Sample records for security emerging technology

  1. 75 FR 18484 - Emerging Technology and Research Advisory Committee; Notice of Open Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-04-12

    ... Emerging Technologies Analysis. 2. ETRAC Panel on Emerging Technologies. 3. History of the Laser. 4... DEPARTMENT OF COMMERCE Bureau of Industry and Security Emerging Technology and Research Advisory Committee; Notice of Open Meeting The Emerging Technology and Research Advisory Committee (ETRAC) [[Page...

  2. 78 FR 40098 - Emerging Technology and Research Advisory Committee;

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-07-03

    ... DEPARTMENT OF COMMERCE Bureau of Industry and Security Emerging Technology and Research Advisory Committee; Notice of Partially Closed Meeting The Emerging Technology and Research Advisory Committee (ETRAC... Assistant Secretary for Export Administration on emerging technology and research activities, including...

  3. 48 CFR 39.101 - Policy.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ..., including consideration of security of resources, protection of privacy, national security and emergency... information technology, agencies shall include the appropriate information technology security policies and requirements, including use of common security configurations available from the National Institute of...

  4. 48 CFR 39.101 - Policy.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ..., including consideration of security of resources, protection of privacy, national security and emergency... information technology, agencies shall include the appropriate information technology security policies and requirements, including use of common security configurations available from the National Institute of...

  5. 48 CFR 39.101 - Policy.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ..., including consideration of security of resources, protection of privacy, national security and emergency... information technology, agencies shall include the appropriate information technology security policies and requirements, including use of common security configurations available from the National Institute of...

  6. 48 CFR 39.101 - Policy.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ..., including consideration of security of resources, protection of privacy, national security and emergency... information technology, agencies shall include the appropriate information technology security policies and requirements, including use of common security configurations available from the National Institute of...

  7. The Electronic Intrusion Threat to National Security and Emergency Preparedness (NS/EP) Telecommunications. An Awareness Document

    DTIC Science & Technology

    1999-03-01

    Responsibilities, a national security emergency is “any occurrence, including natural disaster, military attack, technological emergency, or other...in information systems increase in Russia, “the growing role of information- technology warfare is rapidly lowering the barrier between war and peace...waging war. As one Russian military theorist stated, “it is necessary to place paramount importance on technological indicators of new weapons, which are

  8. 76 FR 54734 - Emerging Technology and Research Advisory Committee; Notice of Partially Closed Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-09-02

    ... DEPARTMENT OF COMMERCE Bureau of Industry and Security Emerging Technology and Research Advisory Committee; Notice of Partially Closed Meeting The Emerging Technology and Research Advisory Committee (ETRAC... the Assistant Secretary for Export Administration on emerging technology and research activities...

  9. 76 FR 30647 - Emerging Technology and Research Advisory Committee; Notice of Partially Closed Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-05-26

    ... Introductions. 2. Member Discussion Methodology Options for Identifying Emerging Technologies. 3. Public... DEPARTMENT OF COMMERCE Bureau of Industry and Security Emerging Technology and Research Advisory Committee; Notice of Partially Closed Meeting The Emerging Technology and Research Advisory Committee (ETRAC...

  10. 76 FR 10004 - Emerging Technology and Research Advisory Committee; Notice of Partially Closed Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-02-23

    ... DEPARTMENT OF COMMERCE Bureau of Industry and Security Emerging Technology and Research Advisory Committee; Notice of Partially Closed Meeting The Emerging Technology and Research Advisory Committee (ETRAC... the Assistant Secretary for Export Administration on emerging technology and research activities...

  11. 75 FR 41439 - Emerging Technology and Research Advisory Committee; Notice of Partially Closed Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-07-16

    ... DEPARTMENT OF COMMERCE Bureau of Industry and Security Emerging Technology and Research Advisory Committee; Notice of Partially Closed Meeting The Emerging Technology and Research Advisory Committee (ETRAC... the Assistant Secretary for Export Administration on emerging technology and research activities...

  12. 77 FR 39209 - Emerging Technology and Research Advisory Committee; Notice of Open Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-07-02

    ... DEPARTMENT OF COMMERCE Bureau of Industry and Security Emerging Technology and Research Advisory Committee; Notice of Open Meeting The Emerging Technology and Research Advisory Committee (ETRAC) will meet... Secretary for Export Administration on emerging technology and research activities, including those related...

  13. 75 FR 5952 - Emerging Technology and Research Advisory Committee; Notice of Partially Closed Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-02-05

    ... DEPARTMENT OF COMMERCE Bureau of Industry and Security Emerging Technology and Research Advisory Committee; Notice of Partially Closed Meeting The Emerging Technology and Research Advisory Committee (ETRAC... Office of the Assistant Secretary for Export Administration on emerging technology and research...

  14. 75 FR 62508 - Emerging Technology and Research Advisory Committee; Notice of Partially Closed Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-10-12

    ... Noon 1. Welcome and Introductions. 2. ETRAC Member Discussion Emerging Technology Analysis. 3. Public... DEPARTMENT OF COMMERCE Bureau of Industry and Security Emerging Technology and Research Advisory Committee; Notice of Partially Closed Meeting The Emerging Technology and Research Advisory Committee (ETRAC...

  15. 75 FR 72792 - Emerging Technology and Research Advisory Committee; Notice of Partially Closed Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-11-26

    ... Noon 1. Welcome and Introductions. 2. ETRAC Member Discussion Emerging Technology Analysis. 3. Public... DEPARTMENT OF COMMERCE Bureau of Industry and Security Emerging Technology and Research Advisory Committee; Notice of Partially Closed Meeting The Emerging Technology and Research Advisory Committee (ETRAC...

  16. Technology's Role in Security.

    ERIC Educational Resources Information Center

    Day, C. William

    1999-01-01

    Examines the use of technology to bolster the school security system, tips on selecting a security consultant, and several basic strategies to make buildings and grounds safer. Technological ideas discussed include the use of telephones in classrooms to expedite care in emergency situations, surveillance cameras to reduce crime, and metal…

  17. MIT Lincoln Laboratory Annual Report 2007: Technology in Support of National Security

    DTIC Science & Technology

    2007-01-01

    technical innovation and scientific discoveries. MISSION: TechnoLogy In SupporT of naTIonaL SecurITy 2007 Dr. Claude R. Canizares Vice president for...problems. The Lincoln Laboratory New Technology Initiatives Program is one of several internal technology innovation mechanisms. Technologies emerging...externships. LIFT2, an innovative professional learning program for science, technology , and math teachers, serves Massachusetts metro south/west region

  18. A DHS Skunkworks Project: Defining and Addressing Homeland Security Grand Challenges

    DTIC Science & Technology

    2016-12-01

    Peter Diamandis, Ansari XPRIZE, market failure, technology, stealth technologies, Pasteur’s quadrant, Heilmeier Catechism, Homeland Security Advanced...Judging and Scoring ....................................................................27 D. OPTIMIZING FOR AN EMERGING MARKET ...37 Figure 3. Market /Technology Chart

  19. 2016 Emerging Technology Domains Risk Survey

    DTIC Science & Technology

    2016-04-05

    2016 Emerging Technology Domains Risk Survey Christopher King Dan Klinedinst Todd Lewellen Garret Wassermann April 2016 TECHNICAL REPORT...Unlimited [Checkoway 2011] Checkoway, Stephen; McCoy, Damon; Kantor, Brian; Anderson, Danny; Shacham, Hovav; Savage, Stefan. Comprehensive Experimental ...Koscher 2010] Koscher, Karl et al. “ Experimental Security Analysis of a Modern Automobile,” 447-462. IEEE Symposium on Security and Privacy

  20. Chemical Sniffing Instrumentation for Security Applications.

    PubMed

    Giannoukos, Stamatios; Brkić, Boris; Taylor, Stephen; Marshall, Alan; Verbeck, Guido F

    2016-07-27

    Border control for homeland security faces major challenges worldwide due to chemical threats from national and/or international terrorism as well as organized crime. A wide range of technologies and systems with threat detection and monitoring capabilities has emerged to identify the chemical footprint associated with these illegal activities. This review paper investigates artificial sniffing technologies used as chemical sensors for point-of-use chemical analysis, especially during border security applications. This article presents an overview of (a) the existing available technologies reported in the scientific literature for threat screening, (b) commercially available, portable (hand-held and stand-off) chemical detection systems, and (c) their underlying functional and operational principles. Emphasis is given to technologies that have been developed for in-field security operations, but laboratory developed techniques are also summarized as emerging technologies. The chemical analytes of interest in this review are (a) volatile organic compounds (VOCs) associated with security applications (e.g., illegal, hazardous, and terrorist events), (b) chemical "signatures" associated with human presence, and (c) threat compounds (drugs, explosives, and chemical warfare agents).

  1. Identifying Potential Implications of Technologies on Military and Security Options

    DTIC Science & Technology

    2006-06-01

    Technology Readiness Level (TRL) ratings. THE DISCUSSION Technology surprise occurs through the use of rapidly-emerging and disruptive technologies by...NATO RTB Systems Analysis and Studies Panel, Exploratory Team on the Impact of Disruptive Technologies The objectives of this task group (TG...Workshop on Emerging Disruptive Technologies and the Implications for Defence advanced the view that TTCP should examine the potential of emerging

  2. Security concept in 'MyAngelWeb' a website for the individual patient at risk of emergency.

    PubMed

    Pinciroli, F; Nahaissi, D; Boschini, M; Ferrari, R; Meloni, G; Camnasio, M; Spaggiari, P; Carnerone, G

    2000-11-01

    We describe the Security Plan for the 'MyAngelWeb' service. The different actors involved in the service are subject to different security procedures. The core of the security system is implemented at the host site by means of a DBMS and standard Information Technology tools. Hardware requirements for sustainable security are needed at the web-site construction sites. They are not needed at the emergency physician's site. At the emergency physician's site, a two-way authentication system (password and test phrase method) is implemented.

  3. Security concept in 'MyAngelWeb((R))' a website for the individual patient at risk of emergency.

    PubMed

    Pinciroli; Nahaissi; Boschini; Ferrari; Meloni; Camnasio; Spaggiari; Carnerone

    2000-11-01

    We describe the Security Plan for the 'MyAngelWeb' service. The different actors involved in the service are subject to different security procedures. The core of the security system is implemented at the host site by means of a DBMS and standard Information Technology tools. Hardware requirements for sustainable security are needed at the web-site construction sites. They are not needed at the emergency physician's site. At the emergency physician's site, a two-way authentication system (password and test phrase method) is implemented.

  4. NASA Blue Team: Determining Operational Security Posture of Critical Systems and Networks

    NASA Technical Reports Server (NTRS)

    Alley, Adam David

    2016-01-01

    Emergence of Cybersecurity has increased the focus on security risks to Information Technology (IT) assets going beyond traditional Information Assurance (IA) concerns: More sophisticated threats have emerged from increasing sources as advanced hacker tools and techniques have emerged and proliferated to broaden the attack surface available across globally interconnected networks.

  5. Emerging Technologies Program Integration Report. Volume 2. Background, Delphi and Workshop Data. Appendices

    DTIC Science & Technology

    1987-05-04

    FTIILE COP’ AD-A196 840 EMERGING TECHNOLOGIES PROGRAM INTEGRATION REPORT VOLUME II BACKGROUND, DELPHI AND WORKSHOP DATA, APPENDICES . -- PREPARED...Security Classification) Emerging Technologies Program Integration Report Volume II: Background, Delphi and Workshop Data; Appendices (U) 12 PERSONAL...volumes of this integration report assess and synthesize information gathered through a Delphi survey, defense needs prioritization workshops, and

  6. Secure, Autonomous, Intelligent Controller for Integrating Distributed Emergency Response Satellite Operations

    NASA Astrophysics Data System (ADS)

    Ivancic, W. D.; Paulsen, P. E.; Miller, E. M.; Sage, S. P.

    This report describes a Secure, Autonomous, and Intelligent Controller for Integrating Distributed Emergency Response Satellite Operations. It includes a description of current improvements to existing Virtual Mission Operations Center technology being used by US Department of Defense and originally developed under NASA funding. The report also highlights a technology demonstration performed in partnership with the United States Geological Service for Earth Resources Observation and Science using DigitalGlobe® satellites to obtain space-based sensor data.

  7. 47 CFR 202.1 - Policies.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 47 Telecommunication 5 2010-10-01 2010-10-01 false Policies. 202.1 Section 202.1 Telecommunication OFFICE OF SCIENCE AND TECHNOLOGY POLICY AND NATIONAL SECURITY COUNCIL NATIONAL SECURITY AND EMERGENCY... Office of Science and Technology Policy is the single point of authority within the Federal Government...

  8. 47 CFR 202.1 - Policies.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 47 Telecommunication 5 2011-10-01 2011-10-01 false Policies. 202.1 Section 202.1 Telecommunication OFFICE OF SCIENCE AND TECHNOLOGY POLICY AND NATIONAL SECURITY COUNCIL NATIONAL SECURITY AND EMERGENCY... Office of Science and Technology Policy is the single point of authority within the Federal Government...

  9. 47 CFR 202.1 - Policies.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 47 Telecommunication 5 2012-10-01 2012-10-01 false Policies. 202.1 Section 202.1 Telecommunication OFFICE OF SCIENCE AND TECHNOLOGY POLICY AND NATIONAL SECURITY COUNCIL NATIONAL SECURITY AND EMERGENCY... Office of Science and Technology Policy is the single point of authority within the Federal Government...

  10. 47 CFR 202.1 - Policies.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 47 Telecommunication 5 2013-10-01 2013-10-01 false Policies. 202.1 Section 202.1 Telecommunication OFFICE OF SCIENCE AND TECHNOLOGY POLICY AND NATIONAL SECURITY COUNCIL NATIONAL SECURITY AND EMERGENCY... Office of Science and Technology Policy is the single point of authority within the Federal Government...

  11. 47 CFR 202.1 - Policies.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 47 Telecommunication 5 2014-10-01 2014-10-01 false Policies. 202.1 Section 202.1 Telecommunication OFFICE OF SCIENCE AND TECHNOLOGY POLICY AND NATIONAL SECURITY COUNCIL NATIONAL SECURITY AND EMERGENCY... Office of Science and Technology Policy is the single point of authority within the Federal Government...

  12. Secure, Autonomous, Intelligent Controller for Integrating Distributed Emergency Response Satellite Operations

    NASA Technical Reports Server (NTRS)

    Ivancic, William D.; Paulsen, Phillip E.; Miller, Eric M.; Sage, Steen P.

    2013-01-01

    This report describes a Secure, Autonomous, and Intelligent Controller for Integrating Distributed Emergency Response Satellite Operations. It includes a description of current improvements to existing Virtual Mission Operations Center technology being used by US Department of Defense and originally developed under NASA funding. The report also highlights a technology demonstration performed in partnership with the United States Geological Service for Earth Resources Observation and Science using DigitalGlobe(Registered TradeMark) satellites to obtain space-based sensor data.

  13. 47 CFR 0.332 - Actions taken under delegated authority.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... safety, homeland security, national security, emergency management and preparedness, and disaster management communications—the Public Safety and Homeland Security Bureau. (d) Complaints involving equal... frequencies shared with broadcast, common carrier, or government services—Office of Engineering and Technology...

  14. Emerging Trends

    ERIC Educational Resources Information Center

    Black, James R.

    2009-01-01

    The campus security standard of care continues to evolve. Technology plays a more important role than ever before, and manufacturers want their equipment to become the solution of choice at education facilities across the nation. Campus administrators need to know more about these security technologies and how they might fit into a campus security…

  15. Examining Long Term Climate Related Security Risks through the Use of Gaming and Scenario Planning

    DTIC Science & Technology

    2016-10-24

    114 Examining Long-Term Climate-Related Security Risks through the Use of Gaming and Scenario Planning Catherine M. Schkoda, Shawna G. Cuan, and...E. D. McGrady Abstract: This paper examines four possible climate change-related security risks that emerged from an international game and scenario...potential for an emerging disparity between regions over the consensus and control of climate change-related technologies. Keywords: gaming , scenario

  16. Review: Security in Wireless Technologies in Business

    NASA Astrophysics Data System (ADS)

    Sattarova, F. Y.; Kim, Tai-Hoon

    Wireless technology seems to be everywhere now - but it is still relatively in its infancy. New standards and protocols continue to emerge and problems and bugs are discovered. Nevertheless, wireless networks make many things much more convenient and it appears that wireless networks are here to stay. The differences and similarities of wireless and wired security, the new threats brought by mobility, the security of networks and devices and effects of security, or lack of it are shortly discussed in this review paper.

  17. 7 CFR 2.95 - Director, Office of Homeland Security and Emergency Coordination.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ..., technological emergency, or any other all hazards incident. (ii) Manage the Department Emergency Operations... ensuring the safety of USDA employees, the public, and the environment resulting from USDA's use of...

  18. 7 CFR 2.95 - Director, Office of Homeland Security and Emergency Coordination.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ..., technological emergency, or any other all hazards incident. (ii) Manage the Department Emergency Operations... ensuring the safety of USDA employees, the public, and the environment resulting from USDA's use of...

  19. 7 CFR 2.95 - Director, Office of Homeland Security and Emergency Coordination.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ..., technological emergency, or any other all hazards incident. (ii) Manage the Department Emergency Operations... ensuring the safety of USDA employees, the public, and the environment resulting from USDA's use of...

  20. 7 CFR 2.95 - Director, Office of Homeland Security and Emergency Coordination.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ..., technological emergency, or any other all hazards incident. (ii) Manage the Department Emergency Operations... ensuring the safety of USDA employees, the public, and the environment resulting from USDA's use of...

  1. NATIONAL PREPAREDNESS: Integrating New and Existing Technology and Information Sharing into an Effective Homeland Security Strategy

    DTIC Science & Technology

    2002-06-07

    Continue to Develop and Refine Emerging Technology • Some of the emerging biometric devices, such as iris scans and facial recognition systems...such as iris scans and facial recognition systems, facial recognition systems, and speaker verification systems. (976301)

  2. What's in a Name?

    ERIC Educational Resources Information Center

    Petersen, Rodney

    2004-01-01

    The evolution of terms, such as computer security, network security, information security, and information assurance, appears to reflect a changing landscape, largely influenced by rapid developments in technology and the maturity of a relatively young profession and an emerging academic discipline. What lies behind the evolution of these terms?…

  3. Assessing security technology's impact: old tools for new problems.

    PubMed

    Kreissl, Reinhard

    2014-09-01

    The general idea developed in this paper from a sociological perspective is that some of the foundational categories on which the debate about privacy, security and technology rests are blurring. This process is a consequence of a blurring of physical and digital worlds. In order to define limits for legitimate use of intrusive digital technologies, one has to refer to binary distinctions such as private versus public, human versus technical, security versus insecurity to draw differences determining limits for the use of surveillance technologies. These distinctions developed in the physical world and are rooted in a cultural understanding of pre-digital culture. Attempts to capture the problems emerging with the implementation of security technologies using legal reasoning encounter a number of problems since law is by definition oriented backwards, adapting new developments to existing traditions, whereas the intrusion of new technologies in the physical world produces changes and creates fundamentally new problems.

  4. Cyber Operations: The New Balance

    DTIC Science & Technology

    2009-01-01

    compelling evidence to suggest that enlight - enment, rather than retrenchment, is the path for cyber New Balance. The economic calamity of the Great...www.guardian.co.uk/ technology /2008/ oct/02/interviews.internet>. 16 Langevin, 11. 17 James Lewis, “Cyber Security Recommen- dations for the Next...Administration,” testimony before House Subcommittee on Emerging Threats, Cyber Security, and Science and Technology , Washington, DC, September 16

  5. Emerging Technologies for Software-Reliant Systems

    DTIC Science & Technology

    2011-02-24

    needs • Loose coupling • Global distribution of hardware, software and people • Horizontal integration and convergence • Virtualization...Webinar– February 2011 © 2011 Carnegie Mellon University Global Distribution of Hardware, Software and People Globalization is an essential part of...University Required Software Engineering Emphasis Due to Emerging Technologies (2) Defensive Programming • Security • Auto-adaptation • Globalization

  6. Addressing social resistance in emerging security technologies

    PubMed Central

    Mitchener-Nissen, Timothy

    2013-01-01

    In their efforts to enhance the safety and security of citizens, governments and law enforcement agencies look to scientists and engineers to produce modern methods for preventing, detecting, and prosecuting criminal activities. Whole body scanners, lie detection technologies, biometrics, etc., are all being developed for incorporation into the criminal justice apparatus.1 Yet despite their purported security benefits these technologies often evoke social resistance. Concerns over privacy, ethics, and function-creep appear repeatedly in analyses of these technologies. It is argued here that scientists and engineers continue to pay insufficient attention to this resistance; acknowledging the presence of these social concerns yet failing to meaningfully address them. In so doing they place at risk the very technologies and techniques they are seeking to develop, for socially controversial security technologies face restrictions and in some cases outright banning. By identifying sources of potential social resistance early in the research and design process, scientists can both engage with the public in meaningful debate and modify their security technologies before deployment so as to minimize social resistance and enhance uptake. PMID:23970863

  7. On determining specifications and selections of alternative technologies for airport checked-baggage security screening.

    PubMed

    Feng, Qianmei

    2007-10-01

    Federal law mandates that every checked bag at all commercial airports be screened by explosive detection systems (EDS), explosive trace detection systems (ETD), or alternative technologies. These technologies serve as critical components of airport security systems that strive to reduce security risks at both national and global levels. To improve the operational efficiency and airport security, emerging image-based technologies have been developed, such as dual-energy X-ray (DX), backscatter X-ray (BX), and multiview tomography (MVT). These technologies differ widely in purchasing cost, maintenance cost, operating cost, processing rate, and accuracy. Based on a mathematical framework that takes into account all these factors, this article investigates two critical issues for operating screening devices: setting specifications for continuous security responses by different technologies; and selecting technology or combination of technologies for efficient 100% baggage screening. For continuous security responses, specifications or thresholds are used for classifying threat items from nonthreat items. By investigating the setting of specifications on system security responses, this article assesses the risk and cost effectiveness of various technologies for both single-device and two-device systems. The findings provide the best selection of image-based technologies for both single-device and two-device systems. Our study suggests that two-device systems outperform single-device systems in terms of both cost effectiveness and accuracy. The model can be readily extended to evaluate risk and cost effectiveness of multiple-device systems for airport checked-baggage security screening.

  8. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Happenny, Sean F.

    The United States’ power infrastructure is aging, underfunded, and vulnerable to cyber attack. Emerging smart grid technologies may take some of the burden off of existing systems and make the grid as a whole more efficient, reliable, and secure. The Pacific Northwest National Laboratory (PNNL) is funding research into several aspects of smart grid technology and grid security, creating a software simulation tool that will allow researchers to test power distribution networks utilizing different smart grid technologies to determine how the grid and these technologies react under different circumstances. Demonstrating security in embedded systems is another research area PNNL ismore » tackling. Many of the systems controlling the U.S. critical infrastructure, such as the power grid, lack integrated security and the networks protecting them are becoming easier to breach. Providing a virtual power substation network to each student team at the National Collegiate Cyber Defense Competition, thereby supporting the education of future cyber security professionals, is another way PNNL is helping to strengthen the security of the nation’s power infrastructure.« less

  9. Increasing the resilience and security of the United States' power infrastructure

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Happenny, Sean F.

    2015-08-01

    The United States' power infrastructure is aging, underfunded, and vulnerable to cyber attack. Emerging smart grid technologies may take some of the burden off of existing systems and make the grid as a whole more efficient, reliable, and secure. The Pacific Northwest National Laboratory (PNNL) is funding research into several aspects of smart grid technology and grid security, creating a software simulation tool that will allow researchers to test power infrastructure control and distribution paradigms by utilizing different smart grid technologies to determine how the grid and these technologies react under different circumstances. Understanding how these systems behave in real-worldmore » conditions will lead to new ways to make our power infrastructure more resilient and secure. Demonstrating security in embedded systems is another research area PNNL is tackling. Many of the systems controlling the U.S. critical infrastructure, such as the power grid, lack integrated security and the aging networks protecting them are becoming easier to attack.« less

  10. Safety and Security: Lessons Learned from 9/11.

    ERIC Educational Resources Information Center

    Schmitz, William J.

    2002-01-01

    Discusses issues faced by the Borough of Manhattan Community College following the September 11th terrorist attacks: the expense of recovery and budgeting for it, developing an emergency preparedness plan, the characteristics of emergency management and disaster recovery plans, technology and its role in emergency management, being prepared for…

  11. Technology Assessment and Roadmap for the Emergency Radiation Dose Assessment Program

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Turteltaub, K W; Hartman-Siantar, C; Easterly, C

    2005-10-03

    A Joint Interagency Working Group (JIWG) under the auspices of the Department of Homeland Security Office of Research and Development conducted a technology assessment of emergency radiological dose assessment capabilities as part of the overall need for rapid emergency medical response in the event of a radiological terrorist event in the United States. The goal of the evaluation is to identify gaps and recommend general research and development needs to better prepare the Country for mitigating the effects of such an event. Given the capabilities and roles for responding to a radiological event extend across many agencies, a consensus ofmore » gaps and suggested development plans was a major goal of this evaluation and road-mapping effort. The working group consisted of experts representing the Departments of Homeland Security, Health and Human Services (Centers for Disease Control and the National Institutes of Health), Food and Drug Administration, Department of Defense and the Department of Energy's National Laboratories (see appendix A for participants). The specific goals of this Technology Assessment and Roadmap were to: (1) Describe the general context for deployment of emergency radiation dose assessment tools following terrorist use of a radiological or nuclear device; (2) Assess current and emerging dose assessment technologies; and (3) Put forward a consensus high-level technology roadmap for interagency research and development in this area. This report provides a summary of the consensus of needs, gaps and recommendations for a research program in the area of radiation dosimetry for early response, followed by a summary of the technologies available and on the near-term horizon. We then present a roadmap for a research program to bring present and emerging near-term technologies to bear on the gaps in radiation dose assessment and triage. Finally we present detailed supporting discussion on the nature of the threats we considered, the status of technology today, promising emerging technologies and references for further reading.« less

  12. On the security of consumer wearable devices in the Internet of Things.

    PubMed

    Tahir, Hasan; Tahir, Ruhma; McDonald-Maier, Klaus

    2018-01-01

    Miniaturization of computer hardware and the demand for network capable devices has resulted in the emergence of a new class of technology called wearable computing. Wearable devices have many purposes like lifestyle support, health monitoring, fitness monitoring, entertainment, industrial uses, and gaming. Wearable devices are hurriedly being marketed in an attempt to capture an emerging market. Owing to this, some devices do not adequately address the need for security. To enable virtualization and connectivity wearable devices sense and transmit data, therefore it is essential that the device, its data and the user are protected. In this paper the use of novel Integrated Circuit Metric (ICMetric) technology for the provision of security in wearable devices has been suggested. ICMetric technology uses the features of a device to generate an identification which is then used for the provision of cryptographic services. This paper explores how a device ICMetric can be generated by using the accelerometer and gyroscope sensor. Since wearable devices often operate in a group setting the work also focuses on generating a group identification which is then used to deliver services like authentication, confidentiality, secure admission and symmetric key generation. Experiment and simulation results prove that the scheme offers high levels of security without compromising on resource demands.

  13. On the security of consumer wearable devices in the Internet of Things

    PubMed Central

    Tahir, Hasan; Tahir, Ruhma; McDonald-Maier, Klaus

    2018-01-01

    Miniaturization of computer hardware and the demand for network capable devices has resulted in the emergence of a new class of technology called wearable computing. Wearable devices have many purposes like lifestyle support, health monitoring, fitness monitoring, entertainment, industrial uses, and gaming. Wearable devices are hurriedly being marketed in an attempt to capture an emerging market. Owing to this, some devices do not adequately address the need for security. To enable virtualization and connectivity wearable devices sense and transmit data, therefore it is essential that the device, its data and the user are protected. In this paper the use of novel Integrated Circuit Metric (ICMetric) technology for the provision of security in wearable devices has been suggested. ICMetric technology uses the features of a device to generate an identification which is then used for the provision of cryptographic services. This paper explores how a device ICMetric can be generated by using the accelerometer and gyroscope sensor. Since wearable devices often operate in a group setting the work also focuses on generating a group identification which is then used to deliver services like authentication, confidentiality, secure admission and symmetric key generation. Experiment and simulation results prove that the scheme offers high levels of security without compromising on resource demands. PMID:29668756

  14. National Security Technology Incubator Evaluation Process

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    None, None

    This report describes the process by which the National Security Technology Incubator (NSTI) will be evaluated. The technology incubator is being developed as part of the National Security Preparedness Project (NSPP), funded by a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This report includes a brief description of the components, steps, and measures of the proposed evaluation process. The purpose of the NSPP is to promote national security technologies through business incubation, technology demonstration and validation, and workforce development. The NSTI will focus on serving businesses with national security technology applications by nurturing them through critical stages ofmore » early development. An effective evaluation process of the NSTI is an important step as it can provide qualitative and quantitative information on incubator performance over a given period. The vision of the NSTI is to be a successful incubator of technologies and private enterprise that assist the NNSA in meeting new challenges in national safety and security. The mission of the NSTI is to identify, incubate, and accelerate technologies with national security applications at various stages of development by providing hands-on mentoring and business assistance to small businesses and emerging or growing companies. To achieve success for both incubator businesses and the NSTI program, an evaluation process is essential to effectively measure results and implement corrective processes in the incubation design if needed. The evaluation process design will collect and analyze qualitative and quantitative data through performance evaluation system.« less

  15. Private quantum computation: an introduction to blind quantum computing and related protocols

    NASA Astrophysics Data System (ADS)

    Fitzsimons, Joseph F.

    2017-06-01

    Quantum technologies hold the promise of not only faster algorithmic processing of data, via quantum computation, but also of more secure communications, in the form of quantum cryptography. In recent years, a number of protocols have emerged which seek to marry these concepts for the purpose of securing computation rather than communication. These protocols address the task of securely delegating quantum computation to an untrusted device while maintaining the privacy, and in some instances the integrity, of the computation. We present a review of the progress to date in this emerging area.

  16. Cyber-Security Curricula for Basic Users

    DTIC Science & Technology

    2013-09-01

    like cyberbullying , digital cheating, and safety and security concerns‖ [7]. The need to teach security principles to this age demographic is at an...addresses the following topics: Cyberbullying , Inappropriate content, 25 Predators, Revealing too much Information, Spyware, spam, and scams. Each...emerging technology, surfing the web, video gaming, the dark side – cyberbullying . Each topic is covered by providing facts for the teacher to present

  17. Biosecurity in the age of Big Data: a conversation with the FBI

    PubMed Central

    Kozminski, Keith G.

    2015-01-01

    New scientific frontiers and emerging technologies within the life sciences pose many global challenges to society. Big Data is a premier example, especially with respect to individual, national, and international security. Here a Special Agent of the Federal Bureau of Investigation discusses the security implications of Big Data and the need for security in the life sciences. PMID:26543195

  18. Secure voice for mobile satellite applications

    NASA Technical Reports Server (NTRS)

    Vaisnys, Arvydas; Berner, Jeff

    1990-01-01

    The initial system studies are described which were performed at JPL on secure voice for mobile satellite applications. Some options are examined for adapting existing Secure Telephone Unit III (STU-III) secure telephone equipment for use over a digital mobile satellite link, as well as for the evolution of a dedicated secure voice mobile earth terminal (MET). The work has included some lab and field testing of prototype equipment. The work is part of an ongoing study at JPL for the National Communications System (NCS) on the use of mobile satellites for emergency communications. The purpose of the overall task is to identify and enable the technologies which will allow the NCS to use mobile satellite services for its National Security Emergency Preparedness (NSEP) communications needs. Various other government agencies will also contribute to a mobile satellite user base, and for some of these, secure communications will be an essential feature.

  19. A review of emerging non-volatile memory (NVM) technologies and applications

    NASA Astrophysics Data System (ADS)

    Chen, An

    2016-11-01

    This paper will review emerging non-volatile memory (NVM) technologies, with the focus on phase change memory (PCM), spin-transfer-torque random-access-memory (STTRAM), resistive random-access-memory (RRAM), and ferroelectric field-effect-transistor (FeFET) memory. These promising NVM devices are evaluated in terms of their advantages, challenges, and applications. Their performance is compared based on reported parameters of major industrial test chips. Memory selector devices and cell structures are discussed. Changing market trends toward low power (e.g., mobile, IoT) and data-centric applications create opportunities for emerging NVMs. High-performance and low-cost emerging NVMs may simplify memory hierarchy, introduce non-volatility in logic gates and circuits, reduce system power, and enable novel architectures. Storage-class memory (SCM) based on high-density NVMs could fill the performance and density gap between memory and storage. Some unique characteristics of emerging NVMs can be utilized for novel applications beyond the memory space, e.g., neuromorphic computing, hardware security, etc. In the beyond-CMOS era, emerging NVMs have the potential to fulfill more important functions and enable more efficient, intelligent, and secure computing systems.

  20. Transportation Secure Data Center Publications | Transportation Secure Data

    Science.gov Websites

    : Emerging Technologies, June 2015 Pavement Performance Evaluation Using Connected Vehicles Author: R Research Procedia, 2015 Quantification of Temperature Implications and Investigation of Battery Design Design, and Consumer Usage Authors: E. Wood, J. Neubauer, A. Brooker, J. Gonder, and K. Smith Conference

  1. The Survey on Near Field Communication.

    PubMed

    Coskun, Vedat; Ozdenizci, Busra; Ok, Kerem

    2015-06-05

    Near Field Communication (NFC) is an emerging short-range wireless communication technology that offers great and varied promise in services such as payment, ticketing, gaming, crowd sourcing, voting, navigation, and many others. NFC technology enables the integration of services from a wide range of applications into one single smartphone. NFC technology has emerged recently, and consequently not much academic data are available yet, although the number of academic research studies carried out in the past two years has already surpassed the total number of the prior works combined. This paper presents the concept of NFC technology in a holistic approach from different perspectives, including hardware improvement and optimization, communication essentials and standards, applications, secure elements, privacy and security, usability analysis, and ecosystem and business issues. Further research opportunities in terms of the academic and business points of view are also explored and discussed at the end of each section. This comprehensive survey will be a valuable guide for researchers and academicians, as well as for business in the NFC technology and ecosystem.

