THE WASHINGTON, DC, METROPOLITAN AREA Ronald Reagan Washington National Airport: Enhanced Security Procedures for Certain Operations § 1562.27...
Code of Federal Regulations, 2010 CFR
2010-10-01
... Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY OPERATIONS IN THE WASHINGTON, DC, METROPOLITAN AREA Ronald Reagan Washington National Airport: Enhanced Security Procedures for Certain Operations § 1562.27...
Code of Federal Regulations, 2011 CFR
2011-10-01
... Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY OPERATIONS IN THE WASHINGTON, DC, METROPOLITAN AREA Ronald Reagan Washington National Airport: Enhanced Security Procedures for Certain Operations § 1562.27...
Code of Federal Regulations, 2013 CFR
2013-10-01
... Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY OPERATIONS IN THE WASHINGTON, DC, METROPOLITAN AREA Ronald Reagan Washington National Airport: Enhanced Security Procedures for Certain Operations § 1562.27...
Code of Federal Regulations, 2012 CFR
2012-10-01
... Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY OPERATIONS IN THE WASHINGTON, DC, METROPOLITAN AREA Ronald Reagan Washington National Airport: Enhanced Security Procedures for Certain Operations § 1562.27...
An Embedded Sensor Node Microcontroller with Crypto-Processors.
Panić, Goran; Stecklina, Oliver; Stamenković, Zoran
2016-04-27
Wireless sensor network applications range from industrial automation and control, agricultural and environmental protection, to surveillance and medicine. In most applications, data are highly sensitive and must be protected from any type of attack and abuse. Security challenges in wireless sensor networks are mainly defined by the power and computing resources of sensor devices, memory size, quality of radio channels and susceptibility to physical capture. In this article, an embedded sensor node microcontroller designed to support sensor network applications with severe security demands is presented. It features a low power 16-bitprocessor core supported by a number of hardware accelerators designed to perform complex operations required by advanced crypto algorithms. The microcontroller integrates an embedded Flash and an 8-channel 12-bit analog-to-digital converter making it a good solution for low-power sensor nodes. The article discusses the most important security topics in wireless sensor networks and presents the architecture of the proposed hardware solution. Furthermore, it gives details on the chip implementation, verification and hardware evaluation. Finally, the chip power dissipation and performance figures are estimated and analyzed.
An Embedded Sensor Node Microcontroller with Crypto-Processors
Panić, Goran; Stecklina, Oliver; Stamenković, Zoran
2016-01-01
Wireless sensor network applications range from industrial automation and control, agricultural and environmental protection, to surveillance and medicine. In most applications, data are highly sensitive and must be protected from any type of attack and abuse. Security challenges in wireless sensor networks are mainly defined by the power and computing resources of sensor devices, memory size, quality of radio channels and susceptibility to physical capture. In this article, an embedded sensor node microcontroller designed to support sensor network applications with severe security demands is presented. It features a low power 16-bitprocessor core supported by a number of hardware accelerators designed to perform complex operations required by advanced crypto algorithms. The microcontroller integrates an embedded Flash and an 8-channel 12-bit analog-to-digital converter making it a good solution for low-power sensor nodes. The article discusses the most important security topics in wireless sensor networks and presents the architecture of the proposed hardware solution. Furthermore, it gives details on the chip implementation, verification and hardware evaluation. Finally, the chip power dissipation and performance figures are estimated and analyzed. PMID:27128925
Next Generation Security for the 10,240 Processor Columbia System
NASA Technical Reports Server (NTRS)
Hinke, Thomas; Kolano, Paul; Shaw, Derek; Keller, Chris; Tweton, Dave; Welch, Todd; Liu, Wen (Betty)
2005-01-01
This presentation includes a discussion of the Columbia 10,240-processor system located at the NASA Advanced Supercomputing (NAS) division at the NASA Ames Research Center which supports each of NASA's four missions: science, exploration systems, aeronautics, and space operations. It is comprised of 20 Silicon Graphics nodes, each consisting of 512 Itanium II processors. A 64 processor Columbia front-end system supports users as they prepare their jobs and then submits them to the PBS system. Columbia nodes and front-end systems use the Linux OS. Prior to SC04, the Columbia system was used to attain a processing speed of 51.87 TeraFlops, which made it number two on the Top 500 list of the world's supercomputers and the world's fastest "operational" supercomputer since it was fully engaged in supporting NASA users.
49 CFR 1542.217 - Law enforcement personnel.
Code of Federal Regulations, 2014 CFR
2014-10-01
....217 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.217 Law enforcement personnel. (a) Each airport operator must ensure that law enforcement personnel used...
49 CFR 1542.217 - Law enforcement personnel.
Code of Federal Regulations, 2013 CFR
2013-10-01
....217 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.217 Law enforcement personnel. (a) Each airport operator must ensure that law enforcement personnel used...
49 CFR 1542.217 - Law enforcement personnel.
Code of Federal Regulations, 2011 CFR
2011-10-01
....217 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.217 Law enforcement personnel. (a) Each airport operator must ensure that law enforcement personnel used...
49 CFR 1562.25 - Fixed base operator requirements.
Code of Federal Regulations, 2014 CFR
2014-10-01
... 1562.25 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY OPERATIONS IN THE WASHINGTON, DC, METROPOLITAN AREA Ronald Reagan Washington National Airport: Enhanced Security Procedures for Certain...
49 CFR 1542.217 - Law enforcement personnel.
Code of Federal Regulations, 2012 CFR
2012-10-01
....217 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.217 Law enforcement personnel. (a) Each airport operator must ensure that law enforcement personnel used...
7 CFR 764.255 - Security requirements.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 7 Agriculture 7 2014-01-01 2014-01-01 false Security requirements. 764.255 Section 764.255... AGRICULTURE SPECIAL PROGRAMS DIRECT LOAN MAKING Operating Loan Program § 764.255 Security requirements. An OL... operating purposes, loans must be secured by a first lien on farm property or products having a security...
Evaluating open-source cloud computing solutions for geosciences
NASA Astrophysics Data System (ADS)
Huang, Qunying; Yang, Chaowei; Liu, Kai; Xia, Jizhe; Xu, Chen; Li, Jing; Gui, Zhipeng; Sun, Min; Li, Zhenglong
2013-09-01
Many organizations start to adopt cloud computing for better utilizing computing resources by taking advantage of its scalability, cost reduction, and easy to access characteristics. Many private or community cloud computing platforms are being built using open-source cloud solutions. However, little has been done to systematically compare and evaluate the features and performance of open-source solutions in supporting Geosciences. This paper provides a comprehensive study of three open-source cloud solutions, including OpenNebula, Eucalyptus, and CloudStack. We compared a variety of features, capabilities, technologies and performances including: (1) general features and supported services for cloud resource creation and management, (2) advanced capabilities for networking and security, and (3) the performance of the cloud solutions in provisioning and operating the cloud resources as well as the performance of virtual machines initiated and managed by the cloud solutions in supporting selected geoscience applications. Our study found that: (1) no significant performance differences in central processing unit (CPU), memory and I/O of virtual machines created and managed by different solutions, (2) OpenNebula has the fastest internal network while both Eucalyptus and CloudStack have better virtual machine isolation and security strategies, (3) Cloudstack has the fastest operations in handling virtual machines, images, snapshots, volumes and networking, followed by OpenNebula, and (4) the selected cloud computing solutions are capable for supporting concurrent intensive web applications, computing intensive applications, and small-scale model simulations without intensive data communication.
Adams, Martin; Stamper, Paul D.; Dasgupta, Debanjana; Hewson, Roger; Buck, Charles D.; Richards, Allen L.; Hay, John
2016-01-01
Strategic laboratory planning in limited resource areas is essential for addressing global health security issues. Establishing a national reference laboratory, especially one with BSL-3 or -4 biocontainment facilities, requires a heavy investment of resources, a multisectoral approach, and commitments from multiple stakeholders. We make the case for donor organizations and recipient partners to develop a comprehensive laboratory operations roadmap that addresses factors such as mission and roles, engaging national and political support, securing financial support, defining stakeholder involvement, fostering partnerships, and building trust. Successful development occurred with projects in African countries and in Azerbaijan, where strong leadership and a clear management framework have been key to success. A clearly identified and agreed management framework facilitate identifying the responsibility for developing laboratory capabilities and support services, including biosafety and biosecurity, quality assurance, equipment maintenance, supply chain establishment, staff certification and training, retention of human resources, and sustainable operating revenue. These capabilities and support services pose rate-limiting yet necessary challenges. Laboratory capabilities depend on mission and role, as determined by all stakeholders, and demonstrate the need for relevant metrics to monitor the success of the laboratory, including support for internal and external audits. Our analysis concludes that alternative frameworks for success exist for developing and implementing capabilities at regional and national levels in limited resource areas. Thus, achieving a balance for standardizing practices between local procedures and accepted international standards is a prerequisite for integrating new facilities into a country's existing public health infrastructure and into the overall international scientific community. PMID:27559843
Hemrich, Günter
2005-06-01
This case study reviews the experience of the Somalia Food Security Assessment Unit (FSAU) of operating a food security information system in the context of a complex emergency. In particular, it explores the linkages between selected features of the protracted crisis environment in Somalia and conceptual and operational aspects of food security information work. The paper specifically examines the implications of context characteristics for the establishment and operations of the FSAU field monitoring component and for the interface with information users and their diverse information needs. It also analyses the scope for linking food security and nutrition analysis and looks at the role of conflict and gender analysis in food security assessment work. Background data on the food security situation in Somalia and an overview of some key features of the FSAU set the scene for the case study. The paper is targeted at those involved in designing, operating and funding food security information activities.
Feeney, Brooke C.; Collins, Nancy L.; Van Vleet, Meredith; Tomlinson, Jennifer
2015-01-01
This investigation examined the importance of underlying motivations in predicting secure base support behavior, as well as the extent to which support motivations are predicted by individual differences in attachment orientation. Participants were 189 married couples who participated in two laboratory sessions: During a questionnaire session, couples completed assessments of their underlying motivations for providing, and for not providing, support for their partner's exploration (i.e., goal-strivings), as well as assessments of their typical secure base support behavior. In an observational session, couples engaged in a discussion of one member's personal goals, during which the partner's secure base support was assessed. Results revealed a variety of distinct motivations for providing, and for not providing, secure base support to one's partner, as well as theoretically expected links between these motivations and both secure base behavior and attachment orientation. This work establishes motivations as important mechanisms that underlie the effective or ineffective provision of relational support. PMID:23581972
49 CFR 1544.227 - Exclusive area agreement.
Code of Federal Regulations, 2012 CFR
2012-10-01
....227 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRCRAFT OPERATOR SECURITY: AIR CARRIERS... has entered into an exclusive area agreement with an airport operator, under § 1542.111 of this...
49 CFR 1544.227 - Exclusive area agreement.
Code of Federal Regulations, 2010 CFR
2010-10-01
....227 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRCRAFT OPERATOR SECURITY: AIR CARRIERS... has entered into an exclusive area agreement with an airport operator, under § 1542.111 of this...
49 CFR 1544.227 - Exclusive area agreement.
Code of Federal Regulations, 2013 CFR
2013-10-01
....227 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRCRAFT OPERATOR SECURITY: AIR CARRIERS... has entered into an exclusive area agreement with an airport operator, under § 1542.111 of this...
49 CFR 1544.227 - Exclusive area agreement.
Code of Federal Regulations, 2011 CFR
2011-10-01
....227 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRCRAFT OPERATOR SECURITY: AIR CARRIERS... has entered into an exclusive area agreement with an airport operator, under § 1542.111 of this...
49 CFR 1544.227 - Exclusive area agreement.
Code of Federal Regulations, 2014 CFR
2014-10-01
....227 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRCRAFT OPERATOR SECURITY: AIR CARRIERS... has entered into an exclusive area agreement with an airport operator, under § 1542.111 of this...
2017-06-09
MONGOLIA’S ECONOMIC SECURITY: HOW CAN ECONOMIC DEVELOPMENT FURTHER SUPPORT MONGOLIAN NATIONAL SECURITY THROUGH DEVELOPING ITS MINING SECTOR... Economic Security: How can Economic Development Further Support Mongolian National Security through Developing its Mining Sector? 5a. CONTRACT NUMBER...geographic position between two political and economic powers (China and Russia) provides both opportunities and disadvantages for Mongolia’s economy
Lawrence Livermore National Laboratory Environmental Report 2012
DOE Office of Scientific and Technical Information (OSTI.GOV)
Jones, Henry E.; Armstrong, Dave; Blake, Rick G.
Lawrence Livermore National Laboratory (LLNL) is a premier research laboratory that is part of the National Nuclear Security Administration (NNSA) within the U.S. Department of Energy (DOE). As a national security laboratory, LLNL is responsible for ensuring that the nation’s nuclear weapons remain safe, secure, and reliable. The Laboratory also meets other pressing national security needs, including countering the proliferation of weapons of mass destruction and strengthening homeland security, and conducting major research in atmospheric, earth, and energy sciences; bioscience and biotechnology; and engineering, basic science, and advanced technology. The Laboratory is managed and operated by Lawrence Livermore National Security,more » LLC (LLNS), and serves as a scientific resource to the U.S. government and a partner to industry and academia. LLNL operations have the potential to release a variety of constituents into the environment via atmospheric, surface water, and groundwater pathways. Some of the constituents, such as particles from diesel engines, are common at many types of facilities while others, such as radionuclides, are unique to research facilities like LLNL. All releases are highly regulated and carefully monitored. LLNL strives to maintain a safe, secure and efficient operational environment for its employees and neighboring communities. Experts in environment, safety and health (ES&H) support all Laboratory activities. LLNL’s radiological control program ensures that radiological exposures and releases are reduced to as low as reasonably achievable to protect the health and safety of its employees, contractors, the public, and the environment. LLNL is committed to enhancing its environmental stewardship and managing the impacts its operations may have on the environment through a formal Environmental Management System. The Laboratory encourages the public to participate in matters related to the Laboratory’s environmental impact on the community by soliciting citizens’ input on matters of significant public interest and through various communications. The Laboratory also provides public access to information on its ES&H activities. LLNL consists of two sites—an urban site in Livermore, California, referred to as the “Livermore Site,” which occupies 1.3 square miles; and a rural Experimental Test Site, referred to as “Site 300,” near Tracy, California, which occupies 10.9 square miles. In 2012 the Laboratory had a staff of approximately 7000.« less
Lawrence Livermore National Laboratory Environmental Report 2013
DOE Office of Scientific and Technical Information (OSTI.GOV)
Jones, H. E.; Bertoldo, N. A.; Blake, R. G.
Lawrence Livermore National Laboratory (LLNL) is a premier research laboratory that is part of the National Nuclear Security Administration (NNSA) within the U.S. Department of Energy (DOE). As a national security laboratory, LLNL is responsible for ensuring that the nation’s nuclear weapons remain safe, secure, and reliable. The Laboratory also meets other pressing national security needs, including countering the proliferation of weapons of mass destruction and strengthening homeland security, and conducting major research in atmospheric, earth, and energy sciences; bioscience and biotechnology; and engineering, basic science, and advanced technology. The Laboratory is managed and operated by Lawrence Livermore National Security,more » LLC (LLNS), and serves as a scientific resource to the U.S. government and a partner to industry and academia. LLNL operations have the potential to release a variety of constituents into the environment via atmospheric, surface water, and groundwater pathways. Some of the constituents, such as particles from diesel engines, are common at many types of facilities while others, such as radionuclides, are unique to research facilities like LLNL. All releases are highly regulated and carefully monitored. LLNL strives to maintain a safe, secure and efficient operational environment for its employees and neighboring communities. Experts in environment, safety and health (ES&H) support all Laboratory activities. LLNL’s radiological control program ensures that radiological exposures and releases are reduced to as low as reasonably achievable to protect the health and safety of its employees, contractors, the public, and the environment. LLNL is committed to enhancing its environmental stewardship and managing the impacts its operations may have on the environment through a formal Environmental Management System. The Laboratory encourages the public to participate in matters related to the Laboratory’s environmental impact on the community by soliciting citizens’ input on matters of significant public interest and through various communications. The Laboratory also provides public access to information on its ES&H activities. LLNL consists of two sites—an urban site in Livermore, California, referred to as the “Livermore Site,” which occupies 1.3 square miles; and a rural Experimental Test Site, referred to as “Site 300,” near Tracy, California, which occupies 10.9 square miles. In 2013 the Laboratory had a staff of approximately 6,300.« less
DOT National Transportation Integrated Search
2003-09-16
The objective of this Hazardous Material (HazMat) Transportation Safety and Security Field Operational Test (FOT) Final Detailed Test Plans evaluation is to measure the impact of technology solutions on the safety, security, and operational efficienc...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-10-23
...This notice announces that the Transportation Security Administration (TSA) has forwarded the new Information Collection Request (ICR) abstracted below to the Office of Management and Budget (OMB) for review and approval under the Paperwork Reduction Act (PRA). The ICR describes the nature of the information collection and its expected burden. TSA published a Federal Register notice, with a 60-day comment period soliciting comments, of the following collection of information on June 20, 2012, 77 FR 37062. The collection involves the reimbursement of expenses incurred by airport operators for the provision of law enforcement officers (LEOs) to support airport security checkpoint screening.