  2. The Survey on Near Field Communication

    PubMed Central

    Coskun, Vedat; Ozdenizci, Busra; Ok, Kerem

    2015-01-01

    Near Field Communication (NFC) is an emerging short-range wireless communication technology that offers great and varied promise in services such as payment, ticketing, gaming, crowd sourcing, voting, navigation, and many others. NFC technology enables the integration of services from a wide range of applications into one single smartphone. NFC technology has emerged recently, and consequently not much academic data are available yet, although the number of academic research studies carried out in the past two years has already surpassed the total number of the prior works combined. This paper presents the concept of NFC technology in a holistic approach from different perspectives, including hardware improvement and optimization, communication essentials and standards, applications, secure elements, privacy and security, usability analysis, and ecosystem and business issues. Further research opportunities in terms of the academic and business points of view are also explored and discussed at the end of each section. This comprehensive survey will be a valuable guide for researchers and academicians, as well as for business in the NFC technology and ecosystem. PMID:26057043

  3. Cyber security challenges in Smart Cities: Safety, security and privacy.

    PubMed

    Elmaghraby, Adel S; Losavio, Michael M

    2014-07-01

    The world is experiencing an evolution of Smart Cities. These emerge from innovations in information technology that, while they create new economic and social opportunities, pose challenges to our security and expectations of privacy. Humans are already interconnected via smart phones and gadgets. Smart energy meters, security devices and smart appliances are being used in many cities. Homes, cars, public venues and other social systems are now on their path to the full connectivity known as the "Internet of Things." Standards are evolving for all of these potentially connected systems. They will lead to unprecedented improvements in the quality of life. To benefit from them, city infrastructures and services are changing with new interconnected systems for monitoring, control and automation. Intelligent transportation, public and private, will access a web of interconnected data from GPS location to weather and traffic updates. Integrated systems will aid public safety, emergency responders and in disaster recovery. We examine two important and entangled challenges: security and privacy. Security includes illegal access to information and attacks causing physical disruptions in service availability. As digital citizens are more and more instrumented with data available about their location and activities, privacy seems to disappear. Privacy protecting systems that gather data and trigger emergency response when needed are technological challenges that go hand-in-hand with the continuous security challenges. Their implementation is essential for a Smart City in which we would wish to live. We also present a model representing the interactions between person, servers and things. Those are the major element in the Smart City and their interactions are what we need to protect.

  4. Safety First

    ERIC Educational Resources Information Center

    Taft, Darryl

    2011-01-01

    Ned Miller does not take security lightly. As director of campus safety and emergency management at the Des Moines Area Community College (DMACC), any threat requires serious consideration. As community college administrators adopt a more proactive approach to campus safety, many institutions are experimenting with emerging technologies, including…

  5. Technologies for distributed defense

    NASA Astrophysics Data System (ADS)

    Seiders, Barbara; Rybka, Anthony

    2002-07-01

    For Americans, the nature of warfare changed on September 11, 2001. Our national security henceforth will require distributed defense. One extreme of distributed defense is represented by fully deployed military troops responding to a threat from a hostile nation state. At the other extreme is a country of 'citizen soldiers', with families and communities securing their common defense through heightened awareness, engagement as good neighbors, and local support of and cooperation with local law enforcement, emergency and health care providers. Technologies - for information exploitation, biological agent detection, health care surveillance, and security - will be critical to ensuring success in distributed defense.

  6. Emerging Technology for School Security

    ERIC Educational Resources Information Center

    Doss, Kevin T.

    2012-01-01

    Locks and keys ring up huge costs for education institutions. No wonder many facility directors and public-safety directors have turned to automated access-control systems with magnetic-stripe cards, proximity cards and, most recently, smart cards. Smart cards can provide a host of on- and off-campus services beyond security. In addition to…

  7. IEEE TRANSACTIONS ON CYBERNETICS

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Craig R. RIeger; David H. Scheidt; William D. Smart

    2014-11-01

    MODERN societies depend on complex and critical infrastructures for energy, transportation, sustenance, medical care, emergency response, communications security. As computers, automation, and information technology (IT) have advanced, these technologies have been exploited to enhance the efficiency of operating the processes that make up these infrastructures

  8. Optimizing Citizen Engagement During Emergencies Through Use of Web 2.0 Technologies

    DTIC Science & Technology

    2009-03-01

    Technologies 6. AUTHOR( S ) Laurie J. Van Leuven 5. FUNDING NUMBERS 7. PERFORMING ORGANIZATION NAME( S ) AND ADDRESS(ES) Naval Postgraduate School...Monterey, CA 93943-5000 8. PERFORMING ORGANIZATION REPORT NUMBER 9. SPONSORING /MONITORING AGENCY NAME( S ) AND ADDRESS(ES) N/A 10. SPONSORING...Van Leuven Security and Emergency Management Strategic Advisor, City of Seattle B.A., University of Washington, 1998 Submitted in partial

  9. Smart Grid Demonstration Project

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Miller, Craig; Carroll, Paul; Bell, Abigail

    The National Rural Electric Cooperative Association (NRECA) organized the NRECA-U.S. Department of Energy (DOE) Smart Grid Demonstration Project (DE-OE0000222) to install and study a broad range of advanced smart grid technologies in a demonstration that spanned 23 electric cooperatives in 12 states. More than 205,444 pieces of electronic equipment and more than 100,000 minor items (bracket, labels, mounting hardware, fiber optic cable, etc.) were installed to upgrade and enhance the efficiency, reliability, and resiliency of the power networks at the participating co-ops. The objective of this project was to build a path for other electric utilities, and particularly electrical cooperatives,more » to adopt emerging smart grid technology when it can improve utility operations, thus advancing the co-ops’ familiarity and comfort with such technology. Specifically, the project executed multiple subprojects employing a range of emerging smart grid technologies to test their cost-effectiveness and, where the technology demonstrated value, provided case studies that will enable other electric utilities—particularly electric cooperatives— to use these technologies. NRECA structured the project according to the following three areas: Demonstration of smart grid technology; Advancement of standards to enable the interoperability of components; and Improvement of grid cyber security. We termed these three areas Technology Deployment Study, Interoperability, and Cyber Security. Although the deployment of technology and studying the demonstration projects at coops accounted for the largest portion of the project budget by far, we see our accomplishments in each of the areas as critical to advancing the smart grid. All project deliverables have been published. Technology Deployment Study: The deliverable was a set of 11 single-topic technical reports in areas related to the listed technologies. Each of these reports has already been submitted to DOE, distributed to co-ops, and posted for universal access at www.nreca.coop/smartgrid. This research is available for widespread distribution to both cooperative members and non-members. These reports are listed in Table 1.2. Interoperability: The deliverable in this area was the advancement of the MultiSpeak™ interoperability standard from version 4.0 to version 5.0, and improvement in the MultiSpeak™ documentation to include more than 100 use cases. This deliverable substantially expanded the scope and usability of MultiSpeak, ™ the most widely deployed utility interoperability standard, now in use by more than 900 utilities. MultiSpeak™ documentation can be accessed only at www.multispeak.org. Cyber Security: NRECA’s starting point was to develop cyber security tools that incorporated succinct guidance on best practices. The deliverables were: cyber security extensions to MultiSpeak,™ which allow more security message exchanges; a Guide to Developing a Cyber Security and Risk Mitigation Plan; a Cyber Security Risk Mitigation Checklist; a Cyber Security Plan Template that co-ops can use to create their own cyber security plans; and Security Questions for Smart Grid Vendors.« less

  10. Web technology for emergency medicine and secure transmission of electronic patient records.

    PubMed

    Halamka, J D

    1998-01-01

    The American Heritage dictionary defines the word "web" as "something intricately contrived, especially something that ensnares or entangles." The wealth of medical resources on the World Wide Web is now so extensive, yet disorganized and unmonitored, that such a definition seems fitting. In emergency medicine, for example, a field in which accurate and complete information, including patients' records, is urgently needed, more than 5000 Web pages are available today, whereas fewer than 50 were available in December 1994. Most sites are static Web pages using the Internet to publish textbook material, but new technology is extending the scope of the Internet to include online medical education and secure exchange of clinical information. This article lists some of the best Web sites for use in emergency medicine and then describes a project in which the Web is used for transmission and protection of electronic medical records.

  11. 47 CFR 202.3 - Plans preparation and execution.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 202.3 Telecommunication OFFICE OF SCIENCE AND TECHNOLOGY POLICY AND NATIONAL SECURITY COUNCIL NATIONAL... Emergencies Act (50 U.S.C. 1601). (2) The Director of the Office of Science and Technology Policy shall direct... direction of the activities of the NCS. (2) The Director of the Office of Science and Technology Policy...

  12. 47 CFR 202.3 - Plans preparation and execution.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 202.3 Telecommunication OFFICE OF SCIENCE AND TECHNOLOGY POLICY AND NATIONAL SECURITY COUNCIL NATIONAL... Emergencies Act (50 U.S.C. 1601). (2) The Director of the Office of Science and Technology Policy shall direct... direction of the activities of the NCS. (2) The Director of the Office of Science and Technology Policy...

  13. 47 CFR 202.3 - Plans preparation and execution.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 202.3 Telecommunication OFFICE OF SCIENCE AND TECHNOLOGY POLICY AND NATIONAL SECURITY COUNCIL NATIONAL... Emergencies Act (50 U.S.C. 1601). (2) The Director of the Office of Science and Technology Policy shall direct... direction of the activities of the NCS. (2) The Director of the Office of Science and Technology Policy...

  14. 47 CFR 202.3 - Plans preparation and execution.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 202.3 Telecommunication OFFICE OF SCIENCE AND TECHNOLOGY POLICY AND NATIONAL SECURITY COUNCIL NATIONAL... Emergencies Act (50 U.S.C. 1601). (2) The Director of the Office of Science and Technology Policy shall direct... direction of the activities of the NCS. (2) The Director of the Office of Science and Technology Policy...

  15. 47 CFR 202.3 - Plans preparation and execution.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 202.3 Telecommunication OFFICE OF SCIENCE AND TECHNOLOGY POLICY AND NATIONAL SECURITY COUNCIL NATIONAL... Emergencies Act (50 U.S.C. 1601). (2) The Director of the Office of Science and Technology Policy shall direct... direction of the activities of the NCS. (2) The Director of the Office of Science and Technology Policy...

  16. Secure Utilization of Beacons and UAVs in Emergency Response Systems for Building Fire Hazard

    PubMed Central

    Seo, Seung-Hyun; Choi, Jung-In; Song, Jinseok

    2017-01-01

    An intelligent emergency system for hazard monitoring and building evacuation is a very important application area in Internet of Things (IoT) technology. Through the use of smart sensors, such a system can provide more vital and reliable information to first-responders and also reduce the incidents of false alarms. Several smart monitoring and warning systems do already exist, though they exhibit key weaknesses such as a limited monitoring coverage and security, which have not yet been sufficiently addressed. In this paper, we propose a monitoring and emergency response method for buildings by utilizing beacons and Unmanned Aerial Vehicles (UAVs) on an IoT security platform. In order to demonstrate the practicability of our method, we also implement a proof of concept prototype, which we call the UAV-EMOR (UAV-assisted Emergency Monitoring and Response) system. Our UAV-EMOR system provides the following novel features: (1) secure communications between UAVs, smart sensors, the control server and a smartphone app for security managers; (2) enhanced coordination between smart sensors and indoor/outdoor UAVs to expand real-time monitoring coverage; and (3) beacon-aided rescue and building evacuation. PMID:28946659

  17. Secure Utilization of Beacons and UAVs in Emergency Response Systems for Building Fire Hazard.

    PubMed

    Seo, Seung-Hyun; Choi, Jung-In; Song, Jinseok

    2017-09-25

    An intelligent emergency system for hazard monitoring and building evacuation is a very important application area in Internet of Things (IoT) technology. Through the use of smart sensors, such a system can provide more vital and reliable information to first-responders and also reduce the incidents of false alarms. Several smart monitoring and warning systems do already exist, though they exhibit key weaknesses such as a limited monitoring coverage and security, which have not yet been sufficiently addressed. In this paper, we propose a monitoring and emergency response method for buildings by utilizing beacons and Unmanned Aerial Vehicles (UAVs) on an IoT security platform. In order to demonstrate the practicability of our method, we also implement a proof of concept prototype, which we call the UAV-EMOR (UAV-assisted Emergency Monitoring and Response) system. Our UAV-EMOR system provides the following novel features: (1) secure communications between UAVs, smart sensors, the control server and a smartphone app for security managers; (2) enhanced coordination between smart sensors and indoor/outdoor UAVs to expand real-time monitoring coverage; and (3) beacon-aided rescue and building evacuation.

  18. Neuroscience, ethics, and national security: the state of the art.

    PubMed

    Tennison, Michael N; Moreno, Jonathan D

    2012-01-01

    National security organizations in the United States, including the armed services and the intelligence community, have developed a close relationship with the scientific establishment. The latest technology often fuels warfighting and counter-intelligence capacities, providing the tactical advantages thought necessary to maintain geopolitical dominance and national security. Neuroscience has emerged as a prominent focus within this milieu, annually receiving hundreds of millions of Department of Defense dollars. Its role in national security operations raises ethical issues that need to be addressed to ensure the pragmatic synthesis of ethical accountability and national security.

  19. Overview of Accelerator Applications for Security and Defense

    DOE PAGES

    Antolak, Arlyn J.

    2015-01-01

    Particle accelerators play a key role in a broad set of defense and security applications including war-fighter and asset protection, cargo inspection, nonproliferation, materials characterization and stockpile stewardship. Accelerators can replace the high activity radioactive sources that pose a security threat for developing a radiological dispersal device and be used to produce isotopes for medical, industrial, and re-search purposes. Lastly, we present an overview of current and emerging accelerator technologies relevant to addressing the needs of defense and security.

  20. Cyber security challenges in Smart Cities: Safety, security and privacy

    PubMed Central

    Elmaghraby, Adel S.; Losavio, Michael M.

    2014-01-01

    The world is experiencing an evolution of Smart Cities. These emerge from innovations in information technology that, while they create new economic and social opportunities, pose challenges to our security and expectations of privacy. Humans are already interconnected via smart phones and gadgets. Smart energy meters, security devices and smart appliances are being used in many cities. Homes, cars, public venues and other social systems are now on their path to the full connectivity known as the “Internet of Things.” Standards are evolving for all of these potentially connected systems. They will lead to unprecedented improvements in the quality of life. To benefit from them, city infrastructures and services are changing with new interconnected systems for monitoring, control and automation. Intelligent transportation, public and private, will access a web of interconnected data from GPS location to weather and traffic updates. Integrated systems will aid public safety, emergency responders and in disaster recovery. We examine two important and entangled challenges: security and privacy. Security includes illegal access to information and attacks causing physical disruptions in service availability. As digital citizens are more and more instrumented with data available about their location and activities, privacy seems to disappear. Privacy protecting systems that gather data and trigger emergency response when needed are technological challenges that go hand-in-hand with the continuous security challenges. Their implementation is essential for a Smart City in which we would wish to live. We also present a model representing the interactions between person, servers and things. Those are the major element in the Smart City and their interactions are what we need to protect. PMID:25685517

  1. Consumer Attitudes and Perceptions on mHealth Privacy and Security: Findings From a Mixed-Methods Study.

    PubMed

    Atienza, Audie A; Zarcadoolas, Christina; Vaughon, Wendy; Hughes, Penelope; Patel, Vaishali; Chou, Wen-Ying Sylvia; Pritts, Joy

    2015-01-01

    This study examined consumers' attitudes and perceptions regarding mobile health (mHealth) technology use in health care. Twenty-four focus groups with 256 participants were conducted in 5 geographically diverse locations. Participants were also diverse in age, education, race/ethnicity, gender, and rural versus urban settings. Several key themes emerged from the focus groups. Findings suggest that consumer attitudes regarding mHealth privacy/security are highly contextualized, with concerns depending on the type of information being communicated, where and when the information is being accessed, who is accessing or seeing the information, and for what reasons. Consumers frequently considered the tradeoffs between the privacy/security of using mHealth technologies and the potential benefits. Having control over mHealth privacy/security features and trust in providers were important issues for consumers. Overall, this study found significant diversity in attitudes regarding mHealth privacy/security both within and between traditional demographic groups. Thus, to address consumers' concerns regarding mHealth privacy and security, a one-size-fits-all approach may not be adequate. Health care providers and technology developers should consider tailoring mHealth technology according to how various types of information are communicated in the health care setting, as well as according to the comfort, skills, and concerns individuals may have with mHealth technology.

  2. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Antolak, Arlyn J.

    Particle accelerators play a key role in a broad set of defense and security applications including war-fighter and asset protection, cargo inspection, nonproliferation, materials characterization and stockpile stewardship. Accelerators can replace the high activity radioactive sources that pose a security threat for developing a radiological dispersal device and be used to produce isotopes for medical, industrial, and re-search purposes. Lastly, we present an overview of current and emerging accelerator technologies relevant to addressing the needs of defense and security.

  3. Quantum technology and cryptology for information security

    NASA Astrophysics Data System (ADS)

    Naqvi, Syed; Riguidel, Michel

    2007-04-01

    Cryptology and information security are set to play a more prominent role in the near future. In this regard, quantum communication and cryptography offer new opportunities to tackle ICT security. Quantum Information Processing and Communication (QIPC) is a scientific field where new conceptual foundations and techniques are being developed. They promise to play an important role in the future of information Security. It is therefore essential to have a cross-fertilizing development between quantum technology and cryptology in order to address the security challenges of the emerging quantum era. In this article, we discuss the impact of quantum technology on the current as well as future crypto-techniques. We then analyse the assumptions on which quantum computers may operate. Then we present our vision for the distribution of security attributes using a novel form of trust based on Heisenberg's uncertainty; and, building highly secure quantum networks based on the clear transmission of single photons and/or bundles of photons able to withstand unauthorized reading as a result of secure protocols based on the observations of quantum mechanics. We argue how quantum cryptographic systems need to be developed that can take advantage of the laws of physics to provide long-term security based on solid assumptions. This requires a structured integration effort to deploy quantum technologies within the existing security infrastructure. Finally, we conclude that classical cryptographic techniques need to be redesigned and upgraded in view of the growing threat of cryptanalytic attacks posed by quantum information processing devices leading to the development of post-quantum cryptography.

  4. The Law, Digitally Speaking

    ERIC Educational Resources Information Center

    Chronicle of Higher Education, 2008

    2008-01-01

    As new technologies emerge on campuses, how can colleges avoid legal land mines? What are the areas of greatest risk, and how should higher-education leaders deal with them? In this article, three experts offered their advice at the Technology Forum: Beth Cate, associate general counsel at Indiana University, on data privacy and security; Steven…

  5. Can Economics Provide Insights into Trust Infrastructure?

    NASA Astrophysics Data System (ADS)

    Vishik, Claire

    Many security technologies require infrastructure for authentication, verification, and other processes. In many cases, viable and innovative security technologies are never adopted on a large scale because the necessary infrastructure is slow to emerge. Analyses of such technologies typically focus on their technical flaws, and research emphasizes innovative approaches to stronger implementation of the core features. However, an observation can be made that in many cases the success of adoption pattern depends on non-technical issues rather than technology-lack of economic incentives, difficulties in finding initial investment, inadequate government support. While a growing body of research is dedicated to economics of security and privacy in general, few theoretical studies in this area have been completed, and even fewer that look at the economics of “trust infrastructure” beyond simple “cost of ownership” models. This exploratory paper takes a look at some approaches in theoretical economics to determine if they can provide useful insights into security infrastructure technologies and architectures that have the best chance to be adopted. We attempt to discover if models used in theoretical economics can help inform technology developers of the optimal business models that offer a better chance for quick infrastructure deployment.

  6. Neuroscience, Ethics, and National Security: The State of the Art

    PubMed Central

    Tennison, Michael N.; Moreno, Jonathan D.

    2012-01-01

    National security organizations in the United States, including the armed services and the intelligence community, have developed a close relationship with the scientific establishment. The latest technology often fuels warfighting and counter-intelligence capacities, providing the tactical advantages thought necessary to maintain geopolitical dominance and national security. Neuroscience has emerged as a prominent focus within this milieu, annually receiving hundreds of millions of Department of Defense dollars. Its role in national security operations raises ethical issues that need to be addressed to ensure the pragmatic synthesis of ethical accountability and national security. PMID:22448146

  7. Radiological Materials Security Act

    THOMAS, 111th Congress

    Rep. Clarke, Yvette D. [D-NY-11

    2009-04-23

    House - 05/04/2009 Referred to the Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  8. Security Research on VoIP with Watermarking

    NASA Astrophysics Data System (ADS)

    Hu, Dong; Lee, Ping

    2008-11-01

    With the wide application of VoIP, many problems have occurred. One of the problems is security. The problems with securing VoIP systems, insufficient standardization and lack of security mechanisms emerged the need for new approaches and solutions. In this paper, we propose a new security architecture for VoIP which is based on digital watermarking which is a new, flexible and powerful technology that is increasingly gaining more and more attentions. Besides known applications e.g. to solve copyright protection problems, we propose to use digital watermarking to secure not only transmitted audio but also signaling protocol that VoIP is based on.

  9. Nanotechnology in a Globalized World: Strategic Assessments of an Emerging Technology

    DTIC Science & Technology

    2014-06-01

    neoclassical microeconomic tenets underpinning the market-driven, laissez faire view.180 These theories argue that technology, rather than capital and foreign...V. Technological Innovation and Leadership in a Globalized World .................................................... 59   National...nanotechnology with respect to U.S. national security and leadership and means for managing them, the report begins with an examination of some of nanotech’s

  10. International Workshop on Gamma Aluminide Alloy Technology. Section Three

    DTIC Science & Technology

    1997-04-18

    Structure / Property Relationships General Mechanical Behavior Tensile Fracture Toughness Creep Fatigue; FCG, Inverse Ductility/FT Relationship...Workshop on Gamma Titanium Aluminide Alloy Technology. 1 May 1996-3 May 1996 The Topics covered include: Fundamental research issues for...understanding the emerging class of Gamma Titanium Aluminide Alloy Technologies 14. SUBJECT TERMS 15. NUMBER OF PAGES 16. PRICE CODE N/A 17. SECURITY

  11. Privacy, security, and the public health researcher in the era of electronic health record research

    PubMed Central

    Sarwate, Anand D.

    2016-01-01

    Health data derived from electronic health records are increasingly utilized in large-scale population health analyses. Going hand in hand with this increase in data is an increasing number of data breaches. Ensuring privacy and security of these data is a shared responsibility between the public health researcher, collaborators, and their institutions. In this article, we review the requirements of data privacy and security and discuss epidemiologic implications of emerging technologies from the computer science community that can be used for health data. In order to ensure that our needs as researchers are captured in these technologies, we must engage in the dialogue surrounding the development of these tools. PMID:28210428

  12. Privacy, security, and the public health researcher in the era of electronic health record research.

    PubMed

    Goldstein, Neal D; Sarwate, Anand D

    2016-01-01

    Health data derived from electronic health records are increasingly utilized in large-scale population health analyses. Going hand in hand with this increase in data is an increasing number of data breaches. Ensuring privacy and security of these data is a shared responsibility between the public health researcher, collaborators, and their institutions. In this article, we review the requirements of data privacy and security and discuss epidemiologic implications of emerging technologies from the computer science community that can be used for health data. In order to ensure that our needs as researchers are captured in these technologies, we must engage in the dialogue surrounding the development of these tools.

  13. Emerging Agricultural Biotechnologies for Sustainable Agriculture and Food Security.

    PubMed

    Anderson, Jennifer A; Gipmans, Martijn; Hurst, Susan; Layton, Raymond; Nehra, Narender; Pickett, John; Shah, Dilip M; Souza, Thiago Lívio P O; Tripathi, Leena

    2016-01-20

    As global populations continue to increase, agricultural productivity will be challenged to keep pace without overtaxing important environmental resources. A dynamic and integrated approach will be required to solve global food insecurity and position agriculture on a trajectory toward sustainability. Genetically modified (GM) crops enhanced through modern biotechnology represent an important set of tools that can promote sustainable agriculture and improve food security. Several emerging biotechnology approaches were discussed in a recent symposium organized at the 13th IUPAC International Congress of Pesticide Chemistry meeting in San Francisco, CA, USA. This paper summarizes the innovative research and several of the new and emerging technologies within the field of agricultural biotechnology that were presented during the symposium. This discussion highlights how agricultural biotechnology fits within the context of sustainable agriculture and improved food security and can be used in support of further development and adoption of beneficial GM crops.

  14. National Labs and Nuclear Emergency Response

    NASA Astrophysics Data System (ADS)

    Budil, Kimberly

    2015-04-01

    The DOE national laboratories, and in particular the three NNSA national security laboratories, have long supported a broad suite of national nuclear security missions for the U.S. government. The capabilities, infrastructure and base of expertise developed to support the U.S. nuclear weapons stockpile have been applied to such challenges as stemming nuclear proliferation, understanding the nuclear capabilities of adversaries, and assessing and countering nuclear threats including essential support to nuclear emergency response. This talk will discuss the programs that are underway at the laboratories and the essential role that science and technology plays therein. Nuclear scientists provide expertise, fundamental understanding of nuclear materials, processes and signatures, and tools and technologies to aid in the identification and mitigation of nuclear threats as well as consequence management. This talk will also discuss the importance of direct engagement with the response community, which helps to shape research priorities and to enable development of useful tools and techniques for responders working in the field. National Labs and Nuclear Emergency Response.

  15. National Security Technology Incubation Strategic Plan

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    None, None

    This strategic plan contains information on the vision, mission, business and technology environment, goals, objectives, and incubation process of the National Security Technology Incubation Program (NSTI) at Arrowhead Center. The development of the NSTI is a key goal of the National Security Preparedness Project (NSPP). Objectives to achieve this goal include developing incubator plans (strategic, business, action, and operations), creating an incubator environment, creating a support and mentor network for companies in the incubator program, attracting security technology businesses to the region, encouraging existing business to expand, initiating business start-ups, evaluating products and processes of the incubator program, and achievingmore » sustainability of the incubator program. With the events of 9/11, the global community faces ever increasing and emerging threats from hostile groups determined to rule by terror. According to the National Nuclear Security Administration (NNSA) Strategic Plan, the United States must be able to quickly respond and adapt to unanticipated situations as they relate to protection of our homeland and national security. Technology plays a key role in a strong national security position, and the private business community, along with the national laboratories, academia, defense and homeland security organizations, provide this technology. Fostering innovative ideas, translated into relevant technologies answering the needs of NNSA, is the purpose of the NSTI. Arrowhead Center of New Mexico State University is the operator and manager of the NSTI. To develop the NSTI, Arrowhead Center must meet the planning, development, execution, evaluation, and sustainability activities for the program and identify and incubate new technologies to assist the NNSA in meeting its mission and goals. Technology alone does not give a competitive advantage to the country, but the creativity and speed with which it is employed does. For a company to succeed, it must have sustainable competitive advantages in seven key areas: geography, products and businesses, distribution, sales and service culture, efficiency, brand, and most important, people. The four strategic goals of the plan are to: 1. Identify and recruit small businesses with technology applications for national security. 2. Design and implement a national security incubator program that provides incubator services and physical space for the targeted businesses. 3. Provide business assistance and technical leadership to NSTI clients to assist in bringing their products to market. 4. Construct a new multi-tenant facility with dedicated physical space for businesses with technology applications for national security.« less

  16. Technologies for security, military police and professional policing organizations, the Department of Energy perspective

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Steele, B.J.

    1996-12-31

    There are many technologies emerging from this decade that can be used to help the law enforcement community protect the public as well as public and private facilities against ever increasing threats to this country and its resources. These technologies include sensors, closed circuit television (CCTV), access control, contraband detection, communications, control and display, barriers, and various component and system modeling techniques. This paper will introduce some of the various technologies that have been examined for the Department of Energy that could be applied to various law enforcement applications. They include: (1) scannerless laser radar; (2) next generation security systems;more » (3) response force video information helmet system; (4) access delay technologies; (5) rapidly deployable intrusion detection systems; and (6) cost risk benefit analysis.« less

  17. Information Dominance: Special Operations Forces in MOOTW.

    DTIC Science & Technology

    1997-04-15

    threats to our national security. In a rapidly changing world, S0F must be affordable yet technologically advanced to fully support emerging operational concepts and achieve critical information dominance for America in MOOTW.

  18. ASPECT (Airborne Spectral Photometric Environmental Collection Technology) Fact Sheet

    EPA Pesticide Factsheets

    This multi-sensor screening tool provides infrared and photographic images with geospatial, chemical, and radiological data within minutes to support emergency responses, home-land security missions, environmental surveys, and climate monitoring missions.

  19. Securing health sensing using integrated circuit metric.

    PubMed

    Tahir, Ruhma; Tahir, Hasan; McDonald-Maier, Klaus

    2015-10-20

    Convergence of technologies from several domains of computing and healthcare have aided in the creation of devices that can help health professionals in monitoring their patients remotely. An increase in networked healthcare devices has resulted in incidents related to data theft, medical identity theft and insurance fraud. In this paper, we discuss the design and implementation of a secure lightweight wearable health sensing system. The proposed system is based on an emerging security technology called Integrated Circuit Metric (ICMetric) that extracts the inherent features of a device to generate a unique device identification. In this paper, we provide details of how the physical characteristics of a health sensor can be used for the generation of hardware "fingerprints". The obtained fingerprints are used to deliver security services like authentication, confidentiality, secure admission and symmetric key generation. The generated symmetric key is used to securely communicate the health records and data of the patient. Based on experimental results and the security analysis of the proposed scheme, it is apparent that the proposed system enables high levels of security for health monitoring in resource optimized manner.

  20. Securing Health Sensing Using Integrated Circuit Metric

    PubMed Central

    Tahir, Ruhma; Tahir, Hasan; McDonald-Maier, Klaus

    2015-01-01

    Convergence of technologies from several domains of computing and healthcare have aided in the creation of devices that can help health professionals in monitoring their patients remotely. An increase in networked healthcare devices has resulted in incidents related to data theft, medical identity theft and insurance fraud. In this paper, we discuss the design and implementation of a secure lightweight wearable health sensing system. The proposed system is based on an emerging security technology called Integrated Circuit Metric (ICMetric) that extracts the inherent features of a device to generate a unique device identification. In this paper, we provide details of how the physical characteristics of a health sensor can be used for the generation of hardware “fingerprints”. The obtained fingerprints are used to deliver security services like authentication, confidentiality, secure admission and symmetric key generation. The generated symmetric key is used to securely communicate the health records and data of the patient. Based on experimental results and the security analysis of the proposed scheme, it is apparent that the proposed system enables high levels of security for health monitoring in resource optimized manner. PMID:26492250

  1. Evolving telemedicine/ehealth technology.

    PubMed

    Ferrante, Frank E

    2005-06-01

    This paper describes emerging technologies to support a rapidly changing and expanding scope of telemedicine/telehealth applications. Of primary interest here are wireless systems, emerging broadband, nanotechnology, intelligent agent applications, and grid computing. More specifically, the paper describes the changes underway in wireless designs aimed at enhancing security; some of the current work involving the development of nanotechnology applications and research into the use of intelligent agents/artificial intelligence technology to establish what are termed "Knowbots"; and a sampling of the use of Web services, such as grid computing capabilities, to support medical applications. In addition, the expansion of these technologies and the need for cost containment to sustain future health care for an increasingly mobile and aging population is discussed.

  2. Playful biometrics: controversial technology through the lens of play.

    PubMed

    Ellerbrok, Ariane

    2011-01-01

    This article considers the role of play in the context of technological emergence and expansion, particularly as it relates to recently emerging surveillance technologies. As a case study, I consider the trajectory of automated face recognition—a biometric technology of numerous applications, from its more controversial manifestations under the rubric of national security to a clearly emerging orientation toward play. This shift toward “playful” biometrics—or from a technology traditionally coded as “hard” to one now increasingly coded as “soft”—is critical insofar as it renders problematic the traditional modes of critique that have, up until this point, challenged the expansion of biometric systems into increasingly ubiquitous realms of everyday life. In response to this dynamic, I propose theorizing the expansion of face recognition specifically in relation to “play,” a step that allows us to broaden the critical space around newly emerging playful biometrics, as well as playful surveillance more generally. In addition, play may also have relevance for theorizing other forms of controversial technology, particularly given its potential role in processes of obfuscation, normalization, and marginalization.

  3. Homeland Security Cyber and Physical Infrastructure Protection Act of 2010

    THOMAS, 111th Congress

    Rep. Thompson, Bennie G. [D-MS-2

    2010-11-17

    House - 11/23/2010 Referred to the Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  4. Information-Flow-Based Access Control for Web Browsers

    NASA Astrophysics Data System (ADS)

    Yoshihama, Sachiko; Tateishi, Takaaki; Tabuchi, Naoshi; Matsumoto, Tsutomu

    The emergence of Web 2.0 technologies such as Ajax and Mashup has revealed the weakness of the same-origin policy[1], the current de facto standard for the Web browser security model. We propose a new browser security model to allow fine-grained access control in the client-side Web applications for secure mashup and user-generated contents. We propose a browser security model that is based on information-flow-based access control (IBAC) to overcome the dynamic nature of the client-side Web applications and to accurately determine the privilege of scripts in the event-driven programming model.

  5. Understanding How the "Open" of Open Source Software (OSS) Will Improve Global Health Security.

    PubMed

    Hahn, Erin; Blazes, David; Lewis, Sheri

    2016-01-01

    Improving global health security will require bold action in all corners of the world, particularly in developing settings, where poverty often contributes to an increase in emerging infectious diseases. In order to mitigate the impact of emerging pandemic threats, enhanced disease surveillance is needed to improve early detection and rapid response to outbreaks. However, the technology to facilitate this surveillance is often unattainable because of high costs, software and hardware maintenance needs, limited technical competence among public health officials, and internet connectivity challenges experienced in the field. One potential solution is to leverage open source software, a concept that is unfortunately often misunderstood. This article describes the principles and characteristics of open source software and how it may be applied to solve global health security challenges.