Drachal, Marcin
2017-01-01
Using case studies of the Ebola outbreak in Western Africa in 2014, and the terrorist attacks in Paris and Brussels in 2015 and 2016 respectively, this paper demonstrates how various resilience-related corporate functions contributed to effective crisis response. This paper describes the logical order of actions taken in each of the cases, and how the organisation prioritised its assets and coordinated activities to ensure the response was adequate, efficient and timely. The article demonstrates how business continuity, physical security, threat management, security intelligence and incident management worked together to support the organisation's crisis management structures in complex crisis situations.
The SERENITY Runtime Monitoring Framework
NASA Astrophysics Data System (ADS)
Spanoudakis, George; Kloukinas, Christos; Mahbub, Khaled
This chapter describes SERENITY’s approach to runtime monitoring and the framework that has been developed to support it. Runtime monitoring is required in SERENITY in order to check for violations of security and dependability properties which are necessary for the correct operation of the security and dependability solutions that are available from the SERENITY framework. This chapter discusses how such properties are specified and monitored. The chapter focuses on the activation and execution of monitoring activities using S&D Patterns and the actions that may be undertaken following the detection of property violations. The approach is demonstrated in reference to one of the industrial case studies of the SERENITY project.
Federal Register 2010, 2011, 2012, 2013, 2014
2013-06-12
... research in support of program operations, management, performance monitoring, evaluation, risk management... the Privacy Act of 1974 (U.S.C. 552a(e)(4)), as amended, and Office of Management and Budget (OMB... submitted to the Office of Management and Budget (OMB), the Senate Committee on Homeland Security and...
2012-04-10
builders . Human Intelligence (HUMINT) and Signals Intelligence (SIGINT) could then also be prioritized and employed accordingly for optimal 8...responsibility for digital and multimedia forensics, and DIA responsibility for forensic intelligence activities and programs.31 The Army is also currently...aligning functional oversight of Forensics, Biometrics, Law Enforcement, Detainee Operations, and Physical Security 11 under one overarching
Code of Federal Regulations, 2010 CFR
2010-07-01
... Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) DEEPWATER PORTS DEEPWATER PORTS... Activities of Vessels at Deepwater Ports Regulated activities Safety zone Areas to be avoided around each... anchoring area) Tankers calling at port C C C C Support vessel movements C C C C Transit by vessels other...
High Throughput Determination of Ricinine Abrine and Alpha ...
Analytical Method This document provides the standard operating procedure for determination of ricinine (RIC), abrine (ABR), and α-amanitin (AMAN) in drinking water by isotope dilution liquid chromatography tandem mass spectrometry (LC/MS/MS). This method is designed to support site-specific cleanup goals of environmental remediation activities following a homeland security incident involving one or a combination of these analytes.
Concept of Operations for the Next Generation Air Transportation System. Version 3.2
2011-01-01
Airside. Security Identification Display Area/Airport ( SIDA ) operations area, terminal perimeter, terminal airspace (security) • Landside. Terminal...Definition RTSS Remote Terminal Security Screening SAA Special Activity Airspace SIDA Security Identification Display Area SM Separation Management
Security Concepts for Satellite Links
NASA Astrophysics Data System (ADS)
Tobehn, C.; Penné, B.; Rathje, R.; Weigl, A.; Gorecki, Ch.; Michalik, H.
2008-08-01
The high costs to develop, launch and maintain a satellite network makes protecting the assets imperative. Attacks may be passive such as eavesdropping on the payload data. More serious threat are active attacks that try to gain control of the satellite, which may lead to the total lost of the satellite asset. To counter these threats, new satellite and ground systems are using cryptographic technologies to provide a range of services: confidentiality, entity & message authentication, and data integrity. Additionally, key management cryptographic services are required to support these services. This paper describes the key points of current satellite control and operations, that are authentication of the access to the satellite TMTC link and encryption of security relevant TM/TC data. For payload data management the key points are multi-user ground station access and high data rates both requiring frequent updates and uploads of keys with the corresponding key management methods. For secure satellite management authentication & key negotiation algorithms as HMAC-RIPEMD160, EC- DSA and EC-DH are used. Encryption of data uses algorithms as IDEA, AES, Triple-DES, or other. A channel coding and encryption unit for payload data provides download data rates up to Nx250 Mbps. The presented concepts are based on our experience and heritage of the security systems for all German MOD satellite projects (SATCOMBw2, SAR-Lupe multi- satellite system and German-French SAR-Lupe-Helios- II systems inter-operability) as well as for further international (KOMPSAT-II Payload data link system) and ESA activities (TMTC security and GMES).
Federal Register 2010, 2011, 2012, 2013, 2014
2012-02-07
...] Quarterly Listings; Safety Zones, Security Zones, Special Local Regulations, Drawbridge Operation... they could be published in the Federal Register. This notice lists temporary safety zones, security zones, special local regulations, drawbridge operation regulations and regulated navigation areas, all...
Effectiveness of the Civil Aviation Security Program.
1980-10-14
CEASE FUNDING OF TRAINING"OF LAW ENFORCEMENT OFFICERS SUPPORTING AIRPORT SECURITY ACTIVITIES. F. FEDERAL AIR MARSHALS PROVIDE LAW ENFORCEMENT SUPPORT...enforcement officer authority through special deputations by the U.S. Marshals Service on an annual basis. Airport Security - Continuing activities...which contributed signifi- cantly to airport security include the training of local law enforcement officers supporting airport security programs, the
Effectiveness of the Civil Aviation Security Program.
1980-05-22
SECURITY. - CONTINUED TRAINING OF LAW ENFORCEMENT OFFICERS SUPPORTING AIRPORT SECURITY ACTIVITIES. - SECURITY PROGRAMS IMPLEMENTED BY AIR FREIGHT...cooperation by all concerned. (See Exhibit 14) Airport Security - Ongoing activities which contributed significantly to airport security included full...implementation of the revised Federal Aviation Regulations (FAR) Part 107 governing airport security , training of law enforcement officers supporting
DOT National Transportation Integrated Search
2016-07-01
This document provides guidance material in regards to security for the CV Pilots Deployment Concept Development Phase. An approach for developing the security operational concept is presented based on identifying the impacts of security breaches reg...
49 CFR 1542.219 - Supplementing law enforcement personnel.
Code of Federal Regulations, 2014 CFR
2014-10-01
... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY... an airport operator as prescribed in this section, that not enough qualified State, local, and... authorize the airport operator to use, on a reimbursable basis, personnel employed by TSA, or by another...
49 CFR 1542.219 - Supplementing law enforcement personnel.
Code of Federal Regulations, 2013 CFR
2013-10-01
... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY... an airport operator as prescribed in this section, that not enough qualified State, local, and... authorize the airport operator to use, on a reimbursable basis, personnel employed by TSA, or by another...
49 CFR 1542.219 - Supplementing law enforcement personnel.
Code of Federal Regulations, 2011 CFR
2011-10-01
... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY... an airport operator as prescribed in this section, that not enough qualified State, local, and... authorize the airport operator to use, on a reimbursable basis, personnel employed by TSA, or by another...
49 CFR 1542.219 - Supplementing law enforcement personnel.
Code of Federal Regulations, 2012 CFR
2012-10-01
... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY... an airport operator as prescribed in this section, that not enough qualified State, local, and... authorize the airport operator to use, on a reimbursable basis, personnel employed by TSA, or by another...
NASA Astrophysics Data System (ADS)
Sklavos, N.; Selimis, G.; Koufopavlou, O.
2005-01-01
The explosive growth of internet and consumer demand for mobility has fuelled the exponential growth of wireless communications and networks. Mobile users want access to services and information, from both internet and personal devices, from a range of locations without the use of a cable medium. IEEE 802.11 is one of the most widely used wireless standards of our days. The amount of access and mobility into wireless networks requires a security infrastructure that protects communication within that network. The security of this protocol is based on the wired equivalent privacy (WEP) scheme. Currently, all the IEEE 802.11 market products support WEP. But recently, the 802.11i working group introduced the advanced encryption standard (AES), as the security scheme for the future IEEE 802.11 applications. In this paper, the hardware integrations of WEP and AES are studied. A field programmable gate array (FPGA) device has been used as the hardware implementation platform, for a fair comparison between the two security schemes. Measurements for the FPGA implementation cost, operating frequency, power consumption and performance are given.
NASA Astrophysics Data System (ADS)
Tang, Li; Liu, Jing-Ning; Feng, Dan; Tong, Wei
2008-12-01
Existing security solutions in network storage environment perform poorly because cryptographic operations (encryption and decryption) implemented in software can dramatically reduce system performance. In this paper we propose a cryptographic hardware accelerator on dynamically reconfigurable platform for the security of high performance network storage system. We employ a dynamic reconfigurable platform based on a FPGA to implement a PowerPCbased embedded system, which executes cryptographic algorithms. To reduce the reconfiguration latency, we apply prefetch scheduling. Moreover, the processing elements could be dynamically configured to support different cryptographic algorithms according to the request received by the accelerator. In the experiment, we have implemented AES (Rijndael) and 3DES cryptographic algorithms in the reconfigurable accelerator. Our proposed reconfigurable cryptographic accelerator could dramatically increase the performance comparing with the traditional software-based network storage systems.
Concept of Operations for the Next Generation Air Transportation System, Version 2.0
2007-06-13
SIDA )/airport operations area (AOA), [R-110] terminal perimeter, terminal airspace (security) • Landside. Terminal public and commercial roadways and...Required Surveillance Performance RTSS Remote Terminal Security Screening SAA Special Activity Airspace SIDA Security Identification Display Area SM...impede airside operations? R-110 Research 6.4.2/C. 4.4.1 Airside: Security Identification Display Area ( SIDA )/AOA R&D needed to develop and
Laboratory-Directed Research and Development 2016 Summary Annual Report
DOE Office of Scientific and Technical Information (OSTI.GOV)
Pillai, Rekha Sukamar; Jacobson, Julie Ann
The Laboratory-Directed Research and Development (LDRD) Program at Idaho National Laboratory (INL) reports its status to the U.S. Department of Energy (DOE) by March of each year. The program operates under the authority of DOE Order 413.2C, “Laboratory Directed Research and Development” (April 19, 2006), which establishes DOE’s requirements for the program while providing the laboratory director broad flexibility for program implementation. LDRD funds are obtained through a charge to all INL programs. This report includes summaries of all INL LDRD research activities supported during Fiscal Year (FY) 2016. INL is the lead laboratory for the DOE Office of Nuclearmore » Energy (DOE-NE). The INL mission is to discover, demonstrate, and secure innovative nuclear energy solutions, other clean energy options, and critical infrastructure with a vision to change the world’s energy future and secure our critical infrastructure. Operating since 1949, INL is the nation’s leading research, development, and demonstration center for nuclear energy, including nuclear nonproliferation and physical and cyber-based protection of energy systems and critical infrastructure, as well as integrated energy systems research, development, demonstration, and deployment. INL has been managed and operated by Battelle Energy Alliance, LLC (a wholly owned company of Battelle) for DOE since 2005. Battelle Energy Alliance, LLC, is a partnership between Battelle, BWX Technologies, Inc., AECOM, the Electric Power Research Institute, the National University Consortium (Massachusetts Institute of Technology, Ohio State University, North Carolina State University, University of New Mexico, and Oregon State University), and the Idaho university collaborators (i.e., University of Idaho, Idaho State University, and Boise State University). Since its creation, INL’s research and development (R&D) portfolio has broadened with targeted programs supporting national missions to advance nuclear energy, enable clean energy deployment, and secure and modernize critical infrastructure. INL’s research, development, and demonstration capabilities, its resources, and its unique geography enable integration of scientific discovery, innovation, engineering, operations, and controls into complex large-scale testbeds for discovery, innovation, and demonstration of transformational clean energy and security concepts. These attributes strengthen INL’s leadership as a demonstration laboratory. As a national resource, INL also applies its capabilities and skills to the specific needs of other federal agencies and customers through DOE’s Strategic Partnership Program.« less
49 CFR 1544.409 - Integrity of screener tests.
Code of Federal Regulations, 2014 CFR
2014-10-01
... 49 Transportation 9 2014-10-01 2014-10-01 false Integrity of screener tests. 1544.409 Section 1544.409 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRCRAFT OPERATOR SECURITY: AIR CARRIERS AND COMMERCIAL OPERATORS Screener...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-12-23
... Federal agency for pipeline security, it is important for TSA to have contact information for company... DEPARTMENT OF HOMELAND SECURITY Transportation Security Administration Extension of Agency Information Collection Activity Under OMB Review: Pipeline System Operator Security Information AGENCY...
33 CFR 127.305 - Operations Manual.
Code of Federal Regulations, 2010 CFR
2010-07-01
... security personnel; (e) A description of the security systems for the marine transfer area for LNG; (f) The...) Transfer operations start-up and shutdown; (3) Security violations; and (4) The communications systems; and... Section 127.305 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-10-24
... standards. The collection also requires airport operators to comply with a security directive by maintaining... airport operators maintain records of criminal history records checks and security threat assessments in... DEPARTMENT OF HOMELAND SECURITY Transportation Security Administration Extension of Agency...
In Support of the Common Defense: Homeland Defense and Security Journal. Volume 1
2012-04-01
been, “When the nation is least ready, we must be most ready.” While that rings clear as far as warfare is concerned, it is not nearly so when it...JP) 5.0, Joint Operational Planning, and then examines Colonel John A. Warden III’s theory 28 In Support of the Common Defense (Five Ring Model) of...by a discussion of how an adaptation of Warden’s Five Ring Model can be used as a viable framework to assist in a more comprehensive risk
Military Deception Reconsidered
2008-06-01
operations through media channels to receive real benefits . If information advantage is properly formulated, carried out, and secured, it is a...timeliness, security, objective, and centralized control. However, I propose that operational advantage , consisting of surprise, information advantage ... Advantage , Surprise, Operational Advantage , Military Tactics, Deception Campaigns 16. PRICE CODE 17. SECURITY CLASSIFICATION OF REPORT Unclassified
Alleviating line overload by line switching
DOE Office of Scientific and Technical Information (OSTI.GOV)
Brown, H.E.
1988-01-01
Traditionally, the method used by power system dispatchers to reduce or to eliminate line overload conditions has been to shift generation. Such shifts are generally in conflict with the carefully considered economic dispatch of generation. A proper generation schedule has taken into account many factors, such as generator limits, transmission penalties, incremental costs, var support, and system security. Any deviation from this schedule results in increased production cost. Recently, consideration has been given to alleviating line overloads by line switching. In many situations, line switching does not greatly change the transmission penalty factors and, therefore, can be undertaken without seriouslymore » affecting the economic dispatch. It would be convenient for system operators to have a fast, easy-to-operate computer and program available for the evaluation of the efficacy of a line removal (or addition) in dealing with an overload. It is imperative that the operator be properly advised, that a certain line switching reduces the overload and not aggravate the condition. After it has been determined that a line opening (or closing) produces the desired effect, the operator still must assess the consequence of such switching on system security before actually taking such action.« less
NASA Astrophysics Data System (ADS)
Nair, Nirmal-Kumar
As open access market principles are applied to power systems, significant changes are happening in their planning, operation and control. In the emerging marketplace, systems are operating under higher loading conditions as markets focus greater attention to operating costs than stability and security margins. Since operating stability is a basic requirement for any power system, there is need for newer tools to ensure stability and security margins being strictly enforced in the competitive marketplace. This dissertation investigates issues associated with incorporating voltage security into the unbundled operating environment of electricity markets. It includes addressing voltage security in the monitoring, operational and planning horizons of restructured power system. This dissertation presents a new decomposition procedure to estimate voltage security usage by transactions. The procedure follows physical law and uses an index that can be monitored knowing the state of the system. The expression derived is based on composite market coordination models that have both PoolCo and OpCo transactions, in a shared stressed transmission grid. Our procedure is able to equitably distinguish the impacts of individual transactions on voltage stability, at load buses, in a simple and fast manner. This dissertation formulates a new voltage stability constrained optimal power flow (VSCOPF) using a simple voltage security index. In modern planning, composite power system reliability analysis that encompasses both adequacy and security issues is being developed. We have illustrated the applicability of our VSCOPF into composite reliability analysis. This dissertation also delves into the various applications of voltage security index. Increasingly, FACT devices are being used in restructured markets to mitigate a variety of operational problems. Their control effects on voltage security would be demonstrated using our VSCOPF procedure. Further, this dissertation investigates the application of steady state voltage stability index to detect potential dynamic voltage collapse. Finally, this dissertation examines developments in representation, standardization, communication and exchange of power system data. Power system data is the key input to all analytical engines for system operation, monitoring and control. Data exchange and dissemination could impact voltage security evaluation and therefore needs to be critically examined.
49 CFR 1544.305 - Security Directives and Information Circulars.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 49 Transportation 9 2010-10-01 2010-10-01 false Security Directives and Information Circulars... SECURITY: AIR CARRIERS AND COMMERCIAL OPERATORS Threat and Threat Response § 1544.305 Security Directives and Information Circulars. (a) TSA may issue an Information Circular to notify aircraft operators of...
14 CFR 135.125 - Aircraft security.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 14 Aeronautics and Space 3 2014-01-01 2014-01-01 false Aircraft security. 135.125 Section 135.125....125 Aircraft security. Certificate holders conducting operators conducting operations under this part must comply with the applicable security requirements in 49 CFR chapter XII. [67 FR 8350, Feb. 22, 2002] ...
14 CFR 135.125 - Aircraft security.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 14 Aeronautics and Space 3 2012-01-01 2012-01-01 false Aircraft security. 135.125 Section 135.125....125 Aircraft security. Certificate holders conducting operators conducting operations under this part must comply with the applicable security requirements in 49 CFR chapter XII. [67 FR 8350, Feb. 22, 2002] ...