  6. Web Service Execution and Monitoring in Integrated Applications in Support of Business Communities

    NASA Astrophysics Data System (ADS)

    Chiriacescu, Rares M.; SzóKe, Alexandru; Portase, Sorin; Florea, Monica

    Emerging technology is one of the key factors that drive the business world to faster adaptation, reaction and shorter communication path. Building upon such technologies, business communities emerge, geared toward high flexibility in their offerings and collaboration: business-to-customer and business-to-business collaborations. Adapting to the market requirements, companies must address several technical challenges that arise from the main requirements of the system they have to introduce: a high degree of flexibility, heterogeneous system collaboration and security of the transferred data.

  7. PREFACE: 1st International Conference on Sensing for Industry, Control, Communication & Security Technologies

    NASA Astrophysics Data System (ADS)

    Shuja Syed, Ahmed

    2013-12-01

    The 1st International Conference on Sensing for Industry, Control, Communication & Security Technologies (ICSICCST-2013), took place in Karachi, Pakistan, from 24-26 June 2013. It was organized by Indus University, Karachi, in collaboration with HEJ Research Institute of Chemistry, University of Karachi, Karachi. More than 80 abstracts were submitted to the conference and were double blind-reviewed by an international scientific committee. The topics of the Conference were: Video, Image & Voice Sensing Sensing for Industry, Environment, and Health Automation and Controls Laser Sensors and Systems Displays for Innovative Applications Emerging Technologies Unmanned, Robotic, and Layered Systems Sensing for Defense, Homeland Security, and Law Enforcement The title of the conference, 'Sensing for Industry, Control, Communication & Security Technologies' is very apt in capturing the main issues facing the industry of Pakistan and the world. We believe the sensing industry, particularly in Pakistan, is currently at a critical juncture of its development. The future of the industry will depend on how the industry players choose to respond to the challenge of global competition and opportunities arising from strong growth in the Asian region for which we are pleased to note that the conference covered a comprehensive spectrum of issues with an international perspective. This will certainly assist industry players to make informed decisions in shaping the future of the industry. The conference gathered qualified researchers from developed countries like USA, UK, Sweden, Saudi Arabia, China, South Korea and Malaysia etc whose expertise resulting from the research can be drawn upon to build an exploitable area of new technology that has potential Defense, Homeland Security, and Military applicability. More than 250 researchers/students attended the event and made the event great success as the turnout was 100%. An exceptional line-up of speakers spoke at the occasion. We want to thank the Organizing Committee, the Institutions and Sponsors supporting the Conference, especially 'Centre for Emerging Sciences, Engineering & Technology (CESET), Islamabad', the IOP Publishers and everyone who contributed to the organization of this meeting, for their invaluable efforts to make this event a great success. Professor Dr Ahmed Shuja Syed Chief Editor The PDF also contains lists of the boards, committees and sponsors.

  8. Worldwide Emerging Environmental Issues Affecting the U.S. Military. January 2010 Report

    DTIC Science & Technology

    2010-01-01

    key farmland in Africa on a long-term basis. The report notes that it is critical to ensure that such contracts promote shared food security ...Technological Advances with Environmental Security Implications………………..4 6.1 New Detection and Cleanup Techniques…………………………………………...…4 6.2...Regulatory Regime might be adjusted to Include Nanomaterials…..6 7.2 Monopoly over Rare Earth Elements Raises Security and Environmental Concerns…..7

  9. Laboratory Directed Research and Development FY2010 Annual Report

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Jackson, K J

    2011-03-22

    A premier applied-science laboratory, Lawrence Livermore National Laboratory (LLNL) has at its core a primary national security mission - to ensure the safety, security, and reliability of the nation's nuclear weapons stockpile without nuclear testing, and to prevent and counter the spread and use of weapons of mass destruction: nuclear, chemical, and biological. The Laboratory uses the scientific and engineering expertise and facilities developed for its primary mission to pursue advanced technologies to meet other important national security needs - homeland defense, military operations, and missile defense, for example - that evolve in response to emerging threats. For broader nationalmore » needs, LLNL executes programs in energy security, climate change and long-term energy needs, environmental assessment and management, bioscience and technology to improve human health, and for breakthroughs in fundamental science and technology. With this multidisciplinary expertise, the Laboratory serves as a science and technology resource to the U.S. government and as a partner with industry and academia. This annual report discusses the following topics: (1) Advanced Sensors and Instrumentation; (2) Biological Sciences; (3) Chemistry; (4) Earth and Space Sciences; (5) Energy Supply and Use; (6) Engineering and Manufacturing Processes; (7) Materials Science and Technology; Mathematics and Computing Science; (8) Nuclear Science and Engineering; and (9) Physics.« less

  10. 47 CFR 211.2 - Definitions.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 47 Telecommunication 5 2012-10-01 2012-10-01 false Definitions. 211.2 Section 211.2 Telecommunication OFFICE OF SCIENCE AND TECHNOLOGY POLICY AND NATIONAL SECURITY COUNCIL EMERGENCY RESTORATION PRIORITY PROCEDURES FOR TELECOMMUNICATIONS SERVICES § 211.2 Definitions. The following definitions apply...

  11. 47 CFR 211.0 - Purpose.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... OFFICE OF SCIENCE AND TECHNOLOGY POLICY AND NATIONAL SECURITY COUNCIL EMERGENCY RESTORATION PRIORITY PROCEDURES FOR TELECOMMUNICATIONS SERVICES § 211.0 Purpose. This part establishes policies and procedures.... 820), policies, plans, and procedures developed pursuant to the Executive order shall be in consonance...

  12. 47 CFR 211.0 - Purpose.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... OFFICE OF SCIENCE AND TECHNOLOGY POLICY AND NATIONAL SECURITY COUNCIL EMERGENCY RESTORATION PRIORITY PROCEDURES FOR TELECOMMUNICATIONS SERVICES § 211.0 Purpose. This part establishes policies and procedures.... 820), policies, plans, and procedures developed pursuant to the Executive order shall be in consonance...

  13. 47 CFR 211.0 - Purpose.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... OFFICE OF SCIENCE AND TECHNOLOGY POLICY AND NATIONAL SECURITY COUNCIL EMERGENCY RESTORATION PRIORITY PROCEDURES FOR TELECOMMUNICATIONS SERVICES § 211.0 Purpose. This part establishes policies and procedures.... 820), policies, plans, and procedures developed pursuant to the Executive order shall be in consonance...

  14. 47 CFR 211.2 - Definitions.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 47 Telecommunication 5 2010-10-01 2010-10-01 false Definitions. 211.2 Section 211.2 Telecommunication OFFICE OF SCIENCE AND TECHNOLOGY POLICY AND NATIONAL SECURITY COUNCIL EMERGENCY RESTORATION PRIORITY PROCEDURES FOR TELECOMMUNICATIONS SERVICES § 211.2 Definitions. The following definitions apply...

  15. 47 CFR 211.2 - Definitions.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 47 Telecommunication 5 2013-10-01 2013-10-01 false Definitions. 211.2 Section 211.2 Telecommunication OFFICE OF SCIENCE AND TECHNOLOGY POLICY AND NATIONAL SECURITY COUNCIL EMERGENCY RESTORATION PRIORITY PROCEDURES FOR TELECOMMUNICATIONS SERVICES § 211.2 Definitions. The following definitions apply...

  16. 47 CFR 211.0 - Purpose.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... OFFICE OF SCIENCE AND TECHNOLOGY POLICY AND NATIONAL SECURITY COUNCIL EMERGENCY RESTORATION PRIORITY PROCEDURES FOR TELECOMMUNICATIONS SERVICES § 211.0 Purpose. This part establishes policies and procedures.... 820), policies, plans, and procedures developed pursuant to the Executive order shall be in consonance...

  17. 47 CFR 211.2 - Definitions.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 47 Telecommunication 5 2011-10-01 2011-10-01 false Definitions. 211.2 Section 211.2 Telecommunication OFFICE OF SCIENCE AND TECHNOLOGY POLICY AND NATIONAL SECURITY COUNCIL EMERGENCY RESTORATION PRIORITY PROCEDURES FOR TELECOMMUNICATIONS SERVICES § 211.2 Definitions. The following definitions apply...

  18. 47 CFR 211.0 - Purpose.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... OFFICE OF SCIENCE AND TECHNOLOGY POLICY AND NATIONAL SECURITY COUNCIL EMERGENCY RESTORATION PRIORITY PROCEDURES FOR TELECOMMUNICATIONS SERVICES § 211.0 Purpose. This part establishes policies and procedures.... 820), policies, plans, and procedures developed pursuant to the Executive order shall be in consonance...

  19. 47 CFR 211.2 - Definitions.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 47 Telecommunication 5 2014-10-01 2014-10-01 false Definitions. 211.2 Section 211.2 Telecommunication OFFICE OF SCIENCE AND TECHNOLOGY POLICY AND NATIONAL SECURITY COUNCIL EMERGENCY RESTORATION PRIORITY PROCEDURES FOR TELECOMMUNICATIONS SERVICES § 211.2 Definitions. The following definitions apply...

  20. IEC 61850: Technology Standards and Cyber-Security Threats

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Youssef, Tarek A; El Hariri, mohamed; Bugay, Nicole

    Substations constitute a fundamental part in providing reliable electricity to consumers. For a substation to maintain electricity reliability and its own real-time operability, communication between its components is inevitable. Before the emergence of IEC 61850, inter-substation communication was established via expensive copper wires with limited capabilities. IEC 61850 is the standard set by the International Electrotechnical Commission (IEC) Technical Committee Number 57 Working Group 10 and IEEE for Ethernet (IEEE 802.3)-based communication in electrical substations. Like many power grid systems standards, IEC 61850 was set without extensive consideration for critical security measures. This paper discusses IEC 61850 technology standards andmore » applications thoroughly and points out major security vulnerabilities it introduces in the context of current cyber-physical smart grid systems.« less

  1. Management of toxic substances and hazardous wastes.

    PubMed

    Niemela, V E

    1984-08-01

    This paper describes the extent of the hazardous and toxic chemical waste problems in Canada and discusses the management, treatment, and disposal methods commonly used in North America and Europe. The treatment and disposal techniques covered are biological, physical-chemical, incineration technologies, and secure land disposal. Some of the available and emerging technologies for destruction of polychlorinated biphenyls are also described.

  2. Integrating Information Assurance and Security into IT Education: A Look at the Model Curriculum and Emerging Practice

    ERIC Educational Resources Information Center

    Dark, Melissa Jane; Ekstrom, Joseph J.; Lunt, Barry M.

    2006-01-01

    In December 2001 a meeting of interested parties from fifteen four-year IT programs from the US along with representatives from IEEE, ACM, and ABET (CITC-1) began work on the formalization of Information Technology as an accredited academic discipline. The effort has evolved into SIGITE, the ACM SIG for Information Technology Education. During…

  3. Technology transfer: Transportation

    NASA Technical Reports Server (NTRS)

    Anyos, T.; Christy, L.; Lizak, R.; Wilhelm, J.

    1978-01-01

    The successful application of aerospace technology to problems related to highways and rail and rapid transit systems is described with emphasis on the use of corrosion resistant paints, fire retardant materials, and law enforcement. Possible areas for the use of spinoff from NASA technology by the California State Department of Corrections are identified. These include drug detection, security and warning systems, and the transportation and storage of food. A communication system for emergency services is also described.

  4. Statistical Relational Learning (SRL) as an Enabling Technology for Data Acquisition and Data Fusion in Video

    DTIC Science & Technology

    2013-05-02

    REPORT Statistical Relational Learning ( SRL ) as an Enabling Technology for Data Acquisition and Data Fusion in Video 14. ABSTRACT 16. SECURITY...particular, it is important to reason about which portions of video require expensive analysis and storage. This project aims to make these...inferences using new and existing tools from Statistical Relational Learning ( SRL ). SRL is a recently emerging technology that enables the effective 1

  5. Cyber Science, Biometrics and Digital Forensics: Workshop on Emerging Cyber Techniques and Technologies

    DTIC Science & Technology

    2016-09-07

    and the University of Southern California through have been collaborating on a proposal led by Florida International University’s School of Computing...security. We will develop an action plan to identify needs, assess vulnerabilities and address disruptive technologies that could clearly provide a ...Institute of Technology and his Bachelor of Science degree in Aerospace Engineering, Polytechnic University of New York. Mr. Hurtado is a member of the

  6. Contemporary, emerging, and ratified wireless security standards: an update for the networked dental office.

    PubMed

    Mupparapu, Muralidhar

    2006-02-15

    Wireless networking is not new to contemporary dental offices around the country. Wireless routers and network cards have made access to patient records within the office handy and, thereby, saving valuable chair side time and increasing productivity. As is the case with any rapidly developing technology, wireless technology also changes with the same rate. Unless, the users of the wireless networking understand the implications of these changes and keep themselves updated periodically, the office network will become obsolete very quickly. This update of the emerging security protocols and pertaining to ratified wireless 802.11 standards will be timely for the contemporary dentist whose office is wirelessly networked. This article brings the practicing dentist up-to-date on the newer versions and standards in wireless networking that are changing at a fast pace. The introduction of newer 802.11 standards like super G, Super AG, Multiple Input Multiple Output (MIMO), and pre-n are changing the pace of adaptation of this technology. Like any other rapidly transforming technology, information pertaining to wireless networking should be a priority for the contemporary dentist, an eventual end-user in order to be a well-informed and techno-savvy consumer.

  7. Achieving household nutrition security in societies in transition: an overview.

    PubMed

    Gopalan, C

    2001-01-01

    The achievement of nutrition security at the household level involves adequacy of food supply at the national level and equitable distribution of food among the population in accordance with their physiological needs. The emergence of globalization and market liberalization and the increasing power of some transnational corporations that are advocating pharmaceutical shortcuts have raised concerns in many developing countries. In order to achieve adequacy of food production, earlier mistakes (such as a reliance on unsustainable new technologies) need to be corrected and the resultant imbalances with respect to food production need to be reversed. Emerging new technologies, including genetic modifications, need to be effectively harnessed and adapted with due consideration to safety and sustainability. There is a need to collect convincing evidence of the efficacy and safety of genetically modified foods before they can gain general public acceptance. Information technology will play an important role in future programmes of food production and developing countries must strive to achieve access to this technology. There is considerable scope and need for the expansion of agro-based industries in villages and townships. This could create job opportunities and could also lead to better production and more effective utilization of local food resources by the community and reduce the present considerable loss of perishable food items. Household nutrition security means more than avoidance of chronic starvation. Policy makers of developing countries should set, as their target in the next century, the achievement of adequate nutrition rather than mere survival.

  8. A triangular fuzzy TOPSIS-based approach for the application of water technologies in different emergency water supply scenarios.

    PubMed

    Qu, Jianhua; Meng, Xianlin; Yu, Huan; You, Hong

    2016-09-01

    Because of the increasing frequency and intensity of unexpected natural disasters, providing safe drinking water for the affected population following a disaster has become a global challenge of growing concern. An onsite water supply technology that is portable, mobile, or modular is a more suitable and sustainable solution for the victims than transporting bottled water. In recent years, various water techniques, such as membrane-assisted technologies, have been proposed and successfully implemented in many places. Given the diversity of techniques available, the current challenge is how to scientifically identify the optimum options for different disaster scenarios. Hence, a fuzzy triangular-based multi-criteria, group decision-making tool was developed in this research. The approach was then applied to the selection of the most appropriate water technologies corresponding to the different emergency water supply scenarios. The results show this tool capable of facilitating scientific analysis in the evaluation and selection of emergency water technologies for enduring security drinking water supply in disaster relief.

  9. Attacks on practical quantum key distribution systems (and how to prevent them)

    NASA Astrophysics Data System (ADS)

    Jain, Nitin; Stiller, Birgit; Khan, Imran; Elser, Dominique; Marquardt, Christoph; Leuchs, Gerd

    2016-07-01

    With the emergence of an information society, the idea of protecting sensitive data is steadily gaining importance. Conventional encryption methods may not be sufficient to guarantee data protection in the future. Quantum key distribution (QKD) is an emerging technology that exploits fundamental physical properties to guarantee perfect security in theory. However, it is not easy to ensure in practice that the implementations of QKD systems are exactly in line with the theoretical specifications. Such theory-practice deviations can open loopholes and compromise security. Several such loopholes have been discovered and investigated in the last decade. These activities have motivated the proposal and implementation of appropriate countermeasures, thereby preventing future attacks and enhancing the practical security of QKD. This article introduces the so-called field of quantum hacking by summarising a variety of attacks and their prevention mechanisms.

  10. Strategic factors in the development of the National Technology Transfer Network

    NASA Technical Reports Server (NTRS)

    Root, Jonathan F.; Stone, Barbara A.

    1993-01-01

    Broad consensus among industry and government leaders has developed over the last decade on the importance of applying the U.S. leadership in research and development (R&D) to strengthen competitiveness in the global marketplace, and thus enhance national prosperity. This consensus has emerged against the backdrop of increasing economic competition, and the dramatic reduction of military threats to national security with the end of the Cold War. This paper reviews the key factors and considerations that shaped - and continue to influence - the development of the Regional Technoloty Transfer Centers (RTTC) and the National Technology Transfer Center (NTTC). Also, the future role of the national network in support of emerging technology policy initiatives will be explored.

  11. Photonic sensor opportunities for distributed and wireless systems in security applications

    NASA Astrophysics Data System (ADS)

    Krohn, David

    2006-10-01

    There are broad ranges of homeland security sensing applications that can be facilitated by distributed fiber optic sensors and photonics integrated wireless systems. These applications include [1]: Pipeline, (Monitoring, Security); Smart structures (Bridges, Tunnels, Dams, Public spaces); Power lines (Monitoring, Security); Transportation security; Chemical/biological detection; Wide area surveillance - perimeter; and Port Security (Underwater surveillance, Cargo container). Many vital assets which cover wide areas, such as pipeline and borders, are under constant threat of being attacked or breached. There is a rapidly emerging need to be able to provide identification of intrusion threats to such vital assets. Similar problems exit for monitoring the basic infrastructure such as water supply, power utilities, communications systems as well as transportation. There is a need to develop a coordinated and integrated solution for the detection of threats. From a sensor standpoint, consideration must not be limited to detection, but how does detection lead to intervention and deterrence. Fiber optic sensor technology must be compatible with other surveillance technologies such as wireless mote technology to facilitate integration. In addition, the multi-functionality of fiber optic sensors must be expanded to include bio-chemical detection. There have been a number of barriers for the acceptance and broad use of smart fiber optic sensors. Compared to telecommunications, the volume is low. This fact coupled with proprietary and custom specifications has kept the price of fiber optic sensors high. There is a general lack of a manufacturing infrastructure and lack of standards for packaging and reliability. Also, there are several competing technologies; some photonic based and other approaches based on conventional non-photonic technologies.

  12. 47 CFR 212.3 - Responsibilities.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 47 Telecommunication 5 2013-10-01 2013-10-01 false Responsibilities. 212.3 Section 212.3 Telecommunication OFFICE OF SCIENCE AND TECHNOLOGY POLICY AND NATIONAL SECURITY COUNCIL PROCEDURES FOR OBTAINING INTERNATIONAL TELECOMMUNICATION SERVICE FOR USE DURING A WARTIME EMERGENCY § 212.3 Responsibilities. (a...

  13. 47 CFR 211.5 - Priorities.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 47 Telecommunication 5 2014-10-01 2014-10-01 false Priorities. 211.5 Section 211.5 Telecommunication OFFICE OF SCIENCE AND TECHNOLOGY POLICY AND NATIONAL SECURITY COUNCIL EMERGENCY RESTORATION PRIORITY PROCEDURES FOR TELECOMMUNICATIONS SERVICES § 211.5 Priorities. There are hereby established four...

  14. 47 CFR 212.3 - Responsibilities.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 47 Telecommunication 5 2014-10-01 2014-10-01 false Responsibilities. 212.3 Section 212.3 Telecommunication OFFICE OF SCIENCE AND TECHNOLOGY POLICY AND NATIONAL SECURITY COUNCIL PROCEDURES FOR OBTAINING INTERNATIONAL TELECOMMUNICATION SERVICE FOR USE DURING A WARTIME EMERGENCY § 212.3 Responsibilities. (a...

  15. 47 CFR 211.5 - Priorities.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 47 Telecommunication 5 2010-10-01 2010-10-01 false Priorities. 211.5 Section 211.5 Telecommunication OFFICE OF SCIENCE AND TECHNOLOGY POLICY AND NATIONAL SECURITY COUNCIL EMERGENCY RESTORATION PRIORITY PROCEDURES FOR TELECOMMUNICATIONS SERVICES § 211.5 Priorities. There are hereby established four...

  16. 47 CFR 212.3 - Responsibilities.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 47 Telecommunication 5 2012-10-01 2012-10-01 false Responsibilities. 212.3 Section 212.3 Telecommunication OFFICE OF SCIENCE AND TECHNOLOGY POLICY AND NATIONAL SECURITY COUNCIL PROCEDURES FOR OBTAINING INTERNATIONAL TELECOMMUNICATION SERVICE FOR USE DURING A WARTIME EMERGENCY § 212.3 Responsibilities. (a...

  17. 47 CFR 212.3 - Responsibilities.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 47 Telecommunication 5 2011-10-01 2011-10-01 false Responsibilities. 212.3 Section 212.3 Telecommunication OFFICE OF SCIENCE AND TECHNOLOGY POLICY AND NATIONAL SECURITY COUNCIL PROCEDURES FOR OBTAINING INTERNATIONAL TELECOMMUNICATION SERVICE FOR USE DURING A WARTIME EMERGENCY § 212.3 Responsibilities. (a...

  18. 47 CFR 212.3 - Responsibilities.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 47 Telecommunication 5 2010-10-01 2010-10-01 false Responsibilities. 212.3 Section 212.3 Telecommunication OFFICE OF SCIENCE AND TECHNOLOGY POLICY AND NATIONAL SECURITY COUNCIL PROCEDURES FOR OBTAINING INTERNATIONAL TELECOMMUNICATION SERVICE FOR USE DURING A WARTIME EMERGENCY § 212.3 Responsibilities. (a...

  19. 47 CFR 211.5 - Priorities.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 47 Telecommunication 5 2013-10-01 2013-10-01 false Priorities. 211.5 Section 211.5 Telecommunication OFFICE OF SCIENCE AND TECHNOLOGY POLICY AND NATIONAL SECURITY COUNCIL EMERGENCY RESTORATION PRIORITY PROCEDURES FOR TELECOMMUNICATIONS SERVICES § 211.5 Priorities. There are hereby established four...

  20. 47 CFR 211.5 - Priorities.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 47 Telecommunication 5 2012-10-01 2012-10-01 false Priorities. 211.5 Section 211.5 Telecommunication OFFICE OF SCIENCE AND TECHNOLOGY POLICY AND NATIONAL SECURITY COUNCIL EMERGENCY RESTORATION PRIORITY PROCEDURES FOR TELECOMMUNICATIONS SERVICES § 211.5 Priorities. There are hereby established four...

  1. 47 CFR 211.5 - Priorities.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 47 Telecommunication 5 2011-10-01 2011-10-01 false Priorities. 211.5 Section 211.5 Telecommunication OFFICE OF SCIENCE AND TECHNOLOGY POLICY AND NATIONAL SECURITY COUNCIL EMERGENCY RESTORATION PRIORITY PROCEDURES FOR TELECOMMUNICATIONS SERVICES § 211.5 Priorities. There are hereby established four...

  2. Attack Methodology Analysis: Emerging Trends in Computer-Based Attack Methodologies and Their Applicability to Control System Networks

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bri Rolston

    2005-06-01

    Threat characterization is a key component in evaluating the threat faced by control systems. Without a thorough understanding of the threat faced by critical infrastructure networks, adequate resources cannot be allocated or directed effectively to the defense of these systems. Traditional methods of threat analysis focus on identifying the capabilities and motivations of a specific attacker, assessing the value the adversary would place on targeted systems, and deploying defenses according to the threat posed by the potential adversary. Too many effective exploits and tools exist and are easily accessible to anyone with access to an Internet connection, minimal technical skills,more » and a significantly reduced motivational threshold to be able to narrow the field of potential adversaries effectively. Understanding how hackers evaluate new IT security research and incorporate significant new ideas into their own tools provides a means of anticipating how IT systems are most likely to be attacked in the future. This research, Attack Methodology Analysis (AMA), could supply pertinent information on how to detect and stop new types of attacks. Since the exploit methodologies and attack vectors developed in the general Information Technology (IT) arena can be converted for use against control system environments, assessing areas in which cutting edge exploit development and remediation techniques are occurring can provide significance intelligence for control system network exploitation, defense, and a means of assessing threat without identifying specific capabilities of individual opponents. Attack Methodology Analysis begins with the study of what exploit technology and attack methodologies are being developed in the Information Technology (IT) security research community within the black and white hat community. Once a solid understanding of the cutting edge security research is established, emerging trends in attack methodology can be identified and the gap between those threats and the defensive capabilities of control systems can be analyzed. The results of the gap analysis drive changes in the cyber security of critical infrastructure networks to close the gap between current exploits and existing defenses. The analysis also provides defenders with an idea of how threat technology is evolving and how defenses will need to be modified to address these emerging trends.« less

  3. Butterfly Encryption Scheme for Resource-Constrained Wireless Networks †

    PubMed Central

    Sampangi, Raghav V.; Sampalli, Srinivas

    2015-01-01

    Resource-constrained wireless networks are emerging networks such as Radio Frequency Identification (RFID) and Wireless Body Area Networks (WBAN) that might have restrictions on the available resources and the computations that can be performed. These emerging technologies are increasing in popularity, particularly in defence, anti-counterfeiting, logistics and medical applications, and in consumer applications with growing popularity of the Internet of Things. With communication over wireless channels, it is essential to focus attention on securing data. In this paper, we present an encryption scheme called Butterfly encryption scheme. We first discuss a seed update mechanism for pseudorandom number generators (PRNG), and employ this technique to generate keys and authentication parameters for resource-constrained wireless networks. Our scheme is lightweight, as in it requires less resource when implemented and offers high security through increased unpredictability, owing to continuously changing parameters. Our work focuses on accomplishing high security through simplicity and reuse. We evaluate our encryption scheme using simulation, key similarity assessment, key sequence randomness assessment, protocol analysis and security analysis. PMID:26389899

  4. Nevada National Security Site-Directed Research and Development FY 2011 Annual Report

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Howard Bender, comp.

    2012-04-25

    This fiscal year 2011 annual report of the Site-Directed Research and Development program, the 10th anniversary edition, recognizes a full decade of innovative R&D accomplishments in support of the Nevada National Security Site (NNSS). Last year the NNSS itself was renamed to reflect a diversifying mission, and our R&D program has contributed significantly to shape emerging missions that will continue to evolve. New initiatives in stockpile stewardship science, nonproliferation, and treaty verification and monitoring have had substantial successes in FY 2011, and many more accomplishments are expected. SDRD is the cornerstone on which many of these initiatives rest. Historically supportingmore » our main focus areas, SDRD is also building a solid foundation for new, and non-traditional, emerging national security missions. The program continues its charter to advance science and technology for a broad base of agencies including the U.S. Department of Energy (DOE), U.S. Department of Defense (DoD), U.S. Department of Homeland Security (DHS), and many others.« less

  5. Butterfly Encryption Scheme for Resource-Constrained Wireless Networks.

    PubMed

    Sampangi, Raghav V; Sampalli, Srinivas

    2015-09-15

    Resource-constrained wireless networks are emerging networks such as Radio Frequency Identification (RFID) and Wireless Body Area Networks (WBAN) that might have restrictions on the available resources and the computations that can be performed. These emerging technologies are increasing in popularity, particularly in defence, anti-counterfeiting, logistics and medical applications, and in consumer applications with growing popularity of the Internet of Things. With communication over wireless channels, it is essential to focus attention on securing data. In this paper, we present an encryption scheme called Butterfly encryption scheme. We first discuss a seed update mechanism for pseudorandom number generators (PRNG), and employ this technique to generate keys and authentication parameters for resource-constrained wireless networks. Our scheme is lightweight, as in it requires less resource when implemented and offers high security through increased unpredictability, owing to continuously changing parameters. Our work focuses on accomplishing high security through simplicity and reuse. We evaluate our encryption scheme using simulation, key similarity assessment, key sequence randomness assessment, protocol analysis and security analysis.

  6. Security, safety, and related technology - the triangle of eHealth service provision.

    PubMed

    Savastano, Mario; Hovsto, Asbjorn; Pharow, Peter; Blobel, Bernd

    2008-01-01

    The developing of innovative solutions in the emerging eHealth market requires strong economic efforts which may be justified only in presence of particularly suitable boundary conditions. Among the factors retained of primary importance for the development of eHealth, a correct approach to id-management is unanimously considered fundamental. Three keywords in the id-management context appear particularly important: standardization, security and safety. Standardization may contribute to increase the size and duration of the eHealth market, while security and safety may encourage all the stakeholders to trust in a appropriate and safe management of all the very sensitive personal data involved in the eHealth applications. The aim of the present paper is analyzing some security and safety issues in eHealth from the particular prospective of the identity management and standardization. The paper highlights the mission of the EU funded "BioHealth" project whose mission is to increase the stakeholders' knowledge about existing and emerging standards in eHealth with particular reference to identity management.

  7. Ageing-in-place with the use of ambient intelligence technology: perspectives of older users.

    PubMed

    van Hoof, J; Kort, H S M; Rutten, P G S; Duijnstee, M S H

    2011-05-01

    Ambient intelligence technologies are a means to support ageing-in-place by monitoring clients in the home. In this study, monitoring is applied for the purpose of raising an alarm in an emergency situation, and thereby, providing an increased sense of safety and security. Apart from these technological solutions, there are numerous environmental interventions in the home environment that can support people to age-in-place. The aim of this study was to investigate the needs and motives, related to ageing-in-place, of the respondents receiving ambient intelligence technologies, and to investigate whether, and how, these technologies contributed to aspects of ageing-in-place. This paper presents the results of a qualitative study comprised of interviews and observations of technology and environmental interventions in the home environment among 18 community-dwelling older adults with a complex demand for care. These respondents had a prototype of the Unattended Autonomous Surveillance system, an example of ambient intelligence technology, installed in their homes as a means to age-in-place. The UAS-system offers a large range of functionalities, including mobility monitoring, voice response, fire detection, as well as wandering detection and prevention, which can be installed in different configurations. The respondents had various motives to use ambient intelligence technologies to support ageing-in-place. The most prominent reason was to improve the sense of safety and security, in particular, in case of fall incidents, when people were afraid not to be able to use their existing emergency response systems. The ambient intelligence technologies were initially seen as a welcome addition to strategies already adopted by the respondents, including a variety of home modifications and assistive devices. The systems tested increased the sense of safety and security and helped to postpone institutionalisation. Respondents came up with a set of specifications in terms of the operation and the design of the technology. False alarms were also regarded as a sign that the ambient intelligence technology is functioning. Moreover, a good integration of the new technologies in the provision of health care is indispensable, and installation should be done in an acceptable and unobtrusive manner. Ambient intelligence technologies can contribute to an increased safety and security at home. The technologies alone offer no all encompassing solution as home care and additional environmental interventions are still needed to support ageing-in-place. Results of the study are used to further improve the ambient intelligence technologies and their implementation. 2011 Elsevier Ireland Ltd. All rights reserved.

  8. ONCHIT security in distributed environments: a proposed model for implantable devices.

    PubMed

    Lorence, Daniel; Lee, James; Richards, Michael

    2010-08-01

    Recent ONCHIT mandates call for increased individual health data collection efforts as well as heightened security measures. To date most healthcare organizations have been reluctant to exchange information, citing confidentiality concerns and unshared costs incurred by specific organizations. Implantable monitoring and treatment devices are rapidly emerging as data collection interface tools in response to such mandates. Proposed here is a translational, device-independent consumer-based solution, which focuses on information controlled by specific patients, and functions within a distributed (organization neutral) environment. While the conceptual applications employed in this technology set are provided by way of illustration, they may also serve as a transformative model for emerging EMR/EHR requirements.

  9. An open, interoperable, and scalable prehospital information technology network architecture.

    PubMed

    Landman, Adam B; Rokos, Ivan C; Burns, Kevin; Van Gelder, Carin M; Fisher, Roger M; Dunford, James V; Cone, David C; Bogucki, Sandy

    2011-01-01

    Some of the most intractable challenges in prehospital medicine include response time optimization, inefficiencies at the emergency medical services (EMS)-emergency department (ED) interface, and the ability to correlate field interventions with patient outcomes. Information technology (IT) can address these and other concerns by ensuring that system and patient information is received when and where it is needed, is fully integrated with prior and subsequent patient information, and is securely archived. Some EMS agencies have begun adopting information technologies, such as wireless transmission of 12-lead electrocardiograms, but few agencies have developed a comprehensive plan for management of their prehospital information and integration with other electronic medical records. This perspective article highlights the challenges and limitations of integrating IT elements without a strategic plan, and proposes an open, interoperable, and scalable prehospital information technology (PHIT) architecture. The two core components of this PHIT architecture are 1) routers with broadband network connectivity to share data between ambulance devices and EMS system information services and 2) an electronic patient care report to organize and archive all electronic prehospital data. To successfully implement this comprehensive PHIT architecture, data and technology requirements must be based on best available evidence, and the system must adhere to health data standards as well as privacy and security regulations. Recent federal legislation prioritizing health information technology may position federal agencies to help design and fund PHIT architectures.