14 CFR 135.125 - Aircraft security.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 14 Aeronautics and Space 3 2010-01-01 2010-01-01 false Aircraft security. 135.125 Section 135.125....125 Aircraft security. Certificate holders conducting operators conducting operations under this part must comply with the applicable security requirements in 49 CFR chapter XII. [67 FR 8350, Feb. 22, 2002] ...
12 CFR 615.5450 - Definitions.
Code of Federal Regulations, 2010 CFR
2010-01-01
... AND OPERATIONS, AND FUNDING OPERATIONS Book-Entry Procedures for Farm Credit Securities § 615.5450... the claimant for another person to hold, transfer, or deal with the security. (b) Book-entry security means a Farm Credit security issued or maintained in the Book-entry System. (c) Book-entry System means...
You, Ilsun; Kwon, Soonhyun; Choudhary, Gaurav; Sharma, Vishal; Seo, Jung Taek
2018-06-08
The Internet of Things (IoT) utilizes algorithms to facilitate intelligent applications across cities in the form of smart-urban projects. As the majority of devices in IoT are battery operated, their applications should be facilitated with a low-power communication setup. Such facility is possible through the Low-Power Wide-Area Network (LPWAN), but at a constrained bit rate. For long-range communication over LPWAN, several approaches and protocols are adopted. One such protocol is the Long-Range Wide Area Network (LoRaWAN), which is a media access layer protocol for long-range communication between the devices and the application servers via LPWAN gateways. However, LoRaWAN comes with fewer security features as a much-secured protocol consumes more battery because of the exorbitant computational overheads. The standard protocol fails to support end-to-end security and perfect forward secrecy while being vulnerable to the replay attack that makes LoRaWAN limited in supporting applications where security (especially end-to-end security) is important. Motivated by this, an enhanced LoRaWAN security protocol is proposed, which not only provides the basic functions of connectivity between the application server and the end device, but additionally averts these listed security issues. The proposed protocol is developed with two options, the Default Option (DO) and the Security-Enhanced Option (SEO). The protocol is validated through Burrows⁻Abadi⁻Needham (BAN) logic and the Automated Validation of Internet Security Protocols and Applications (AVISPA) tool. The proposed protocol is also analyzed for overheads through system-based and low-power device-based evaluations. Further, a case study on a smart factory-enabled parking system is considered for its practical application. The results, in terms of network latency with reliability fitting and signaling overheads, show paramount improvements and better performance for the proposed protocol compared with the two handshake options, Pre-Shared Key (PSK) and Elliptic Curve Cryptography (ECC), of Datagram Transport Layer Security (DTLS).
DOE Office of Scientific and Technical Information (OSTI.GOV)
Stewart, John; Halbgewachs, Ron; Chavez, Adrian
The manner in which the control systems are being designed and operated in the energy sector is undergoing some of the most significant changes in history due to the evolution of technology and the increasing number of interconnections to other system. With these changes however come two significant challenges that the energy sector must face; 1) Cyber security is more important than ever before, and 2) Cyber security is more complicated than ever before. A key requirement in helping utilities and vendors alike in meeting these challenges is interoperability. While interoperability has been present in much of the discussions relatingmore » to technology utilized within the energy sector and especially the Smart Grid, it has been absent in the context of cyber security. The Lemnos project addresses these challenges by focusing on the interoperability of devices utilized within utility control systems which support critical cyber security functions. In theory, interoperability is possible with many of the cyber security solutions available to utilities today. The reality is that the effort required to achieve cyber security interoperability is often a barrier for utilities. For example, consider IPSec, a widely-used Internet Protocol to define Virtual Private Networks, or tunnels , to communicate securely through untrusted public and private networks. The IPSec protocol suite has a significant number of configuration options and encryption parameters to choose from, which must be agreed upon and adopted by both parties establishing the tunnel. The exercise in getting software or devices from different vendors to interoperate is labor intensive and requires a significant amount of security expertise by the end user. Scale this effort to a significant number of devices operating over a large geographical area and the challenge becomes so overwhelming that it often leads utilities to pursue solutions from a single vendor. These single vendor solutions may inadvertently lock utilities into proprietary and closed systems.« less
17 CFR 240.12d1-5 - Operation of certification on subsequent amendments.
Code of Federal Regulations, 2013 CFR
2013-04-01
... 17 Commodity and Securities Exchanges 3 2013-04-01 2013-04-01 false Operation of certification on subsequent amendments. 240.12d1-5 Section 240.12d1-5 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) GENERAL RULES AND REGULATIONS, SECURITIES EXCHANGE ACT OF 1934 Rules and Regulations Under the Securities Exchange...
17 CFR 240.12d1-5 - Operation of certification on subsequent amendments.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 17 Commodity and Securities Exchanges 3 2011-04-01 2011-04-01 false Operation of certification on subsequent amendments. 240.12d1-5 Section 240.12d1-5 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) GENERAL RULES AND REGULATIONS, SECURITIES EXCHANGE ACT OF 1934 Rules and Regulations Under the Securities Exchange...
17 CFR 240.12d1-5 - Operation of certification on subsequent amendments.
Code of Federal Regulations, 2014 CFR
2014-04-01
... 17 Commodity and Securities Exchanges 4 2014-04-01 2014-04-01 false Operation of certification on subsequent amendments. 240.12d1-5 Section 240.12d1-5 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) GENERAL RULES AND REGULATIONS, SECURITIES EXCHANGE ACT OF 1934 Rules and Regulations Under the Securities Exchange...
17 CFR 240.12d1-5 - Operation of certification on subsequent amendments.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Operation of certification on subsequent amendments. 240.12d1-5 Section 240.12d1-5 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) GENERAL RULES AND REGULATIONS, SECURITIES EXCHANGE ACT OF 1934 Rules and Regulations Under the Securities Exchange...
17 CFR 240.12d1-5 - Operation of certification on subsequent amendments.
Code of Federal Regulations, 2012 CFR
2012-04-01
... 17 Commodity and Securities Exchanges 3 2012-04-01 2012-04-01 false Operation of certification on subsequent amendments. 240.12d1-5 Section 240.12d1-5 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) GENERAL RULES AND REGULATIONS, SECURITIES EXCHANGE ACT OF 1934 Rules and Regulations Under the Securities Exchange...
Liu, Ren; Srivastava, Anurag K.; Bakken, David E.; ...
2017-08-17
Intermittency of wind energy poses a great challenge for power system operation and control. Wind curtailment might be necessary at the certain operating condition to keep the line flow within the limit. Remedial Action Scheme (RAS) offers quick control action mechanism to keep reliability and security of the power system operation with high wind energy integration. In this paper, a new RAS is developed to maximize the wind energy integration without compromising the security and reliability of the power system based on specific utility requirements. A new Distributed Linear State Estimation (DLSE) is also developed to provide the fast andmore » accurate input data for the proposed RAS. A distributed computational architecture is designed to guarantee the robustness of the cyber system to support RAS and DLSE implementation. The proposed RAS and DLSE is validated using the modified IEEE-118 Bus system. Simulation results demonstrate the satisfactory performance of the DLSE and the effectiveness of RAS. Real-time cyber-physical testbed has been utilized to validate the cyber-resiliency of the developed RAS against computational node failure.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
Liu, Ren; Srivastava, Anurag K.; Bakken, David E.
Intermittency of wind energy poses a great challenge for power system operation and control. Wind curtailment might be necessary at the certain operating condition to keep the line flow within the limit. Remedial Action Scheme (RAS) offers quick control action mechanism to keep reliability and security of the power system operation with high wind energy integration. In this paper, a new RAS is developed to maximize the wind energy integration without compromising the security and reliability of the power system based on specific utility requirements. A new Distributed Linear State Estimation (DLSE) is also developed to provide the fast andmore » accurate input data for the proposed RAS. A distributed computational architecture is designed to guarantee the robustness of the cyber system to support RAS and DLSE implementation. The proposed RAS and DLSE is validated using the modified IEEE-118 Bus system. Simulation results demonstrate the satisfactory performance of the DLSE and the effectiveness of RAS. Real-time cyber-physical testbed has been utilized to validate the cyber-resiliency of the developed RAS against computational node failure.« less
12 CFR 615.5502 - Issuance of global debt securities.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 12 Banks and Banking 7 2012-01-01 2012-01-01 false Issuance of global debt securities. 615.5502... AFFAIRS, LOAN POLICIES AND OPERATIONS, AND FUNDING OPERATIONS Global Debt Securities § 615.5502 Issuance of global debt securities. (a) The Funding Corporation may provide for the sale of global debt...
12 CFR 615.5502 - Issuance of global debt securities.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 12 Banks and Banking 7 2014-01-01 2014-01-01 false Issuance of global debt securities. 615.5502... AFFAIRS, LOAN POLICIES AND OPERATIONS, AND FUNDING OPERATIONS Global Debt Securities § 615.5502 Issuance of global debt securities. (a) The Funding Corporation may provide for the sale of global debt...
12 CFR 615.5502 - Issuance of global debt securities.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 12 Banks and Banking 7 2013-01-01 2013-01-01 false Issuance of global debt securities. 615.5502... AFFAIRS, LOAN POLICIES AND OPERATIONS, AND FUNDING OPERATIONS Global Debt Securities § 615.5502 Issuance of global debt securities. (a) The Funding Corporation may provide for the sale of global debt...
12 CFR 615.5502 - Issuance of global debt securities.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 12 Banks and Banking 6 2011-01-01 2011-01-01 false Issuance of global debt securities. 615.5502... AFFAIRS, LOAN POLICIES AND OPERATIONS, AND FUNDING OPERATIONS Global Debt Securities § 615.5502 Issuance of global debt securities. (a) The Funding Corporation may provide for the sale of global debt...
A resilient and secure software platform and architecture for distributed spacecraft
NASA Astrophysics Data System (ADS)
Otte, William R.; Dubey, Abhishek; Karsai, Gabor
2014-06-01
A distributed spacecraft is a cluster of independent satellite modules flying in formation that communicate via ad-hoc wireless networks. This system in space is a cloud platform that facilitates sharing sensors and other computing and communication resources across multiple applications, potentially developed and maintained by different organizations. Effectively, such architecture can realize the functions of monolithic satellites at a reduced cost and with improved adaptivity and robustness. Openness of these architectures pose special challenges because the distributed software platform has to support applications from different security domains and organizations, and where information flows have to be carefully managed and compartmentalized. If the platform is used as a robust shared resource its management, configuration, and resilience becomes a challenge in itself. We have designed and prototyped a distributed software platform for such architectures. The core element of the platform is a new operating system whose services were designed to restrict access to the network and the file system, and to enforce resource management constraints for all non-privileged processes Mixed-criticality applications operating at different security labels are deployed and controlled by a privileged management process that is also pre-configuring all information flows. This paper describes the design and objective of this layer.
The technological obsolescence of the Brazilian eletronic ballot box.
Camargo, Carlos Rogério; Faust, Richard; Merino, Eugênio; Stefani, Clarissa
2012-01-01
The electronic ballot box has played a significant role in the consolidation of Brazilian political process. It has enabled paper ballots extinction as a support for the elector's vote as well as for voting counting processes. It is also widely known that election automation has decisively collaborated to the legitimization of Brazilian democracy, getting rid of doubts about the winning candidates. In 1995, when the project was conceived, it represented a compromise solution, balancing technical efficiency and costs trade-offs. However, this architecture currently limits the ergonomic enhancements to the device operation, transportation, maintenance and storage. Nowadays are available in the market devices of reduced dimensions, based on novel computational architecture, namely tablet computers, which emphasizes usability, autonomy, portability, security and low power consumption. Therefore, the proposal under discussion is the replacement of the current electronic ballot boxes for tablet-based devices to improve the ergonomics aspects of the Brazilian voting process. These devices offer a plethora of integrated features (e.g., capacitive touchscreen, speakers, microphone) that enable highly usable and simple user interfaces, in addition to enhancing the voting process security mechanisms. Finally, their operational systems features allow for the development of highly secure applications, suitable to the requirements of a voting process.
Cyber-Defense Return on Investment for NAVFAC Energy Technologies
2017-12-01
Stakeholder input is important to properly develop a tool that reflects the legitimate concerns of those who routinely design , operate, and use control ...cybersecurity results with no control system network connectivity at all. Both are extreme scenarios, unless electrical engineers can design a...support of a Department of Defense (DOD) effort to improve cyber- security in relation to DOD installation control systems. Space and Naval Warfare
Total Quality Management Implementation Plan: Defense Depot, Ogden
1989-07-01
NUMBERS Total Quality Management Implementation Plan Defense Depot Ogden 6. AUTHOR(S) 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) 8. PERFORMING...PAGES TQM (Total Quality Management ), Continuous Process Improvement, Depot Operations, Process Action Teams 16. PRICE CODE 17. SECURITY...034 A Message From The Commander On Total Quality Management i fully support the DLA aoproacii to Total Quality Management . As stated by General
2011-03-29
bases across the continent. This was false when the rumors arose at the time of AFRICOM’s creation and remains false today." Admiral Moeller also went...diseases such as river blindness, sleeping sickness, ’ ’ diarrhea, cholera , typhoid, and other water based ~iseases like guinea worm and Bilharzias. 6
Using Honeynets and the Diamond Model for ICS Threat Analysis
2016-05-11
TR-006 | SOFTWARE ENGINEERING INSTITUTE | CARNEGIE MELLON UNIVERSITY Distribution Statement A: Approved for Public Release; Distribution is...Unlimited Copyright 2016 Carnegie Mellon University This material is based upon work funded and supported by Department of Homeland Security under Contract...No. FA8721-05-C-0003 with Carnegie Mellon University for the operation of the Software Engineering Institute, a federally funded research and
Technical Operations Support III (TOPS III). Task Order 0018: Nanostructured Graphene-Like Polymers
2010-06-01
diverse response by a large class of materials: viscoelastic fluids, inelasticity, crystallization of polymers, twinning, shape memory alloys , single...crystal super alloys , and viscoelastic solids. 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT: SAR 18. NUMBER...twinning (Rajagopal and Srinivasa (1997)), Kannan et al. (2002)), shape memory alloys (Rajagopal and Srinivasa (1999)), single crystal super alloys
2017-04-06
commander in bringing stability to the region. This research paper will also evaluate the current capability of the AFMS International Health...education, exercises, materiel, leader, personnel, and facilities (DOTMLPF) analysis. This research paper is organized to describe the 1) concept...foreign security partners, and selected international organizations by supporting: 1) combined policies, plans, and procedures, including
6 CFR 5.32 - Contracts for the operation of record systems.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 6 Domestic Security 1 2010-01-01 2010-01-01 false Contracts for the operation of record systems. 5.32 Section 5.32 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY DISCLOSURE OF RECORDS AND INFORMATION Privacy Act § 5.32 Contracts for the operation of record systems. Under 5...
17 CFR 210.8-06 - Real estate operations acquired or to be acquired.
Code of Federal Regulations, 2012 CFR
2012-04-01
... 17 Commodity and Securities Exchanges 2 2012-04-01 2012-04-01 false Real estate operations acquired or to be acquired. 210.8-06 Section 210.8-06 Commodity and Securities Exchanges SECURITIES AND...-06 Real estate operations acquired or to be acquired. If, during the period for which income...
17 CFR 210.8-06 - Real estate operations acquired or to be acquired.
Code of Federal Regulations, 2013 CFR
2013-04-01
... 17 Commodity and Securities Exchanges 2 2013-04-01 2013-04-01 false Real estate operations acquired or to be acquired. 210.8-06 Section 210.8-06 Commodity and Securities Exchanges SECURITIES AND...-06 Real estate operations acquired or to be acquired. If, during the period for which income...
17 CFR 210.8-06 - Real estate operations acquired or to be acquired.
Code of Federal Regulations, 2014 CFR
2014-04-01
... 17 Commodity and Securities Exchanges 3 2014-04-01 2014-04-01 false Real estate operations acquired or to be acquired. 210.8-06 Section 210.8-06 Commodity and Securities Exchanges SECURITIES AND...-06 Real estate operations acquired or to be acquired. If, during the period for which income...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-08-11
...] Private Security Contractors (PSCs) Operating in Contingency Operations, Combat Operations or Other..., ``Contractor Personnel Authorized to Accompany the U.S. Armed Forces,'' which provides guidance for all DoD contractors operating in contingency operations. This Rule was published as an Interim Final Rule on July 17...
NASA Astrophysics Data System (ADS)
Hughes, B. K.
2010-12-01
The mission of the National Oceanic and Atmospheric Administration (NOAA) National Environmental Data Information Service (NESDIS) is to provide timely access to global environmental data from satellites and other sources to promote, protect, and enhance America’s economy, security, environment, and quality of life. To fulfill its responsibilities, NESDIS acquires and manages America’s operational environmental satellites, operates the NOAA National Data Centers, provides data and information services including Earth system monitoring, performs official assessments of the environment, and conducts related research. The Nation’s fleet of operational environmental satellites has proven to be very critical in the detection, analysis, and forecast of natural or man-made phenomena. These assets have provided for the protection of people and property while safeguarding the Nation’s commerce and enabling safe and effective military operations. This presentation will take the audience through the evolution of operational satellite based remote sensing in support of weather forecasting, nowcasting, warning operations, hazard detection and mitigation. From the very first experiments involving radiation budget to today’s fleet of Geostationary and Polar Orbiting satellites to tomorrow’s constellation of high resolution imagers and hyperspectral sounders, environmental satellites sustain key observations for current and future generations.
Security of Quantum Repeater Network Operation
2016-10-03
AFRL-AFOSR-JP-TR-2016-0079 Security of Quantum Repeater Network Operation Rodney Van Meter KEIO UNIVERSITY Final Report 10/03/2016 DISTRIBUTION A...To) 29 May 2014 to 28 May 2016 4. TITLE AND SUBTITLE Security of Quantum Repeater Network Operation 5a. CONTRACT NUMBER 5b. GRANT NUMBER FA2386...ABSTRACT Much of the work on quantum networks , both entangled and unentangled, has been about the uses of quantum networks to enhance end- host security
Yehualashet, Yared G.; Wadda, Alieu; Agblewonu, Koffi B.; Zhema, Theophilus; Ibrahim, Al-asi A.; Corr, Alhagie; Linkins, Jennifer; Mkanda, Pascal; Vaz, Rui G.; Nsubuga, Peter; Ashogbon, Daniel
2016-01-01
Background. Following the 1988 World Health Assembly resolution to eradicate polio, the government of Nigeria, with support from partners, has been implementing several rounds of supplementary immunization activities (SIAs) each year. In addition to the technical requirements, the success of the polio eradication initiative depends on timely provision of adequate financial resources. Disbursement of funds for SIAs and payment of allowances to numerous vaccination personnel at the grassroots level are enormous operational challenges in a country the size of Nigeria. Upon donors' request for a transparent and effective payment mechanism, the World Health Organization (WHO), in consultation with national counterparts, created the innovative direct disbursement mechanism (DDM) in 2004. The objective of the DDM was to timely deploy operational funds at the field level and directly pay vaccination personnel allowances at the grassroots level. Methods. A detailed operational guideline for funds disbursement was developed in close consultation with central and field stakeholders. Multiyear financial resource requirements and operational budgets for every campaign were produced by an interagency-coordinated finance subcommittee. The WHO engaged a bank and an accounting firm as DDM partners to support disbursement of and accounting for the SIA funds, respectively. The 37 WHO field offices were equipped with electronic financial systems to support the DDM process, and temporary payment sites were set up to facilitate payment to vaccination personnel at the grassroots level. Coordination meetings among DDM partners were held regularly to reconcile financial records and address operational challenges. Results. Between 2004 and 2014, DDM supported 99 polio and nonpolio vaccination campaigns, disbursing more than $370 million to about 16 million beneficiaries across 280 temporary payment sites. To mitigate security risks and reduce operational costs, the WHO and DDM partners introduced mobile payment to vaccination personnel in May 2015 in compliance with national regulations. A total of 97% of the targeted 1871 beneficiaries in 2 pilot sites were successfully paid through mobile payment, although some challenges remain to be addressed. Discussion. The DDM has met its objectives with a high rate of financial accountability and transparency, despite persistent operational and security challenges. With support from Nigeria, the Pakistan polio vaccination program successfully adopted the DDM. The DDM continues to play an important role in effective implementation of the polio endgame strategy and the national immunization strategic plan. As part of polio legacy planning, we recommend the DDM as a model for other opportunities that involve the engagement of large field-level teams as new vaccines are introduced in Nigeria and elsewhere. PMID:26908746
NASA Technical Reports Server (NTRS)
Critchfield, Anna R.; Zepp, Robert H.
2000-01-01
We propose that the user interact with the spacecraft as if the spacecraft were a file server, so that the user can select and receive data as files in standard formats (e.g., tables or images, such as jpeg) via the Internet. Internet technology will be used end-to-end from the spacecraft to authorized users, such as the flight operation team, and project scientists. The proposed solution includes a ground system and spacecraft architecture, mission operations scenarios, and an implementation roadmap showing migration from current practice to the future, where distributed users request and receive files of spacecraft data from archives or spacecraft with equal ease. This solution will provide ground support personnel and scientists easy, direct, secure access to their authorized data without cumbersome processing, and can be extended to support autonomous communications with the spacecraft.
Activities report of PTT Research
NASA Astrophysics Data System (ADS)
In the field of postal infrastructure research, activities were performed on postcode readers, radiolabels, and techniques of operations research and artificial intelligence. In the field of telecommunication, transportation, and information, research was made on multipurpose coding schemes, speech recognition, hypertext, a multimedia information server, security of electronic data interchange, document retrieval, improvement of the quality of user interfaces, domotics living support (techniques), and standardization of telecommunication prototcols. In the field of telecommunication infrastructure and provisions research, activities were performed on universal personal telecommunications, advanced broadband network technologies, coherent techniques, measurement of audio quality, near field facilities, local beam communication, local area networks, network security, coupling of broadband and narrowband integrated services digital networks, digital mapping, and standardization of protocols.
Framework and prototype for a secure XML-based electronic health records system.
Steele, Robert; Gardner, William; Chandra, Darius; Dillon, Tharam S
2007-01-01
Security of personal medical information has always been a challenge for the advancement of Electronic Health Records (EHRs) initiatives. eXtensible Markup Language (XML), is rapidly becoming the key standard for data representation and transportation. The widespread use of XML and the prospect of its use in the Electronic Health (e-health) domain highlights the need for flexible access control models for XML data and documents. This paper presents a declarative access control model for XML data repositories that utilises an expressive XML role control model. The operational semantics of this model are illustrated by Xplorer, a user interface generation engine which supports search-browse-navigate activities on XML repositories.
Sustainable water use and management options in a water-stressed river basin in Kenya
NASA Astrophysics Data System (ADS)
Hirpa, Feyera; Dadson, Simon; Dyer, Ellen; Barbour, Emily; Charles, Katrina; Hope, Robert
2017-04-01
Sustainable water resource is critical for maintaining healthy ecosystems and supporting socio-economic sectors. Hydro-climatic change and variability, population growth as well as new infrastructure developments create water security risks. Therefore, evidence-based management decisions are necessary to improve water security and meet the future water demands of multiple competing sectors. In this work we perform water resource modelling in order to investigate the impact of increasing water demand (expanding agriculture, booming industry, growing population) on the sustainable water use in Turkwel river basin, located in arid north-western Kenya. We test different management options to determine those that meet the water demands of the concerned sectors whilst minimising environmental impact. We perform scenario analysis using Water Evaluation And Planning (WEAP) model to explore different ranges of climate conditions, population growth rates, irrigation scale, reservoir operations, and economic development. The results can be used as a scientific guideline for the policy makers who decide the alternative management options that ensure the sustainable water use in the basin. The work is part of the REACH - improving water security for the poor program (http://reachwater.org.uk/), aiming to support a pathway to sustainable growth and poverty reduction
Implementing a High-Assurance Smart-Card OS
NASA Astrophysics Data System (ADS)
Karger, Paul A.; Toll, David C.; Palmer, Elaine R.; McIntosh, Suzanne K.; Weber, Samuel; Edwards, Jonathan W.
Building a high-assurance, secure operating system for memory constrained systems, such as smart cards, introduces many challenges. The increasing power of smart cards has made their use feasible in applications such as electronic passports, military and public sector identification cards, and cell-phone based financial and entertainment applications. Such applications require a secure environment, which can only be provided with sufficient hardware and a secure operating system. We argue that smart cards pose additional security challenges when compared to traditional computer platforms. We discuss our design for a secure smart card operating system, named Caernarvon, and show that it addresses these challenges, which include secure application download, protection of cryptographic functions from malicious applications, resolution of covert channels, and assurance of both security and data integrity in the face of arbitrary power losses.
Federal Register 2010, 2011, 2012, 2013, 2014
2011-11-23
...] Revision of Agency Information Collection Activity Under OMB Review: Secure Flight Program AGENCY... operators and foreign air carriers submit to Secure Flight for the purposes of watch list matching... screening checkpoint which airport operators will submit to Secure Flight, and a survey of certain general...
Code of Federal Regulations, 2010 CFR
2010-04-01
..., no independent assets or operations, minor, finance subsidiary and operating subsidiary. Paragraph (i....220f of this chapter). (b) Finance subsidiary issuer of securities guaranteed by its parent company. When a finance subsidiary issues securities and its parent company guarantees those securities, the...
12 CFR 615.5451 - Book-entry and definitive securities.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 12 Banks and Banking 7 2013-01-01 2013-01-01 false Book-entry and definitive securities. 615.5451... AFFAIRS, LOAN POLICIES AND OPERATIONS, AND FUNDING OPERATIONS Book-Entry Procedures for Farm Credit Securities § 615.5451 Book-entry and definitive securities. Subject to subpart C of this part: (a) Farm...
12 CFR 615.5451 - Book-entry and definitive securities.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 12 Banks and Banking 6 2010-01-01 2010-01-01 false Book-entry and definitive securities. 615.5451... AFFAIRS, LOAN POLICIES AND OPERATIONS, AND FUNDING OPERATIONS Book-Entry Procedures for Farm Credit Securities § 615.5451 Book-entry and definitive securities. Subject to subpart C of this part: (a) Farm...
12 CFR 615.5451 - Book-entry and definitive securities.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 12 Banks and Banking 7 2012-01-01 2012-01-01 false Book-entry and definitive securities. 615.5451... AFFAIRS, LOAN POLICIES AND OPERATIONS, AND FUNDING OPERATIONS Book-Entry Procedures for Farm Credit Securities § 615.5451 Book-entry and definitive securities. Subject to subpart C of this part: (a) Farm...
12 CFR 615.5451 - Book-entry and definitive securities.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 12 Banks and Banking 6 2011-01-01 2011-01-01 false Book-entry and definitive securities. 615.5451... AFFAIRS, LOAN POLICIES AND OPERATIONS, AND FUNDING OPERATIONS Book-Entry Procedures for Farm Credit Securities § 615.5451 Book-entry and definitive securities. Subject to subpart C of this part: (a) Farm...
12 CFR 615.5451 - Book-entry and definitive securities.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 12 Banks and Banking 7 2014-01-01 2014-01-01 false Book-entry and definitive securities. 615.5451... AFFAIRS, LOAN POLICIES AND OPERATIONS, AND FUNDING OPERATIONS Book-Entry Procedures for Farm Credit Securities § 615.5451 Book-entry and definitive securities. Subject to subpart C of this part: (a) Farm...
Modular robotic system for forensic investigation support
NASA Astrophysics Data System (ADS)
Kowalski, Grzegorz; Główka, Jakub; Maciaś, Mateusz; Puchalski, Sławomir
2017-10-01
Forensic investigation on the crime scene is an activity that requires not only knowledge about the ways of searching for evidence, collecting and processing them. In some cases the area of operation might not be properly secured and poses threat to human health or life. Some devices or materials may be left intentionally or not to injure potential investigators. Besides conventional explosives, threats can be in form of CBRN materials, which have not only immediate effect on the exposed personnel, but can contaminate further people, when being transferred for example on clothes or unsecured equipment. In this case a risk evaluation should be performed, that can lead to conclusions that it is too dangerous for investigators to work. In that kind of situation remote devices, which are able to examine the crime scene and secure samples, can be used. In the course of R&D activities PIAP developed a system, which is based on small UGV capable of carrying out inspection of suspicious places and securing evidence, when needed. The system consists of remotely controlled mobile robot, its control console and a set of various inspection and support tools, that enable detection of CBRN threats as well as revelation, documentation and securing of the evidence. This paper will present main features of the system, like mission adjustment possibilities and communication aspects, and also examples of the forensic accessories.
14 CFR 380.34 - Security and depository agreements.
Code of Federal Regulations, 2010 CFR
2010-01-01
... charter operator for that charter. (2) The direct air carrier and charter operator or foreign charter... operator or foreign charter operator shall furnish a security agreement in an amount for not less than the... charter operator with respect to the charter. (b) The direct air carrier and the charter operator or...
17 CFR 210.3-14 - Special instructions for real estate operations to be acquired.
Code of Federal Regulations, 2014 CFR
2014-04-01
... § 210.3-14 Special instructions for real estate operations to be acquired. (a) If, during the period for... 17 Commodity and Securities Exchanges 3 2014-04-01 2014-04-01 false Special instructions for real estate operations to be acquired. 210.3-14 Section 210.3-14 Commodity and Securities Exchanges SECURITIES...
17 CFR 210.3-14 - Special instructions for real estate operations to be acquired.
Code of Federal Regulations, 2013 CFR
2013-04-01
... § 210.3-14 Special instructions for real estate operations to be acquired. (a) If, during the period for... 17 Commodity and Securities Exchanges 2 2013-04-01 2013-04-01 false Special instructions for real estate operations to be acquired. 210.3-14 Section 210.3-14 Commodity and Securities Exchanges SECURITIES...
17 CFR 210.8-06 - Real estate operations acquired or to be acquired.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 17 Commodity and Securities Exchanges 2 2011-04-01 2011-04-01 false Real estate operations acquired or to be acquired. 210.8-06 Section 210.8-06 Commodity and Securities Exchanges SECURITIES AND... Statements of Smaller Reporting Companies § 210.8-06 Real estate operations acquired or to be acquired. If...
17 CFR 210.3-14 - Special instructions for real estate operations to be acquired.
Code of Federal Regulations, 2012 CFR
2012-04-01
... § 210.3-14 Special instructions for real estate operations to be acquired. (a) If, during the period for... 17 Commodity and Securities Exchanges 2 2012-04-01 2012-04-01 false Special instructions for real estate operations to be acquired. 210.3-14 Section 210.3-14 Commodity and Securities Exchanges SECURITIES...
17 CFR 210.3-14 - Special instructions for real estate operations to be acquired.
Code of Federal Regulations, 2011 CFR
2011-04-01
... General Instructions As to Financial Statements § 210.3-14 Special instructions for real estate operations... 17 Commodity and Securities Exchanges 2 2011-04-01 2011-04-01 false Special instructions for real estate operations to be acquired. 210.3-14 Section 210.3-14 Commodity and Securities Exchanges SECURITIES...
Food security -- an insurance approach.
1979-01-01
An adequate standard of nutrition at national and individual level is a basic -- and not wholly altruistic -- objective for mankind. Its ingredients are food production and distribution. Of these the latter is currently considered the more limiting, but fluctuations in the former -- over various geographical and time scales -- can be the overriding factor when national supplies are critical. Under these conditions the automatic operations of a legal mandatory food support system -- free from political strings or connotations of welfare -- would be advantageous. A system for providing a measure of food security, using insurance principles and based on a compromise between international stockpiling and direct financial subventions, is outlined in a recent publication of the International Food Policy Research Institute. Essentially it is a means by which the international community could contribute to the food security of food deficit, developing countries without having to create large buffer stocks and stabilize world grain prices. Extracts from this publication are given below.
Remote Sensing Laboratory - RSL
None
2018-01-16
One of the primary resources supporting homeland security is the Remote Sensing Laboratory, or RSL. The Laboratory creates advanced technologies for emergency response operations, radiological incident response, and other remote sensing activities. RSL emergency response teams are on call 24-hours a day, and maintain the capability to deploy domestically and internationally in response to threats involving the loss, theft, or release of nuclear or radioactive material. Such incidents might include Nuclear Power Plant accidents, terrorist incidents involving nuclear or radiological materials, NASA launches, and transportation accidents involving nuclear materials. Working with the US Department of Homeland Security, RSL personnel equip, maintain, and conduct training on the mobile detection deployment unit, to provide nuclear radiological security at major national events such as the super bowl, the Indianapolis 500, New Year's Eve celebrations, presidential inaugurations, international meetings and conferences, just about any event where large numbers of people will gather.
Remote Sensing Laboratory - RSL
DOE Office of Scientific and Technical Information (OSTI.GOV)
None
2014-11-06
One of the primary resources supporting homeland security is the Remote Sensing Laboratory, or RSL. The Laboratory creates advanced technologies for emergency response operations, radiological incident response, and other remote sensing activities. RSL emergency response teams are on call 24-hours a day, and maintain the capability to deploy domestically and internationally in response to threats involving the loss, theft, or release of nuclear or radioactive material. Such incidents might include Nuclear Power Plant accidents, terrorist incidents involving nuclear or radiological materials, NASA launches, and transportation accidents involving nuclear materials. Working with the US Department of Homeland Security, RSL personnel equip,more » maintain, and conduct training on the mobile detection deployment unit, to provide nuclear radiological security at major national events such as the super bowl, the Indianapolis 500, New Year's Eve celebrations, presidential inaugurations, international meetings and conferences, just about any event where large numbers of people will gather.« less
Internet Based Remote Operations
NASA Technical Reports Server (NTRS)
Chamberlain, James
1999-01-01
This is the Final Report for the Internet Based Remote Operations Contract, has performed payload operations research support tasks March 1999 through September 1999. These tasks support the GSD goal of developing a secure, inexpensive data, voice, and video mission communications capability between remote payload investigators and the NASA payload operations team in the International Space Station (ISS) era. AZTek has provided feedback from the NASA payload community by utilizing its extensive payload development and operations experience to test and evaluate remote payload operations systems. AZTek has focused on use of the "public Internet" and inexpensive, Commercial-off-the-shelf (COTS) Internet-based tools that would most benefit "small" (e.g., $2 Million or less) payloads and small developers without permanent remote operations facilities. Such projects have limited budgets to support installation and development of high-speed dedicated communications links and high-end, custom ground support equipment and software. The primary conclusions of the study are as follows: (1) The trend of using Internet technology for "live" collaborative applications such as telescience will continue. The GSD-developed data and voice capabilities continued to work well over the "public" Internet during this period. 2. Transmitting multiple voice streams from a voice-conferencing server to a client PC to be mixed and played on the PC is feasible. 3. There are two classes of voice vendors in the market: - Large traditional phone equipment vendors pursuing integration of PSTN with Internet, and Small Internet startups.The key to selecting a vendor will be to find a company sufficiently large and established to provide a base voice-conferencing software product line for the next several years.