  10. Home automation in the workplace.

    PubMed

    McCormack, J E; Tello, S F

    1994-01-01

    Environmental control units and home automation devices contribute to the independence and potential of individuals with disabilities, both at work and at home. Devices currently exist that can assist people with physical, cognitive, and sensory disabilities to control lighting, appliances, temperature, security, and telephone communications. This article highlights several possible applications for these technologies and discusses emerging technologies that will increase the benefits these devices offer people with disabilities.

  11. 47 CFR 213.6 - Criteria.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 47 Telecommunication 5 2012-10-01 2012-10-01 false Criteria. 213.6 Section 213.6 Telecommunication OFFICE OF SCIENCE AND TECHNOLOGY POLICY AND NATIONAL SECURITY COUNCIL GOVERNMENT AND PUBLIC CORRESPONDENCE TELECOMMUNICATIONS PRECEDENCE SYSTEM § 213.6 Criteria. (a) Flash, Flash Emergency. (1) This is the...

  12. 47 CFR 213.6 - Criteria.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 47 Telecommunication 5 2013-10-01 2013-10-01 false Criteria. 213.6 Section 213.6 Telecommunication OFFICE OF SCIENCE AND TECHNOLOGY POLICY AND NATIONAL SECURITY COUNCIL GOVERNMENT AND PUBLIC CORRESPONDENCE TELECOMMUNICATIONS PRECEDENCE SYSTEM § 213.6 Criteria. (a) Flash, Flash Emergency. (1) This is the...

  13. 47 CFR 213.6 - Criteria.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 47 Telecommunication 5 2011-10-01 2011-10-01 false Criteria. 213.6 Section 213.6 Telecommunication OFFICE OF SCIENCE AND TECHNOLOGY POLICY AND NATIONAL SECURITY COUNCIL GOVERNMENT AND PUBLIC CORRESPONDENCE TELECOMMUNICATIONS PRECEDENCE SYSTEM § 213.6 Criteria. (a) Flash, Flash Emergency. (1) This is the...

  14. 47 CFR 213.6 - Criteria.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 47 Telecommunication 5 2014-10-01 2014-10-01 false Criteria. 213.6 Section 213.6 Telecommunication OFFICE OF SCIENCE AND TECHNOLOGY POLICY AND NATIONAL SECURITY COUNCIL GOVERNMENT AND PUBLIC CORRESPONDENCE TELECOMMUNICATIONS PRECEDENCE SYSTEM § 213.6 Criteria. (a) Flash, Flash Emergency. (1) This is the...

  15. 47 CFR 213.6 - Criteria.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 47 Telecommunication 5 2010-10-01 2010-10-01 false Criteria. 213.6 Section 213.6 Telecommunication OFFICE OF SCIENCE AND TECHNOLOGY POLICY AND NATIONAL SECURITY COUNCIL GOVERNMENT AND PUBLIC CORRESPONDENCE TELECOMMUNICATIONS PRECEDENCE SYSTEM § 213.6 Criteria. (a) Flash, Flash Emergency. (1) This is the...

  16. Field studies of safety security rescue technologies through training and response activities

    NASA Astrophysics Data System (ADS)

    Murphy, Robin R.; Stover, Sam

    2006-05-01

    This paper describes the field-oriented philosophy of the Institute for Safety Security Rescue Technology (iSSRT) and summarizes the activities and lessons learned during calendar year 2005 of its two centers: the Center for Robot-Assisted Search and Rescue and the NSF Safety Security Rescue industry/university cooperative research center. In 2005, iSSRT participated in four responses (La Conchita, CA, Mudslides, Hurricane Dennis, Hurricane Katrina, Hurricane Wilma) and conducted three field experiments (NJTF-1, Camp Hurricane, Richmond, MO). The lessons learned covered mobility, operator control units, wireless communications, and general reliability. The work has collectively identified six emerging issues for future work. Based on these studies, a 10-hour, 1 continuing education unit credit course on rescue robotics has been created and is available. Rescue robots and sensors are available for loan upon request.

  17. Remote Sensing Laboratory - RSL

    ScienceCinema

    None

    2018-01-16

    One of the primary resources supporting homeland security is the Remote Sensing Laboratory, or RSL. The Laboratory creates advanced technologies for emergency response operations, radiological incident response, and other remote sensing activities. RSL emergency response teams are on call 24-hours a day, and maintain the capability to deploy domestically and internationally in response to threats involving the loss, theft, or release of nuclear or radioactive material. Such incidents might include Nuclear Power Plant accidents, terrorist incidents involving nuclear or radiological materials, NASA launches, and transportation accidents involving nuclear materials. Working with the US Department of Homeland Security, RSL personnel equip, maintain, and conduct training on the mobile detection deployment unit, to provide nuclear radiological security at major national events such as the super bowl, the Indianapolis 500, New Year's Eve celebrations, presidential inaugurations, international meetings and conferences, just about any event where large numbers of people will gather.

  18. Remote Sensing Laboratory - RSL

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    None

    2014-11-06

    One of the primary resources supporting homeland security is the Remote Sensing Laboratory, or RSL. The Laboratory creates advanced technologies for emergency response operations, radiological incident response, and other remote sensing activities. RSL emergency response teams are on call 24-hours a day, and maintain the capability to deploy domestically and internationally in response to threats involving the loss, theft, or release of nuclear or radioactive material. Such incidents might include Nuclear Power Plant accidents, terrorist incidents involving nuclear or radiological materials, NASA launches, and transportation accidents involving nuclear materials. Working with the US Department of Homeland Security, RSL personnel equip,more » maintain, and conduct training on the mobile detection deployment unit, to provide nuclear radiological security at major national events such as the super bowl, the Indianapolis 500, New Year's Eve celebrations, presidential inaugurations, international meetings and conferences, just about any event where large numbers of people will gather.« less

  19. Urbanization, Extreme Climate Hazards and Food, Energy Water Security

    NASA Astrophysics Data System (ADS)

    Romero-Lankao, P.; Davidson, D.; McPhearson, T.

    2016-12-01

    Research is urgently needed that incorporates the interconnected nature of three critical resources supporting our cities: food, energy and water. Cities are increasing demands for food, water and energy resources that in turn stress resource supplies, creating risks of negative impacts to human and ecological wellbeing. Simultaneously, shifts in climatic conditions, including extremes such as floods, heat, and droughts, threaten the sustainable availability of adequate quantities and qualities of food, energy and water (FEW) resources needed for resilient cities and ecosystems. These resource flows cannot be treated in isolation simply because they are interconnected: shifts in food, energy or water dynamics in turn affect the others, affecting the security of the whole - i.e., FEW nexus security. We present a framework to examine the dynamic interactions of urbanization, FEW nexus security and extreme hazard risks, with two overarching research questions: Do existing and emerging actions intended to enhance a population's food, water and energy security have the capacity to ensure FEW nexus security in the face of changing climate and urban development conditions? Can we identify a common set of social, ecological and technological conditions across a diversity of urban-regions that support the emergence of innovations that can lead to structural transformations for FEW nexus security?

  20. Assistive Technologies and Issues Relating to Privacy, Ethics and Security

    NASA Astrophysics Data System (ADS)

    Martin, Suzanne; Bengtsson, Johan E.; Dröes, Rose-Marie

    Emerging technologies provide the opportunity to develop innovative sustainable service models, capable of supporting adults with dementia at home. Devices range from simple stand-alone components that can generate a responsive alarm call to complex interoperable systems that even can be remotely controlled. From these complex systems the paradigm of the ubiquitous or ambient smart home has emerged, integrating technology, environmental design and traditional care provision. The service context is often complex, involving a variety of stakeholders and a range of interested agencies. Against this backdrop, as anecdotal evidence and government policies spawn further innovation it is critical that due consideration is given to the potential ethical ramifications at an individual, organisational and societal level. Well-grounded ethical thinking and proactive ethical responses to this innovation are required. Explicit policy and practice should therefore emerge which engenders confidence in existing supported living option schemes for adults with dementia and informs further innovation.

  1. Unmanned and Unattended Response Capability for Homeland Defense

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    BENNETT, PHIL C.

    2002-11-01

    An analysis was conducted of the potential for unmanned and unattended robotic technologies for forward-based, immediate response capabilities that enables access and controlled task performance. The authors analyze high-impact response scenarios in conjunction with homeland security organizations, such as the NNSA Office of Emergency Response, the FBI, the National Guard, and the Army Technical Escort Unit, to cover a range of radiological, chemical and biological threats. They conducted an analysis of the potential of forward-based, unmanned and unattended robotic technologies to accelerate and enhance emergency and crisis response by Homeland Defense organizations. Response systems concepts were developed utilizing new technologiesmore » supported by existing emerging threats base technologies to meet the defined response scenarios. These systems will pre-position robotic and remote sensing capabilities stationed close to multiple sites for immediate action. Analysis of assembled systems included experimental activities to determine potential efficacy in the response scenarios, and iteration on systems concepts and remote sensing and robotic technologies, creating new immediate response capabilities for Homeland Defense.« less

  2. Identifying the science and technology dimensions of emerging public policy issues through horizon scanning.

    PubMed

    Parker, Miles; Acland, Andrew; Armstrong, Harry J; Bellingham, Jim R; Bland, Jessica; Bodmer, Helen C; Burall, Simon; Castell, Sarah; Chilvers, Jason; Cleevely, David D; Cope, David; Costanzo, Lucia; Dolan, James A; Doubleday, Robert; Feng, Wai Yi; Godfray, H Charles J; Good, David A; Grant, Jonathan; Green, Nick; Groen, Arnoud J; Guilliams, Tim T; Gupta, Sunjai; Hall, Amanda C; Heathfield, Adam; Hotopp, Ulrike; Kass, Gary; Leeder, Tim; Lickorish, Fiona A; Lueshi, Leila M; Magee, Chris; Mata, Tiago; McBride, Tony; McCarthy, Natasha; Mercer, Alan; Neilson, Ross; Ouchikh, Jackie; Oughton, Edward J; Oxenham, David; Pallett, Helen; Palmer, James; Patmore, Jeff; Petts, Judith; Pinkerton, Jan; Ploszek, Richard; Pratt, Alan; Rocks, Sophie A; Stansfield, Neil; Surkovic, Elizabeth; Tyler, Christopher P; Watkinson, Andrew R; Wentworth, Jonny; Willis, Rebecca; Wollner, Patrick K A; Worts, Kim; Sutherland, William J

    2014-01-01

    Public policy requires public support, which in turn implies a need to enable the public not just to understand policy but also to be engaged in its development. Where complex science and technology issues are involved in policy making, this takes time, so it is important to identify emerging issues of this type and prepare engagement plans. In our horizon scanning exercise, we used a modified Delphi technique. A wide group of people with interests in the science and policy interface (drawn from policy makers, policy adviser, practitioners, the private sector and academics) elicited a long list of emergent policy issues in which science and technology would feature strongly and which would also necessitate public engagement as policies are developed. This was then refined to a short list of top priorities for policy makers. Thirty issues were identified within broad areas of business and technology; energy and environment; government, politics and education; health, healthcare, population and aging; information, communication, infrastructure and transport; and public safety and national security.

  3. 47 CFR 212.4 - Other requirements.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 47 Telecommunication 5 2013-10-01 2013-10-01 false Other requirements. 212.4 Section 212.4 Telecommunication OFFICE OF SCIENCE AND TECHNOLOGY POLICY AND NATIONAL SECURITY COUNCIL PROCEDURES FOR OBTAINING INTERNATIONAL TELECOMMUNICATION SERVICE FOR USE DURING A WARTIME EMERGENCY § 212.4 Other requirements. (a...

  4. 47 CFR 212.2 - Scope.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 47 Telecommunication 5 2013-10-01 2013-10-01 false Scope. 212.2 Section 212.2 Telecommunication OFFICE OF SCIENCE AND TECHNOLOGY POLICY AND NATIONAL SECURITY COUNCIL PROCEDURES FOR OBTAINING INTERNATIONAL TELECOMMUNICATION SERVICE FOR USE DURING A WARTIME EMERGENCY § 212.2 Scope. The procedures in this...

  5. Ready or Not: Preparation through Simulation

    ERIC Educational Resources Information Center

    Spellman, Joy

    2008-01-01

    Immediately after 9/11, Burlington County College (BCC) realized that the focus of emergency preparedness must change. BCC responded by identifying community needs, developing customized simulation training using high-fidelity human patient simulators and laptop/desktop technology; developing partnerships, and securing outside funding. Over 8,500…

  6. 47 CFR 211.1 - Authority.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 47 Telecommunication 5 2014-10-01 2014-10-01 false Authority. 211.1 Section 211.1 Telecommunication OFFICE OF SCIENCE AND TECHNOLOGY POLICY AND NATIONAL SECURITY COUNCIL EMERGENCY RESTORATION... Communications Act of 1934, as amended. (47 U.S.C. 606). (b) Authority to develop plans policies, and procedures...

  7. 47 CFR 211.7 - Obligation of carriers.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 47 Telecommunication 5 2014-10-01 2014-10-01 false Obligation of carriers. 211.7 Section 211.7 Telecommunication OFFICE OF SCIENCE AND TECHNOLOGY POLICY AND NATIONAL SECURITY COUNCIL EMERGENCY RESTORATION PRIORITY PROCEDURES FOR TELECOMMUNICATIONS SERVICES § 211.7 Obligation of carriers. (a) During the...

  8. 47 CFR 212.4 - Other requirements.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 47 Telecommunication 5 2012-10-01 2012-10-01 false Other requirements. 212.4 Section 212.4 Telecommunication OFFICE OF SCIENCE AND TECHNOLOGY POLICY AND NATIONAL SECURITY COUNCIL PROCEDURES FOR OBTAINING INTERNATIONAL TELECOMMUNICATION SERVICE FOR USE DURING A WARTIME EMERGENCY § 212.4 Other requirements. (a...

  9. 47 CFR 211.4 - Policy.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 47 Telecommunication 5 2014-10-01 2014-10-01 false Policy. 211.4 Section 211.4 Telecommunication OFFICE OF SCIENCE AND TECHNOLOGY POLICY AND NATIONAL SECURITY COUNCIL EMERGENCY RESTORATION PRIORITY PROCEDURES FOR TELECOMMUNICATIONS SERVICES § 211.4 Policy. During the continuance of a war in which the...

  10. 47 CFR 211.7 - Obligation of carriers.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 47 Telecommunication 5 2013-10-01 2013-10-01 false Obligation of carriers. 211.7 Section 211.7 Telecommunication OFFICE OF SCIENCE AND TECHNOLOGY POLICY AND NATIONAL SECURITY COUNCIL EMERGENCY RESTORATION PRIORITY PROCEDURES FOR TELECOMMUNICATIONS SERVICES § 211.7 Obligation of carriers. (a) During the...

  11. 47 CFR 211.4 - Policy.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 47 Telecommunication 5 2010-10-01 2010-10-01 false Policy. 211.4 Section 211.4 Telecommunication OFFICE OF SCIENCE AND TECHNOLOGY POLICY AND NATIONAL SECURITY COUNCIL EMERGENCY RESTORATION PRIORITY PROCEDURES FOR TELECOMMUNICATIONS SERVICES § 211.4 Policy. During the continuance of a war in which the...

  12. 47 CFR 211.1 - Authority.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 47 Telecommunication 5 2013-10-01 2013-10-01 false Authority. 211.1 Section 211.1 Telecommunication OFFICE OF SCIENCE AND TECHNOLOGY POLICY AND NATIONAL SECURITY COUNCIL EMERGENCY RESTORATION... Communications Act of 1934, as amended. (47 U.S.C. 606). (b) Authority to develop plans policies, and procedures...

  13. 47 CFR 212.2 - Scope.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 47 Telecommunication 5 2014-10-01 2014-10-01 false Scope. 212.2 Section 212.2 Telecommunication OFFICE OF SCIENCE AND TECHNOLOGY POLICY AND NATIONAL SECURITY COUNCIL PROCEDURES FOR OBTAINING INTERNATIONAL TELECOMMUNICATION SERVICE FOR USE DURING A WARTIME EMERGENCY § 212.2 Scope. The procedures in this...

  14. 47 CFR 212.1 - Purpose.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 47 Telecommunication 5 2012-10-01 2012-10-01 false Purpose. 212.1 Section 212.1 Telecommunication OFFICE OF SCIENCE AND TECHNOLOGY POLICY AND NATIONAL SECURITY COUNCIL PROCEDURES FOR OBTAINING INTERNATIONAL TELECOMMUNICATION SERVICE FOR USE DURING A WARTIME EMERGENCY § 212.1 Purpose. The purpose of this...

  15. 47 CFR 212.1 - Purpose.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 47 Telecommunication 5 2010-10-01 2010-10-01 false Purpose. 212.1 Section 212.1 Telecommunication OFFICE OF SCIENCE AND TECHNOLOGY POLICY AND NATIONAL SECURITY COUNCIL PROCEDURES FOR OBTAINING INTERNATIONAL TELECOMMUNICATION SERVICE FOR USE DURING A WARTIME EMERGENCY § 212.1 Purpose. The purpose of this...

  16. 47 CFR 212.2 - Scope.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 47 Telecommunication 5 2012-10-01 2012-10-01 false Scope. 212.2 Section 212.2 Telecommunication OFFICE OF SCIENCE AND TECHNOLOGY POLICY AND NATIONAL SECURITY COUNCIL PROCEDURES FOR OBTAINING INTERNATIONAL TELECOMMUNICATION SERVICE FOR USE DURING A WARTIME EMERGENCY § 212.2 Scope. The procedures in this...

  17. 47 CFR 212.2 - Scope.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 47 Telecommunication 5 2011-10-01 2011-10-01 false Scope. 212.2 Section 212.2 Telecommunication OFFICE OF SCIENCE AND TECHNOLOGY POLICY AND NATIONAL SECURITY COUNCIL PROCEDURES FOR OBTAINING INTERNATIONAL TELECOMMUNICATION SERVICE FOR USE DURING A WARTIME EMERGENCY § 212.2 Scope. The procedures in this...

  18. 47 CFR 211.4 - Policy.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 47 Telecommunication 5 2013-10-01 2013-10-01 false Policy. 211.4 Section 211.4 Telecommunication OFFICE OF SCIENCE AND TECHNOLOGY POLICY AND NATIONAL SECURITY COUNCIL EMERGENCY RESTORATION PRIORITY PROCEDURES FOR TELECOMMUNICATIONS SERVICES § 211.4 Policy. During the continuance of a war in which the...

  19. 47 CFR 211.1 - Authority.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 47 Telecommunication 5 2011-10-01 2011-10-01 false Authority. 211.1 Section 211.1 Telecommunication OFFICE OF SCIENCE AND TECHNOLOGY POLICY AND NATIONAL SECURITY COUNCIL EMERGENCY RESTORATION... Communications Act of 1934, as amended. (47 U.S.C. 606). (b) Authority to develop plans policies, and procedures...

  20. 47 CFR 212.4 - Other requirements.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 47 Telecommunication 5 2010-10-01 2010-10-01 false Other requirements. 212.4 Section 212.4 Telecommunication OFFICE OF SCIENCE AND TECHNOLOGY POLICY AND NATIONAL SECURITY COUNCIL PROCEDURES FOR OBTAINING INTERNATIONAL TELECOMMUNICATION SERVICE FOR USE DURING A WARTIME EMERGENCY § 212.4 Other requirements. (a...

  1. 47 CFR 212.1 - Purpose.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 47 Telecommunication 5 2014-10-01 2014-10-01 false Purpose. 212.1 Section 212.1 Telecommunication OFFICE OF SCIENCE AND TECHNOLOGY POLICY AND NATIONAL SECURITY COUNCIL PROCEDURES FOR OBTAINING INTERNATIONAL TELECOMMUNICATION SERVICE FOR USE DURING A WARTIME EMERGENCY § 212.1 Purpose. The purpose of this...

  2. 47 CFR 212.4 - Other requirements.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 47 Telecommunication 5 2011-10-01 2011-10-01 false Other requirements. 212.4 Section 212.4 Telecommunication OFFICE OF SCIENCE AND TECHNOLOGY POLICY AND NATIONAL SECURITY COUNCIL PROCEDURES FOR OBTAINING INTERNATIONAL TELECOMMUNICATION SERVICE FOR USE DURING A WARTIME EMERGENCY § 212.4 Other requirements. (a...

  3. 47 CFR 212.2 - Scope.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 47 Telecommunication 5 2010-10-01 2010-10-01 false Scope. 212.2 Section 212.2 Telecommunication OFFICE OF SCIENCE AND TECHNOLOGY POLICY AND NATIONAL SECURITY COUNCIL PROCEDURES FOR OBTAINING INTERNATIONAL TELECOMMUNICATION SERVICE FOR USE DURING A WARTIME EMERGENCY § 212.2 Scope. The procedures in this...

  4. 47 CFR 211.4 - Policy.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 47 Telecommunication 5 2011-10-01 2011-10-01 false Policy. 211.4 Section 211.4 Telecommunication OFFICE OF SCIENCE AND TECHNOLOGY POLICY AND NATIONAL SECURITY COUNCIL EMERGENCY RESTORATION PRIORITY PROCEDURES FOR TELECOMMUNICATIONS SERVICES § 211.4 Policy. During the continuance of a war in which the...

  5. 47 CFR 212.4 - Other requirements.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 47 Telecommunication 5 2014-10-01 2014-10-01 false Other requirements. 212.4 Section 212.4 Telecommunication OFFICE OF SCIENCE AND TECHNOLOGY POLICY AND NATIONAL SECURITY COUNCIL PROCEDURES FOR OBTAINING INTERNATIONAL TELECOMMUNICATION SERVICE FOR USE DURING A WARTIME EMERGENCY § 212.4 Other requirements. (a...

  6. 47 CFR 211.7 - Obligation of carriers.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 47 Telecommunication 5 2010-10-01 2010-10-01 false Obligation of carriers. 211.7 Section 211.7 Telecommunication OFFICE OF SCIENCE AND TECHNOLOGY POLICY AND NATIONAL SECURITY COUNCIL EMERGENCY RESTORATION PRIORITY PROCEDURES FOR TELECOMMUNICATIONS SERVICES § 211.7 Obligation of carriers. (a) During the...

  7. 47 CFR 211.4 - Policy.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 47 Telecommunication 5 2012-10-01 2012-10-01 false Policy. 211.4 Section 211.4 Telecommunication OFFICE OF SCIENCE AND TECHNOLOGY POLICY AND NATIONAL SECURITY COUNCIL EMERGENCY RESTORATION PRIORITY PROCEDURES FOR TELECOMMUNICATIONS SERVICES § 211.4 Policy. During the continuance of a war in which the...

  8. 47 CFR 212.1 - Purpose.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 47 Telecommunication 5 2013-10-01 2013-10-01 false Purpose. 212.1 Section 212.1 Telecommunication OFFICE OF SCIENCE AND TECHNOLOGY POLICY AND NATIONAL SECURITY COUNCIL PROCEDURES FOR OBTAINING INTERNATIONAL TELECOMMUNICATION SERVICE FOR USE DURING A WARTIME EMERGENCY § 212.1 Purpose. The purpose of this...

  9. 47 CFR 212.1 - Purpose.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 47 Telecommunication 5 2011-10-01 2011-10-01 false Purpose. 212.1 Section 212.1 Telecommunication OFFICE OF SCIENCE AND TECHNOLOGY POLICY AND NATIONAL SECURITY COUNCIL PROCEDURES FOR OBTAINING INTERNATIONAL TELECOMMUNICATION SERVICE FOR USE DURING A WARTIME EMERGENCY § 212.1 Purpose. The purpose of this...

  10. 47 CFR 211.1 - Authority.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 47 Telecommunication 5 2010-10-01 2010-10-01 false Authority. 211.1 Section 211.1 Telecommunication OFFICE OF SCIENCE AND TECHNOLOGY POLICY AND NATIONAL SECURITY COUNCIL EMERGENCY RESTORATION... Communications Act of 1934, as amended. (47 U.S.C. 606). (b) Authority to develop plans policies, and procedures...

  11. 47 CFR 211.7 - Obligation of carriers.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 47 Telecommunication 5 2011-10-01 2011-10-01 false Obligation of carriers. 211.7 Section 211.7 Telecommunication OFFICE OF SCIENCE AND TECHNOLOGY POLICY AND NATIONAL SECURITY COUNCIL EMERGENCY RESTORATION PRIORITY PROCEDURES FOR TELECOMMUNICATIONS SERVICES § 211.7 Obligation of carriers. (a) During the...

  12. 47 CFR 211.7 - Obligation of carriers.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 47 Telecommunication 5 2012-10-01 2012-10-01 false Obligation of carriers. 211.7 Section 211.7 Telecommunication OFFICE OF SCIENCE AND TECHNOLOGY POLICY AND NATIONAL SECURITY COUNCIL EMERGENCY RESTORATION PRIORITY PROCEDURES FOR TELECOMMUNICATIONS SERVICES § 211.7 Obligation of carriers. (a) During the...

  13. 47 CFR 211.1 - Authority.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 47 Telecommunication 5 2012-10-01 2012-10-01 false Authority. 211.1 Section 211.1 Telecommunication OFFICE OF SCIENCE AND TECHNOLOGY POLICY AND NATIONAL SECURITY COUNCIL EMERGENCY RESTORATION... Communications Act of 1934, as amended. (47 U.S.C. 606). (b) Authority to develop plans policies, and procedures...

  14. The evolving role of telecommunications switching

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Personick, S.D.

    1993-01-01

    There are many forces impacting on the evolution of switching vis-a-vis its role in telecommunications/information networking. Many of the technologies that in the past 15 years have enabled the cost reductions the industry has experienced in digital switches, and the emergence of intelligent networks are now also enabling a wide range of new end-user applications. Many of these applications are rapidly emerging and evolving to meet the, as yet, uncertain needs of the marketplace. There is an explosion of new ideas for applications involving personalized, nomadic communications, multimedia communications, and information access. Some of these will succeed in the marketplacemore » and some will not. There is a continuing emergence of new and improved underlying electronic and photonic technologies and, most recently, the emergence of reliable, secure distributed computing, communications, and management environments. End-user CPE and servers have become increasingly powerful and cost effective as places to locate session (call) management and session enabling objects such as user-interfaces, directories, agents, multimedia bridges, and storage/server subsystems. Not only are dramatically new paradigms for building networks to support existing applications possible, but there is a pressing need to support the emerging and evolving new applications in a timely way. Competition is accelerating the rate of introduction of new technologies, architectures, and telecommunication services. Every aspect of the business is being reexamined to find better ways of meeting customers' needs more efficiently. Meanwhile, as new applications become deployed, there are increasing pressures to provide for security, privacy, and network integrity. This article reviews the author's personal views (many of which are widely shared by others) of the implications of all of these forces on what we traditionally call telecommunications switching. 10 refs.« less

  15. Emerging Science And Technologies: Securing The Nation Through Dicovery and Innovation

    DTIC Science & Technology

    2013-04-01

    potential material for use in quantum computing and spintronics. R&D in the area of advanced carbon-based materials has the potential to revolutionize...seem to involve a dual-approach strategy. First, the vast majority of our sensory input information does not reach the level of consciousness ...WHITE PAPER | 17 Relevant technology areas that support Protection of the Intelligence Enterprise include: Quantum Computing and Associated

  16. Laser Imaging Video Camera Sees Through Fire, Fog, Smoke

    NASA Technical Reports Server (NTRS)

    2015-01-01

    Under a series of SBIR contracts with Langley Research Center, inventor Richard Billmers refined a prototype for a laser imaging camera capable of seeing through fire, fog, smoke, and other obscurants. Now, Canton, Ohio-based Laser Imaging through Obscurants (LITO) Technologies Inc. is demonstrating the technology as a perimeter security system at Glenn Research Center and planning its future use in aviation, shipping, emergency response, and other fields.

  17. Information infrastructure for emergency medical services.

    PubMed

    Orthner, Helmuth; Mishra, Ninad; Terndrup, Thomas; Acker, Joseph; Grimes, Gary; Gemmill, Jill; Battles, Marcie

    2005-01-01

    The pre-hospital emergency medical and public safety information environment is nearing a threshold of significant change. The change is driven in part by several emerging technologies such as secure, high-speed wireless communication in the local and wide area networks (wLAN, 3G), Geographic Information Systems (GIS), Global Positioning Systems (GPS), and powerful handheld computing and communication services, that are of sufficient utility to be more widely adopted. We propose a conceptual model to enable improved clinical decision making in the pre-hospital environment using these change agents.

  18. Cost and effectiveness analysis on unmanned aerial vehicle (UAV) use at border security

    NASA Astrophysics Data System (ADS)

    Yilmaz, Bahadır.

    2013-06-01

    Drones and Remotely Piloted Vehicles are types of Unmanned Aerial Vehicles. UAVs began to be used with the war of Vietnam, they had a great interest when Israel used them in Bekaa Valley Operations of 1982. UAVs have been used by different countries with different aims with the help of emerging technology and investments. In this article, in the context of areas of UAV usage in national security, benefits and disadvantages of UAVs are put forward. Particularly, it has been evaluated on the basis of cost-effectiveness by focusing the use of UAV in the border security. UAVs have been studied by taking cost analysis, procurement and operational costs into consideration. Analysis of effectiveness has been done with illegal passages of people and drugs from flight times of UAVs. Although the procurement cost of the medium-level UAVs is low, its operational costs are high. For this reason, the idea of less costly alternative systems have been revealed for the border security. As the costs are reduced to acceptable level involving national security and border security in future with high-technology products in their structure, it will continue to be used in an increasing proportion.

  19. The public health dashboard: a surveillance model for bioterrorism preparedness.

    PubMed

    Foldy, Seth L; Biedrzycki, Paul A; Baker, Bevan K; Swain, Geoffrey R; Howe, Donna S; Gieryn, Douglas; Barthell, Edward N; Pemble, Kim R

    2004-01-01

    The City of Milwaukee Health Department piloted a short-term, near real-time syndromic surveillance and communication tool by using an existing secure regional Internet infrastructure. Voluntary, active syndromic case reporting by hospital Emergency Departments was combined with other data streams, including clinical laboratory reports of communicable disease, hospital emergency room diversions, ambulance runs, medical examiner reports of unusual or suspicious deaths, poison control and nursing hotline call volumes, and pharmacy over-the-counter sales. These data were aggregated into a "Surveillance Dashboard" format that was used to communicate community syndromic health trends to hospitals, Emergency Departments, and other providers using a secure Internet technology. Emergency Departments at 8 area hospitals reported a total of 314 cases meeting syndromic criteria from 26,888 patient encounters. Participants were satisfied with data entry and communications. All participating Emergency Departments received e-mail and text pager alerts sent by the Milwaukee Health Department. No unexplained findings or suggestions of an early outbreak were reported through syndrome surveillance for the 4-week duration of the project. Similar surveillance and communications systems could provide multiple benefits to Emergency Department workflow and management, as well as to public health and emergency response.

  20. Safely Enabling UAS Operations in Low-Altitude Airspace

    NASA Technical Reports Server (NTRS)

    Kopardekar, Parimal H.

    2016-01-01

    Flexibility where possible, and structure where necessary. Consider the needs of national security, safe airspace operations, economic opportunities, and emerging technologies. Risk-based approach based on population density, assets on the ground, density of operations, etc. Digital, virtual, dynamic, and as needed UTM services to manage operations.

  1. 47 CFR 214.0 - Authority.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 47 Telecommunication 5 2013-10-01 2013-10-01 false Authority. 214.0 Section 214.0 Telecommunication OFFICE OF SCIENCE AND TECHNOLOGY POLICY AND NATIONAL SECURITY COUNCIL PROCEDURES FOR THE USE AND COORDINATION OF THE RADIO SPECTRUM DURING A WARTIME EMERGENCY § 214.0 Authority. The provisions of this part...

  2. 47 CFR 214.2 - Scope.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 47 Telecommunication 5 2013-10-01 2013-10-01 false Scope. 214.2 Section 214.2 Telecommunication OFFICE OF SCIENCE AND TECHNOLOGY POLICY AND NATIONAL SECURITY COUNCIL PROCEDURES FOR THE USE AND COORDINATION OF THE RADIO SPECTRUM DURING A WARTIME EMERGENCY § 214.2 Scope. This part covers procedures for...

  3. National Security/Emergency Preparedness and Disaster Recovery Communications Via ACTS

    NASA Technical Reports Server (NTRS)

    Pasqualino, Christopher R.; Abbe, Brian S.; Dixon, Frank

    1996-01-01

    During the period from early 1993 through 1994, the U.S. National Communication System, a government agency, sponsored the development and execution of several fixed and mobile experiments using the Advanced Communications Technology Satellite (ACTS)...The results of these experiments are described in this paper.

  4. Safety Systems

    ERIC Educational Resources Information Center

    Halligan, Tom

    2009-01-01

    Colleges across the country are rising to the task by implementing safety programs, response strategies, and technologies intended to create a secure environment for teachers and students. Whether it is preparing and responding to a natural disaster, health emergency, or act of violence, more schools are making campus safety a top priority. At…

  5. 47 CFR 214.3 - Assumptions.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 47 Telecommunication 5 2013-10-01 2013-10-01 false Assumptions. 214.3 Section 214.3 Telecommunication OFFICE OF SCIENCE AND TECHNOLOGY POLICY AND NATIONAL SECURITY COUNCIL PROCEDURES FOR THE USE AND COORDINATION OF THE RADIO SPECTRUM DURING A WARTIME EMERGENCY § 214.3 Assumptions. When the provisions of this...

  6. 47 CFR 214.2 - Scope.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 47 Telecommunication 5 2010-10-01 2010-10-01 false Scope. 214.2 Section 214.2 Telecommunication OFFICE OF SCIENCE AND TECHNOLOGY POLICY AND NATIONAL SECURITY COUNCIL PROCEDURES FOR THE USE AND COORDINATION OF THE RADIO SPECTRUM DURING A WARTIME EMERGENCY § 214.2 Scope. This part covers procedures for...