Polyport atmospheric gas sampler
Guggenheim, S. Frederic
1995-01-01
An atmospheric gas sampler with a multi-port valve which allows for multi, sequential sampling of air through a plurality of gas sampling tubes mounted in corresponding gas inlet ports. The gas sampler comprises a flow-through housing which defines a sampling chamber and includes a gas outlet port to accommodate a flow of gases through the housing. An apertured sample support plate defining the inlet ports extends across and encloses the sampling chamber and supports gas sampling tubes which depend into the sampling chamber and are secured across each of the inlet ports of the sample support plate in a flow-through relation to the flow of gases through the housing during sampling operations. A normally closed stopper means mounted on the sample support plate and operatively associated with each of the inlet ports blocks the flow of gases through the respective gas sampling tubes. A camming mechanism mounted on the sample support plate is adapted to rotate under and selectively lift open the stopper spring to accommodate a predetermined flow of gas through the respective gas sampling tubes when air is drawn from the housing through the outlet port.
SRB Processing Facilities Media Event
2016-03-01
Members of the news media watch as two cranes are used to lift one of two pathfinders, or test versions, of solid rocket booster segments for NASA’s Space Launch System (SLS) rocket into the vertical position inside the Rotation, Processing and Surge Facility at NASA’s Kennedy Space Center in Florida. The pathfinder booster segment will be moved to the other end of the RPSF and secured on a test stand. The Ground Systems Development and Operations Program and Jacobs Engineering, on the Test and Operations Support Contract, will prepare the booster segments, which are inert, for a series of lifts, moves and stacking operations to prepare for Exploration Mission-1, deep-space missions and the journey to Mars.
NASA Astrophysics Data System (ADS)
Lama, Carlos E.; Fagan, Joe E.
2009-09-01
The United States Department of Defense (DoD) defines 'force protection' as "preventive measures taken to mitigate hostile actions against DoD personnel (to include family members), resources, facilities, and critical information." Advanced technologies enable significant improvements in automating and distributing situation awareness, optimizing operator time, and improving sustainability, which enhance protection and lower costs. The JFPASS Joint Capability Technology Demonstration (JCTD) demonstrates a force protection environment that combines physical security and Chemical, Biological, Radiological, Nuclear, and Explosive (CBRNE) defense through the application of integrated command and control and data fusion. The JFPASS JCTD provides a layered approach to force protection by integrating traditional sensors used in physical security, such as video cameras, battlefield surveillance radars, unmanned and unattended ground sensors. The optimization of human participation and automation of processes is achieved by employment of unmanned ground vehicles, along with remotely operated lethal and less-than-lethal weapon systems. These capabilities are integrated via a tailorable, user-defined common operational picture display through a data fusion engine operating in the background. The combined systems automate the screening of alarms, manage the information displays, and provide assessment and response measures. The data fusion engine links disparate sensors and systems, and applies tailored logic to focus the assessment of events. It enables timely responses by providing the user with automated and semi-automated decision support tools. The JFPASS JCTD uses standard communication/data exchange protocols, which allow the system to incorporate future sensor technologies or communication networks, while maintaining the ability to communicate with legacy or existing systems.
Re-designing the PhEDEx Security Model
DOE Office of Scientific and Technical Information (OSTI.GOV)
Huang, C.-H.; Wildish, T.; Zhang, X.
2014-01-01
PhEDEx, the data-placement tool used by the CMS experiment at the LHC, was conceived in a more trusting time. The security model provided a safe environment for site agents and operators, but offerred little more protection than that. Data was not sufficiently protected against loss caused by operator error or software bugs or by deliberate manipulation of the database. Operators were given high levels of access to the database, beyond what was actually needed to accomplish their tasks. This exposed them to the risk of suspicion should an incident occur. Multiple implementations of the security model led to difficulties maintainingmore » code, which can lead to degredation of security over time. In order to meet the simultaneous goals of protecting CMS data, protecting the operators from undue exposure to risk, increasing monitoring capabilities and improving maintainability of the security model, the PhEDEx security model was redesigned and re-implemented. Security was moved from the application layer into the database itself, fine-grained access roles were established, and tools and procedures created to control the evolution of the security model over time. In this paper we describe this work, we describe the deployment of the new security model, and we show how these enhancements improve security on several fronts simultaneously.« less
Re-designing the PhEDEx Security Model
NASA Astrophysics Data System (ADS)
C-H, Huang; Wildish, T.; X, Zhang
2014-06-01
PhEDEx, the data-placement tool used by the CMS experiment at the LHC, was conceived in a more trusting time. The security model provided a safe environment for site agents and operators, but offerred little more protection than that. Data was not sufficiently protected against loss caused by operator error or software bugs or by deliberate manipulation of the database. Operators were given high levels of access to the database, beyond what was actually needed to accomplish their tasks. This exposed them to the risk of suspicion should an incident occur. Multiple implementations of the security model led to difficulties maintaining code, which can lead to degredation of security over time. In order to meet the simultaneous goals of protecting CMS data, protecting the operators from undue exposure to risk, increasing monitoring capabilities and improving maintainability of the security model, the PhEDEx security model was redesigned and re-implemented. Security was moved from the application layer into the database itself, fine-grained access roles were established, and tools and procedures created to control the evolution of the security model over time. In this paper we describe this work, we describe the deployment of the new security model, and we show how these enhancements improve security on several fronts simultaneously.
A wireless electronic monitoring system for securing milk from farm to processor
NASA Astrophysics Data System (ADS)
Womble, Phillip; Hopper, Lindsay; Thompson, Chris; Alexander, Suraj M.; Crist, William; Payne, Fred; Stombaugh, Tim; Paschal, Jon; Moore, Ryan; Luck, Brian; Tabayehnejab, Nasrin
2008-04-01
The Department of Homeland Security and the Department of Health and Human Services have targeted bulk food contamination as a focus for attention. The contamination of bulk food poses a high consequence threat to our society. Milk transport falls into three of the 17 targeted NIPP (National Infrastructure Protection Plan) sectors including agriculture-food, public health, and commercial facilities. Minimal security safeguards have been developed for bulk milk transport. The current manual methods of securing milk are paper intensive and prone to errors. The bulk milk transportation sector requires a security enhancement that will both reduce recording errors and enable normal transport activities to occur while providing security against unauthorized access. Milk transportation companies currently use voluntary seal programs that utilize plastic, numbered seals on milk transport tank openings. Our group has developed a Milk Transport Security System which is an electromechanical access control and communication system that assures the secure transport of milk, milk samples, milk data, and security data between locations and specifically between dairy farms, transfer stations, receiving stations, and milk plants. It includes a security monitoring system installed on the milk transport tank, a hand held device, optional printers, data server, and security evaluation software. The system operates automatically and requires minimal or no attention by the bulk milk hauler/sampler. The system is compatible with existing milk transport infrastructure, and has the support of the milk producers, milk transportation companies, milk marketing agencies, and dairy processors. The security protocol developed is applicable for transport of other bulk foods both nationally and internationally. This system adds significantly to the national security infrastructure for bulk food transport. We are currently demonstrating the system in central Kentucky and will report on the results of the demonstration.
Lightweight Boom For Rescue Helicopter
NASA Technical Reports Server (NTRS)
Haslim, Leonard A.
1993-01-01
Telescoping boom and associated mechanisms attached to helicopter aid rescue operations by extending lifeline beyond sweep of main rotor. Pilot observes rescuee and control position of helicopter more effectively than if rescuee directly below and hidden from pilot's view. Rescuee outside downdraft of rotor, which is often powerful enough to blow away or submerge someone in water. Used for marine or land operations. Boom thin and lightweight because it need not support weight of rescuee. Lifeline pulls away from boom after secured around rescuee, who is lifted directly into cabin by winch. Potential application for in situ erection of telescopic space structures.
Electro-textile garments for power and data distribution
NASA Astrophysics Data System (ADS)
Slade, Jeremiah R.; Winterhalter, Carole
2015-05-01
U.S. troops are increasingly being equipped with various electronic assets including flexible displays, computers, and communications systems. While these systems can significantly enhance operational capabilities, forming reliable connections between them poses a number of challenges in terms of comfort, weight, ergonomics, and operational security. IST has addressed these challenges by developing the technologies needed to integrate large-scale cross-seam electrical functionality into virtually any textile product, including the various garments and vests that comprise the warfighter's ensemble. Using this technology IST is able to develop textile products that do not simply support or accommodate a network but are the network.
Development Status: Automation Advanced Development Space Station Freedom Electric Power System
NASA Technical Reports Server (NTRS)
Dolce, James L.; Kish, James A.; Mellor, Pamela A.
1990-01-01
Electric power system automation for Space Station Freedom is intended to operate in a loop. Data from the power system is used for diagnosis and security analysis to generate Operations Management System (OMS) requests, which are sent to an arbiter, which sends a plan to a commander generator connected to the electric power system. This viewgraph presentation profiles automation software for diagnosis, scheduling, and constraint interfaces, and simulation to support automation development. The automation development process is diagrammed, and the process of creating Ada and ART versions of the automation software is described.
Intelligent Data Analysis in the EMERCOM Information System
NASA Astrophysics Data System (ADS)
Elena, Sharafutdinova; Tatiana, Avdeenko; Bakaev, Maxim
2017-01-01
The paper describes an information system development project for the Russian Ministry of Emergency Situations (MES, whose international operations body is known as EMERCOM), which was attended by the representatives of both the IT industry and the academia. Besides the general description of the system, we put forward OLAP and Data Mining-based approaches towards the intelligent analysis of the data accumulated in the database. In particular, some operational OLAP reports and an example of multi-dimensional information space based on OLAP Data Warehouse are presented. Finally, we outline Data Mining application to support decision-making regarding security inspections planning and results consideration.
Strategy for a transparent, accessible, and sustainable national claims database.
Gelburd, Robin
2015-03-01
The article outlines the strategy employed by FAIR Health, Inc, an independent nonprofit, to maintain a national database of over 18 billion private health insurance claims to support consumer education, payer and provider operations, policy makers, and researchers with standard and customized data sets on an economically self-sufficient basis. It explains how FAIR Health conducts all operations in-house, including data collection, security, validation, information organization, product creation, and transmission, with a commitment to objectivity and reliability in data and data products. It also describes the data elements available to researchers and the diverse studies that FAIR Health data facilitate.
Birds of a Feather: Supporting Secure Systems
DOE Office of Scientific and Technical Information (OSTI.GOV)
Braswell III, H V
2006-04-24
Over the past few years Lawrence Livermore National Laboratory has begun the process of moving to a diskless environment in the Secure Computer Support realm. This movement has included many moving targets and increasing support complexity. We would like to set up a forum for Security and Support professionals to get together from across the Complex and discuss current deployments, lessons learned, and next steps. This would include what hardware, software, and hard copy based solutions are being used to manage Secure Computing. The topics to be discussed include but are not limited to: Diskless computing, port locking and management,more » PC, Mac, and Linux/UNIX support and setup, system imaging, security setup documentation and templates, security documentation and management, customer tracking, ticket tracking, software download and management, log management, backup/disaster recovery, and mixed media environments.« less
2008-05-14
CAPE CANAVERAL, Fla. -- A support boat from a rescue training exercise, known as Mode VIII, returns to the ship off Florida's central east coast. In support of, and with logistical support from, NASA, USSTRATCOM is hosting a major exercise involving Department of Defense, Department of Homeland Security, search and rescue (SAR) forces, including the 45th Space Wing at Patrick Air Force Base, which support space shuttle astronaut bailout contingency operations, known as Mode VIII. This exercise tests SAR capabilities to locate, recover and provide medical treatment for astronauts following a space shuttle launch phase open-ocean bailout. Participants include members of the U.S. Navy, U.S. Coast Guard, U.S. Air Force, and NASA's Kennedy Space Center and Johnson Space Center. Photo credit: NASA/Dimitri Gerondidakis
2008-05-14
CAPE CANAVERAL, Fla. -- Participants in a rescue training exercise, known as Mode VIII, wait for a support boat off Florida's central east coast. In support of, and with logistical support from, NASA, USSTRATCOM is hosting a major exercise involving Department of Defense, Department of Homeland Security, search and rescue (SAR) forces, including the 45th Space Wing at Patrick Air Force Base, which support space shuttle astronaut bailout contingency operations, known as Mode VIII. This exercise tests SAR capabilities to locate, recover and provide medical treatment for astronauts following a space shuttle launch phase open-ocean bailout. Participants include members of the U.S. Navy, U.S. Coast Guard, U.S. Air Force, and NASA's Kennedy Space Center and Johnson Space Center. Photo credit: NASA/Dimitri Gerondidakis
2008-05-14
CAPE CANAVERAL, Fla. -- Support boats connect off Florida's central east coast during a rescue training exercise, known as Mode VIII. In support of, and with logistical support from, NASA, USSTRATCOM is hosting a major exercise involving Department of Defense, Department of Homeland Security, search and rescue (SAR) forces, including the 45th Space Wing at Patrick Air Force Base, which support space shuttle astronaut bailout contingency operations, known as Mode VIII. This exercise tests SAR capabilities to locate, recover and provide medical treatment for astronauts following a space shuttle launch phase open-ocean bailout. Participants include members of the U.S. Navy, U.S. Coast Guard, U.S. Air Force, and NASA's Kennedy Space Center and Johnson Space Center. Photo credit: NASA/Dimitri Gerondidakis
DOE Office of Scientific and Technical Information (OSTI.GOV)
Thrower, A.; Best, R.; Finewood, L.
2008-07-01
The Department of Energy's (DOE's) Office of Civilian Radioactive Waste Management (OCRWM) is responsible for developing and implementing a safe, secure and efficient transportation system to ship spent nuclear fuel (SNF) and high-level radioactive waste (HLW) from commercial and DOE sites to the proposed Yucca Mountain repository. The Office of Logistics Management (OLM) within OCRWM has begun to work with stakeholders to identify preliminary national suites of highway and rail routes that could be used for future shipments OLM is striving to develop a planning-basis set of routes that will support long-lead time logistical analyses (i.e., five or more yearsmore » before shipment). The results will represent a starting point for discussions between DOE and corridor jurisdictions, and for shipping arrangements between DOE and carriers. This fulfills a recommendation of the National Academy of Sciences report on SNF and HLW transportation that 'DOE should identify and make public its suite of preferred highway and rail routes for transporting spent fuel and high level waste to a federal repository as soon as practicable to support State, Tribal and local planning, especially for emergency responder preparedness'. OLM encourages and supports participation of program stakeholders in a process to identify suites of national routes. The principal objective is to identify preliminary suites of national routes that reflect responsible consideration of the interests of a broad cross-section of stakeholders. This will facilitate transportation planning activities to help meet program goals, including providing an advanced planning framework for State and Tribal authorities; supporting a pilot program for providing funding under Section 180(c) of the Nuclear Waste Policy Act; allowing sufficient time for security and operational reviews in advance of shipments to Yucca Mountain; and supporting utility planning and readiness for transportation operations. Concepts for routing and routing criteria have been considered by several state regional groups supported by cooperative agreements with OLM. OCRWM is also working with other Federal agencies, transportation service providers and others involved in the transportation industry to ensure the criteria are consistent with operating practices and regulations. These coordination efforts will ensure the experience, knowledge, and expertise of those involved are considered in the process to identify the preliminary national suites of routes. This paper describes the current process and timeline for preliminary identification and analyses of routes. In conclusion: The path toward developing a safe, secure, and efficient transportation system for shipments of SNF and HLW to Yucca Mountain will require the participation of many interested parties. Real cooperative planning is sometimes challenging, and requires a commitment from all involved parties to act in good faith and to employ their best efforts in developing mutually beneficial solutions. Identifying routes to the proposed repository at Yucca Mountain, and engaging in planning and preparedness activities with affected jurisdictions and other stakeholders, will take time. OCRWM is committed to a cooperative approach that will ultimately enhance safety, security, efficiency and public confidence. (authors)« less
U.S. Maritime Security: Sustainability Challenges
2011-09-01
Security Council ICE Immigration and Customs Enforcement IOC Interagency Operation Center JHOC Joint Harbor Operation Center JIATF-S Joint...maritime threats into nation threats, transnational criminal and piracy threats, environmental destruction, and illegal seaborne immigration (U.S...safe and secure borders, welcome lawful immigrants and visitors and promote the free-flow of commerce (U.S. Department of Homeland Security, 2011
17 CFR 240.17Ad-21T - Operational capability in a Year 2000 environment.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Operational capability in a Year 2000 environment. 240.17Ad-21T Section 240.17Ad-21T Commodity and Securities Exchanges SECURITIES... Company Rules § 240.17Ad-21T Operational capability in a Year 2000 environment. (a) This section applies...
Alternative Futures: United States Air Force Security Police in the Twenty-First Century
1988-04-01
34What policies should today’s Air Force leadership be pursuing to prepare for tomorrow’s combat support and security police roles?’ The monograph...Further, it addresses the capability of the Air Force to respond to its future combat support and security police missions and their integration into the...security police organizations. His most recent assignments were as the deputy commander of a combat support group and the commander of a security police
The Operations Security Concept for Future ESA Earth Observation Missions
NASA Astrophysics Data System (ADS)
Fischer, D.; Bargellini, P.; Merri, M.
2008-08-01
Next-generation European earth observation missions will play a critical role in public safety and security infrastructures. This makes it necessary for ESA to protect the communication infrastructure of these missions in order to guarantee their service availability. In this paper, we discuss the development process for a generic earth observation security concept. This concept has been developed as part of a GMES Flight Operation Segment security study with the objective to analyse and select a number of high level security requirements for the missions. Further, we studied the impact of an implementation for these requirements on the operational infrastructure of current earth observation missions.
Afghanistan: Post-Taliban Governance, Security, and U.S. Policy
2013-10-23
for failing to comply with a collection of information if it does not display a currently valid OMB control number. 1. REPORT DATE 23 OCT 2013 2...York closed, although Taliban representative Abdul Hakim Mujahid continued to operate informally .9 In March 2001, Administration officials received a ...Resolution 2096. Resolution 2096 reiterates the expanded UNAMA mandate, while noting that UNAMA and the international community are moving to a supporting
Continuous Tamper-proof Logging using TPM2.0
2014-06-16
process each log entry. Additional hardware support could mitigate this problem. Tradeoffs between performance and security guarantees Disk write...becomes weaker as the block size increases. This problem is mitigated in protocol B by allowing offline recovery from a power failure and detection of...M.K., Isozaki, H.: Flicker : An execution infrastructure for TCB minimization. ACM SIGOPS Operating Systems Review 42(4) (2008) 315–328 24. Parno, B
Cockpit Video: A Low Cost BDA Source
1993-12-01
military expertise, and material withheld for operational security, the press was very reluctant to accept the military’s claims. As one reporter...readout of the KA-71 and radar scope film, and the normal intelligence support to include aircrew briefing/debriefing, preparation of target materials ...target, and recording the result of impact, the effectivenass of a weapon system can be evaluated. The secondary purposes of ARP materials include
A Taxonomy of Operational Cyber Security Risks Version 2
2014-05-01
2014-TN-006 CERT® Division Unlimited distribution subject to the copyright. http://www.sei.cmu.edu Copyright 2014 Carnegie Mellon University...This material is based upon work funded and supported by DHS DoD under Contract No. FA8721-05- C-0003 with Carnegie Mellon University for the...Schilling Circle, Bldg 1305, 3rd floor Hanscom AFB, MA 01731-2125 NO WARRANTY. THIS CARNEGIE MELLON UNIVERSITY AND SOFTWARE ENGINEERING INSTITUTE
A Case Study of Information Resource Management in the Department of Defense
1992-03-01
prepared to make effective decisions in a military environment. The justification for the use of information technology (IT) in support of operations...t ement No PfICt NO [ask No r 11 TITLE (Include Security Classification) A Case Study ofinformation Resourcc Management in the Departnentufl)clelse...block number) FIELD GROUP SUBGROUP Case study,Corporate Information Management, CIM. Information Hesource Munagenitnt IRM 19 ABSTRACT (continue on
Military space station implications. Study project
DOE Office of Scientific and Technical Information (OSTI.GOV)
Bourne, G.D.; Skirvin, G.D.; Wilson, G.R.
1987-03-23
Justifying the relevancy of a Manned Military Space Station (MMSS) and subsequently proposing its deployment to capitalize upon the United States' national security interests is the essence and purpose of this group study project. The MMSS is intended to perform a two-fold purpose: (1) facilitate military peacetime operations while simultaneously supporting and promoting civilian space initiatives; and, (2) act as a force multiplier for space and terrestrial force operations in the event of conventional, theater nuclear, and/or strategic nuclear war. Data to support the future value of the MMSS was obtained from individual and group research using unclassified sources suchmore » as professional journals, books, US Air Force Staff College reference material, and information from the US Air Force space coordinating staff in Washington, DC. The importance of space to our future and especially of a MMSS by America's national leaders and its people has yet to be fully appreciated and/or realized. The significance of space and its nexus to the United States' national security has been growing dramatically in importance since the launching of the Sputnik in 1957 by Russian. Space, as the forth dimension, cannot and should not be understated in importance as it relates to commercialism, deterrence to war, and to the stability of world order.« less
Monitoring and Predicting the African Climate for Food Security
NASA Astrophysics Data System (ADS)
Thiaw, W. M.
2015-12-01
Drought is one of the greatest challenges in Africa due to its impact on access to sanitary water and food. In response to this challenge, the international community has mobilized to develop famine early warning systems (FEWS) to bring safe food and water to populations in need. Over the past several decades, much attention has focused on advance risk planning in agriculture and water. This requires frequent updates of weather and climate outlooks. This paper describes the active role of NOAA's African Desk in FEWS. Emphasis is on the operational products from short and medium range weather forecasts to subseasonal and seasonal outlooks in support of humanitarian relief programs. Tools to provide access to real time weather and climate information to the public are described. These include the downscaling of the U.S. National Multi-model Ensemble (NMME) to improve seasonal forecasts in support of Regional Climate Outlook Forums (RCOFs). The subseasonal time scale has emerged as extremely important to many socio-economic sectors. Drawing from advances in numerical models that can now provide a better representation of the MJO, operational subseasonal forecasts are included in the African Desk product suite. These along with forecasts skill assessment and verifications are discussed. The presentation will also highlight regional hazards outlooks basis for FEWSNET food security outlooks.
Secure and interoperable communication infrastructures for PPDR organisations
NASA Astrophysics Data System (ADS)
Müller, Wilmuth; Marques, Hugo; Pereira, Luis; Rodriguez, Jonathan; Brouwer, Frank; Bouwers, Bert; Politis, Ilias; Lykourgiotis, Asimakis; Ladas, Alexandros; Adigun, Olayinka; Jelenc, David
2016-05-01
The growing number of events affecting public safety and security (PS&S) on a regional scale with potential to grow up to large scale cross border disasters puts an increased pressure on agencies and organisation responsible for PS&S. In order to respond timely and in an adequate manner to such events, Public Protection and Disaster Relief (PPDR) organisations need to cooperate, align their procedures and activities, share the needed information and be interoperable. Existing PPDR/PMR technologies such as TETRA, TETRAPOL or P25, do not currently provide broadband capability nor is expected such technologies to be upgraded in the future. This presents a major limitation in supporting new services and information flows. Furthermore, there is no known standard that addresses interoperability of these technologies. In this contribution the design of a next generation communication infrastructure for PPDR organisations which fulfills the requirements of secure and seamless end-to-end communication and interoperable information exchange within the deployed communication networks is presented. Based on Enterprise Architecture of PPDR organisations, a next generation PPDR network that is backward compatible with legacy communication technologies is designed and implemented, capable of providing security, privacy, seamless mobility, QoS and reliability support for mission-critical Private Mobile Radio (PMR) voice and broadband data services. The designed solution provides a robust, reliable, and secure mobile broadband communications system for a wide variety of PMR applications and services on PPDR broadband networks, including the ability of inter-system, interagency and cross-border operations with emphasis on interoperability between users in PMR and LTE.
Margin and sensitivity methods for security analysis of electric power systems
NASA Astrophysics Data System (ADS)
Greene, Scott L.
Reliable operation of large scale electric power networks requires that system voltages and currents stay within design limits. Operation beyond those limits can lead to equipment failures and blackouts. Security margins measure the amount by which system loads or power transfers can change before a security violation, such as an overloaded transmission line, is encountered. This thesis shows how to efficiently compute security margins defined by limiting events and instabilities, and the sensitivity of those margins with respect to assumptions, system parameters, operating policy, and transactions. Security margins to voltage collapse blackouts, oscillatory instability, generator limits, voltage constraints and line overloads are considered. The usefulness of computing the sensitivities of these margins with respect to interarea transfers, loading parameters, generator dispatch, transmission line parameters, and VAR support is established for networks as large as 1500 buses. The sensitivity formulas presented apply to a range of power system models. Conventional sensitivity formulas such as line distribution factors, outage distribution factors, participation factors and penalty factors are shown to be special cases of the general sensitivity formulas derived in this thesis. The sensitivity formulas readily accommodate sparse matrix techniques. Margin sensitivity methods are shown to work effectively for avoiding voltage collapse blackouts caused by either saddle node bifurcation of equilibria or immediate instability due to generator reactive power limits. Extremely fast contingency analysis for voltage collapse can be implemented with margin sensitivity based rankings. Interarea transfer can be limited by voltage limits, line limits, or voltage stability. The sensitivity formulas presented in this thesis apply to security margins defined by any limit criteria. A method to compute transfer margins by directly locating intermediate events reduces the total number of loadflow iterations required by each margin computation and provides sensitivity information at minimal additional cost. Estimates of the effect of simultaneous transfers on the transfer margins agree well with the exact computations for a network model derived from a portion of the U.S grid. The accuracy of the estimates over a useful range of conditions and the ease of obtaining the estimates suggest that the sensitivity computations will be of practical value.
NASA Technical Reports Server (NTRS)
Swenson, Paul
2017-01-01
Satellite/Payload Ground Systems - Typically highly-customized to a specific mission's use cases - Utilize hundreds (or thousands!) of specialized point-to-point interfaces for data flows / file transfers Documentation and tracking of these complex interfaces requires extensive time to develop and extremely high staffing costs Implementation and testing of these interfaces are even more cost-prohibitive, and documentation often lags behind implementation resulting in inconsistencies down the road With expanding threat vectors, IT Security, Information Assurance and Operational Security have become key Ground System architecture drivers New Federal security-related directives are generated on a daily basis, imposing new requirements on current / existing ground systems - These mandated activities and data calls typically carry little or no additional funding for implementation As a result, Ground System Sustaining Engineering groups and Information Technology staff continually struggle to keep up with the rolling tide of security Advancing security concerns and shrinking budgets are pushing these large stove-piped ground systems to begin sharing resources - I.e. Operational / SysAdmin staff, IT security baselines, architecture decisions or even networks / hosting infrastructure Refactoring these existing ground systems into multi-mission assets proves extremely challenging due to what is typically very tight coupling between legacy components As a result, many "Multi-Mission" ops. environments end up simply sharing compute resources and networks due to the difficulty of refactoring into true multi-mission systems Utilizing continuous integration / rapid system deployment technologies in conjunction with an open architecture messaging approach allows System Engineers and Architects to worry less about the low-level details of interfaces between components and configuration of systems GMSEC messaging is inherently designed to support multi-mission requirements, and allows components to aggregate data across multiple homogeneous or heterogeneous satellites or payloads - The highly-successful Goddard Science and Planetary Operations Control Center (SPOCC) utilizes GMSEC as the hub for it's automation and situational awareness capability Shifts focus towards getting GS to a final configuration-managed baseline, as well as multi-mission / big-picture capabilities that help increase situational awareness, promote cross-mission sharing and establish enhanced fleet management capabilities across all levels of the enterprise.
ADVANCED CERAMIC MATERIALS FOR NEXT-GENERATION NUCLEAR APPLICATIONS
DOE Office of Scientific and Technical Information (OSTI.GOV)
Marra, J.
2010-09-29
Rising global energy demands coupled with increased environmental concerns point to one solution; they must reduce their dependence on fossil fuels that emit greenhouse gases. As the global community faces the challenge of maintaining sovereign nation security, reducing greenhouse gases, and addressing climate change nuclear power will play a significant and likely growing role. In the US, nuclear energy already provides approximately one-fifth of the electricity used to power factories, offices, homes, and schools with 104 operating nuclear power plants, located at 65 sites in 31 states. Additionally, 19 utilities have applied to the US Nuclear Regulatory Commission (NRC) formore » construction and operating licenses for 26 new reactors at 17 sites. This planned growth of nuclear power is occurring worldwide and has been termed the 'nuclear renaissance.' As major industrial nations craft their energy future, there are several important factors that must be considered about nuclear energy: (1) it has been proven over the last 40 years to be safe, reliable and affordable (good for Economic Security); (2) its technology and fuel can be domestically produced or obtained from allied nations (good for Energy Security); and (3) it is nearly free of greenhouse gas emissions (good for Environmental Security). Already an important part of worldwide energy security via electricity generation, nuclear energy can also potentially play an important role in industrial processes and supporting the nation's transportation sector. Coal-to-liquid processes, the generation of hydrogen and supporting the growing potential for a greatly increased electric transportation system (i.e. cars and trains) mean that nuclear energy could see dramatic growth in the near future as we seek to meet our growing demand for energy in cleaner, more secure ways. In order to address some of the prominent issues associated with nuclear power generation (i.e., high capital costs, waste management, and proliferation), the worldwide community is working to develop and deploy new nuclear energy systems and advanced fuel cycles. These new nuclear systems address the key challenges and include: (1) extracting the full energy value of the nuclear fuel; (2) creating waste solutions with improved long term safety; (3) minimizing the potential for the misuse of the technology and materials for weapons; (4) continually improving the safety of nuclear energy systems; and (5) keeping the cost of energy affordable.« less
Healthcare teams over the Internet: programming a certificate-based approach.
Georgiadis, Christos K; Mavridis, Ioannis K; Pangalos, George I
2003-07-01
Healthcare environments are a representative case of collaborative environments since individuals (e.g. doctors) in many cases collaborate in order to provide care to patients in a more proficient way. At the same time modern healthcare institutions are increasingly interested in sharing access of their information resources in the networked environment. Healthcare applications over the Internet offer an attractive communication infrastructure at worldwide level but with a noticeably great factor of risk. Security has, therefore, become a major concern. However, although an adequate level of security can be relied upon digital certificates, if an appropriate security model is used, additional security considerations are needed in order to deal efficiently with the above team-work concerns. The already known Hybrid Access Control (HAC) security model supports and handles efficiently healthcare teams with active security capabilities and is capable to exploit the benefits of certificate technology. In this paper we present the way for encoding the appropriate authoritative information in various types of certificates, as well as the overall operational architecture of the implemented access control system for healthcare collaborative environments over the Internet. A pilot implementation of the proposed methodology in a major Greek hospital has shown the applicability of the proposals and the flexibility of the access control provided.
Healthcare teams over the Internet: towards a certificate-based approach.
Georgiadis, Christos K; Mavridis, Ioannis K; Pangalos, George I
2002-01-01
Healthcare environments are a representative case of collaborative environments since individuals (e.g. doctors) in many cases collaborate in order to provide care to patients in a more proficient way. At the same time modem healthcare institutions are increasingly interested in sharing access of their information resources in the networked environment. Healthcare applications over the Internet offer an attractive communication infrastructure at worldwide level but with a noticeably great factor of risk. Security has therefore become a major concern for healthcare applications over the Internet. However, although an adequate level of security can be relied upon digital certificates, if an appropriate security policy is used, additional security considerations are needed in order to deal efficiently with the above team-work concerns. The already known Hybrid Access Control security model supports and handles efficiently healthcare teams with active security capabilities and is capable to exploit the benefits of certificate technology. In this paper we present the way for encoding the appropriate authoritative information in various types of certificates, as well as the overall operational architecture of the implemented access control system for healthcare collaborative environments over the Internet. A pilot implementation of the proposed methodology in a major Greek hospital has shown the applicability of the proposals and the flexibility of the access control provided.
A Robust and Effective Smart-Card-Based Remote User Authentication Mechanism Using Hash Function
Odelu, Vanga; Goswami, Adrijit
2014-01-01
In a remote user authentication scheme, a remote server verifies whether a login user is genuine and trustworthy, and also for mutual authentication purpose a login user validates whether the remote server is genuine and trustworthy. Several remote user authentication schemes using the password, the biometrics, and the smart card have been proposed in the literature. However, most schemes proposed in the literature are either computationally expensive or insecure against several known attacks. In this paper, we aim to propose a new robust and effective password-based remote user authentication scheme using smart card. Our scheme is efficient, because our scheme uses only efficient one-way hash function and bitwise XOR operations. Through the rigorous informal and formal security analysis, we show that our scheme is secure against possible known attacks. We perform the simulation for the formal security analysis using the widely accepted AVISPA (Automated Validation Internet Security Protocols and Applications) tool to ensure that our scheme is secure against passive and active attacks. Furthermore, our scheme supports efficiently the password change phase always locally without contacting the remote server and correctly. In addition, our scheme performs significantly better than other existing schemes in terms of communication, computational overheads, security, and features provided by our scheme. PMID:24892078
A robust and effective smart-card-based remote user authentication mechanism using hash function.
Das, Ashok Kumar; Odelu, Vanga; Goswami, Adrijit
2014-01-01
In a remote user authentication scheme, a remote server verifies whether a login user is genuine and trustworthy, and also for mutual authentication purpose a login user validates whether the remote server is genuine and trustworthy. Several remote user authentication schemes using the password, the biometrics, and the smart card have been proposed in the literature. However, most schemes proposed in the literature are either computationally expensive or insecure against several known attacks. In this paper, we aim to propose a new robust and effective password-based remote user authentication scheme using smart card. Our scheme is efficient, because our scheme uses only efficient one-way hash function and bitwise XOR operations. Through the rigorous informal and formal security analysis, we show that our scheme is secure against possible known attacks. We perform the simulation for the formal security analysis using the widely accepted AVISPA (Automated Validation Internet Security Protocols and Applications) tool to ensure that our scheme is secure against passive and active attacks. Furthermore, our scheme supports efficiently the password change phase always locally without contacting the remote server and correctly. In addition, our scheme performs significantly better than other existing schemes in terms of communication, computational overheads, security, and features provided by our scheme.