  7. 47 CFR 214.0 - Authority.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 47 Telecommunication 5 2012-10-01 2012-10-01 false Authority. 214.0 Section 214.0 Telecommunication OFFICE OF SCIENCE AND TECHNOLOGY POLICY AND NATIONAL SECURITY COUNCIL PROCEDURES FOR THE USE AND COORDINATION OF THE RADIO SPECTRUM DURING A WARTIME EMERGENCY § 214.0 Authority. The provisions of this part...

  8. 47 CFR 211.6 - Submission and processing of restoration priority requests.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 47 Telecommunication 5 2010-10-01 2010-10-01 false Submission and processing of restoration priority requests. 211.6 Section 211.6 Telecommunication OFFICE OF SCIENCE AND TECHNOLOGY POLICY AND NATIONAL SECURITY COUNCIL EMERGENCY RESTORATION PRIORITY PROCEDURES FOR TELECOMMUNICATIONS SERVICES § 211.6...

  9. 47 CFR 214.0 - Authority.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 47 Telecommunication 5 2011-10-01 2011-10-01 false Authority. 214.0 Section 214.0 Telecommunication OFFICE OF SCIENCE AND TECHNOLOGY POLICY AND NATIONAL SECURITY COUNCIL PROCEDURES FOR THE USE AND COORDINATION OF THE RADIO SPECTRUM DURING A WARTIME EMERGENCY § 214.0 Authority. The provisions of this part...

  10. 47 CFR 214.0 - Authority.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 47 Telecommunication 5 2010-10-01 2010-10-01 false Authority. 214.0 Section 214.0 Telecommunication OFFICE OF SCIENCE AND TECHNOLOGY POLICY AND NATIONAL SECURITY COUNCIL PROCEDURES FOR THE USE AND COORDINATION OF THE RADIO SPECTRUM DURING A WARTIME EMERGENCY § 214.0 Authority. The provisions of this part...

  11. 47 CFR 211.3 - Scope and coverage.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 47 Telecommunication 5 2013-10-01 2013-10-01 false Scope and coverage. 211.3 Section 211.3 Telecommunication OFFICE OF SCIENCE AND TECHNOLOGY POLICY AND NATIONAL SECURITY COUNCIL EMERGENCY RESTORATION PRIORITY PROCEDURES FOR TELECOMMUNICATIONS SERVICES § 211.3 Scope and coverage. (a) The priority system and...

  12. 47 CFR 211.3 - Scope and coverage.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 47 Telecommunication 5 2014-10-01 2014-10-01 false Scope and coverage. 211.3 Section 211.3 Telecommunication OFFICE OF SCIENCE AND TECHNOLOGY POLICY AND NATIONAL SECURITY COUNCIL EMERGENCY RESTORATION PRIORITY PROCEDURES FOR TELECOMMUNICATIONS SERVICES § 211.3 Scope and coverage. (a) The priority system and...

  13. 47 CFR 214.3 - Assumptions.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 47 Telecommunication 5 2010-10-01 2010-10-01 false Assumptions. 214.3 Section 214.3 Telecommunication OFFICE OF SCIENCE AND TECHNOLOGY POLICY AND NATIONAL SECURITY COUNCIL PROCEDURES FOR THE USE AND COORDINATION OF THE RADIO SPECTRUM DURING A WARTIME EMERGENCY § 214.3 Assumptions. When the provisions of this...

  14. 47 CFR 214.2 - Scope.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 47 Telecommunication 5 2014-10-01 2014-10-01 false Scope. 214.2 Section 214.2 Telecommunication OFFICE OF SCIENCE AND TECHNOLOGY POLICY AND NATIONAL SECURITY COUNCIL PROCEDURES FOR THE USE AND COORDINATION OF THE RADIO SPECTRUM DURING A WARTIME EMERGENCY § 214.2 Scope. This part covers procedures for...

  15. 47 CFR 214.2 - Scope.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 47 Telecommunication 5 2011-10-01 2011-10-01 false Scope. 214.2 Section 214.2 Telecommunication OFFICE OF SCIENCE AND TECHNOLOGY POLICY AND NATIONAL SECURITY COUNCIL PROCEDURES FOR THE USE AND COORDINATION OF THE RADIO SPECTRUM DURING A WARTIME EMERGENCY § 214.2 Scope. This part covers procedures for...

  16. 47 CFR 214.3 - Assumptions.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 47 Telecommunication 5 2014-10-01 2014-10-01 false Assumptions. 214.3 Section 214.3 Telecommunication OFFICE OF SCIENCE AND TECHNOLOGY POLICY AND NATIONAL SECURITY COUNCIL PROCEDURES FOR THE USE AND COORDINATION OF THE RADIO SPECTRUM DURING A WARTIME EMERGENCY § 214.3 Assumptions. When the provisions of this...

  17. 47 CFR 211.6 - Submission and processing of restoration priority requests.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 47 Telecommunication 5 2014-10-01 2014-10-01 false Submission and processing of restoration priority requests. 211.6 Section 211.6 Telecommunication OFFICE OF SCIENCE AND TECHNOLOGY POLICY AND NATIONAL SECURITY COUNCIL EMERGENCY RESTORATION PRIORITY PROCEDURES FOR TELECOMMUNICATIONS SERVICES § 211.6...

  18. 47 CFR 214.0 - Authority.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 47 Telecommunication 5 2014-10-01 2014-10-01 false Authority. 214.0 Section 214.0 Telecommunication OFFICE OF SCIENCE AND TECHNOLOGY POLICY AND NATIONAL SECURITY COUNCIL PROCEDURES FOR THE USE AND COORDINATION OF THE RADIO SPECTRUM DURING A WARTIME EMERGENCY § 214.0 Authority. The provisions of this part...

  19. 47 CFR 211.6 - Submission and processing of restoration priority requests.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 47 Telecommunication 5 2011-10-01 2011-10-01 false Submission and processing of restoration priority requests. 211.6 Section 211.6 Telecommunication OFFICE OF SCIENCE AND TECHNOLOGY POLICY AND NATIONAL SECURITY COUNCIL EMERGENCY RESTORATION PRIORITY PROCEDURES FOR TELECOMMUNICATIONS SERVICES § 211.6...

  20. 47 CFR 214.3 - Assumptions.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 47 Telecommunication 5 2011-10-01 2011-10-01 false Assumptions. 214.3 Section 214.3 Telecommunication OFFICE OF SCIENCE AND TECHNOLOGY POLICY AND NATIONAL SECURITY COUNCIL PROCEDURES FOR THE USE AND COORDINATION OF THE RADIO SPECTRUM DURING A WARTIME EMERGENCY § 214.3 Assumptions. When the provisions of this...

  1. 47 CFR 214.3 - Assumptions.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 47 Telecommunication 5 2012-10-01 2012-10-01 false Assumptions. 214.3 Section 214.3 Telecommunication OFFICE OF SCIENCE AND TECHNOLOGY POLICY AND NATIONAL SECURITY COUNCIL PROCEDURES FOR THE USE AND COORDINATION OF THE RADIO SPECTRUM DURING A WARTIME EMERGENCY § 214.3 Assumptions. When the provisions of this...

  2. 47 CFR 211.3 - Scope and coverage.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 47 Telecommunication 5 2010-10-01 2010-10-01 false Scope and coverage. 211.3 Section 211.3 Telecommunication OFFICE OF SCIENCE AND TECHNOLOGY POLICY AND NATIONAL SECURITY COUNCIL EMERGENCY RESTORATION PRIORITY PROCEDURES FOR TELECOMMUNICATIONS SERVICES § 211.3 Scope and coverage. (a) The priority system and...

  3. 47 CFR 211.6 - Submission and processing of restoration priority requests.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 47 Telecommunication 5 2013-10-01 2013-10-01 false Submission and processing of restoration priority requests. 211.6 Section 211.6 Telecommunication OFFICE OF SCIENCE AND TECHNOLOGY POLICY AND NATIONAL SECURITY COUNCIL EMERGENCY RESTORATION PRIORITY PROCEDURES FOR TELECOMMUNICATIONS SERVICES § 211.6...

  4. 47 CFR 211.3 - Scope and coverage.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 47 Telecommunication 5 2012-10-01 2012-10-01 false Scope and coverage. 211.3 Section 211.3 Telecommunication OFFICE OF SCIENCE AND TECHNOLOGY POLICY AND NATIONAL SECURITY COUNCIL EMERGENCY RESTORATION PRIORITY PROCEDURES FOR TELECOMMUNICATIONS SERVICES § 211.3 Scope and coverage. (a) The priority system and...

  5. 47 CFR 211.6 - Submission and processing of restoration priority requests.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 47 Telecommunication 5 2012-10-01 2012-10-01 false Submission and processing of restoration priority requests. 211.6 Section 211.6 Telecommunication OFFICE OF SCIENCE AND TECHNOLOGY POLICY AND NATIONAL SECURITY COUNCIL EMERGENCY RESTORATION PRIORITY PROCEDURES FOR TELECOMMUNICATIONS SERVICES § 211.6...

  6. 47 CFR 214.2 - Scope.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 47 Telecommunication 5 2012-10-01 2012-10-01 false Scope. 214.2 Section 214.2 Telecommunication OFFICE OF SCIENCE AND TECHNOLOGY POLICY AND NATIONAL SECURITY COUNCIL PROCEDURES FOR THE USE AND COORDINATION OF THE RADIO SPECTRUM DURING A WARTIME EMERGENCY § 214.2 Scope. This part covers procedures for...

  7. 47 CFR 211.3 - Scope and coverage.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 47 Telecommunication 5 2011-10-01 2011-10-01 false Scope and coverage. 211.3 Section 211.3 Telecommunication OFFICE OF SCIENCE AND TECHNOLOGY POLICY AND NATIONAL SECURITY COUNCIL EMERGENCY RESTORATION PRIORITY PROCEDURES FOR TELECOMMUNICATIONS SERVICES § 211.3 Scope and coverage. (a) The priority system and...

  8. New frontiers for infrared

    NASA Astrophysics Data System (ADS)

    Corsi, C.

    2015-03-01

    Infrared (IR) science and technology has been mainly dedicated to surveillance and security: since the 70's specialized techniques have been emerging in thermal imaging for medical and cultural heritage diagnostics, building and aeronautics structures control, energy savings and remote sensing. Most of these applications were developed thanks to IR FPAs sensors with high numbers of pixels and, actually, working at room temperatures. Besides these technological achievements in sensors/ receivers, advanced developments of IR laser sources up to far IR bands have been achieved in the form QCL (quantum cascade laser), allowing wide band TLC and high sensitivity systems for security. recently new sensors and sources with improved performances are emerging in the very far IR region up to submillimeter wavelengths, the so called terahertz (THz) region. A survey of the historical growth and a forecast of the future developments in Devices and Systems for the new frontier of IR will be discussed, in particular for the key questions: "From where and when is IR coming?", "Where is it now?" and "Where will it go and when?". These questions will be treated for key systems (Military/Civil), key devices (Sensors/ Sources), and new strategic technologies (Nanotech/TeraHertz).

  9. A review of existing and emerging digital technologies to combat the global trade in fake medicines.

    PubMed

    Mackey, Tim K; Nayyar, Gaurvika

    2017-05-01

    The globalization of the pharmaceutical supply chain has introduced new challenges, chief among them, fighting the international criminal trade in fake medicines. As the manufacture, supply, and distribution of drugs becomes more complex, so does the need for innovative technology-based solutions to protect patients globally. Areas covered: We conducted a multidisciplinary review of the science/health, information technology, computer science, and general academic literature with the aim of identifying cutting-edge existing and emerging 'digital' solutions to combat fake medicines. Our review identified five distinct categories of technology including mobile, radio frequency identification, advanced computational methods, online verification, and blockchain technology. Expert opinion: Digital fake medicine solutions are unifying platforms that integrate different types of anti-counterfeiting technologies as complementary solutions, improve information sharing and data collection, and are designed to overcome existing barriers of adoption and implementation. Investment in this next generation technology is essential to ensure the future security and integrity of the global drug supply chain.

  10. Towards the cyber security paradigm of ehealth: Resilience and design aspects

    NASA Astrophysics Data System (ADS)

    Rajamäki, Jyri; Pirinen, Rauno

    2017-06-01

    Digital technologies have significantly changed the role of healthcare clients in seeking and receiving medical help, as well as brought up more cooperative policy issues in healthcare cross-border services. Citizens continue to take a more co-creative role in decisions about their own healthcare, and new technologies can enable and facilitate this emergent trend. In this study, healthcare services have been intended as a critical societal sector and therefore healthcare systems are focused on as critical infrastructures that ought to be protected from all types of fears, including cyber security threats and attacks. Despite continual progress in the systemic risk management of cyber domain, it is clear that anticipation and prevention of all possible types of attack and malfunction are not achievable for current or future cyber infrastructures. This study focuses on the investigation of a cyber security paradigm, adaptive systems and sense of resilience in a healthcare critical information infrastructure.

  11. Integrating Safety with Science,Technology and Innovation at Los Alamos National Laboratory

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Rich, Bethany M

    2012-04-02

    The mission of Los Alamos National Laboratory (LANL) is to develop and apply science, technology and engineering solutions to ensure the safety, security, and reliability of the U.S. nuclear deterrent; reduce global threats; and solve emerging national security challenges. The most important responsibility is to direct and conduct efforts to meet the mission with an emphasis on safety, security, and quality. In this article, LANL Environmental, Safety, and Health (ESH) trainers discuss how their application and use of a kinetic learning module (learn by doing) with a unique fall arrest system is helping to address one the most common industrialmore » safety challenges: slips and falls. A unique integration of Human Performance Improvement (HPI), Behavior Based Safety (BBS) and elements of the Voluntary Protection Program (VPP) combined with an interactive simulator experience is being used to address slip and fall events at Los Alamos.« less

  12. Security Attacks and Solutions in Electronic Health (E-health) Systems.

    PubMed

    Zeadally, Sherali; Isaac, Jesús Téllez; Baig, Zubair

    2016-12-01

    For centuries, healthcare has been a basic service provided by many governments to their citizens. Over the past few decades, we have witnessed a significant transformation in the quality of healthcare services provided by healthcare organizations and professionals. Recent advances have led to the emergence of Electronic Health (E-health), largely made possible by the massive deployment and adoption of information and communication technologies (ICTs). However, cybercriminals and attackers are exploiting vulnerabilities associated primarily with ICTs, causing data breaches of patients' confidential digital health information records. Here, we review recent security attacks reported for E-healthcare and discuss the solutions proposed to mitigate them. We also identify security challenges that must be addressed by E-health system designers and implementers in the future, to respond to threats that could arise as E-health systems become integrated with technologies such as cloud computing, the Internet of Things, and smart cities.

  13. Protocol and the post-human performativity of security techniques.

    PubMed

    O'Grady, Nathaniel

    2016-07-01

    This article explores the deployment of exercises by the United Kingdom Fire and Rescue Service. Exercises stage, simulate and act out potential future emergencies and in so doing help the Fire and Rescue Service prepare for future emergencies. Specifically, exercises operate to assess and develop protocol; sets of guidelines which plan out the actions undertaken by the Fire and Rescue Service in responding to a fire. In the article I outline and assess the forms of knowledge and technologies, what I call the 'aesthetic forces', by which the exercise makes present and imagines future emergencies. By critically engaging with Karen Barad's notion of post-human performativity, I argue that exercises provide a site where such forces can entangle with one another; creating a bricolage through which future emergencies are evoked sensually and representatively, ultimately making it possible to experience emergencies in the present. This understanding of exercises allows also for critical appraisal of protocol both as phenomena that are produced through the enmeshing of different aesthetic forces and as devices which premise the operation of the security apparatus on contingency.

  14. Protocol and the post-human performativity of security techniques

    PubMed Central

    O’Grady, Nathaniel

    2015-01-01

    This article explores the deployment of exercises by the United Kingdom Fire and Rescue Service. Exercises stage, simulate and act out potential future emergencies and in so doing help the Fire and Rescue Service prepare for future emergencies. Specifically, exercises operate to assess and develop protocol; sets of guidelines which plan out the actions undertaken by the Fire and Rescue Service in responding to a fire. In the article I outline and assess the forms of knowledge and technologies, what I call the ‘aesthetic forces’, by which the exercise makes present and imagines future emergencies. By critically engaging with Karen Barad’s notion of post-human performativity, I argue that exercises provide a site where such forces can entangle with one another; creating a bricolage through which future emergencies are evoked sensually and representatively, ultimately making it possible to experience emergencies in the present. This understanding of exercises allows also for critical appraisal of protocol both as phenomena that are produced through the enmeshing of different aesthetic forces and as devices which premise the operation of the security apparatus on contingency. PMID:29708110

  15. The meaning of technology in an intensive care unit--an interview study.

    PubMed

    Wikström, Ann-Charlott; Cederborg, Ann-Christin; Johanson, Marita

    2007-08-01

    Previous research has suggested technology may dehumanise patient care and also that technology may restrict nurses' freedom of action. This raises questions about the relationship between technology, care and medicine in units where the patient's need for treatment is often an emergency. The aim of the study was to explore how staff members in an intensive care unit (ICU) make sense of technology in their everyday practice. Twelve staff members from one ICU were interviewed about their understanding of technology in their everyday practice. Three main findings emerged from the analysis: Technology seems to be considered decisive as it directs and controls medical treatment and results in the patients' well being; technology is seen as facilitating everyday practice because it makes treatment more secure and decreases workload; however technology can complicate the staff members' everyday practice as it is not completely trustworthy, is not easy to handle and can cause ethical dilemmas. Contrary to previous findings this study shows that technology seems to be embedded in care and medical treatment. Furthermore, the meaning of technology appears to be dependent on the different staff members' accounting practices.

  16. Information security concepts and practices: the case of a provincial multi-specialty hospital.

    PubMed

    Cavalli, Enrico; Mattasoglio, Andrea; Pinciroli, Francesco; Spaggiari, Piergiorgio

    2004-03-31

    In recent years, major and widely accepted information security understandings and achievements confirm that the problem is complex. They clarify that technologies are fundamental tools, but management processes have even bigger relevance, as also prestigious international magazines dossier clearly explained recently. Such a magazine attention outlines the wide impact that the subject has on watchful decision makers. ISO17799 is an emerging standard in information security. In principle there are no reasons for considering it not applicable to the health care sector. In practice, because of both the just conceptual level of the standard and the peculiarities of the health care data and institutions, a lot of analysis and design work need to be invested any time a health care institution decides to deal with the subject. CEN/ENV 12924 is another emerging standard certainly more on the spot of the health care. Nevertheless, it also asks for evident further investigation. The practical case of information security design, implementation, management, and auditing inside a multi-specialty provincial Italian hospital will be described.

  17. Integrating security in multiple, remote, and diverse facilities: how major health systems are meeting today's and tomorrow's technological and organizational challenges.

    PubMed

    1996-11-01

    As the trend to mergers and diversification of healthcare facilities grows, so too does the challenge to security directors to effectively and efficiently protect not only acute care, emergency, and outpatient facilities, but physician office buildings, parking garages, long-term-care units, medical schools, technical service units, and even health clubs. Besides the different security and communications problems posed by each type of facility, the problem of distance between facilities and their geographic location must also be met. In this report, we'll update you on the approaches being taken by security and planning executives at three leading health systems and how they are dealing with current and future problems.

  18. Design tools for complex dynamic security systems.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Byrne, Raymond Harry; Rigdon, James Brian; Rohrer, Brandon Robinson

    2007-01-01

    The development of tools for complex dynamic security systems is not a straight forward engineering task but, rather, a scientific task where discovery of new scientific principles and math is necessary. For years, scientists have observed complex behavior but have had difficulty understanding it. Prominent examples include: insect colony organization, the stock market, molecular interactions, fractals, and emergent behavior. Engineering such systems will be an even greater challenge. This report explores four tools for engineered complex dynamic security systems: Partially Observable Markov Decision Process, Percolation Theory, Graph Theory, and Exergy/Entropy Theory. Additionally, enabling hardware technology for next generation security systemsmore » are described: a 100 node wireless sensor network, unmanned ground vehicle and unmanned aerial vehicle.« less

  19. 47 CFR 214.1 - Purpose.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 47 Telecommunication 5 2013-10-01 2013-10-01 false Purpose. 214.1 Section 214.1 Telecommunication OFFICE OF SCIENCE AND TECHNOLOGY POLICY AND NATIONAL SECURITY COUNCIL PROCEDURES FOR THE USE AND COORDINATION OF THE RADIO SPECTRUM DURING A WARTIME EMERGENCY § 214.1 Purpose. The purpose of this part is to...

  20. 2011 IT Expo

    NASA Image and Video Library

    2011-06-21

    Stennis Space Center employees enjoyed an opportunity to learn about available and emerging information technology services during the seventh annual IT Expo in the Roy S. Estess Building on June 21. The expo featured exhibits on a variety of services and capabilities, including applications support, IT security, video production, audiovisual services and records management.

  1. Contemporary Responses to Violent Attacks on College Campuses

    ERIC Educational Resources Information Center

    Sulkowski, Michael L.; Lazarus, Philip J.

    2011-01-01

    In this article, the authors review efforts to increase the availability of crime data to students and parents, utilize security technologies on campus, allow members of campus communities to carry concealed weapons, use criminal or potential shooter profiling, employ threat assessment techniques, and implement emergency response plans to address…

  2. DEVELOPMENT AND APPLICATIONS OF CFD SIMULATIONS SUPPORTING URBAN AIR QUALITY AND HOMELAND SECURITY

    EPA Science Inventory

    Prior to September 11, 2001 developments of Computational Fluid Dynamics (CFD) were begun to support air quality applications. CFD models are emerging as a promising technology for such assessments, in part due to the advancing power of computational hardware and software. CFD si...

  3. Minimizing Security Vulnerabilities in High-Tech Classrooms

    ERIC Educational Resources Information Center

    Ozkan, Betul C.; Gunay, Vedat

    2004-01-01

    Emerging technologies are quickly becoming part of daily learning and teaching endeavors in academia. Due to the access to certain high-tech tools educators must learn how to integrate these tools in educational settings. However, many also encounter problems and weaknesses in the same high-tech environment that uses and delivers information…

  4. 47 CFR 214.4 - Planned actions.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 47 Telecommunication 5 2014-10-01 2014-10-01 false Planned actions. 214.4 Section 214.4 Telecommunication OFFICE OF SCIENCE AND TECHNOLOGY POLICY AND NATIONAL SECURITY COUNCIL PROCEDURES FOR THE USE AND COORDINATION OF THE RADIO SPECTRUM DURING A WARTIME EMERGENCY § 214.4 Planned actions. (a) Whenever it is...

  5. 47 CFR 214.1 - Purpose.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 47 Telecommunication 5 2011-10-01 2011-10-01 false Purpose. 214.1 Section 214.1 Telecommunication OFFICE OF SCIENCE AND TECHNOLOGY POLICY AND NATIONAL SECURITY COUNCIL PROCEDURES FOR THE USE AND COORDINATION OF THE RADIO SPECTRUM DURING A WARTIME EMERGENCY § 214.1 Purpose. The purpose of this part is to...

  6. 47 CFR 214.6 - Postattack procedures and actions.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 47 Telecommunication 5 2014-10-01 2014-10-01 false Postattack procedures and actions. 214.6 Section 214.6 Telecommunication OFFICE OF SCIENCE AND TECHNOLOGY POLICY AND NATIONAL SECURITY COUNCIL PROCEDURES FOR THE USE AND COORDINATION OF THE RADIO SPECTRUM DURING A WARTIME EMERGENCY § 214.6 Postattack...

  7. 47 CFR 214.1 - Purpose.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 47 Telecommunication 5 2010-10-01 2010-10-01 false Purpose. 214.1 Section 214.1 Telecommunication OFFICE OF SCIENCE AND TECHNOLOGY POLICY AND NATIONAL SECURITY COUNCIL PROCEDURES FOR THE USE AND COORDINATION OF THE RADIO SPECTRUM DURING A WARTIME EMERGENCY § 214.1 Purpose. The purpose of this part is to...

  8. 47 CFR 214.6 - Postattack procedures and actions.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 47 Telecommunication 5 2012-10-01 2012-10-01 false Postattack procedures and actions. 214.6 Section 214.6 Telecommunication OFFICE OF SCIENCE AND TECHNOLOGY POLICY AND NATIONAL SECURITY COUNCIL PROCEDURES FOR THE USE AND COORDINATION OF THE RADIO SPECTRUM DURING A WARTIME EMERGENCY § 214.6 Postattack...

  9. 47 CFR 214.4 - Planned actions.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 47 Telecommunication 5 2012-10-01 2012-10-01 false Planned actions. 214.4 Section 214.4 Telecommunication OFFICE OF SCIENCE AND TECHNOLOGY POLICY AND NATIONAL SECURITY COUNCIL PROCEDURES FOR THE USE AND COORDINATION OF THE RADIO SPECTRUM DURING A WARTIME EMERGENCY § 214.4 Planned actions. (a) Whenever it is...

  10. 47 CFR 214.6 - Postattack procedures and actions.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 47 Telecommunication 5 2010-10-01 2010-10-01 false Postattack procedures and actions. 214.6 Section 214.6 Telecommunication OFFICE OF SCIENCE AND TECHNOLOGY POLICY AND NATIONAL SECURITY COUNCIL PROCEDURES FOR THE USE AND COORDINATION OF THE RADIO SPECTRUM DURING A WARTIME EMERGENCY § 214.6 Postattack...

  11. 47 CFR 214.1 - Purpose.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 47 Telecommunication 5 2014-10-01 2014-10-01 false Purpose. 214.1 Section 214.1 Telecommunication OFFICE OF SCIENCE AND TECHNOLOGY POLICY AND NATIONAL SECURITY COUNCIL PROCEDURES FOR THE USE AND COORDINATION OF THE RADIO SPECTRUM DURING A WARTIME EMERGENCY § 214.1 Purpose. The purpose of this part is to...

  12. 47 CFR 214.6 - Postattack procedures and actions.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 47 Telecommunication 5 2011-10-01 2011-10-01 false Postattack procedures and actions. 214.6 Section 214.6 Telecommunication OFFICE OF SCIENCE AND TECHNOLOGY POLICY AND NATIONAL SECURITY COUNCIL PROCEDURES FOR THE USE AND COORDINATION OF THE RADIO SPECTRUM DURING A WARTIME EMERGENCY § 214.6 Postattack...

  13. 47 CFR 214.1 - Purpose.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 47 Telecommunication 5 2012-10-01 2012-10-01 false Purpose. 214.1 Section 214.1 Telecommunication OFFICE OF SCIENCE AND TECHNOLOGY POLICY AND NATIONAL SECURITY COUNCIL PROCEDURES FOR THE USE AND COORDINATION OF THE RADIO SPECTRUM DURING A WARTIME EMERGENCY § 214.1 Purpose. The purpose of this part is to...

  14. 47 CFR 214.4 - Planned actions.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 47 Telecommunication 5 2010-10-01 2010-10-01 false Planned actions. 214.4 Section 214.4 Telecommunication OFFICE OF SCIENCE AND TECHNOLOGY POLICY AND NATIONAL SECURITY COUNCIL PROCEDURES FOR THE USE AND COORDINATION OF THE RADIO SPECTRUM DURING A WARTIME EMERGENCY § 214.4 Planned actions. (a) Whenever it is...

  15. 47 CFR 214.4 - Planned actions.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 47 Telecommunication 5 2011-10-01 2011-10-01 false Planned actions. 214.4 Section 214.4 Telecommunication OFFICE OF SCIENCE AND TECHNOLOGY POLICY AND NATIONAL SECURITY COUNCIL PROCEDURES FOR THE USE AND COORDINATION OF THE RADIO SPECTRUM DURING A WARTIME EMERGENCY § 214.4 Planned actions. (a) Whenever it is...

  16. Nuclear Terrorism - Dimensions, Options, and Perspectives in Moldova

    NASA Astrophysics Data System (ADS)

    Vaseashta, Ashok; Susmann, P.; Braman, Eric W.; Enaki, Nicolae A.

    Securing nuclear materials, controlling contraband and preventing proliferation is an international priority to resolve using technology, diplomacy, strategic alliances, and if necessary, targeted military exercises. Nuclear security consists of complementary programs involving international legal and regulatory structure, intelligence and law enforcement agencies, border and customs forces, point and stand-off radiation detectors, personal protection equipment, preparedness for emergency and disaster, and consequence management teams. The strategic goal of UNSCR 1540 and the GICNT is to prevent nuclear materials from finding their way into the hands of our adversaries. This multi-jurisdictional and multi-agency effort demands tremendous coordination, technology assessment, policy development and guidance from several sectors. The overall goal envisions creating a secured environment that controls and protects nuclear materials while maintaining the free flow of commerce and individual liberty on international basis. Integral to such efforts are technologies to sense/detect nuclear material, provide advance information of nuclear smuggling routes, and other advanced means to control nuclear contraband and prevent proliferation. We provide an overview of GICNT and several initiatives supporting such efforts. An overview is provided of technological advances in support of point and stand-off detection and receiving advance information of nuclear material movement from perspectives of the Republic of Moldova.

  17. MAC layer security issues in wireless mesh networks

    NASA Astrophysics Data System (ADS)

    Reddy, K. Ganesh; Thilagam, P. Santhi

    2016-03-01

    Wireless Mesh Networks (WMNs) have emerged as a promising technology for a broad range of applications due to their self-organizing, self-configuring and self-healing capability, in addition to their low cost and easy maintenance. Securing WMNs is more challenging and complex issue due to their inherent characteristics such as shared wireless medium, multi-hop and inter-network communication, highly dynamic network topology and decentralized architecture. These vulnerable features expose the WMNs to several types of attacks in MAC layer. The existing MAC layer standards and implementations are inadequate to secure these features and fail to provide comprehensive security solutions to protect both backbone and client mesh. Hence, there is a need for developing efficient, scalable and integrated security solutions for WMNs. In this paper, we classify the MAC layer attacks and analyze the existing countermeasures. Based on attacks classification and countermeasures analysis, we derive the research directions to enhance the MAC layer security for WMNs.

  18. Implantable electronics: emerging design issues and an ultra light-weight security solution.

    PubMed

    Narasimhan, Seetharam; Wang, Xinmu; Bhunia, Swarup

    2010-01-01

    Implantable systems that monitor biological signals require increasingly complex digital signal processing (DSP) electronics for real-time in-situ analysis and compression of the recorded signals. While it is well-known that such signal processing hardware needs to be implemented under tight area and power constraints, new design requirements emerge with their increasing complexity. Use of nanoscale technology shows tremendous benefits in implementing these advanced circuits due to dramatic improvement in integration density and power dissipation per operation. However, it also brings in new challenges such as reliability and large idle power (due to higher leakage current). Besides, programmability of the device as well as security of the recorded information are rapidly becoming major design considerations of such systems. In this paper, we analyze the emerging issues associated with the design of the DSP unit in an implantable system. Next, we propose a novel ultra light-weight solution to address the information security issue. Unlike the conventional information security approaches like data encryption, which come at large area and power overhead and hence are not amenable for resource-constrained implantable systems, we propose a multilevel key-based scrambling algorithm, which exploits the nature of the biological signal to effectively obfuscate it. Analysis of the proposed algorithm in the context of neural signal processing and its hardware implementation shows that we can achieve high level of security with ∼ 13X lower power and ∼ 5X lower area overhead than conventional cryptographic solutions.

  19. Knowledge of practice: A multi-sited event ethnography of border security fairs in Europe and North America.

    PubMed

    Baird, Theodore

    2017-06-01

    This article takes the reader inside four border security fairs in Europe and North America to examine the knowledge practices of border security professionals. Building on the border security as practice research agenda, the analysis focuses on the production, circulation, and consumption of scarce forms of knowledge. To explore situated knowledge of border security practices, I develop an approach to multi-sited event ethnography to observe and interpret knowledge that may be hard to access at the security fairs. The analysis focuses on mechanisms for disseminating and distributing scarce forms of knowledge, technological materializations of situated knowledge, expressions of transversal knowledge of security problems, how masculinities structure knowledge in gendered ways, and how unease is expressed through imagined futures in order to anticipate emergent solutions to proposed security problems. The article concludes by reflecting on the contradictions at play at fairs and how to address such contradictions through alternative knowledges and practices.

  20. Knowledge of practice: A multi-sited event ethnography of border security fairs in Europe and North America

    PubMed Central

    Baird, Theodore

    2017-01-01

    This article takes the reader inside four border security fairs in Europe and North America to examine the knowledge practices of border security professionals. Building on the border security as practice research agenda, the analysis focuses on the production, circulation, and consumption of scarce forms of knowledge. To explore situated knowledge of border security practices, I develop an approach to multi-sited event ethnography to observe and interpret knowledge that may be hard to access at the security fairs. The analysis focuses on mechanisms for disseminating and distributing scarce forms of knowledge, technological materializations of situated knowledge, expressions of transversal knowledge of security problems, how masculinities structure knowledge in gendered ways, and how unease is expressed through imagined futures in order to anticipate emergent solutions to proposed security problems. The article concludes by reflecting on the contradictions at play at fairs and how to address such contradictions through alternative knowledges and practices. PMID:29046601

  1. The Design Process of Physical Security as Applied to a U.S. Border Port of Entry

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Wagner, G.G.

    1999-02-22

    This paper details the application of a standard physical security system design process to a US Border Port of Entry (PoE) for vehicle entry/exit. The physical security design methodology is described as well as the physical security similarities to facilities currently at a US Border PoE for vehicles. The physical security design process description includes the various elements that make up the methodologies well as the considerations that must be taken into account when dealing with system integration of those elements. The distinctions between preventing unlawful entry/exit of illegal contraband and personnel are described. The potential to enhance the functionsmore » of drug/contraband detection in the Pre-Primary Inspection area through the application of emerging technologies are also addressed.« less

  2. Privacy and security of patient data in the pathology laboratory.

    PubMed

    Cucoranu, Ioan C; Parwani, Anil V; West, Andrew J; Romero-Lauro, Gonzalo; Nauman, Kevin; Carter, Alexis B; Balis, Ulysses J; Tuthill, Mark J; Pantanowitz, Liron

    2013-01-01

    Data protection and security are critical components of routine pathology practice because laboratories are legally required to securely store and transmit electronic patient data. With increasing connectivity of information systems, laboratory work-stations, and instruments themselves to the Internet, the demand to continuously protect and secure laboratory information can become a daunting task. This review addresses informatics security issues in the pathology laboratory related to passwords, biometric devices, data encryption, internet security, virtual private networks, firewalls, anti-viral software, and emergency security situations, as well as the potential impact that newer technologies such as mobile devices have on the privacy and security of electronic protected health information (ePHI). In the United States, the Health Insurance Portability and Accountability Act (HIPAA) govern the privacy and protection of medical information and health records. The HIPAA security standards final rule mandate administrative, physical, and technical safeguards to ensure the confidentiality, integrity, and security of ePHI. Importantly, security failures often lead to privacy breaches, invoking the HIPAA privacy rule as well. Therefore, this review also highlights key aspects of HIPAA and its impact on the pathology laboratory in the United States.

  3. Access to mobile communications by older people.

    PubMed

    Nguyen, Toan; Irizarry, Carol; Garrett, Rob; Downing, Andrew

    2015-06-01

    To investigate how older people effectively identify, select and learn to use mobile communications technologies to enhance communication and safety, and support independent living. One hundred and fifty-three older South Australians participated in a purpose-designed survey questionnaire. Older people relied on family and friends for information and advice (76%), and their children's assistance with buying (45%) and learning to use (48%) new technology. The most preferred learning method was face-to-face training (56%). Less than half (44%) were interested in trying out new designs/applications, functions and capabilities that could assist with independent living. The highest need was for personal security and emergencies (88%). Findings suggest that the family and friends of older people play an important role in identifying, selecting and learning to use mobile communication technologies. The safety and emergency capabilities of mobile communications technologies were more important than having functions that could assist with independent living. © 2014 ACOTA.

  4. A Grid Infrastructure for Supporting Space-based Science Operations

    NASA Technical Reports Server (NTRS)

    Bradford, Robert N.; Redman, Sandra H.; McNair, Ann R. (Technical Monitor)

    2002-01-01

    Emerging technologies for computational grid infrastructures have the potential for revolutionizing the way computers are used in all aspects of our lives. Computational grids are currently being implemented to provide a large-scale, dynamic, and secure research and engineering environments based on standards and next-generation reusable software, enabling greater science and engineering productivity through shared resources and distributed computing for less cost than traditional architectures. Combined with the emerging technologies of high-performance networks, grids provide researchers, scientists and engineers the first real opportunity for an effective distributed collaborative environment with access to resources such as computational and storage systems, instruments, and software tools and services for the most computationally challenging applications.

  5. Emergency managers as community change agents: an expanded vision of the profession.

    PubMed

    Drabek, Thomas E

    2014-01-01

    Reflecting the historical evolution of attack preparedness, technological failures, and so-called natural disaster events, the profession of emergency management confronts new challenges today. In part, these reflect important cultural differences among stakeholder groups, especially local emergency managers. homeland security personnel, and those focused on public health threats and business continuity. An expanded and more strategic vision of the profession is required wherein fundamental assumption sets are placed into broader contexts. Contrary to the drift experienced in the US during the past decade, a major paradigm shift is required reflecting new orientations and program priorities.

  6. Identifying the Science and Technology Dimensions of Emerging Public Policy Issues through Horizon Scanning

    PubMed Central

    Parker, Miles; Acland, Andrew; Armstrong, Harry J.; Bellingham, Jim R.; Bland, Jessica; Bodmer, Helen C.; Burall, Simon; Castell, Sarah; Chilvers, Jason; Cleevely, David D.; Cope, David; Costanzo, Lucia; Dolan, James A.; Doubleday, Robert; Feng, Wai Yi; Godfray, H. Charles J.; Good, David A.; Grant, Jonathan; Green, Nick; Groen, Arnoud J.; Guilliams, Tim T.; Gupta, Sunjai; Hall, Amanda C.; Heathfield, Adam; Hotopp, Ulrike; Kass, Gary; Leeder, Tim; Lickorish, Fiona A.; Lueshi, Leila M.; Magee, Chris; Mata, Tiago; McBride, Tony; McCarthy, Natasha; Mercer, Alan; Neilson, Ross; Ouchikh, Jackie; Oughton, Edward J.; Oxenham, David; Pallett, Helen; Palmer, James; Patmore, Jeff; Petts, Judith; Pinkerton, Jan; Ploszek, Richard; Pratt, Alan; Rocks, Sophie A.; Stansfield, Neil; Surkovic, Elizabeth; Tyler, Christopher P.; Watkinson, Andrew R.; Wentworth, Jonny; Willis, Rebecca; Wollner, Patrick K. A.; Worts, Kim; Sutherland, William J.

    2014-01-01

    Public policy requires public support, which in turn implies a need to enable the public not just to understand policy but also to be engaged in its development. Where complex science and technology issues are involved in policy making, this takes time, so it is important to identify emerging issues of this type and prepare engagement plans. In our horizon scanning exercise, we used a modified Delphi technique [1]. A wide group of people with interests in the science and policy interface (drawn from policy makers, policy adviser, practitioners, the private sector and academics) elicited a long list of emergent policy issues in which science and technology would feature strongly and which would also necessitate public engagement as policies are developed. This was then refined to a short list of top priorities for policy makers. Thirty issues were identified within broad areas of business and technology; energy and environment; government, politics and education; health, healthcare, population and aging; information, communication, infrastructure and transport; and public safety and national security. PMID:24879444

  7. Video performance for high security applications.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Connell, Jack C.; Norman, Bradley C.

    2010-06-01

    The complexity of physical protection systems has increased to address modern threats to national security and emerging commercial technologies. A key element of modern physical protection systems is the data presented to the human operator used for rapid determination of the cause of an alarm, whether false (e.g., caused by an animal, debris, etc.) or real (e.g., a human adversary). Alarm assessment, the human validation of a sensor alarm, primarily relies on imaging technologies and video systems. Developing measures of effectiveness (MOE) that drive the design or evaluation of a video system or technology becomes a challenge, given the subjectivitymore » of the application (e.g., alarm assessment). Sandia National Laboratories has conducted empirical analysis using field test data and mathematical models such as binomial distribution and Johnson target transfer functions to develop MOEs for video system technologies. Depending on the technology, the task of the security operator and the distance to the target, the Probability of Assessment (PAs) can be determined as a function of a variety of conditions or assumptions. PAs used as an MOE allows the systems engineer to conduct trade studies, make informed design decisions, or evaluate new higher-risk technologies. This paper outlines general video system design trade-offs, discusses ways video can be used to increase system performance and lists MOEs for video systems used in subjective applications such as alarm assessment.« less

  8. Governance and Risk Management of Network and Information Security: The Role of Public Private Partnerships in Managing the Existing and Emerging Risks

    NASA Astrophysics Data System (ADS)

    Navare, Jyoti; Gemikonakli, Orhan

    Globalisation and new technology has opened the gates to more security risks. As the strategic importance of communication networks and information increased, threats to the security and safety of communication infrastructures, as well as information stored in and/or transmitted increased significantly. The development of the self replicating programmes has become a nightmare for Internet users. Leading companies, strategic organisations were not immune to attacks; they were also "hacked" and overtaken by intruders. Incidents of recent years have also shown that national/regional crisis may also trigger cyber attacks at large scale. Experts forecast that cyber wars are likely to take the stage as tension mounts between developed societies. New risks such as cyber-attacks, network terrorism and disintegration of traditional infrastructures has somewhat blurred the boundaries of operation and control. This paper seeks to consider the risk management and governance and looking more specifically at implications for emerging economies.

  9. Emergent functions of quantum materials

    NASA Astrophysics Data System (ADS)

    Tokura, Yoshinori; Kawasaki, Masashi; Nagaosa, Naoto

    2017-11-01

    Materials can harbour quantum many-body systems, most typically in the form of strongly correlated electrons in solids, that lead to novel and remarkable functions thanks to emergence--collective behaviours that arise from strong interactions among the elements. These include the Mott transition, high-temperature superconductivity, topological superconductivity, colossal magnetoresistance, giant magnetoelectric effect, and topological insulators. These phenomena will probably be crucial for developing the next-generation quantum technologies that will meet the urgent technological demands for achieving a sustainable and safe society. Dissipationless electronics using topological currents and quantum spins, energy harvesting such as photovoltaics and thermoelectrics, and secure quantum computing and communication are the three major fields of applications working towards this goal. Here, we review the basic principles and the current status of the emergent phenomena and functions in materials from the viewpoint of strong correlation and topology.

  10. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Eltoweissy, Mohamed Y.; Du, David H.C.; Gerla, Mario

    Mission-Critical Networking (MCN) refers to networking for application domains where life or livelihood may be at risk. Typical application domains for MCN include critical infrastructure protection and operation, emergency and crisis intervention, healthcare services, and military operations. Such networking is essential for safety, security and economic vitality in our complex world characterized by uncertainty, heterogeneity, emergent behaviors, and the need for reliable and timely response. MCN comprise networking technology, infrastructures and services that may alleviate the risk and directly enable and enhance connectivity for mission-critical information exchange among diverse, widely dispersed, mobile users.

  11. Securing the data economy: translating privacy and enacting security in the development of DataSHIELD.

    PubMed

    Murtagh, M J; Demir, I; Jenkings, K N; Wallace, S E; Murtagh, B; Boniol, M; Bota, M; Laflamme, P; Boffetta, P; Ferretti, V; Burton, P R

    2012-01-01

    Contemporary bioscience is seeing the emergence of a new data economy: with data as its fundamental unit of exchange. While sharing data within this new 'economy' provides many potential advantages, the sharing of individual data raises important social and ethical concerns. We examine ongoing development of one technology, DataSHIELD, which appears to elide privacy concerns about sharing data by enabling shared analysis while not actually sharing any individual-level data. We combine presentation of the development of DataSHIELD with presentation of an ethnographic study of a workshop to test the technology. DataSHIELD produced an application of the norm of privacy that was practical, flexible and operationalizable in researchers' everyday activities, and one which fulfilled the requirements of ethics committees. We demonstrated that an analysis run via DataSHIELD could precisely replicate results produced by a standard analysis where all data are physically pooled and analyzed together. In developing DataSHIELD, the ethical concept of privacy was transformed into an issue of security. Development of DataSHIELD was based on social practices as well as scientific and ethical motivations. Therefore, the 'success' of DataSHIELD would, likewise, be dependent on more than just the mathematics and the security of the technology. Copyright © 2012 S. Karger AG, Basel.

  12. Unmanned Aerial Systems Traffic Management (UTM): Safely Enabling UAS Operations in Low-Altitude Airspace

    NASA Technical Reports Server (NTRS)

    Jung, Jaewoo; Kopardekar, Parimal H.

    2016-01-01

    Flexibility where possible, and structure where necessary. Consider the needs of national security, safe airspace operations, economic opportunities, and emerging technologies. Risk-based approach based on population density, assets on the ground, density of operations, etc. Digital, virtual, dynamic, and as needed UTM services to manage operations.

  13. Unmanned Aerial Systems Traffic Management (UTM): Safely Enabling UAS Operations in Low-Altitude Airspace

    NASA Technical Reports Server (NTRS)

    Kopardekar, Parimal H.; Cavolowsky, John

    2015-01-01

    Flexibility where possible, and structure where necessary. Consider the needs of national security, safe airspace operations, economic opportunities, and emerging technologies. Risk-based approach based on population density, assets on the ground, density of operations, etc. Digital, virtual, dynamic, and as needed UTM services to manage operations.

  14. Using Social Media to Support the Learning Needs of Future IS Security Professionals

    ERIC Educational Resources Information Center

    Neville, Karen; Heavin, Ciara

    2013-01-01

    The emergence of social media has forced educators to think differently about the way learning occurs. Students and practitioners alike are using new technologies to connect with peers/colleagues, share ideas, resources and experiences for extracurricular activities. The social business gaming platform considered in this study leverages the social…

  15. Wireless local area network for the dental office.

    PubMed

    Mupparapu, Muralidhar

    2004-01-01

    Dental offices are no exception to the implementation of new and advanced technology, especially if it enhances productivity. In a rapidly transforming digital world, wireless technology has a special place, as it has truly "retired the wire" and contributed to the ease and efficient access to patient data and other software-based applications for diagnosis and treatment. If the office or the clinic is networked, access to patient management software, imaging software and treatment planning tools is enhanced. Access will be further enhanced and unrestricted if the entire network is wireless. As with any new, emerging technology, there will be issues that should be kept in mind before adapting to the wireless environment. Foremost is the network security involved in the installation and use of these wireless networks. This short, technical manuscript deals with standards and choices in wireless technology currently available for implementation within a dental office. The benefits of each network security protocol available to protect patient data and boost the efficiency of a modern dental office are discussed.

  16. China, the United States, and competition for resources that enable emerging technologies

    USGS Publications Warehouse

    Gulley, Andrew L.; Nassar, Nedal T.; Xun, Sean

    2018-01-01

    Historically, resource conflicts have often centered on fuel minerals (particularly oil). Future resource conflicts may, however, focus more on competition for nonfuel minerals that enable emerging technologies. Whether it is rhenium in jet engines, indium in flat panel displays, or gallium in smart phones, obscure elements empower smarter, smaller, and faster technologies, and nations seek stable supplies of these and other nonfuel minerals for their industries. No nation has all of the resources it needs domestically. International trade may lead to international competition for these resources if supplies are deemed at risk or insufficient to satisfy growing demand, especially for minerals used in technologies important to economic development and national security. Here, we compare the net import reliance of China and the United States to inform mineral resource competition and foreign supply risk. Our analysis indicates that China relies on imports for over half of its consumption for 19 of 42 nonfuel minerals, compared with 24 for the United States—11 of which are common to both. It is for these 11 nonfuel minerals that competition between the United States and China may become the most contentious, especially for those with highly concentrated production that prove irreplaceable in pivotal emerging technologies.

  17. Innovation and stasis: technology and race in Mark Twain's Pudd'nhead Wilson.

    PubMed

    Current, Cynthia A

    2009-01-01

    Mark Twain's Pudd'nhead Wilson demonstrates how technologies of identification attempt to counter how bodies evolve beyond previous constraints—in particular, the constraints of racial classification. Twain develops accounts of subjectivity and racial classification that cover an extraordinary breadth of genealogy, biology, and law, while still invoking elements of randomness and chance. The key to such combinations of fixity and emergence in human identity is the technology of fingerprinting. Twain's speculative engagement with fingerprinting creates a system and medium to classify and secure particular forms of identity, leading to the reassertion of racial values already inherent in science and technology, law, and commerce. Fingerprinting represents the direction that technologies of identity would seek to employ: a movement away from direct visual observation of bodies, whose emergence and change over time make them difficult to categorize, to reliance on archives of information that are increasingly removed from the contexts of meaning and emergence those bodies inhabit; this reflects "one drop" politics, as race becomes increasingly difficult to define visually. The archive itself, then, becomes infected with the spectacular vitality of, and the speculation and risk within, nineteenth-century biological and cultural determinism.

  18. Biosecurity in the age of Big Data: a conversation with the FBI.

    PubMed

    You, Edward; Kozminski, Keith G

    2015-11-05

    New scientific frontiers and emerging technologies within the life sciences pose many global challenges to society. Big Data is a premier example, especially with respect to individual, national, and international security. Here a Special Agent of the Federal Bureau of Investigation discusses the security implications of Big Data and the need for security in the life sciences. © 2015 Kozminski. This article is distributed by The American Society for Cell Biology under license from the author(s). Two months after publication it is available to the public under an Attribution–Noncommercial–Share Alike 3.0 Unported Creative Commons License (http://creativecommons.org/licenses/by-nc-sa/3.0).

  19. Information Assurance in Wireless Networks

    NASA Astrophysics Data System (ADS)

    Kabara, Joseph; Krishnamurthy, Prashant; Tipper, David

    2001-09-01

    Emerging wireless networks will contain a hybrid infrastructure based on fixed, mobile and ad hoc topologies and technologies. In such a dynamic architecture, we define information assurance as the provisions for both information security and information availability. The implications of this definition are that the wireless network architecture must (a) provide sufficient security measures, (b) be survivable under node or link attack or failure and (c) be designed such that sufficient capacity remains for all critical services (and preferably most other services) in the event of attack or component failure. We have begun a research project to investigate the provision of information assurance for wireless networks viz. survivability, security and availability and here discuss the issues and challenges therein.

  20. Access control based on attribute certificates for medical intranet applications.

    PubMed

    Mavridis, I; Georgiadis, C; Pangalos, G; Khair, M

    2001-01-01

    Clinical information systems frequently use intranet and Internet technologies. However these technologies have emphasized sharing and not security, despite the sensitive and private nature of much health information. Digital certificates (electronic documents which recognize an entity or its attributes) can be used to control access in clinical intranet applications. To outline the need for access control in distributed clinical database systems, to describe the use of digital certificates and security policies, and to propose the architecture for a system using digital certificates, cryptography and security policy to control access to clinical intranet applications. We have previously developed a security policy, DIMEDAC (Distributed Medical Database Access Control), which is compatible with emerging public key and privilege management infrastructure. In our implementation approach we propose the use of digital certificates, to be used in conjunction with DIMEDAC. Our proposed access control system consists of two phases: the ways users gain their security credentials; and how these credentials are used to access medical data. Three types of digital certificates are used: identity certificates for authentication; attribute certificates for authorization; and access-rule certificates for propagation of access control policy. Once a user is identified and authenticated, subsequent access decisions are based on a combination of identity and attribute certificates, with access-rule certificates providing the policy framework. Access control in clinical intranet applications can be successfully and securely managed through the use of digital certificates and the DIMEDAC security policy.

  1. Preparedness for emergency response: guidelines for the emergency planning process.

    PubMed

    Perry, Ronald W; Lindell, Michael K

    2003-12-01

    Especially since the terrorist attacks of 11 September 2001, governments worldwide have invested considerable resources in the writing of terrorism emergency response plans. Particularly in the United States, the federal government has created new homeland security organisations and urged state and local governments to draw up plans. This emphasis on the written plan tends to draw attention away from the process of planning itself and the original objective of achieving community emergency preparedness. This paper reviews the concepts of community preparedness and emergency planning, and their relationships with training, exercises and the written plan. A series of 10 planning process guidelines are presented that draw upon the preparedness literature for natural and technological disasters, and can be applied to any environmental threat.

  2. Put a Coalatom in Your Tank: The Compelling Case for a Marriage of Coal and Nuclear Energy

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Penfield, Scott R. Jr.; Bolthrunis, Charles O.

    2006-07-01

    Increasing costs and security concerns with present fossil energy sources, plus environmental concerns related to CO{sub 2} emissions and the emergence of new technologies in the energy and transportation sectors set the stage for a marriage of convenience between coal and nuclear energy. As the price of oil continues to increase and supply becomes increasingly constrained, coal offers a secure domestic alternative to foreign oil as a source of liquid fuels. However, conventional technologies for converting coal to liquid fuels produce large quantities of CO{sub 2} that must be released or sequestered. Advanced nuclear technologies, particularly the High-Temperature Gas-Cooled Reactormore » (HTGR), have the potential to produce hydrogen via water splitting; however, the transportation and storage of hydrogen are significant barriers to the 'Holy Grail', the Hydrogen Economy. In a coal/nuclear marriage, the hydrogen and oxygen provided by nuclear energy are joined with coal as a source of carbon to provide liquid fuels with negligible CO{sub 2} release from the process. In combination with emerging hybrid vehicles, fuels based on a coal/nuclear marriage promise stable prices, increased domestic security and a reduction in CO{sub 2} emissions without the need to completely replace our transportation fuels infrastructure. The intent of this paper is to outline the technical basis for the above points and to show that process energy applications of nuclear energy can provide the basis for answering some of the tougher questions related to energy and the environment. (authors)« less

  3. PRESAGE: PRivacy-preserving gEnetic testing via SoftwAre Guard Extension.

    PubMed

    Chen, Feng; Wang, Chenghong; Dai, Wenrui; Jiang, Xiaoqian; Mohammed, Noman; Al Aziz, Md Momin; Sadat, Md Nazmus; Sahinalp, Cenk; Lauter, Kristin; Wang, Shuang

    2017-07-26

    Advances in DNA sequencing technologies have prompted a wide range of genomic applications to improve healthcare and facilitate biomedical research. However, privacy and security concerns have emerged as a challenge for utilizing cloud computing to handle sensitive genomic data. We present one of the first implementations of Software Guard Extension (SGX) based securely outsourced genetic testing framework, which leverages multiple cryptographic protocols and minimal perfect hash scheme to enable efficient and secure data storage and computation outsourcing. We compared the performance of the proposed PRESAGE framework with the state-of-the-art homomorphic encryption scheme, as well as the plaintext implementation. The experimental results demonstrated significant performance over the homomorphic encryption methods and a small computational overhead in comparison to plaintext implementation. The proposed PRESAGE provides an alternative solution for secure and efficient genomic data outsourcing in an untrusted cloud by using a hybrid framework that combines secure hardware and multiple crypto protocols.

  4. Draft secure medical database standard.

    PubMed

    Pangalos, George

    2002-01-01

    Medical database security is a particularly important issue for all Healthcare establishments. Medical information systems are intended to support a wide range of pertinent health issues today, for example: assure the quality of care, support effective management of the health services institutions, monitor and contain the cost of care, implement technology into care without violating social values, ensure the equity and availability of care, preserve humanity despite the proliferation of technology etc.. In this context, medical database security aims primarily to support: high availability, accuracy and consistency of the stored data, the medical professional secrecy and confidentiality, and the protection of the privacy of the patient. These properties, though of technical nature, basically require that the system is actually helpful for medical care and not harmful to patients. These later properties require in turn not only that fundamental ethical principles are not violated by employing database systems, but instead, are effectively enforced by technical means. This document reviews the existing and emerging work on the security of medical database systems. It presents in detail the related problems and requirements related to medical database security. It addresses the problems of medical database security policies, secure design methodologies and implementation techniques. It also describes the current legal framework and regulatory requirements for medical database security. The issue of medical database security guidelines is also examined in detailed. The current national and international efforts in the area are studied. It also gives an overview of the research work in the area. The document also presents in detail the most complete to our knowledge set of security guidelines for the development and operation of medical database systems.

  5. Telemedicine: an emerging health care technology.

    PubMed

    Myers, Mary R

    2003-01-01

    Telemedicine uses advanced telecommunication technologies to exchange health information and provide health care services across geographic, time, social, and cultural barriers. All telemedicine applications require the use of the electronic transfer of information. Telemedicine encompasses computer technologies using narrow and high bandwidths for specific types of information transmission, broadcast video, compressed video, full motion video, and even virtual reality. There are many types of common medical devices that have been adapted for use with telemedicine technology, and many clinical services can be provided via telemedicine to patients who live in physician shortage areas. The greatest challenges for telemedicine in the twenty-first century are financing, safety standards, security, and infrastructure.

  6. Results of SEI Independent Research and Development Projects and Report on Emerging Technologies and Technology Trends

    DTIC Science & Technology

    2004-10-01

    Top-Level Process for Identification and Analysis of Safety-Related Re- quirements 4.4 Collaborators The primary SEI team members were Don Firesmith...Graff, M. & van Wyk, K. Secure Coding Principles & Practices. O’Reilly, 2003. • Hoglund, G. & McGraw, G. Exploiting Software: How to Break Code. Addison...Eisenecker, U.; Glück, R.; Vandevoorde, D.; & Veldhuizen , T. “Generative Programming and Active Libraries (Extended Abstract)” <osl.iu.edu/~tveldhui/papers

  7. The Feasibility of Wearables in an Enterprise Environment and Their Impact on IT Security

    NASA Technical Reports Server (NTRS)

    Scotti, Vincent, Jr.

    2015-01-01

    This paper is intended to explore the usability and feasibility of wearables in an enterprise environment and their impact on IT Security. In this day and age, with the advent of the Internet of Things, we must explore all the new technology emerging from the minds of the new inventors. This means exploring the use of wearables in regards to their benefits, limitations, and the new challenges they pose to securing computer networks in the Federal environment. We will explore the design of the wearables, the interfaces needed to connect them, and what it will take to connect personal devices in the Federal enterprise network environment. We will provide an overview of the wearable design, concerns of ensuring the confidentiality, integrity, and availability of information and the challenges faced by those doing so. We will also review the implications and limitations of the policies governing wearable technology and the physical efforts to enforce them.

  8. 49 CFR 1.44 - Office of Intelligence, Security and Emergency Response.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 49 Transportation 1 2013-10-01 2013-10-01 false Office of Intelligence, Security and Emergency... DELEGATION OF POWERS AND DUTIES Office of the Secretary Ost Officials § 1.44 Office of Intelligence, Security and Emergency Response. The Director of the Office of Intelligence, Security and Emergency Response is...

  9. 49 CFR 1.44 - Office of Intelligence, Security and Emergency Response.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 49 Transportation 1 2014-10-01 2014-10-01 false Office of Intelligence, Security and Emergency... DELEGATION OF POWERS AND DUTIES Office of the Secretary Ost Officials § 1.44 Office of Intelligence, Security and Emergency Response. The Director of the Office of Intelligence, Security and Emergency Response is...

  10. 49 CFR 1.44 - Office of Intelligence, Security and Emergency Response.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 49 Transportation 1 2012-10-01 2012-10-01 false Office of Intelligence, Security and Emergency... DELEGATION OF POWERS AND DUTIES Office of the Secretary Ost Officials § 1.44 Office of Intelligence, Security and Emergency Response. The Director of the Office of Intelligence, Security and Emergency Response is...

  11. Gerald L. Epstein, PhD: director, center for science, technology, and security policy, American Association for the Advancement of Science (AAAS). Interview by Madeline Drexler.

    PubMed

    Epstein, Gerald L

    2009-12-01

    Over his entire career, Gerald Epstein has toiled at the nexus of science, technology, and security. From 2003 to 2009, he was Senior Fellow for Science and Security at the Center for Strategic and International Studies Homeland Security Program, where he worked on reducing biological weapons threats, improving national preparedness, and easing potential tensions between the scientific research and national security communities. Epstein came to CSIS from the Institute for Defense Analyses. From 1996 to 2001, he served in the White House Office of Science and Technology Policy. And from 1983 to 1989, and again from 1991 until its demise in 1995, Epstein worked at the Congressional Office of Technology Assessment, where he directed a study on the proliferation of weapons of mass destruction, alongside research on other global security topics. A recognized expert in biological risk reduction, Epstein was actually trained as a physicist, having received SB degrees in physics and electrical engineering from MIT, and a PhD in physics from the University of California at Berkeley. How, then, did he come to study the evolving threat from bioterrorism? "What compelled me about bioterrorism was that it was a stellar example of a topic that would lead to a train wreck between the scientific community and the security community unless they figured out how to work together," he said. "The distance between a laboratory and a very large consequence event is a lot shorter in biology than in any other field. I got into bioterrorism to help make sure that the security community doesn't get so scared of the science that it shuts it down, and that the science community isn't so oblivious of security concerns that it pays no attention to them." Epstein spoke on November 6, 2009, with contributing writer Madeline Drexler, author of Emerging Epidemics: The Menace of New Infections (Penguin, 2009), an updated version of an earlier volume. Drexler holds a visiting appointment at the Harvard School of Public Health and is a senior fellow at Brandeis University's Schuster Institute for Investigative Journalism.

  12. LANL continuity of operations plan

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Senutovitch, Diane M

    2010-12-22

    The Los Alamos National Laboratory (LANL) is a premier national security research institution, delivering scientific and engineering solutions for the nation's most crucial and complex problems. Our primary responsibility is to ensure the safety, security, and reliability of the nation's nuclear stockpile. LANL emphasizes worker safety, effective operational safeguards and security, and environmental stewardship, outstanding science remains the foundation of work at the Laboratory. In addition to supporting the Laboratory's core national security mission, our work advances bioscience, chemistry, computer science, earth and environmental sciences, materials science, and physics disciplines. To accomplish LANL's mission, we must ensure that the Laboratorymore » EFs continue to be performed during a continuity event, including localized acts of nature, accidents, technological or attack-related emergencies, and pandemic or epidemic events. The LANL Continuity of Operations (COOP) Plan documents the overall LANL COOP Program and provides the operational framework to implement continuity policies, requirements, and responsibilities at LANL, as required by DOE 0 150.1, Continuity Programs, May 2008. LANL must maintain its ability to perform the nation's PMEFs, which are: (1) maintain the safety and security of nuclear materials in the DOE Complex at fixed sites and in transit; (2) respond to a nuclear incident, both domestically and internationally, caused by terrorist activity, natural disaster, or accident, including mobilizing the resources to support these efforts; and (3) support the nation's energy infrastructure. This plan supports Continuity of Operations for Los Alamos National Laboratory (LANL). This plan issues LANL policy as directed by the DOE 0 150.1, Continuity Programs, and provides direction for the orderly continuation of LANL EFs for 30 days of closure or 60 days for a pandemic/epidemic event. Initiation of COOP operations may be required to support an allhazards event, including a national security emergency, major fire, catastrophic natural disaster, man-made disaster, terrorism event, or technological disaster by rendering LANL buildings, infrastructure, or Technical Areas unsafe, temporarily unusable, or inaccessible.« less

  13. Blockchain Technology: A Data Framework to Improve Validity, Trust, and Accountability of Information Exchange in Health Professions Education.

    PubMed

    Funk, Eric; Riddell, Jeff; Ankel, Felix; Cabrera, Daniel

    2018-06-12

    Health professions educators face multiple challenges, among them the need to adapt educational methods to new technologies. In the last decades multiple new digital platforms have appeared in the learning arena, including massive open online courses and social media-based education. The major critique of these novel methods is the lack of the ability to ascertain the origin, validity, and accountability of the knowledge that is created, shared, and acquired. Recently, a novel technology based on secured data storage and transmission, called blockchain, has emerged as a way to generate networks where validity, trust, and accountability can be created. Conceptually blockchain is an open, public, distributed, and secure digital registry where information transactions are secured and have a clear origin, explicit pathways, and concrete value. Health professions education based on the blockchain will potentially allow improved tracking of content and the individuals who create it, quantify educational impact on multiple generations of learners, and build a relative value of educational interventions. Furthermore, institutions adopting blockchain technology would be able to provide certification and credentialing of healthcare professionals with no intermediaries. There is potential for blockchain to significantly change the future of health professions education and radically transform how patients, professionals, educators, and learners interact around safe, valid, and accountable information.

  14. Emergency drinking water treatment during source water pollution accidents in China: origin analysis, framework and technologies.

    PubMed

    Zhang, Xiao-Jian; Chen, Chao; Lin, Peng-Fei; Hou, Ai-Xin; Niu, Zhang-Bin; Wang, Jun

    2011-01-01

    China has suffered frequent source water contamination accidents in the past decade, which has resulted in severe consequences to the water supply of millions of residents. The origins of typical cases of contamination are discussed in this paper as well as the emergency response to these accidents. In general, excessive pursuit of rapid industrialization and the unreasonable location of factories are responsible for the increasing frequency of accidental pollution events. Moreover, insufficient attention to environmental protection and rudimentary emergency response capability has exacerbated the consequences of such accidents. These environmental accidents triggered or accelerated the promulgation of stricter environmental protection policy and the shift from economic development mode to a more sustainable direction, which should be regarded as the turning point of environmental protection in China. To guarantee water security, China is trying to establish a rapid and effective emergency response framework, build up the capability of early accident detection, and develop efficient technologies to remove contaminants from water.

  15. Physicists without borders

    NASA Astrophysics Data System (ADS)

    Jeandron, Michelle

    2008-06-01

    The International Atomic Energy Agency (IAEA), which has its headquarters in Vienna, Austria, is a specialized agency of the United Nations (UN) that seeks to promote the safe, secure and peaceful use of nuclear technology. It has three main areas of expertise. It is the world's nuclear inspectorate, sending inspectors to more than 140 UN member states, from Brazil to Japan, to verify that nuclear technology is not being used for military purposes. The IAEA also helps countries to improve their nuclear safety procedures and to prepare for emergencies. Finally, it serves as a focal point for the world's development of nuclear science and technology across all fields.

  16. Winning the Global Skills Race: National Centers Prime Students for Success in Emerging Job Markets

    ERIC Educational Resources Information Center

    Murray, Corey

    2007-01-01

    This article talks about a joint effort between the National Science Foundation and the nation's community colleges that helps students secure jobs in technical career fields. It describes Advanced Technological Education Program (ATE), National Science Foundation's (NSF's) premier initiative with two-year colleges that was created in response to…

  17. Inguinal Hernia and Airport Scanners: An Emerging Indication for Repair?

    PubMed Central

    Cawich, Shamir O.; Maharaj, Ravi; Dan, Dilip

    2013-01-01

    The use of advanced imaging technology at international airports is increasing in popularity as a corollary to heightened security concerns across the globe. Operators of airport scanners should be educated about common medical disorders such as inguinal herniae in order to avoid unnecessary harassment of travelers since they will encounter these with increasing frequency. PMID:24368923

  18. Trends that will affect your future ... The illness profit industry and national security.

    PubMed

    Schwartz, Stephan A

    2009-01-01

    The SchwartzReport tracks emerging trends that will affect the world, particularly the United States. For EXPLORE, it focuses on matters of health in the broadest sense of that term, including medical issues, changes in the biosphere, technology, and policy considerations, all of which will shape our culture and our lives.

  19. Inguinal hernia and airport scanners: an emerging indication for repair?

    PubMed

    Naraynsingh, Vijay; Cawich, Shamir O; Maharaj, Ravi; Dan, Dilip

    2013-01-01

    The use of advanced imaging technology at international airports is increasing in popularity as a corollary to heightened security concerns across the globe. Operators of airport scanners should be educated about common medical disorders such as inguinal herniae in order to avoid unnecessary harassment of travelers since they will encounter these with increasing frequency.