Frohde, Kenny; Brooks, David J
Emergency management (EM) and business continuity management (BCM) frameworks incorporate various strategic and operational measures. Defined within a number of national and international standards and guidelines, such concepts may be integrated within one another to provide increased resilience to disruptive events. Nevertheless, there is a degree of dispute regarding concept integration among security and EM professionals and bodies of knowledge. In line with cognitive psychology exemplar-based concepts, such disputes may be associated with a lack of precision in communality in the approach to EM and BCM. This paper presents a two-stage study, where stage 1 critiqued national and international literature and stage 2 applied semi-structured interviews with security managers in Western Australia. Findings indicate the existence of contradictory views on EM and its integration within BCM. As such, this study concludes that EM is considered a vital component of BCM by the majority of security managers. However, there is broader dispute regarding its degree of integration. Understanding the underpinnings of such disputes will aid in raising the standards and application of professionalism within security, EM and BCM domains, supporting clarification and definition of professional boundaries.
Evolution of the JPSS Ground Project Calibration and Validation System
NASA Technical Reports Server (NTRS)
Purcell, Patrick; Chander, Gyanesh; Jain, Peyush
2016-01-01
The Joint Polar Satellite System (JPSS) is the National Oceanic and Atmospheric Administration's (NOAA) next-generation operational Earth observation Program that acquires and distributes global environmental data from multiple polar-orbiting satellites. The JPSS Program plays a critical role to NOAA's mission to understand and predict changes in weather, climate, oceans, coasts, and space environments, which supports the Nation's economy and protection of lives and property. The National Aeronautics and Space Administration (NASA) is acquiring and implementing the JPSS, comprised of flight and ground systems, on behalf of NOAA. The JPSS satellites are planned to fly in the afternoon orbit and will provide operational continuity of satellite-based observations and products for NOAA Polar-orbiting Operational Environmental Satellites (POES) and the Suomi National Polar-orbiting Partnership (SNPP) satellite. To support the JPSS Calibration and Validation (CalVal) node Government Resource for Algorithm Verification, Independent Test, and Evaluation (GRAVITE) services facilitate: Algorithm Integration and Checkout, Algorithm and Product Operational Tuning, Instrument Calibration, Product Validation, Algorithm Investigation, and Data Quality Support and Monitoring. GRAVITE is a mature, deployed system that currently supports the SNPP Mission and has been in operations since SNPP launch. This paper discusses the major re-architecture for Block 2.0 that incorporates SNPP lessons learned, architecture of the system, and demonstrates how GRAVITE has evolved as a system with increased performance. It is now a robust, stable, reliable, maintainable, scalable, and secure system that supports development, test, and production strings, replaces proprietary and custom software, uses open source software, and is compliant with NASA and NOAA standards.
Evolution of the JPSS Ground Project Calibration and Validation System
NASA Technical Reports Server (NTRS)
Chander, Gyanesh; Jain, Peyush
2014-01-01
The Joint Polar Satellite System (JPSS) is the National Oceanic and Atmospheric Administrations (NOAA) next-generation operational Earth observation Program that acquires and distributes global environmental data from multiple polar-orbiting satellites. The JPSS Program plays a critical role to NOAAs mission to understand and predict changes in weather, climate, oceans, coasts, and space environments, which supports the Nation’s economy and protection of lives and property. The National Aerospace and Atmospheric Administration (NASA) is acquiring and implementing the JPSS, comprised of flight and ground systems on behalf of NOAA. The JPSS satellites are planned to fly in the afternoon orbit and will provide operational continuity of satellite-based observations and products for NOAA Polar-orbiting Operational Environmental Satellites (POES) and the Suomi National Polar-orbiting Partnership (SNPP) satellite. To support the JPSS Calibration and Validation (CalVal) node Government Resource for Algorithm Verification, Independent Test, and Evaluation (GRAVITE) services facilitate: Algorithm Integration and Checkout, Algorithm and Product Operational Tuning, Instrument Calibration, Product Validation, Algorithm Investigation, and Data Quality Support and Monitoring. GRAVITE is a mature, deployed system that currently supports the SNPP Mission and has been in operations since SNPP launch. This paper discusses the major re-architecture for Block 2.0 that incorporates SNPP lessons learned, architecture of the system, and demonstrates how GRAVITE has evolved as a system with increased performance. It is now a robust, stable, reliable, maintainable, scalable, and secure system that supports development, test, and production strings, replaces proprietary and custom software, uses open source software, and is compliant with NASA and NOAA standards.
DOT National Transportation Integrated Search
2003-03-17
The purpose of this effort is to independently evaluate the Battelle Operational Test Team to test methods for leveraging technology and operations to improve HAZMAT transport security, safety, and operational efficiency. As such, the preceding techn...
Dataset on the Impact of GO-NGO Support on Crop Intensification and Food Security in Bangladesh.
Islam, Md Monirul; Jannat, Arifa; Dhar, Aurup Ratan
2018-06-01
The data used in this article elucidated crop intensification and farmers' food security status through GO-NGO support in Bangladesh. A total of 200 farmers (100 from non-supported and 100 from GO-NGO supported) were selected for data collection using purposive sampling technique. The collected data showed that GO-NGO support has a significant impact on changes in agricultural enterprises. Majority (63.3%) of the households belong to the low intensity category for non-supported farmers. In case of GO-NGO supported farmers, majority (73.3%) of the households belong to the high intensity category. The food security indices values showed that the food security index for non-supported farm households was 0.97 and for GO-NGO supported farm households, it was 1.07.
Fernando, Juanita
2010-01-01
This case study of 9 information technology (IT) support staff in 3 Australian (Victoria) public hospitals juxtaposes their experiences at the user-level of eHealth security in the Natural Hospital Environment with that previously reported by 26 medical, nursing and allied healthcare clinicians. IT support responsibilities comprised the entire hospital, of which clinician eHealth security needs were only part. IT staff believed their support tasks were often fragmented while work responsibilities were hampered by resources shortages. They perceived clinicians as an ongoing security risk to private health information. By comparison clinicians believed IT staff would not adequately support the private and secure application of eHealth for patient care. Preliminary data analysis suggests the tension between these cohorts manifests as an eHealth environment where silos of clinical work are disconnected from silos of IT support work. The discipline-based silos hamper health privacy outcomes. Privacy and security policies, especially those influencing the audit process, will benefit by further research of this phenomenon.
The National Carbon Capture Center at the Power Systems Development Facility
DOE Office of Scientific and Technical Information (OSTI.GOV)
None, None
2014-12-30
The National Carbon Capture Center (NCCC) at the Power Systems Development Facility supports the Department of Energy (DOE) goal of promoting the United States’ energy security through reliable, clean, and affordable energy produced from coal. Work at the NCCC supports the development of new power technologies and the continued operation of conventional power plants under CO 2 emission constraints. The NCCC includes adaptable slipstreams that allow technology development of CO 2 capture concepts using coal-derived syngas and flue gas in industrial settings. Because of the ability to operate under a wide range of flow rates and process conditions, research atmore » the NCCC can effectively evaluate technologies at various levels of maturity and accelerate their development path to commercialization. During its first contract period, from October 1, 2008, through December 30, 2014, the NCCC designed, constructed, and began operation of the Post-Combustion Carbon Capture Center (PC4). Testing of CO 2 capture technologies commenced in 2011, and through the end of the contract period, more than 25,000 hours of testing had been achieved, supporting a variety of technology developers. Technologies tested included advanced solvents, enzymes, membranes, sorbents, and associated systems. The NCCC continued operation of the existing gasification facilities, which have been in operation since 1996, to support the advancement of technologies for next-generation gasification processes and pre-combustion CO 2 capture. The gasification process operated for 13 test runs, supporting over 30,000 hours combined of both gasification and pre-combustion technology developer testing. Throughout the contract period, the NCCC incorporated numerous modifications to the facilities to accommodate technology developers and increase test capabilities. Preparations for further testing were ongoing to continue advancement of the most promising technologies for future power generation processes.« less
Post-Shuttle EVA Operations on ISS
NASA Technical Reports Server (NTRS)
West, Bill; Witt, Vincent; Chullen, Cinda
2010-01-01
The EVA hardware used to assemble and maintain the ISS was designed with the assumption that it would be returned to Earth on the Space Shuttle for ground processing, refurbishment, or failure investigation (if necessary). With the retirement of the Space Shuttle, a new concept of operations was developed to enable EVA hardware (EMU, Airlock Systems, EVA tools, and associated support equipment and consumables) to perform ISS EVAs until 2016 and possibly beyond to 2020. Shortly after the decision to retire the Space Shuttle was announced, NASA and the One EVA contractor team jointly initiated the EVA 2010 Project. Challenges were addressed to extend the operating life and certification of EVA hardware, secure the capability to launch EVA hardware safely on alternate launch vehicles, and protect EMU hardware operability on orbit for long durations.
17 CFR 240.15b7-3T - Operational capability in a Year 2000 environment.
Code of Federal Regulations, 2012 CFR
2012-04-01
... 17 Commodity and Securities Exchanges 3 2012-04-01 2012-04-01 false Operational capability in a Year 2000 environment. 240.15b7-3T Section 240.15b7-3T Commodity and Securities Exchanges SECURITIES... § 240.15b7-3T Operational capability in a Year 2000 environment. (a) This section applies to every...
17 CFR 240.15b7-3T - Operational capability in a Year 2000 environment.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 17 Commodity and Securities Exchanges 3 2011-04-01 2011-04-01 false Operational capability in a Year 2000 environment. 240.15b7-3T Section 240.15b7-3T Commodity and Securities Exchanges SECURITIES... § 240.15b7-3T Operational capability in a Year 2000 environment. (a) This section applies to every...
17 CFR 240.15b7-3T - Operational capability in a Year 2000 environment.
Code of Federal Regulations, 2013 CFR
2013-04-01
... 17 Commodity and Securities Exchanges 3 2013-04-01 2013-04-01 false Operational capability in a Year 2000 environment. 240.15b7-3T Section 240.15b7-3T Commodity and Securities Exchanges SECURITIES... § 240.15b7-3T Operational capability in a Year 2000 environment. (a) This section applies to every...
17 CFR 240.15b7-3T - Operational capability in a Year 2000 environment.
Code of Federal Regulations, 2014 CFR
2014-04-01
... 17 Commodity and Securities Exchanges 4 2014-04-01 2014-04-01 false Operational capability in a Year 2000 environment. 240.15b7-3T Section 240.15b7-3T Commodity and Securities Exchanges SECURITIES... § 240.15b7-3T Operational capability in a Year 2000 environment. (a) This section applies to every...
17 CFR 240.15b7-3T - Operational capability in a Year 2000 environment.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Operational capability in a Year 2000 environment. 240.15b7-3T Section 240.15b7-3T Commodity and Securities Exchanges SECURITIES... § 240.15b7-3T Operational capability in a Year 2000 environment. (a) This section applies to every...
National Security Technology Incubation Strategic Plan
DOE Office of Scientific and Technical Information (OSTI.GOV)
None, None
This strategic plan contains information on the vision, mission, business and technology environment, goals, objectives, and incubation process of the National Security Technology Incubation Program (NSTI) at Arrowhead Center. The development of the NSTI is a key goal of the National Security Preparedness Project (NSPP). Objectives to achieve this goal include developing incubator plans (strategic, business, action, and operations), creating an incubator environment, creating a support and mentor network for companies in the incubator program, attracting security technology businesses to the region, encouraging existing business to expand, initiating business start-ups, evaluating products and processes of the incubator program, and achievingmore » sustainability of the incubator program. With the events of 9/11, the global community faces ever increasing and emerging threats from hostile groups determined to rule by terror. According to the National Nuclear Security Administration (NNSA) Strategic Plan, the United States must be able to quickly respond and adapt to unanticipated situations as they relate to protection of our homeland and national security. Technology plays a key role in a strong national security position, and the private business community, along with the national laboratories, academia, defense and homeland security organizations, provide this technology. Fostering innovative ideas, translated into relevant technologies answering the needs of NNSA, is the purpose of the NSTI. Arrowhead Center of New Mexico State University is the operator and manager of the NSTI. To develop the NSTI, Arrowhead Center must meet the planning, development, execution, evaluation, and sustainability activities for the program and identify and incubate new technologies to assist the NNSA in meeting its mission and goals. Technology alone does not give a competitive advantage to the country, but the creativity and speed with which it is employed does. For a company to succeed, it must have sustainable competitive advantages in seven key areas: geography, products and businesses, distribution, sales and service culture, efficiency, brand, and most important, people. The four strategic goals of the plan are to: 1. Identify and recruit small businesses with technology applications for national security. 2. Design and implement a national security incubator program that provides incubator services and physical space for the targeted businesses. 3. Provide business assistance and technical leadership to NSTI clients to assist in bringing their products to market. 4. Construct a new multi-tenant facility with dedicated physical space for businesses with technology applications for national security.« less
Arno, Peter S; House, James S; Viola, Deborah; Schechter, Clyde
2011-05-01
Social Security is the most important and effective income support program ever introduced in the United States, alleviating the burden of poverty for millions of elderly Americans. We explored the possible role of Social Security in reducing mortality among the elderly. In support of this hypothesis, we found that declines in mortality among the elderly exceeded those among younger age groups following the initial implementation of Social Security in 1940, and also in the periods following marked improvements in Social Security benefits via legislation and indexing of benefits that occurred between the mid-1960s and the early 1970s. A better understanding of the link between Social Security and health status among the elderly would add a significant and missing dimension to the public discourse over the future of Social Security, and the potential role of income support programs in reducing health-related socioeconomic disparities and improving population health.
Yu, Hwan-Jeu; Lai, Hong-Shiee; Chen, Kuo-Hsin; Chou, Hsien-Cheng; Wu, Jin-Ming; Dorjgochoo, Sarangerel; Mendjargal, Adilsaikhan; Altangerel, Erdenebaatar; Tien, Yu-Wen; Hsueh, Chih-Wen; Lai, Feipei
2013-08-01
Pancreaticoduodenectomy (PD) is a major operation with high complication rate. Thereafter, patients may develop morbidity because of the complex reconstruction and loss of pancreatic parenchyma. A well-designed database is very important to address both the short-term and long-term outcomes after PD. The objective of this research was to build an international PD database implemented with security and clinical rule supporting functions, which made the data-sharing easier and improve the accuracy of data. The proposed system is a cloud-based application. To fulfill its requirements, the system comprises four subsystems: a data management subsystem, a clinical rule supporting subsystem, a short message notification subsystem, and an information security subsystem. After completing the surgery, the physicians input the data retrospectively, which are analyzed to study factors associated with post-PD common complications (delayed gastric emptying and pancreatic fistula) to validate the clinical value of this system. Currently, this database contains data from nearly 500 subjects. Five medical centers in Taiwan and two cancer centers in Mongolia are participating in this study. A data mining model of the decision tree analysis showed that elderly patients (>76 years) with pylorus-preserving PD (PPPD) have higher proportion of delayed gastric emptying. About the pancreatic fistula, the data mining model of the decision tree analysis revealed that cases with non-pancreaticogastrostomy (PG) reconstruction - body mass index (BMI)>29.65 or PG reconstruction - BMI>23.7 - non-classic PD have higher proportion of pancreatic fistula after PD. The proposed system allows medical staff to collect and store clinical data in a cloud, sharing the data with other physicians in a secure manner to achieve collaboration in research. Copyright © 2013 Elsevier Ireland Ltd. All rights reserved.
COPERNICUS - The European Union Earth Observation Programme - State of play and way ahead
NASA Astrophysics Data System (ADS)
Koch, Astrid-Christina
2015-04-01
Copernicus is the new name of the European Earth Observation Programme, GMES (Global Monitoring for Environment and Security). Copernicus or rather its predecessor was established as an EU programme. It covers all the activities for ensuring an uninterrupted provision of accurate and reliable data and information on environmental issues and security matters to users in charge of policy making, implementation and monitoring, in the EU and its Member States. Copernicus aims at providing Europe with a continuous, independent and reliable access to observation data and information. The EU investment aims at filling the observation gaps, providing access to existing assets and developing operational services. The data policy of the Copernicus programme supports an open, full and free of charge data access that is in line with the data sharing principles of the Group for Earth Observation (GEO). Copernicus is structured in six Services: Marine, Atmosphere, Land and Climate change monitoring as well as support to Emergency and Security. Copernicus uses data from satellites and in-situ sensors such as buoys, balloons or air sensors to provide timely and reliable added-value information and forecasting to support for example, agriculture and fisheries, land use and urban planning, the fight against forest fires, disaster response, maritime transport or air pollution monitoring. The need for continuing such observations is becoming critical, considering the increasing political pressure on public authorities to take informed decisions in the field of environment, security and climate change and the need to respect international agreements. Copernicus also contributes to economic stability and growth by boosting commercial applications (the so-called downstream services) in many different sectors through a full and open access to Copernicus observation data and information products. KEY WORDS: Sentinels, big data, data access, Emergency, Marine, Atmosphere.
6. Interior, rear offices: operations assistant office looking north toward ...
6. Interior, rear offices: operations assistant office looking north toward security operations officer's office. - Ellsworth Air Force Base, Rushmore Air Force Station, Security Central Control Building, Quesada Drive, Blackhawk, Meade County, SD
49 CFR 1562.25 - Fixed base operator requirements.
Code of Federal Regulations, 2011 CFR
2011-10-01
... 49 Transportation 9 2011-10-01 2011-10-01 false Fixed base operator requirements. 1562.25 Section 1562.25 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY... Operations § 1562.25 Fixed base operator requirements. (a) Security program. Each FBO must adopt and carry...