  20. Privacy and security of patient data in the pathology laboratory

    PubMed Central

    Cucoranu, Ioan C.; Parwani, Anil V.; West, Andrew J.; Romero-Lauro, Gonzalo; Nauman, Kevin; Carter, Alexis B.; Balis, Ulysses J.; Tuthill, Mark J.; Pantanowitz, Liron

    2013-01-01

    Data protection and security are critical components of routine pathology practice because laboratories are legally required to securely store and transmit electronic patient data. With increasing connectivity of information systems, laboratory work-stations, and instruments themselves to the Internet, the demand to continuously protect and secure laboratory information can become a daunting task. This review addresses informatics security issues in the pathology laboratory related to passwords, biometric devices, data encryption, internet security, virtual private networks, firewalls, anti-viral software, and emergency security situations, as well as the potential impact that newer technologies such as mobile devices have on the privacy and security of electronic protected health information (ePHI). In the United States, the Health Insurance Portability and Accountability Act (HIPAA) govern the privacy and protection of medical information and health records. The HIPAA security standards final rule mandate administrative, physical, and technical safeguards to ensure the confidentiality, integrity, and security of ePHI. Importantly, security failures often lead to privacy breaches, invoking the HIPAA privacy rule as well. Therefore, this review also highlights key aspects of HIPAA and its impact on the pathology laboratory in the United States. PMID:23599904

  1. 44 CFR 334.2 - Policy.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... Emergency Management and Assistance FEDERAL EMERGENCY MANAGEMENT AGENCY, DEPARTMENT OF HOMELAND SECURITY... government to meet essential defense and civilian needs during any national security emergency. Accordingly, each Federal department and agency shall prepare its national security emergency preparedness plans and...

  2. 49 CFR 1.45 - Delegations to the Director of the Office of Intelligence, Security and Emergency Response.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... Intelligence, Security and Emergency Response. 1.45 Section 1.45 Transportation Office of the Secretary of... Delegations to the Director of the Office of Intelligence, Security and Emergency Response. The Director of Intelligence, Security, and Emergency Response is delegated authority to: (a) Carry out the functions related...

  3. 49 CFR 1.45 - Delegations to the Director of the Office of Intelligence, Security and Emergency Response.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... Intelligence, Security and Emergency Response. 1.45 Section 1.45 Transportation Office of the Secretary of... Delegations to the Director of the Office of Intelligence, Security and Emergency Response. The Director of Intelligence, Security, and Emergency Response is delegated authority to: (a) Carry out the functions related...

  4. 49 CFR 1.45 - Delegations to the Director of the Office of Intelligence, Security and Emergency Response.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... Intelligence, Security and Emergency Response. 1.45 Section 1.45 Transportation Office of the Secretary of... Delegations to the Director of the Office of Intelligence, Security and Emergency Response. The Director of Intelligence, Security, and Emergency Response is delegated authority to: (a) Carry out the functions related...

  5. A Network Access Control Framework for 6LoWPAN Networks

    PubMed Central

    Oliveira, Luís M. L.; Rodrigues, Joel J. P. C.; de Sousa, Amaro F.; Lloret, Jaime

    2013-01-01

    Low power over wireless personal area networks (LoWPAN), in particular wireless sensor networks, represent an emerging technology with high potential to be employed in critical situations like security surveillance, battlefields, smart-grids, and in e-health applications. The support of security services in LoWPAN is considered a challenge. First, this type of networks is usually deployed in unattended environments, making them vulnerable to security attacks. Second, the constraints inherent to LoWPAN, such as scarce resources and limited battery capacity, impose a careful planning on how and where the security services should be deployed. Besides protecting the network from some well-known threats, it is important that security mechanisms be able to withstand attacks that have not been identified before. One way of reaching this goal is to control, at the network access level, which nodes can be attached to the network and to enforce their security compliance. This paper presents a network access security framework that can be used to control the nodes that have access to the network, based on administrative approval, and to enforce security compliance to the authorized nodes. PMID:23334610

  6. Secure Quantum Technologies

    NASA Astrophysics Data System (ADS)

    Malik, Mehul

    Over the past three decades, quantum mechanics has allowed the development of technologies that provide unconditionally secure communication. In parallel, the quantum nature of the transverse electromagnetic field has spawned the field of quantum imaging that encompasses technologies such as quantum lithography, quantum ghost imaging, and high-dimensional quantum key distribution (QKD). The emergence of such quantum technologies also highlights the need for the development of accurate and efficient methods of measuring and characterizing the elusive quantum state itself. In this thesis, I present new technologies that use the quantum properties of light for security. The first of these is a technique that extends the principles behind QKD to the field of imaging and optical ranging. By applying the polarization-based BB84 protocol to individual photons in an active imaging system, we obtained images that were secure against any intercept-resend jamming attacks. The second technology presented in this thesis is based on an extension of quantum ghost imaging, a technique that uses position-momentum entangled photons to create an image of an object without directly gaining any spatial information from it. We used a holographic filtering technique to build a quantum ghost image identification system that uses a few pairs of photons to identify an object from a set of known objects. The third technology addressed in this thesis is a high-dimensional QKD system that uses orbital-angular-momentum (OAM) modes of light for encoding. Moving to a high-dimensional state space in QKD allows one to impress more information on each photon, as well as introduce higher levels of security. I discuss the development of two OAM-QKD protocols based on the BB84 and Ekert protocols of QKD. In addition, I present a study characterizing the effects of turbulence on a communication system using OAM modes for encoding. The fourth and final technology presented in this thesis is a relatively new technique called direct measurement that uses sequential weak and strong measurements to characterize a quantum state. I use this technique to characterize the quantum state of a photon with a dimensionality of d = 27, and visualize its rotation in the natural basis of OAM.

  7. Performance evaluation of secured DICOM image communication with next generation internet protocol IPv6

    NASA Astrophysics Data System (ADS)

    Yu, Fenghai; Zhang, Jianguo; Chen, Xiaomeng; Huang, H. K.

    2005-04-01

    Next Generation Internet (NGI) technology with new communication protocol IPv6 emerges as a potential solution for low-cost and high-speed networks for image data transmission. IPv6 is designed to solve many of the problems of the current version of IP (known as IPv4) with regard to address depletion, security, autoconfiguration, extensibility, and more. We choose CTN (Central Test Node) DICOM software developed by The Mallinckrodt Institute of Radiology to implement IPv6/IPv4 enabled DICOM communication software on different operating systems (Windows/Linux), and used this DICOM software to evaluate the performance of the IPv6/IPv4 enabled DICOM image communication with different security setting and environments. We compared the security communications of IPsec with SSL/TLS on different TCP/IP protocols (IPv6/IPv4), and find that there are some trade-offs to choose security solution between IPsec and SSL/TLS in the security implementation of IPv6/IPv4 communication networks.

  8. Food security: contributions from science to a new and greener revolution

    PubMed Central

    Beddington, John

    2010-01-01

    There is an intrinsic link between the challenge we face to ensure food security through the twenty-first century and other global issues, most notably climate change, population growth and the need to sustainably manage the world's rapidly growing demand for energy and water. Our progress in reducing global poverty and achieving the Millennium Development Goals will be determined to a great extent by how coherently these long-term challenges are tackled. A key question is whether we can feed a future nine billion people equitably, healthily and sustainably. Science and technology can make a major contribution, by providing practical solutions. Securing this contribution requires that high priority be attached both to research and to facilitating the real world deployment of existing and emergent technologies. Put simply, we need a new, ‘greener revolution’. Important areas for focus include: crop improvement; smarter use of water and fertilizers; new pesticides and their effective management to avoid resistance problems; introduction of novel non-chemical approaches to crop protection; reduction of post-harvest losses; and more sustainable livestock and marine production. Techniques and technologies from many disciplines, ranging from biotechnology and engineering to newer fields such as nanotechnology, will be needed. PMID:20008386

  9. The Promise of Whole Genome Pathogen Sequencing for the Molecular Epidemiology of Emerging Aquaculture Pathogens

    PubMed Central

    Bayliss, Sion C.; Verner-Jeffreys, David W.; Bartie, Kerry L.; Aanensen, David M.; Sheppard, Samuel K.; Adams, Alexandra; Feil, Edward J.

    2017-01-01

    Aquaculture is the fastest growing food-producing sector, and the sustainability of this industry is critical both for global food security and economic welfare. The management of infectious disease represents a key challenge. Here, we discuss the opportunities afforded by whole genome sequencing of bacterial and viral pathogens of aquaculture to mitigate disease emergence and spread. We outline, by way of comparison, how sequencing technology is transforming the molecular epidemiology of pathogens of public health importance, emphasizing the importance of community-oriented databases and analysis tools. PMID:28217117

  10. Medical image security using modified chaos-based cryptography approach

    NASA Astrophysics Data System (ADS)

    Talib Gatta, Methaq; Al-latief, Shahad Thamear Abd

    2018-05-01

    The progressive development in telecommunication and networking technologies have led to the increased popularity of telemedicine usage which involve storage and transfer of medical images and related information so security concern is emerged. This paper presents a method to provide the security to the medical images since its play a major role in people healthcare organizations. The main idea in this work based on the chaotic sequence in order to provide efficient encryption method that allows reconstructing the original image from the encrypted image with high quality and minimum distortion in its content and doesn’t effect in human treatment and diagnosing. Experimental results prove the efficiency of the proposed method using some of statistical measures and robust correlation between original image and decrypted image.

  11. Quantum cryptography over underground optical fibers

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hughes, R.J.; Luther, G.G.; Morgan, G.L.

    1996-05-01

    Quantum cryptography is an emerging technology in which two parties may simultaneously generated shared, secret cryptographic key material using the transmission of quantum states of light whose security is based on the inviolability of the laws of quantum mechanics. An adversary can neither successfully tap the key transmissions, nor evade detection, owing to Heisenberg`s uncertainty principle. In this paper the authors describe the theory of quantum cryptography, and the most recent results from their experimental system with which they are generating key material over 14-km of underground optical fiber. These results show that optical-fiber based quantum cryptography could allow secure,more » real-time key generation over ``open`` multi-km node-to-node optical fiber communications links between secure ``islands.``« less

  12. Improvement of passive THz camera images

    NASA Astrophysics Data System (ADS)

    Kowalski, Marcin; Piszczek, Marek; Palka, Norbert; Szustakowski, Mieczyslaw

    2012-10-01

    Terahertz technology is one of emerging technologies that has a potential to change our life. There are a lot of attractive applications in fields like security, astronomy, biology and medicine. Until recent years, terahertz (THz) waves were an undiscovered, or most importantly, an unexploited area of electromagnetic spectrum. The reasons of this fact were difficulties in generation and detection of THz waves. Recent advances in hardware technology have started to open up the field to new applications such as THz imaging. The THz waves can penetrate through various materials. However, automated processing of THz images can be challenging. The THz frequency band is specially suited for clothes penetration because this radiation does not point any harmful ionizing effects thus it is safe for human beings. Strong technology development in this band have sparked with few interesting devices. Even if the development of THz cameras is an emerging topic, commercially available passive cameras still offer images of poor quality mainly because of its low resolution and low detectors sensitivity. Therefore, THz image processing is very challenging and urgent topic. Digital THz image processing is a really promising and cost-effective way for demanding security and defense applications. In the article we demonstrate the results of image quality enhancement and image fusion of images captured by a commercially available passive THz camera by means of various combined methods. Our research is focused on dangerous objects detection - guns, knives and bombs hidden under some popular types of clothing.

  13. Access Control based on Attribute Certificates for Medical Intranet Applications

    PubMed Central

    Georgiadis, Christos; Pangalos, George; Khair, Marie

    2001-01-01

    Background Clinical information systems frequently use intranet and Internet technologies. However these technologies have emphasized sharing and not security, despite the sensitive and private nature of much health information. Digital certificates (electronic documents which recognize an entity or its attributes) can be used to control access in clinical intranet applications. Objectives To outline the need for access control in distributed clinical database systems, to describe the use of digital certificates and security policies, and to propose the architecture for a system using digital certificates, cryptography and security policy to control access to clinical intranet applications. Methods We have previously developed a security policy, DIMEDAC (Distributed Medical Database Access Control), which is compatible with emerging public key and privilege management infrastructure. In our implementation approach we propose the use of digital certificates, to be used in conjunction with DIMEDAC. Results Our proposed access control system consists of two phases: the ways users gain their security credentials; and how these credentials are used to access medical data. Three types of digital certificates are used: identity certificates for authentication; attribute certificates for authorization; and access-rule certificates for propagation of access control policy. Once a user is identified and authenticated, subsequent access decisions are based on a combination of identity and attribute certificates, with access-rule certificates providing the policy framework. Conclusions Access control in clinical intranet applications can be successfully and securely managed through the use of digital certificates and the DIMEDAC security policy. PMID:11720951

  14. Network and data security design for telemedicine applications.

    PubMed

    Makris, L; Argiriou, N; Strintzis, M G

    1997-01-01

    The maturing of telecommunication technologies has ushered in a whole new era of applications and services in the health care environment. Teleworking, teleconsultation, mutlimedia conferencing and medical data distribution are rapidly becoming commonplace in clinical practice. As a result, a set of problems arises, concerning data confidentiality and integrity. Public computer networks, such as the emerging ISDN technology, are vulnerable to eavesdropping. Therefore it is important for telemedicine applications to employ end-to-end encryption mechanisms securing the data channel from unauthorized access of modification. We propose a network access and encryption system that is both economical and easily implemented for integration in developing or existing applications, using well-known and thoroughly tested encryption algorithms. Public-key cryptography is used for session-key exchange, while symmetric algorithms are used for bulk encryption. Mechanisms for session-key generation and exchange are also provided.

  15. 49 CFR 1.69 - Delegations to the Director of Intelligence, Security, and Emergency Response.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 1 2010-10-01 2010-10-01 false Delegations to the Director of Intelligence... Intelligence, Security, and Emergency Response. The Director of Intelligence, Security, and Emergency Response is delegated authority for the following: (a) Intelligence and Security. Carry out the functions...

  16. 49 CFR 1.69 - Delegations to the Director of Intelligence, Security, and Emergency Response.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 1 2011-10-01 2011-10-01 false Delegations to the Director of Intelligence... Intelligence, Security, and Emergency Response. The Director of Intelligence, Security, and Emergency Response is delegated authority for the following: (a) Intelligence and Security. Carry out the functions...

  17. A Reliable TTP-Based Infrastructure with Low Sensor Resource Consumption for the Smart Home Multi-Platform

    PubMed Central

    Kang, Jungho; Kim, Mansik; Park, Jong Hyuk

    2016-01-01

    With the ICT technology making great progress in the smart home environment, the ubiquitous environment is rapidly emerging all over the world, but problems are also increasing proportionally to the rapid growth of the smart home market such as multiplatform heterogeneity and new security threats. In addition, the smart home sensors have so low computing resources that they cannot process complicated computation tasks, which is required to create a proper security environment. A service provider also faces overhead in processing data from a rapidly increasing number of sensors. This paper aimed to propose a scheme to build infrastructure in which communication entities can securely authenticate and design security channel with physically unclonable PUFs and the TTP that smart home communication entities can rely on. In addition, we analyze and evaluate the proposed scheme for security and performance and prove that it can build secure channels with low resources. Finally, we expect that the proposed scheme can be helpful for secure communication with low resources in future smart home multiplatforms. PMID:27399699

  18. A Reliable TTP-Based Infrastructure with Low Sensor Resource Consumption for the Smart Home Multi-Platform.

    PubMed

    Kang, Jungho; Kim, Mansik; Park, Jong Hyuk

    2016-07-05

    With the ICT technology making great progress in the smart home environment, the ubiquitous environment is rapidly emerging all over the world, but problems are also increasing proportionally to the rapid growth of the smart home market such as multiplatform heterogeneity and new security threats. In addition, the smart home sensors have so low computing resources that they cannot process complicated computation tasks, which is required to create a proper security environment. A service provider also faces overhead in processing data from a rapidly increasing number of sensors. This paper aimed to propose a scheme to build infrastructure in which communication entities can securely authenticate and design security channel with physically unclonable PUFs and the TTP that smart home communication entities can rely on. In addition, we analyze and evaluate the proposed scheme for security and performance and prove that it can build secure channels with low resources. Finally, we expect that the proposed scheme can be helpful for secure communication with low resources in future smart home multiplatforms.

  19. Double-Edged Innovations: Preventing the Misuse of Emerging Biological/Chemical Technologies

    DTIC Science & Technology

    2010-07-01

    1953 paper describing the double-helical structure of the DNA molecule and suggesting a mechanism for its replication. In 1973, Stanley Cohen of...Virology in early 2001. The security implications of the paper , however, triggered a storm of...unexpected findings of the mousepox experiment could have been predicted because a paper describing the role of interleukin-4 in poxvirus virulence

  20. The Effectiveness of Homeland Security Training for Rural Communities: A Comparative Analysis of Web-Based and Instructor-Led Training Delivery

    ERIC Educational Resources Information Center

    Baggett, Ryan K.

    2012-01-01

    The development of advanced training technologies such as Web Based Training (WBT), coupled with the proliferation of computer and Internet availability, has increased training opportunities for rural communities. This advancement is critical to meeting the training needs of emergency response personnel in rural communities who routinely face the…

  1. WMD first response: requirements, emerging technologies, and policy implications

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Vergino, E S; Hoehn, W E

    2000-06-19

    In the US today, efforts are underway to defend against the possible terrorist use of weapons of mass destruction (WMD) against US cities. These efforts include the development and adaptation of technologies to support prevention and detection, to defend against a possible attack, and, if these fail, to provide both mitigation responses and attribution for a WMD incident. Technologies under development span a range of systems, from early detection and identification of an agent or explosive, to diagnostic and systems analysis tools; and to forensic analysis for law enforcement. Also, many techniques and tools that have been developed for othermore » applications are being examined to determine whether, with some modification, they could be of use by the emergency preparedness, public health, and law enforcement communities. However, anecdotal evidence suggests the existence of a serious disconnect between the technology development communities and these user communities. This disconnect arises because funding for technology development is derived primarily from sources (principally federal agencies) distant from the emergency response communities, which are predominantly state, county, or local entities. Moreover, the first responders with whom we have worked candidly admit that their jurisdictions have been given, or have purchased for them, a variety of technological devices, typically without consulting the emergency responders about their utility. In private discussions, emergency responders derisively refer to these as a closet full of useless toys. Technology developers have many new and relevant technologies currently in the development pipeline, but most have not been adequately vetted against the field needs or validated for field use. The Center for Global Security Research at the Lawrence Livermore National Laboratory and the Sam Nunn School of International Affairs at the Georgia Institute of Technology recently sponsored a two-day workshop to bring together some 50 representatives of the emergency response, technology development, and policy communities. Participating in this workshop were first responders (representing law enforcement, public health, and emergency response personnel from Los Angeles County, Salt Lake City, Atlanta, and London, England), technology developers from US government laboratories and universities, and policymakers from both the executive and legislative branches of the federal government. The workshop had several objectives. First, we wanted the emergency responders to define the utility of various technologies and tools currently available for first response to a WMD event. Second, we expected the workshop to provide input to the technologists directly from the field users, regarding their special requirements for, and constraints on the use of, new emergency response technologies. Third, we planned to expose the first responders to the types of new technologies under development and allow them the opportunity to ask questions and voice their needs. Finally, we planned to provide recommendations to policymakers for new directions for development and investment of technology.« less

  2. Legal interfaces in telemedicine technology.

    PubMed

    Lott, C M

    1996-05-01

    Telemedicine, an emerging technology which seeks to use advanced telecommunications equipment to enhance medical care, is progressing rapidly in the Department of Defense health care delivery system. This paper recommends that a cautious, preventive law approach be simultaneously initiated to ensure that the technology does not abridge patients' rights to confidentiality or security of medical records, and that agreement on practice parameters be developed. Seven interfaces, in the areas of informed consent, physician liability, non-physician liability, costs, practice parameters, physician-patient relationships, and ergonomics, are discussed in the context of telemedicine. The author recommends that telemedicine pioneers include the legal community's early input in the application of telemedicine technology to help avoid needless litigation.

  3. Virtualizing Resources for the Application Services and Framework Team

    NASA Technical Reports Server (NTRS)

    Varner, Justin T.; Crawford, Linda K.

    2010-01-01

    Virtualization is an emerging technology that will undoubtedly have a major impact on the future of Information Technology. It allows for the centralization of resources in an enterprise system without the need to make any changes to the host operating system, file system, or registry. In turn, this significantly reduces cost and administration, and provides a much greater level of security, compatibility, and efficiency. This experiment examined the practicality, methodology, challenges, and benefits of implementing the technology for the Launch Control System (LCS), and more specifically the Application Services (AS) group of the National Aeronautics and Space Administration (NASA) at the Kennedy Space Center (KSC). In order to carry out this experiment, I used several tools from the virtualization company known as VMWare; these programs included VMWare ThinApp, VMWare Workstation, and VMWare ACE. Used in conjunction, these utilities provided the engine necessary to virtualize and deploy applications in a desktop environment on any Windows platform available. The results clearly show that virtualization is a viable technology that can, when implemented properly, dramatically cut costs, enhance stability and security, and provide easier management for administrators.

  4. Life cycle evaluation of emerging lignocellulosic ethanol conversion technologies.

    PubMed

    Spatari, Sabrina; Bagley, David M; MacLean, Heather L

    2010-01-01

    Lignocellulosic ethanol holds promise for addressing climate change and energy security issues associated with personal transportation through lowering the fuel mixes' carbon intensity and petroleum demand. We compare the technological features and life cycle environmental impacts of near- and mid-term ethanol bioconversion technologies in the United States. Key uncertainties in the major processes: pre-treatment, hydrolysis, and fermentation are evaluated. The potential to reduce fossil energy use and greenhouse gas (GHG) emissions varies among bioconversion processes, although all options studied are considerably more attractive than gasoline. Anticipated future performance is found to be considerably more attractive than that published in the literature as being achieved to date. Electricity co-product credits are important in characterizing the GHG impacts of different ethanol production pathways; however, in the absence of near-term liquid transportation fuel alternatives to gasoline, optimizing ethanol facilities to produce ethanol (as opposed to co-products) is important for reducing the carbon intensity of the road transportation sector and for energy security.

  5. Security and Privacy in Cyber-Physical Systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Fink, Glenn A.; Edgar, Thomas W.; Rice, Theora R.

    As you have seen from the previous chapters, cyber-physical systems (CPS) are broadly used across technology and industrial domains. While these systems enable process optimization and efficiency and allow previously impossible functionality, security and privacy are key concerns for their design, development, and operation. CPS have been key components utilized in some of the highest publicized security breaches over the last decade. In this chapter, we will look over the CPS described in the previous chapters from a security perspective. In this chapter, we explain classical information and physical security fundamentals in the context of CPS and contextualize them acrossmore » application domains. We give examples where the interplay of functionality and diverse communication can introduce unexpected vulnerabilities and produce larger impacts. We will discuss how CPS security and privacy is inherently different from that of pure cyber or physical systems and what may be done to secure these systems, considering their emergent cyber-physical properties. Finally, we will discuss security and privacy implications of merging infrastructural and personal CPS. Our hope is to impart the knowledge of what CPS security and privacy are, why they are important, and explain existing processes and challenges.« less

  6. International Scavenging for First Responder Guidance and Tools: IAEA Products

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Stern, W.; Berthelot, L.; Bachner, K.

    In fiscal years (FY) 2016 and 2017, with support from the U.S. Department of Homeland Security (DHS), Brookhaven National Laboratory (BNL) examined the International Atomic Energy Agency (IAEA) radiological emergency response and preparedness products (guidance and tools) to determine which of these products could be useful to U.S. first responders. The IAEA Incident and Emergency Centre (IEC), which is responsible for emergency preparedness and response, offers a range of tools and guidance documents for responders in recognizing, responding to, and recovering from radiation emergencies and incidents. In order to implement this project, BNL obtained all potentially relevant tools and productsmore » produced by the IAEA IEC and analyzed these materials to determine their relevance to first responders in the U.S. Subsequently, BNL organized and hosted a workshop at DHS National Urban Security Technology Laboratory (NUSTL) for U.S. first responders to examine and evaluate IAEA products to consider their applicability to the United States. This report documents and describes the First Responder Product Evaluation Workshop, and provides recommendations on potential steps the U.S. federal government could take to make IAEA guidance and tools useful to U.S. responders.« less

  7. User interface design for mobile-based sexual health interventions for young people: design recommendations from a qualitative study on an online Chlamydia clinical care pathway.

    PubMed

    Gkatzidou, Voula; Hone, Kate; Sutcliffe, Lorna; Gibbs, Jo; Sadiq, Syed Tariq; Szczepura, Ala; Sonnenberg, Pam; Estcourt, Claudia

    2015-08-26

    The increasing pervasiveness of mobile technologies has given potential to transform healthcare by facilitating clinical management using software applications. These technologies may provide valuable tools in sexual health care and potentially overcome existing practical and cultural barriers to routine testing for sexually transmitted infections. In order to inform the design of a mobile health application for STIs that supports self-testing and self-management by linking diagnosis with online care pathways, we aimed to identify the dimensions and range of preferences for user interface design features among young people. Nine focus group discussions were conducted (n = 49) with two age-stratified samples (16 to 18 and 19 to 24 year olds) of young people from Further Education colleges and Higher Education establishments. Discussions explored young people's views with regard to: the software interface; the presentation of information; and the ordering of interaction steps. Discussions were audio recorded and transcribed verbatim. Interview transcripts were analysed using thematic analysis. Four over-arching themes emerged: privacy and security; credibility; user journey support; and the task-technology-context fit. From these themes, 20 user interface design recommendations for mobile health applications are proposed. For participants, although privacy was a major concern, security was not perceived as a major potential barrier as participants were generally unaware of potential security threats and inherently trusted new technology. Customisation also emerged as a key design preference to increase attractiveness and acceptability. Considerable effort should be focused on designing healthcare applications from the patient's perspective to maximise acceptability. The design recommendations proposed in this paper provide a valuable point of reference for the health design community to inform development of mobile-based health interventions for the diagnosis and treatment of a number of other conditions for this target group, while stimulating conversation across multidisciplinary communities.

  8. Laser radar: historical prospective-from the East to the West

    NASA Astrophysics Data System (ADS)

    Molebny, Vasyl; McManamon, Paul; Steinvall, Ove; Kobayashi, Takao; Chen, Weibiao

    2017-03-01

    This article discusses the history of laser radar development in America, Europe, and Asia. Direct detection laser radar is discussed for range finding, designation, and topographic mapping of Earth and of extraterrestrial objects. Coherent laser radar is discussed for environmental applications, such as wind sensing and for synthetic aperture laser radar development. Gated imaging is discussed through scattering layers for military, medical, and security applications. Laser microradars have found applications in intravascular studies and in ophthalmology for vision correction. Ghost laser radar has emerged as a new technology in theoretical and simulation applications. Laser radar is now emerging as an important technology for applications such as self-driving cars and unmanned aerial vehicles. It is also used by police to measure speed, and in gaming, such as the Microsoft Kinect.

  9. Sensor Acquisition for Water Utilities: Survey, Down Selection Process, and Technology List

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Alai, M; Glascoe, L; Love, A

    2005-06-29

    The early detection of the biological and chemical contamination of water distribution systems is a necessary capability for securing the nation's water supply. Current and emerging early-detection technology capabilities and shortcomings need to be identified and assessed to provide government agencies and water utilities with an improved methodology for assessing the value of installing these technologies. The Department of Homeland Security (DHS) has tasked a multi-laboratory team to evaluate current and future needs to protect the nation's water distribution infrastructure by supporting an objective evaluation of current and new technologies. The LLNL deliverable from this Operational Technology Demonstration (OTD) wasmore » to assist the development of a technology acquisition process for a water distribution early warning system. The technology survey includes a review of previous sensor surveys and current test programs and a compiled database of relevant technologies. In the survey paper we discuss previous efforts by governmental agencies, research organizations, and private companies. We provide a survey of previous sensor studies with regard to the use of Early Warning Systems (EWS) that includes earlier surveys, testing programs, and response studies. The list of sensor technologies was ultimately developed to assist in the recommendation of candidate technologies for laboratory and field testing. A set of recommendations for future sensor selection efforts has been appended to this document, as has a down selection example for a hypothetical water utility.« less

  10. Trends in Microfabrication Capabilities & Device Architectures.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bauer, Todd; Jones, Adam; Lentine, Anthony L.

    The last two decades have seen an explosion in worldwide R&D, enabling fundamentally new capabilities while at the same time changing the international technology landscape. The advent of technologies for continued miniaturization and electronics feature size reduction, and for architectural innovations, will have many technical, economic, and national security implications. It is important to anticipate possible microelectronics development directions and their implications on US national interests. This report forecasts and assesses trends and directions for several potentially disruptive microfabrication capabilities and device architectures that may emerge in the next 5-10 years.

  11. Cutting the Army’s Umbilical Cord: A Study of Emerging Fuel Technologies and Their Impact on National Security

    DTIC Science & Technology

    2011-12-01

    fuel saving technologies that may be on the civilian market but have not been vetted through the Army procurement process. Some are also military...global market . 18 This heavy dependence also requires that the U.S. use military forces to ensure access to oil both for the health of the U.S...the market price. However, what the cost per gallon does not include is the transparent costs that the FBCF captures. Using the AEPI Reports’ value of

  12. Neutron and Gamma Imaging for National Security Applications

    NASA Astrophysics Data System (ADS)

    Hornback, Donald

    2017-09-01

    The Department of Energy, National Nuclear Security Administration (NNSA), Office of Defense Nuclear Nonproliferation Research and Development (DNN R&D/NA-22) possesses, in part, the mission to develop technologies in support of nuclear security efforts in coordination with other U.S. government entities, such as the Department of Defense and the Department of Homeland Security. DNN R&D has long supported research in nuclear detection at national labs, universities, and through the small business innovation research (SBIR) program. Research topics supported include advanced detector materials and electronics, detection algorithm development, and advanced gamma/neutron detection systems. Neutron and gamma imaging, defined as the directional detection of radiation as opposed to radiography, provides advanced detection capabilities for the NNSA mission in areas of emergency response, international safeguards, and nuclear arms control treaty monitoring and verification. A technical and programmatic overview of efforts in this field of research will be summarized.

  13. Science and Strategic - Climate Implications

    NASA Astrophysics Data System (ADS)

    Tindall, J. A.; Moran, E. H.

    2008-12-01

    Energy of weather systems greatly exceeds energy produced and used by humans. Variation in this energy causes climate variability potentially resulting in local, national, and/or global catastrophes beyond our ability to deter the loss of life and economic destabilization. Large scale natural disasters routinely result in shortages of water, disruption of energy supplies, and destruction of infrastructure. The resulting unforeseen and disastrous events occurring beyond national emergency preparation, as related to climate variability, could insight civil unrest due to dwindling and/or inaccessible resources necessary for survival. Lack of these necessary resources in impacted countries often leads to wars. Climate change coupled with population growth, which exposes more of the population to potential risks associated with climate and environmental change, demands faster technological response. Understanding climate/associated environmental changes, the relation to human activity and behavior, and including this in national and international emergency/security management plans would alleviate shortcomings in our present and future technological status. The scale of environmental change will determine the potential magnitude of civil unrest at the local, national, and/or global level along with security issues at each level. Commonly, security issues related to possible civil unrest owing to temporal environmental change is not part of a short and/or long-term strategy, yet recent large-scale disasters are reminders that system failures (as in hurricane Katrina) include acknowledged breaches to individual, community, and infrastructure security. Without advance planning and management concerning environmental change, oncoming and climate related events will intensify the level of devastation and human catastrophe. Depending upon the magnitude and period of catastrophic events and/or environmental changes, destabilization of agricultural systems, energy supplies, and other lines of commodities often results in severely unbalanced supply and demand ratios, which eventually affect the entire global community. National economies potentially risk destabilization, which is especially important since economics plays a major role in strategic planning. This presentation will address these issues and the role that science can play in human sustainability and local, national, and international security.

  14. 44 CFR 8.3 - Senior FEMA official responsible for the information security program.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... responsible for the information security program. 8.3 Section 8.3 Emergency Management and Assistance FEDERAL EMERGENCY MANAGEMENT AGENCY, DEPARTMENT OF HOMELAND SECURITY GENERAL NATIONAL SECURITY INFORMATION § 8.3 Senior FEMA official responsible for the information security program. The Director of the Security...

  15. Emerging Techniques for Field Device Security

    DOE PAGES

    Schwartz, Moses; Bechtel Corp.; Mulder, John; ...

    2014-11-01

    Critical infrastructure, such as electrical power plants and oil refineries, rely on embedded devices to control essential processes. State of the art security is unable to detect attacks on these devices at the hardware or firmware level. We provide an overview of the hardware used in industrial control system field devices, look at how these devices have been attacked, and discuss techniques and new technologies that may be used to secure them. We follow three themes: (1) Inspectability, the capability for an external arbiter to monitor the internal state of a device. (2) Trustworthiness, the degree to which a systemmore » will continue to function correctly despite disruption, error, or attack. (3) Diversity, the use of adaptive systems and complexity to make attacks more difficult by reducing the feasible attack surface.« less

  16. Machine Learning Technologies Translates Vigilant Surveillance Satellite Big Data into Predictive Alerts for Environmental Stressors

    NASA Astrophysics Data System (ADS)

    Johnson, S. P.; Rohrer, M. E.