49 CFR 1562.25 - Fixed base operator requirements.
Code of Federal Regulations, 2013 CFR
2013-10-01
... 49 Transportation 9 2013-10-01 2013-10-01 false Fixed base operator requirements. 1562.25 Section 1562.25 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY... Operations § 1562.25 Fixed base operator requirements. (a) Security program. Each FBO must adopt and carry...
49 CFR 1562.25 - Fixed base operator requirements.
Code of Federal Regulations, 2012 CFR
2012-10-01
... 49 Transportation 9 2012-10-01 2012-10-01 false Fixed base operator requirements. 1562.25 Section 1562.25 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY... Operations § 1562.25 Fixed base operator requirements. (a) Security program. Each FBO must adopt and carry...
49 CFR 1562.25 - Fixed base operator requirements.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 49 Transportation 9 2010-10-01 2010-10-01 false Fixed base operator requirements. 1562.25 Section 1562.25 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY... Operations § 1562.25 Fixed base operator requirements. (a) Security program. Each FBO must adopt and carry...
Monitoring Global Food Security with New Remote Sensing Products and Tools
NASA Astrophysics Data System (ADS)
Budde, M. E.; Rowland, J.; Senay, G. B.; Funk, C. C.; Husak, G. J.; Magadzire, T.; Verdin, J. P.
2012-12-01
Global agriculture monitoring is a crucial aspect of monitoring food security in the developing world. The Famine Early Warning Systems Network (FEWS NET) has a long history of using remote sensing and crop modeling to address food security threats in the form of drought, floods, pests, and climate change. In recent years, it has become apparent that FEWS NET requires the ability to apply monitoring and modeling frameworks at a global scale to assess potential impacts of foreign production and markets on food security at regional, national, and local levels. Scientists at the U.S. Geological Survey (USGS) Earth Resources Observation and Science (EROS) Center and the University of California Santa Barbara (UCSB) Climate Hazards Group have provided new and improved data products as well as visualization and analysis tools in support of the increased mandate for remote monitoring. We present our monitoring products for measuring actual evapotranspiration (ETa), normalized difference vegetation index (NDVI) in a near-real-time mode, and satellite-based rainfall estimates and derivatives. USGS FEWS NET has implemented a Simplified Surface Energy Balance (SSEB) model to produce operational ETa anomalies for Africa and Central Asia. During the growing season, ETa anomalies express surplus or deficit crop water use, which is directly related to crop condition and biomass. We present current operational products and provide supporting validation of the SSEB model. The expedited Moderate Resolution Imaging Spectroradiometer (eMODIS) production system provides FEWS NET with an improved NDVI dataset for crop and rangeland monitoring. eMODIS NDVI provides a reliable data stream with a relatively high spatial resolution (250-m) and short latency period (less than 12 hours) which allows for better operational vegetation monitoring. We provide an overview of these data and cite specific applications for crop monitoring. FEWS NET uses satellite rainfall estimates as inputs for monitoring agricultural food production and driving crop water balance models. We present a series of derived rainfall products and provide an update on efforts to improve satellite-based estimates. We also present advancements in monitoring tools, namely, the Early Warning eXplorer (EWX) and interactive rainfall and NDVI time series viewers. The EWX is a data analysis and visualization tool that allows users to rapidly visualize multiple remote sensing datasets and compare standardized anomaly maps and time series. The interactive time series viewers allow users to analyze rainfall and NDVI time series over multiple spatial domains. New and improved data products and more targeted analysis tools are a necessity as food security monitoring requirements expand and resources become limited.
NASA Technical Reports Server (NTRS)
Buquo, Lynn; Johnson-Throop, Kathy
2010-01-01
NASA's Human Research Program (HRP) and Space Life Sciences Directorate (SLSD), not unlike many NASA organizations today, struggle with the inherent inefficiencies caused by dependencies on heterogeneous data systems and silos of data and information spread across decentralized discipline domains. The capture of operational and research-based data/information (both in-flight and ground-based) in disparate IT systems impedes the extent to which that data/information can be efficiently and securely shared, analyzed, and enriched into knowledge that directly and more rapidly supports HRP's research-focused human system risk mitigation efforts and SLSD s operationally oriented risk management efforts. As a result, an integrated effort is underway to more fully understand and document how specific sets of risk-related data/information are generated and used and in what IT systems that data/information currently resides. By mapping the risk-related data flow from raw data to useable information and knowledge (think of it as the data supply chain), HRP and SLSD are building an information architecture plan to leverage their existing, shared IT infrastructure. In addition, it is important to create a centralized structured tool to represent risks including attributes such as likelihood, consequence, contributing factors, and the evidence supporting the information in all these fields. Representing the risks in this way enables reasoning about the risks, e.g. revisiting a risk assessment when a mitigation strategy is unavailable, updating a risk assessment when new information becomes available, etc. Such a system also provides a concise way to communicate the risks both within the organization as well as with collaborators. Understanding and, hence, harnessing the human system risk-related data supply chain enhances both organizations' abilities to securely collect, integrate, and share data assets that improve human system research and operations.
2011-12-02
CAPE CANAVERAL, Fla. – NASA's Liberty Star ship departs Port Canaveral in Florida with an Orion flight test capsule secured to its deck. Liberty Star has been enlisted to support the Crew Module Recovery Attach Fitting Test (CRAFT) which began at-sea operations Nov. 29. Multiple attach clips are being evaluated against the current recovery cleat configuration by U.S. Air Force pararescue jumpers (PJs) and a U.S. Navy diver. The 21st Century Ground Systems Program will use data collected from the tests to help develop ground operations support equipment that could be used to recover an uncrewed Orion flight test capsule after splashdown. The Orion Multi-Purpose Crew Vehicle is NASA's next-generation spacecraft being developed for deep space missions to asteroids, moons and other interplanetary destinations throughout the solar system. For more information, visit http://www.nasa.gov/orion. Photo credit: NASA/Tim Jacobs
2011-12-02
CAPE CANAVERAL, Fla. – NASA's Liberty Star ship departs Port Canaveral in Florida with an Orion flight test capsule secured to its deck. Liberty Star has been enlisted to support the Crew Module Recovery Attach Fitting Test (CRAFT) which began at-sea operations Nov. 29. Multiple attach clips are being evaluated against the current recovery cleat configuration by U.S. Air Force pararescue jumpers (PJs) and a U.S. Navy diver. The 21st Century Ground Systems Program will use data collected from the tests to help develop ground operations support equipment that could be used to recover an uncrewed Orion flight test capsule after splashdown. The Orion Multi-Purpose Crew Vehicle is NASA's next-generation spacecraft being developed for deep space missions to asteroids, moons and other interplanetary destinations throughout the solar system. For more information, visit http://www.nasa.gov/orion. Photo credit: NASA/Tim Jacobs
DOT National Transportation Integrated Search
2016-05-18
This document describes the Security Management Operating Concept (SMOC) for the New York City Department of Transportation (NYCDOT) Connected Vehicle Pilot Deployment (CVPD) Project. This SMOC outlines the security mechanisms that will be used to pr...
Small Nations in Multinational Operations and Armenian Perspectives
2014-12-12
National Security Powers: Are the Checks in Balance?” In U.S. Army War College Guide to National Security Issues, Volume II: National Security Policy and...SMALL NATIONS IN MULTINATIONAL OPERATIONS AND ARMENIAN PERSPECTIVES A thesis presented to the Faculty of the U.S. Army
24 CFR 350.7 - Authority of Federal Reserve Banks as Depositories.
Code of Federal Regulations, 2010 CFR
2010-04-01
... applies, in accordance with the Securities Documentation, Federal Reserve Bank Operating Circulars, this..., Security Entitlements, and the operation of the book-entry system under this part. ...) Each Federal Reserve Bank is hereby authorized as Depository for Book-entry Ginnie Mae Securities to...
31 CFR 354.6 - Authority of Federal Reserve Banks.
Code of Federal Regulations, 2010 CFR
2010-07-01
... accordance with the Securities Documentation, and Federal Reserve Bank Operating Circulars; to service and..., Security Entitlements, and the operation of the Book-entry System under this part. ... SECURITIES OF THE STUDENT LOAN MARKETING ASSOCIATION (SALLIE MAE) § 354.6 Authority of Federal Reserve Banks...
49 CFR 1544.217 - Law enforcement personnel.
Code of Federal Regulations, 2012 CFR
2012-10-01
... operations at airports within the United States that are not required to hold a security program under part... applies to operations at airports required to hold security programs under part 1542 of this chapter. For....217 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY...
49 CFR 1544.217 - Law enforcement personnel.
Code of Federal Regulations, 2011 CFR
2011-10-01
... operations at airports within the United States that are not required to hold a security program under part... applies to operations at airports required to hold security programs under part 1542 of this chapter. For....217 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY...
49 CFR 1544.217 - Law enforcement personnel.
Code of Federal Regulations, 2014 CFR
2014-10-01
... operations at airports within the United States that are not required to hold a security program under part... applies to operations at airports required to hold security programs under part 1542 of this chapter. For....217 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY...
49 CFR 1544.217 - Law enforcement personnel.
Code of Federal Regulations, 2013 CFR
2013-10-01
... operations at airports within the United States that are not required to hold a security program under part... applies to operations at airports required to hold security programs under part 1542 of this chapter. For....217 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY...
MAVEN Information Security Governance, Risk Management, and Compliance (GRC): Lessons Learned
NASA Technical Reports Server (NTRS)
Takamura, Eduardo; Gomez-Rosa, Carlos A.; Mangum, Kevin; Wasiak, Fran
2014-01-01
As the first interplanetary mission managed by the NASA Goddard Space Flight Center, the Mars Atmosphere and Volatile EvolutioN (MAVEN) had three IT security goals for its ground system: COMPLIANCE, (IT) RISK REDUCTION, and COST REDUCTION. In a multiorganizational environment in which government, industry and academia work together in support of the ground system and mission operations, information security governance, risk management, and compliance (GRC) becomes a challenge as each component of the ground system has and follows its own set of IT security requirements. These requirements are not necessarily the same or even similar to each other's, making the auditing of the ground system security a challenging feat. A combination of standards-based information security management based on the National Institute of Standards and Technology (NIST) Risk Management Framework (RMF), due diligence by the Mission's leadership, and effective collaboration among all elements of the ground system enabled MAVEN to successfully meet NASA's requirements for IT security, and therefore meet Federal Information Security Management Act (FISMA) mandate on the Agency. Throughout the implementation of GRC on MAVEN during the early stages of the mission development, the Project faced many challenges some of which have been identified in this paper. The purpose of this paper is to document these challenges, and provide a brief analysis of the lessons MAVEN learned. The historical information documented herein, derived from an internal pre-launch lessons learned analysis, can be used by current and future missions and organizations implementing and auditing GRC.
45 CFR 303.30 - Securing medical support information.
Code of Federal Regulations, 2012 CFR
2012-10-01
... 45 Public Welfare 2 2012-10-01 2012-10-01 false Securing medical support information. 303.30 Section 303.30 Public Welfare Regulations Relating to Public Welfare OFFICE OF CHILD SUPPORT ENFORCEMENT... noncustodial parent; (4) Name and social security number of child(ren); (5) Home address of noncustodial parent...
Building Energy Management Open Source Software
DOE Office of Scientific and Technical Information (OSTI.GOV)
This is the repository for Building Energy Management Open Source Software (BEMOSS), which is an open source operating system that is engineered to improve sensing and control of equipment in small- and medium-sized commercial buildings. BEMOSS offers the following key features: (1) Open source, open architecture – BEMOSS is an open source operating system that is built upon VOLTTRON – a distributed agent platform developed by Pacific Northwest National Laboratory (PNNL). BEMOSS was designed to make it easy for hardware manufacturers to seamlessly interface their devices with BEMOSS. Software developers can also contribute to adding additional BEMOSS functionalities and applications.more » (2) Plug & play – BEMOSS was designed to automatically discover supported load controllers (including smart thermostats, VAV/RTUs, lighting load controllers and plug load controllers) in commercial buildings. (3) Interoperability – BEMOSS was designed to work with load control devices form different manufacturers that operate on different communication technologies and data exchange protocols. (4) Cost effectiveness – Implementation of BEMOSS deemed to be cost-effective as it was built upon a robust open source platform that can operate on a low-cost single-board computer, such as Odroid. This feature could contribute to its rapid deployment in small- or medium-sized commercial buildings. (5) Scalability and ease of deployment – With its multi-node architecture, BEMOSS provides a distributed architecture where load controllers in a multi-floor and high occupancy building could be monitored and controlled by multiple single-board computers hosting BEMOSS. This makes it possible for a building engineer to deploy BEMOSS in one zone of a building, be comfortable with its operation, and later on expand the deployment to the entire building to make it more energy efficient. (6) Ability to provide local and remote monitoring – BEMOSS provides both local and remote monitoring ability with role-based access control. (7) Security – In addition to built-in security features provided by VOLTTRON, BEMOSS provides enhanced security features, including BEMOSS discovery approval process, encrypted core-to-node communication, thermostat anti-tampering feature and many more. (8) Support from the Advisory Committee – BEMOSS was developed in consultation with an advisory committee from the beginning of the project. BEMOSS advisory committee comprises representatives from 22 organizations from government and industry.« less
14 CFR 294.32 - Security arrangements for operating Public Charters.
Code of Federal Regulations, 2010 CFR
2010-01-01
... (AVIATION PROCEEDINGS) ECONOMIC REGULATIONS CANADIAN CHARTER AIR TAXI OPERATORS General Rules for Registrants § 294.32 Security arrangements for operating Public Charters. When a Canadian charter air taxi... taxi operator shall meet the bonding or escrow requirements applicable to foreign air carriers as set...
14 CFR 294.32 - Security arrangements for operating Public Charters.
Code of Federal Regulations, 2011 CFR
2011-01-01
... (AVIATION PROCEEDINGS) ECONOMIC REGULATIONS CANADIAN CHARTER AIR TAXI OPERATORS General Rules for Registrants § 294.32 Security arrangements for operating Public Charters. When a Canadian charter air taxi... taxi operator shall meet the bonding or escrow requirements applicable to foreign air carriers as set...
Sea Piracy in Southeast Asia: Implications for Countering Maritime Terrorism in the United States
2006-06-01
least ten agencies that have some involvement in maritime security management with nine authorized to conduct law enforcement operations at sea...exercises, cooperating on consequence management , and sustaining capacity building operations .173 The United States has important bilateral security...Overview and Evaluation,” Journal of Homeland Security and Emergency Management 2, no. 4 (2005). 221 Frittelli, “Terminal Operators ,” 2006, 3
US-CERT Control System Center Input/Output (I/O) Conceputal Design
DOE Office of Scientific and Technical Information (OSTI.GOV)
Not Available
2005-02-01
This document was prepared for the US-CERT Control Systems Center of the National Cyber Security Division (NCSD) of the Department of Homeland Security (DHS). DHS has been tasked under the Homeland Security Act of 2002 to coordinate the overall national effort to enhance the protection of the national critical infrastructure. Homeland Security Presidential Directive HSPD-7 directs the federal departments to identify and prioritize critical infrastructure and protect it from terrorist attack. The US-CERT National Strategy for Control Systems Security was prepared by the NCSD to address the control system security component addressed in the National Strategy to Secure Cyberspace andmore » the National Strategy for the Physical Protection of Critical Infrastructures and Key Assets. The US-CERT National Strategy for Control Systems Security identified five high-level strategic goals for improving cyber security of control systems; the I/O upgrade described in this document supports these goals. The vulnerability assessment Test Bed, located in the Information Operations Research Center (IORC) facility at Idaho National Laboratory (INL), consists of a cyber test facility integrated with multiple test beds that simulate the nation's critical infrastructure. The fundamental mission of the Test Bed is to provide industry owner/operators, system vendors, and multi-agency partners of the INL National Security Division a platform for vulnerability assessments of control systems. The Input/Output (I/O) upgrade to the Test Bed (see Work Package 3.1 of the FY-05 Annual Work Plan) will provide for the expansion of assessment capabilities within the IORC facility. It will also provide capabilities to connect test beds within the Test Range and other Laboratory resources. This will allow real time I/O data input and communication channels for full replications of control systems (Process Control Systems [PCS], Supervisory Control and Data Acquisition Systems [SCADA], and components). This will be accomplished through the design and implementation of a modular infrastructure of control system, communications, networking, computing and associated equipment, and measurement/control devices. The architecture upgrade will provide a flexible patching system providing a quick ''plug and play''configuration through various communication paths to gain access to live I/O running over specific protocols. This will allow for in-depth assessments of control systems in a true-to-life environment. The full I/O upgrade will be completed through a two-phased approach. Phase I, funded by DHS, expands the capabilities of the Test Bed by developing an operational control system in two functional areas, the Science & Technology Applications Research (STAR) Facility and the expansion of various portions of the Test Bed. Phase II (see Appendix A), funded by other programs, will complete the full I/O upgrade to the facility.« less
Support system, excavation arrangement, and process of supporting an object
DOE Office of Scientific and Technical Information (OSTI.GOV)
Arnold, Bill W.
2017-08-01
A support system, an excavation arrangement, and a process of supporting an object are disclosed. The support system includes a weight-bearing device and a camming mechanism positioned below the weight-bearing device. A downward force on the weight-bearing device at least partially secures the camming mechanism to opposing surfaces. The excavation arrangement includes a borehole, a support system positioned within and secured to the borehole, and an object positioned on and supported by the support system. The process includes positioning and securing the support system and positioning the object on the weight-bearing device.