    2017-12-01

    The application of scientific research pertaining to satellite imaging and data processing has facilitated the development of dynamic methodologies and tools that utilize nanosatellites and analytical platforms to address the increasing scope, scale, and intensity of emerging environmental threats to national security. While the use of remotely sensed data to monitor the environment at local and global scales is not a novel proposition, the application of advances in nanosatellites and analytical platforms are capable of overcoming the data availability and accessibility barriers that have historically impeded the timely detection, identification, and monitoring of these stressors. Commercial and university-based applications of these technologies were used to identify and evaluate their capacity as security-motivated environmental monitoring tools. Presently, nanosatellites can provide consumers with 1-meter resolution imaging, frequent revisits, and customizable tasking, allowing users to define an appropriate temporal scale for high resolution data collection that meets their operational needs. Analytical platforms are capable of ingesting increasingly large and diverse volumes of data, delivering complex analyses in the form of interpretation-ready data products and solutions. The synchronous advancement of these technologies creates the capability of analytical platforms to deliver interpretable products from persistently collected high-resolution data that meet varying temporal and geographic scale requirements. In terms of emerging environmental threats, these advances translate into customizable and flexible tools that can respond to and accommodate the evolving nature of environmental stressors. This presentation will demonstrate the capability of nanosatellites and analytical platforms to provide timely, relevant, and actionable information that enables environmental analysts and stakeholders to make informed decisions regarding the prevention, intervention, and prediction of emerging environmental threats.

  17. Implementing healthcare information security: standards can help.

    PubMed

    Orel, Andrej; Bernik, Igor

    2013-01-01

    Using widely spread common approaches to systems security in health dedicated controlled environments, a level of awareness, confidence and acceptance of relevant standardisation is evaluated. Patients' information is sensitive, so putting appropriate organisational techniques as well as modern technology in place to secure health information is of paramount importance. Mobile devices are becoming the top priorities in advanced information security planning with healthcare environments being no exception. There are less and less application areas in healthcare without having a need for a mobile functionality which represents an even greater information security challenge. This is also true in emergency treatments, rehabilitation and homecare just to mention a few areas outside hospital controlled environments. Unfortunately quite often traditional unsecured communications principles are still in routine use for communicating sensitive health related information. The security awareness level with users, patients and care professionals is not high enough so potential threats and risks may not be addressed and the respective information security management is therefore weak. Standards like ISO/IEC 27000 ISMS family, the ISO/IEC 27799 information security guidelines in health are often not well known, but together with legislation principles such as HIPAA, they can help.

  18. Redesigning healthcare systems to meet the health challenges associated with climate change in the twenty-first century.

    PubMed

    Phua, Kai-Lit

    2015-01-01

    In the twenty-first century, climate change is emerging as a significant threat to the health and well-being of the public through links to the following: extreme weather events, sea level rise, temperature-related illnesses, air pollution patterns, water security, food security, vector-borne infectious diseases, and mental health effects (as a result of extreme weather events and climate change-induced population displacement). This article discusses how national healthcare systems can be redesigned through changes in its components such as human resources, facilities and technology, health information system, and health policy to meet these challenges.

  19. SPACE: Vision and Reality: Face to Face. Proceedings Report

    NASA Technical Reports Server (NTRS)

    1995-01-01

    The proceedings of the 11th National Space Symposium entitled 'Vision and Reality: Face to Face' is presented. Technological areas discussed include the following sections: Vision for the future; Positioning for the future; Remote sensing, the emerging era; space opportunities, Competitive vision with acquisition reality; National security requirements in space; The world is into space; and The outlook for space. An appendice is also attached.

  20. Using Automatic Identification System Technology to Improve Maritime Border Security

    DTIC Science & Technology

    2014-12-01

    digital selective calling EPIRB Emergency Position Indicting Radio Beacon EU European Union FAA Federal Aviation Administration GAO U. S. Government...that has visited a hovering vessel or received merchandise outside the territorial sea. A hovering vessel is defined as a vessel loitering offshore...often with the intent to introduce merchandise into the United States illegally. Departing the United States and transiting international or foreign

  1. NASA Virtual Glovebox (VBX): Emerging Simulation Technology for Space Station Experiment Design, Development, Training and Troubleshooting

    NASA Technical Reports Server (NTRS)

    Smith, Jeffrey D.; Twombly, I. Alexander; Maese, A. Christopher; Cagle, Yvonne; Boyle, Richard

    2003-01-01

    The International Space Station demonstrates the greatest capabilities of human ingenuity, international cooperation and technology development. The complexity of this space structure is unprecedented; and training astronaut crews to maintain all its systems, as well as perform a multitude of research experiments, requires the most advanced training tools and techniques. Computer simulation and virtual environments are currently used by astronauts to train for robotic arm manipulations and extravehicular activities; but now, with the latest computer technologies and recent successes in areas of medical simulation, the capability exists to train astronauts for more hands-on research tasks using immersive virtual environments. We have developed a new technology, the Virtual Glovebox (VGX), for simulation of experimental tasks that astronauts will perform aboard the Space Station. The VGX may also be used by crew support teams for design of experiments, testing equipment integration capability and optimizing the procedures astronauts will use. This is done through the 3D, desk-top sized, reach-in virtual environment that can simulate the microgravity environment in space. Additional features of the VGX allow for networking multiple users over the internet and operation of tele-robotic devices through an intuitive user interface. Although the system was developed for astronaut training and assisting support crews, Earth-bound applications, many emphasizing homeland security, have also been identified. Examples include training experts to handle hazardous biological and/or chemical agents in a safe simulation, operation of tele-robotic systems for assessing and diffusing threats such as bombs, and providing remote medical assistance to field personnel through a collaborative virtual environment. Thus, the emerging VGX simulation technology, while developed for space- based applications, can serve a dual use facilitating homeland security here on Earth.

  2. Secure data aggregation in heterogeneous and disparate networks using stand off server architecture

    NASA Astrophysics Data System (ADS)

    Vimalathithan, S.; Sudarsan, S. D.; Seker, R.; Lenin, R. B.; Ramaswamy, S.

    2009-04-01

    The emerging global reach of technology presents myriad challenges and intricacies as Information Technology teams aim to provide anywhere, anytime and anyone access, for service providers and customers alike. The world is fraught with stifling inequalities, both from an economic as well as socio-political perspective. The net result has been large capability gaps between various organizational locations that need to work together, which has raised new challenges for information security teams. Similar issues arise, when mergers and acquisitions among and between organizations take place. While integrating remote business locations with mainstream operations, one or more of the issues including the lack of application level support, computational capabilities, communication limitations, and legal requirements cause a serious impediment thereby complicating integration while not violating the organizations' security requirements. Often resorted techniques like IPSec, tunneling, secure socket layer, etc. may not be always techno-economically feasible. This paper addresses such security issues by introducing an intermediate server between corporate central server and remote sites, called stand-off-server. We present techniques such as break-before-make connection, break connection after transfer, multiple virtual machine instances with different operating systems using the concept of a stand-off-server. Our experiments show that the proposed solution provides sufficient isolation for the central server/site from attacks arising out of weak communication and/or computing links and is simple to implement.

  3. Communication and computing technology in biocontainment laboratories using the NEIDL as a model.

    PubMed

    McCall, John; Hardcastle, Kath

    2014-07-01

    The National Emerging Infectious Diseases Laboratories (NEIDL), Boston University, is a globally unique biocontainment research facility housing biosafety level 2 (BSL-2), BSL-3, and BSL-4 laboratories. Located in the BioSquare area at the University's Medical Campus, it is part of a national network of secure facilities constructed to study infectious diseases of major public health concern. The NEIDL allows for basic, translational, and clinical phases of research to be carried out in a single facility with the overall goal of accelerating understanding, treatment, and prevention of infectious diseases. The NEIDL will also act as a center of excellence providing training and education in all aspects of biocontainment research. Within every detail of NEIDL operations is a primary emphasis on safety and security. The ultramodern NEIDL has required a new approach to communications technology solutions in order to ensure safety and security and meet the needs of investigators working in this complex building. This article discusses the implementation of secure wireless networks and private cloud computing to promote operational efficiency, biosecurity, and biosafety with additional energy-saving advantages. The utilization of a dedicated data center, virtualized servers, virtualized desktop integration, multichannel secure wireless networks, and a NEIDL-dedicated Voice over Internet Protocol (VoIP) network are all discussed. © 2014 Federation of European Microbiological Societies. Published by John Wiley & Sons Ltd. All rights reserved.

  4. Development and Implementation of Culturally Tailored Offline Mobile Health Surveys.

    PubMed

    McIntosh, Scott; Pérez-Ramos, José; Demment, Margaret M; Vélez Vega, Carmen; Avendaño, Esteban; Ossip, Deborah J; Dye, Timothy D

    2016-06-02

    In low and middle income countries (LMICs), and other areas with low resources and unreliable access to the Internet, understanding the emerging best practices for the implementation of new mobile health (mHealth) technologies is needed for efficient and secure data management and for informing public health researchers. Innovations in mHealth technology can improve on previous methods, and dissemination of project development details and lessons learned during implementation are needed to provide lessons learned to stakeholders in both the United States and LMIC settings. The aims of this paper are to share implementation strategies and lessons learned from the development and implementation stages of two survey research projects using offline mobile technology, and to inform and prepare public health researchers and practitioners to implement new mobile technologies in survey research projects in LMICs. In 2015, two survey research projects were developed and piloted in Puerto Rico and pre-tested in Costa Rica to collect face-to-face data, get formative evaluation feedback, and to test the feasibility of an offline mobile data collection process. Fieldwork in each setting involved survey development, back translation with cultural tailoring, ethical review and approvals, data collector training, and piloting survey implementation on mobile tablets. Critical processes and workflows for survey research projects in low resource settings were identified and implemented. This included developing a secure mobile data platform tailored to each survey, establishing user accessibility, and training and eliciting feedback from data collectors and on-site LMIC project partners. Formative and process evaluation strategies are necessary and useful for the development and implementation of survey research projects using emerging mHealth technologies in LMICs and other low resource settings. Lessons learned include: (1) plan institutional review board (IRB) approvals in multiple countries carefully to allow for development, implementation, and feedback, (2) in addition to testing the content of survey instruments, allow time and consideration for testing the use of novel mHealth technology (hardware and software), (3) incorporate training for and feedback from project staff, LMIC partner staff, and research participants, and (4) change methods accordingly, including content, as mHealth technology usage influences and is influenced by the content and structure of the survey instrument. Lessons learned from early phases of LMIC research projects using emerging mHealth technologies are critical for informing subsequent research methods and study designs.

  5. Information security for compliance with select agent regulations.

    PubMed

    Lewis, Nick; Campbell, Mark J; Baskin, Carole R

    2015-01-01

    The past decade has seen a significant rise in research on high-consequence human and animal pathogens, many now known as "select agents." While physical security around these agents is tightly regulated, information security standards are still lagging. The understanding of the threats unique to the academic and research environment is still evolving, in part due to poor communication between the various stakeholders. Perhaps as a result, information security guidelines published by select agent regulators lack the critical details and directives needed to achieve even the lowest security level of the Federal Information Security Management Act (FISMA). While only government agencies are currently required to abide by the provisions of FISMA (unless specified as preconditions for obtaining government grants or contracts--still a relatively rare or narrowly scoped occurrence), the same strategies were recently recommended by executive order for others. We propose that information security guidelines for select agent research be updated to promulgate and detail FISMA standards and processes and that the latter be ultimately incorporated into select agent regulations. We also suggest that information security in academic and research institutions would greatly benefit from active efforts to improve communication among the biosecurity, security, and information technology communities, and from a secure venue for exchange of timely information on emerging threats and solutions in the research environment.

  6. Information Security for Compliance with Select Agent Regulations

    PubMed Central

    Lewis, Nick; Campbell, Mark J.

    2015-01-01

    The past decade has seen a significant rise in research on high-consequence human and animal pathogens, many now known as “select agents.” While physical security around these agents is tightly regulated, information security standards are still lagging. The understanding of the threats unique to the academic and research environment is still evolving, in part due to poor communication between the various stakeholders. Perhaps as a result, information security guidelines published by select agent regulators lack the critical details and directives needed to achieve even the lowest security level of the Federal Information Security Management Act (FISMA). While only government agencies are currently required to abide by the provisions of FISMA (unless specified as preconditions for obtaining government grants or contracts—still a relatively rare or narrowly scoped occurrence), the same strategies were recently recommended by executive order for others. We propose that information security guidelines for select agent research be updated to promulgate and detail FISMA standards and processes and that the latter be ultimately incorporated into select agent regulations. We also suggest that information security in academic and research institutions would greatly benefit from active efforts to improve communication among the biosecurity, security, and information technology communities, and from a secure venue for exchange of timely information on emerging threats and solutions in the research environment. PMID:26042864

  7. "It's Like a Cyber-Security Blanket": The Utility of Remote Activity Monitoring in Family Dementia Care.

    PubMed

    Mitchell, Lauren L; Peterson, Colleen M; Rud, Shaina R; Jutkowitz, Eric; Sarkinen, Andrielle; Trost, Sierra; Porta, Carolyn M; Finlay, Jessica M; Gaugler, Joseph E

    2018-03-01

    Technologies have emerged that aim to help older persons with Alzheimer's disease and related dementias (ADRDs) remain at home while also supporting their caregiving family members. However, the usefulness of these innovations, particularly in home-based care contexts, remains underexplored. The current study evaluated the acceptability and utility of an in-home remote activity monitoring (RAM) system for 30 family caregivers of persons with ADRD via quantitative survey data collected over a 6-month period and qualitative survey and interview data collected for up to 18 months. A parallel convergent mixed methods design was employed. The integrated qualitative and quantitative data suggested that RAM technology offered ongoing monitoring and provided caregivers with a sense of security. Considerable customization was needed so that RAM was most appropriate for persons with ADRD. The findings have important clinical implications when considering how RAM can supplement, or potentially substitute for, ADRD family care.

  8. 47 CFR 0.387 - Other national security and emergency preparedness delegations; cross reference.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 47 Telecommunication 1 2011-10-01 2011-10-01 false Other national security and emergency preparedness delegations; cross reference. 0.387 Section 0.387 Telecommunication FEDERAL COMMUNICATIONS COMMISSION GENERAL COMMISSION ORGANIZATION Delegations of Authority National Security and Emergency...

  9. Impact of new technologies on stress, attrition and well-being in emergency call centers: the NextGeneration 9-1-1 study protocol.

    PubMed

    Baseman, Janet; Revere, Debra; Painter, Ian; Stangenes, Scott; Lilly, Michelle; Beaton, Randal; Calhoun, Rebecca; Meischke, Hendrika

    2018-05-04

    Our public health emergency response system relies on the "first of the first responders"-the emergency call center workforce that handles the emergency needs of a public in distress. Call centers across the United States have been preparing for the "Next Generation 9-1-1" initiative, which will allow citizens to place 9-1-1 calls using a variety of digital technologies. The impacts of this initiative on a workforce that is already highly stressed is unknown. There is concern that these technology changes will increase stress, reduce job performance, contribute to maladaptive coping strategies, lower employee retention, or change morale in the workplace. Understanding these impacts to inform approaches for mitigating the health and performance risks associated with new technologies is crucial for ensuring the 911 system fulfills its mission of providing optimal emergency response to the public. Our project is an observational, prospective cohort study framed by the first new technology that will be implemented: text-to-911 calling. Emergency center call takers will be recruited nationwide. Data will be collected by online surveys distributed at each center before text-to-911 implementation; within the first month of implementation; and 6 months after implementation. Primary outcome measures are stress as measured by the Calgary Symptoms of Stress Index, use of sick leave, job performance, and job satisfaction. Primary analyses will use mixed effects regression models and mixed effects logistic regression models to estimate the change in outcome variables associated with text-to-911 implementation. Multiple secondary analyses will examine effects of stress on absenteeism; associations between technology attitudes and stress; effects of implementation on attitudes towards technology; and mitigating effects of job demands, job satisfaction, attitudes towards workplace technology and workplace support on change in stress. Our public health dependence on this workforce for our security and safety makes it imperative that the impact of technological changes such as text-to-911 are researched so appropriate intervention efforts to can be developed. Failing to protect our 9-1-1 call takers from predictable health risks would be similar to knowingly exposing field emergency responders to a toxic situation without following OSHA required training and practice standards assuring their protection.

  10. MSTD 2007 Publications and Patents

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    King, W E

    2008-04-01

    The Materials Science and Technology Division (MSTD) supports the central scientific and technological missions of the Laboratory, and at the same time, executes world-class, fundamental research and novel technological development over a wide range of disciplines. Our organization is driven by the institutional needs in nuclear weapons stockpile science, high-energy-density science, nuclear reactor science, and energy and environment science and technology. We maintain expertise and capabilities in many diverse areas, including actinide science, electron microscopy, laser-materials interactions, materials theory, simulation and modeling, materials synthesis and processing, materials science under extreme conditions, ultrafast materials science, metallurgy, nanoscience and technology, nuclear fuelsmore » and energy security, optical materials science, and surface science. MSTD scientists play leadership roles in the scientific community in these key and emerging areas.« less

  11. 47 CFR 0.387 - Other national security and emergency preparedness delegations; cross reference.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... Preparedness Delegations § 0.387 Other national security and emergency preparedness delegations; cross... 47 Telecommunication 1 2010-10-01 2010-10-01 false Other national security and emergency preparedness delegations; cross reference. 0.387 Section 0.387 Telecommunication FEDERAL COMMUNICATIONS...

  12. QCAPUF: QCA-based physically unclonable function as a hardware security primitive

    NASA Astrophysics Data System (ADS)

    Abutaleb, M. M.

    2018-04-01

    Physically unclonable functions (PUFs) are increasingly used as innovative security primitives to provide the hardware authentication and identification as well as the secret key generation based on unique and random variations in identically fabricated devices. Security and low power have appeared to become two crucial necessities to modern designs. As an emerging nanoelectronic technology, a quantum-dot cellular automata (QCA) can achieve ultra-low power consumption as well as an extremely small area for implementing digital designs. However, there are various classes of permanent defects that can happen during the manufacture of QCA devices. The recent extensive research has been focused on how to eliminate errors in QCA structures resulting from fabrication variances. By a completely different vision, to turn this disadvantage into an advantage, this paper presents a novel QCA-based PUF (QCAPUF) architecture to exploit the unique physical characteristics of fabricated QCA cells in order to produce different hardware fingerprint instances. This architecture is composed of proposed logic and interconnect blocks that have critical vulnerabilities and perform unexpected logical operations. The behaviour of QCAPUF is thoroughly analysed through physical relations and simulations. Results confirm that the proposed QCAPUF has state of the art PUF characteristics in the QCA technology. This paper will serve as a basis for further research into QCA-based hardware security primitives and applications.

  13. Control System Applicable Use Assessment of the Secure Computing Corporation - Secure Firewall (Sidewinder)

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hadley, Mark D.; Clements, Samuel L.

    2009-01-01

    Battelle’s National Security & Defense objective is, “applying unmatched expertise and unique facilities to deliver homeland security solutions. From detection and protection against weapons of mass destruction to emergency preparedness/response and protection of critical infrastructure, we are working with industry and government to integrate policy, operational, technological, and logistical parameters that will secure a safe future”. In an ongoing effort to meet this mission, engagements with industry that are intended to improve operational and technical attributes of commercial solutions that are related to national security initiatives are necessary. This necessity will ensure that capabilities for protecting critical infrastructure assets aremore » considered by commercial entities in their development, design, and deployment lifecycles thus addressing the alignment of identified deficiencies and improvements needed to support national cyber security initiatives. The Secure Firewall (Sidewinder) appliance by Secure Computing was assessed for applicable use in critical infrastructure control system environments, such as electric power, nuclear and other facilities containing critical systems that require augmented protection from cyber threat. The testing was performed in the Pacific Northwest National Laboratory’s (PNNL) Electric Infrastructure Operations Center (EIOC). The Secure Firewall was tested in a network configuration that emulates a typical control center network and then evaluated. A number of observations and recommendations are included in this report relating to features currently included in the Secure Firewall that support critical infrastructure security needs.« less

  14. When it comes to securing patient health information from breaches, your best medicine is a dose of prevention: A cybersecurity risk assessment checklist.

    PubMed

    Blanke, Sandra J; McGrady, Elizabeth

    2016-07-01

    Health care stakeholders are concerned about the growing risk of protecting sensitive patient health information from breaches. The Federal Emergency Management Agency (FEMA) has identified cyber attacks as an emerging concern, and regulations such as the Health Insurance Portability and Accountability Act (HIPAA) and the Health Information Technology for Economic and Clinical Health Act (HITECH) have increased security requirements and are enforcing compliance through stiff financial penalties. The purpose of this study is to describe health care breaches of protected information, analyze the hazards and vulnerabilities of reported breach cases, and prescribe best practices of managing risk through security controls and countermeasures. Prescriptive findings were used to construct a checklist tool to assess and monitor common risks. This research uses a case methodology to describe specific examples of the 3 major types of cyber breach hazards: portable device, insider, and physical breaches. We utilize a risk management framework to prescribe preventative actions that organizations can take to assess, analyze, and mitigate these risks. The health care sector has the largest number of reported breaches, with 3 major types: portable device, insider, and physical breaches. Analysis of actual cases indicates security gaps requiring prescriptive fixes based on "best practices." Our research culminates in a 25-item checklist that organizations can use to assess existing practices and identify security gaps requiring improvement. © 2016 American Society for Healthcare Risk Management of the American Hospital Association.

  15. Balanced diets in food systems: emerging trends and challenges for human health.

    PubMed

    Sammugam, Lakhsmi; Pasupuleti, Visweswara Rao

    2018-04-25

    Processed foods, generally known as modified raw foods produced by innovative processing technologies alters the food constituents such natural enzymes, fatty acids, micronutrients, macronutrients and vitamins. In contrast to fresh and unprocessed foods, processed foods are guaranteed to be safer, imperishable, long lasting and consist high level of nutrients bioactivity. Currently, the evolution in food processing technologies is necessary to face food security and safety, nutrition demand, its availability and also other global challenges in the food system. In this scenario, this review consists of information on two food processing technologies, which effects on processed foods before and after processing and the impact of food products on human health. It is also very well established that understanding the type and structure of foods to be processed can assist food processing industries towards advancement of novel food products. In connection with this fact, the present article also discusses the emerging trends and possible modifications in food processing technologies with the combination of conventional and modern techniques to get the suitable nutritional and safety qualities in food.

  16. A Lightweight Protocol for Secure Video Streaming

    PubMed Central

    Morkevicius, Nerijus; Bagdonas, Kazimieras

    2018-01-01

    The Internet of Things (IoT) introduces many new challenges which cannot be solved using traditional cloud and host computing models. A new architecture known as fog computing is emerging to address these technological and security gaps. Traditional security paradigms focused on providing perimeter-based protections and client/server point to point protocols (e.g., Transport Layer Security (TLS)) are no longer the best choices for addressing new security challenges in fog computing end devices, where energy and computational resources are limited. In this paper, we present a lightweight secure streaming protocol for the fog computing “Fog Node-End Device” layer. This protocol is lightweight, connectionless, supports broadcast and multicast operations, and is able to provide data source authentication, data integrity, and confidentiality. The protocol is based on simple and energy efficient cryptographic methods, such as Hash Message Authentication Codes (HMAC) and symmetrical ciphers, and uses modified User Datagram Protocol (UDP) packets to embed authentication data into streaming data. Data redundancy could be added to improve reliability in lossy networks. The experimental results summarized in this paper confirm that the proposed method efficiently uses energy and computational resources and at the same time provides security properties on par with the Datagram TLS (DTLS) standard. PMID:29757988

  17. A Lightweight Protocol for Secure Video Streaming.

    PubMed

    Venčkauskas, Algimantas; Morkevicius, Nerijus; Bagdonas, Kazimieras; Damaševičius, Robertas; Maskeliūnas, Rytis

    2018-05-14

    The Internet of Things (IoT) introduces many new challenges which cannot be solved using traditional cloud and host computing models. A new architecture known as fog computing is emerging to address these technological and security gaps. Traditional security paradigms focused on providing perimeter-based protections and client/server point to point protocols (e.g., Transport Layer Security (TLS)) are no longer the best choices for addressing new security challenges in fog computing end devices, where energy and computational resources are limited. In this paper, we present a lightweight secure streaming protocol for the fog computing "Fog Node-End Device" layer. This protocol is lightweight, connectionless, supports broadcast and multicast operations, and is able to provide data source authentication, data integrity, and confidentiality. The protocol is based on simple and energy efficient cryptographic methods, such as Hash Message Authentication Codes (HMAC) and symmetrical ciphers, and uses modified User Datagram Protocol (UDP) packets to embed authentication data into streaming data. Data redundancy could be added to improve reliability in lossy networks. The experimental results summarized in this paper confirm that the proposed method efficiently uses energy and computational resources and at the same time provides security properties on par with the Datagram TLS (DTLS) standard.

  18. Geographic Information System Technology Leveraged for Crisis Planning, Emergency, Response, and Disaster Management

    NASA Astrophysics Data System (ADS)

    Ross, A.; Little, M. M.

    2013-12-01

    NASA's Atmospheric Science Data Center (ASDC) is piloting the use of Geographic Information System (GIS) technology that can be leveraged for crisis planning, emergency response, and disaster management/awareness. Many different organizations currently use GIS tools and geospatial data during a disaster event. ASDC datasets have not been fully utilized by this community in the past due to incompatible data formats that ASDC holdings are archived in. Through the successful implementation of this pilot effort and continued collaboration with the larger Homeland Defense and Department of Defense emergency management community through the Homeland Infrastructure Foundation-Level Data Working Group (HIFLD WG), our data will be easily accessible to those using GIS and increase the ability to plan, respond, manage, and provide awareness during disasters. The HIFLD WG Partnership has expanded to include more than 5,900 mission partners representing the 14 executive departments, 98 agencies, 50 states (and 3 territories), and more than 700 private sector organizations to directly enhance the federal, state, and local government's ability to support domestic infrastructure data gathering, sharing and protection, visualization, and spatial knowledge management.The HIFLD WG Executive Membership is lead by representatives from the Department of Defense (DoD) Office of the Assistant Secretary of Defense for Homeland Defense and Americas' Security Affairs - OASD (HD&ASA); the Department of Homeland Security (DHS), National Protection and Programs Directorate's Office of Infrastructure Protection (NPPD IP); the National Geospatial-Intelligence Agency (NGA) Integrated Working Group - Readiness, Response and Recovery (IWG-R3); the Department of Interior (DOI) United States Geological Survey (USGS) National Geospatial Program (NGP), and DHS Federal Emergency Management Agency (FEMA).

  19. Distributed denial of service (DDoS) attack in cloud- assisted wireless body area networks: a systematic literature review.

    PubMed

    Latif, Rabia; Abbas, Haider; Assar, Saïd

    2014-11-01

    Wireless Body Area Networks (WBANs) have emerged as a promising technology that has shown enormous potential in improving the quality of healthcare, and has thus found a broad range of medical applications from ubiquitous health monitoring to emergency medical response systems. The huge amount of highly sensitive data collected and generated by WBAN nodes requires an ascendable and secure storage and processing infrastructure. Given the limited resources of WBAN nodes for storage and processing, the integration of WBANs and cloud computing may provide a powerful solution. However, despite the benefits of cloud-assisted WBAN, several security issues and challenges remain. Among these, data availability is the most nagging security issue. The most serious threat to data availability is a distributed denial of service (DDoS) attack that directly affects the all-time availability of a patient's data. The existing solutions for standalone WBANs and sensor networks are not applicable in the cloud. The purpose of this review paper is to identify the most threatening types of DDoS attacks affecting the availability of a cloud-assisted WBAN and review the state-of-the-art detection mechanisms for the identified DDoS attacks.

  20. Current Technologies and its Trends of Machine Vision in the Field of Security and Disaster Prevention

    NASA Astrophysics Data System (ADS)

    Hashimoto, Manabu; Fujino, Yozo

    Image sensing technologies are expected as useful and effective way to suppress damages by criminals and disasters in highly safe and relieved society. In this paper, we describe current important subjects, required functions, technical trends, and a couple of real examples of developed system. As for the video surveillance, recognition of human trajectory and human behavior using image processing techniques are introduced with real examples about the violence detection for elevators. In the field of facility monitoring technologies as civil engineering, useful machine vision applications such as automatic detection of concrete cracks on walls of a building or recognition of crowded people on bridge for effective guidance in emergency are shown.

  1. Technologies for Achieving Field Ubiquitous Computing

    NASA Astrophysics Data System (ADS)

    Nagashima, Akira

    Although the term “ubiquitous” may sound like jargon used in information appliances, ubiquitous computing is an emerging concept in industrial automation. This paper presents the author's visions of field ubiquitous computing, which is based on the novel Internet Protocol IPv6. IPv6-based instrumentation will realize the next generation manufacturing excellence. This paper focuses on the following five key issues: 1. IPv6 standardization; 2. IPv6 interfaces embedded in field devices; 3. Compatibility with FOUNDATION fieldbus; 4. Network securities for field applications; and 5. Wireless technologies to complement IP instrumentation. Furthermore, the principles of digital plant operations and ubiquitous production to support the above key technologies to achieve field ubiquitous systems are discussed.

  2. 6 CFR 7.23 - Emergency release of classified information.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Emergency release of classified information. 7... NATIONAL SECURITY INFORMATION Classified Information § 7.23 Emergency release of classified information. (a... notify the DHS Chief Security Officer and the originating agency of the information disclosed. A copy of...

  3. The nature of international health security.

    PubMed

    Chiu, Ya-Wen; Weng, Yi-Hao; Su, Yi-Yuan; Huang, Ching-Yi; Chang, Ya-Chen; Kuo, Ken N

    2009-01-01

    Health issues occasionally intersect security issues. Health security has been viewed as an essential part of human security. Policymakers and health professionals, however, do not share a common definition of health security. This article aims to characterize the notions of health security in order to clarify what constitutes the nexus of health and security. The concept of health security has evolved over time so that it encompasses many entities. Analyzing the health reports of four multilateral organizations (the United Nations, World Health Organization, Asia-Pacific Economic Cooperation, and the European Union) produced eight categories of most significant relevance to contemporary health security, allowing comparison of the definitions. The four categories are: emerging diseases; global infectious disease; deliberate release of chemical and biological materials; violence, conflict, and humanitarian emergencies. Two other categories of common concern are natural disasters and environmental change, as well as chemical and radioactive accidents. The final two categories, food insecurity and poverty, are discussed less frequently. Nevertheless, food security is emerging as an increasingly important issue in public health. Health security is the first line of defence against health emergencies. As globalization brings more complexities, dealing with the increased scale and extent of health security will require greater international effort and political support.

  4. Advanced Materials, Technologies, and Complex Systems Analyses: Emerging Opportunities to Enhance Urban Water Security.

    PubMed

    Zodrow, Katherine R; Li, Qilin; Buono, Regina M; Chen, Wei; Daigger, Glen; Dueñas-Osorio, Leonardo; Elimelech, Menachem; Huang, Xia; Jiang, Guibin; Kim, Jae-Hong; Logan, Bruce E; Sedlak, David L; Westerhoff, Paul; Alvarez, Pedro J J

    2017-09-19

    Innovation in urban water systems is required to address the increasing demand for clean water due to population growth and aggravated water stress caused by water pollution, aging infrastructure, and climate change. Advances in materials science, modular water treatment technologies, and complex systems analyses, coupled with the drive to minimize the energy and environmental footprints of cities, provide new opportunities to ensure a resilient and safe water supply. We present a vision for enhancing efficiency and resiliency of urban water systems and discuss approaches and research needs for overcoming associated implementation challenges.

  5. Health information technology: strategic initiatives, real progress.

    PubMed

    Kolodner, Robert M; Cohn, Simon P; Friedman, Charles P

    2008-01-01

    We fully agree with Carol Diamond and Clay Shirky that deployment of health information technology (IT) is necessary but not sufficient for transforming U.S. health care. However, the recent work to advance health IT is far from an exercise in "magical thinking." It has been strategic thinking. To illustrate this, we highlight recent initiatives and progress under four focus areas: adoption, governance, privacy and security, and interoperability. In addition, solutions exist for health IT to advance rapidly without adversely affecting future policy choices. A broad national consensus is emerging in support of advancing health IT to enable the transformation of health and care.

  6. Enhancing infrastructure resilience through business continuity planning.

    PubMed

    Fisher, Ronald; Norman, Michael; Klett, Mary

    2017-01-01

    Critical infrastructure is crucial to the functionality and wellbeing of the world around us. It is a complex network that works together to create an efficient society. The core components of critical infrastructure are dependent on one another to function at their full potential. Organisations face unprecedented environmental risks such as increased reliance on information technology and telecommunications, increased infrastructure interdependencies and globalisation. Successful organisations should integrate the components of cyber-physical and infrastructure interdependencies into a holistic risk framework. Physical security plans, cyber security plans and business continuity plans can help mitigate environmental risks. Cyber security plans are becoming the most crucial to have, yet are the least commonly found in organisations. As the reliance on cyber continues to grow, it is imperative that organisations update their business continuity and emergency preparedness activities to include this.

  7. Cyber-Physical System Security of Smart Grids

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Dagle, Jeffery E.

    2012-01-31

    Abstract—This panel presentation will provide perspectives of cyber-physical system security of smart grids. As smart grid technologies are deployed, the interconnected nature of these systems is becoming more prevalent and more complex, and the cyber component of this cyber-physical system is increasing in importance. Studying system behavior in the face of failures (e.g., cyber attacks) allows a characterization of the systems’ response to failure scenarios, loss of communications, and other changes in system environment (such as the need for emergent updates and rapid reconfiguration). The impact of such failures on the availability of the system can be assessed and mitigationmore » strategies considered. Scenarios associated with confidentiality, integrity, and availability are considered. The cyber security implications associated with the American Recovery and Reinvestment Act of 2009 in the United States are discussed.« less

  8. New Technologies and Emerging Threats: Personnel Security Adjudicative Guidelines in the Age of Social Networking

    DTIC Science & Technology

    2012-12-01

    behavior unless it becomes criminal or involves the publishing of sensitive information. This means that malicious doxing, cyberbullying or other...workplace or background investigation realms, as well as the many forms of cyberbullying and malicious rumor-spreading online could be addressed. Doxing...None Sexually harass another person online None Engage in cyberbullying by using the Internet to send offensive, inappropriate verbal allack

  9. Still in Bloom? As Completion Takes Center Stage, A Look at the Green Movement and Sustainability on Community College Campuses

    ERIC Educational Resources Information Center

    Collett, Stacy

    2014-01-01

    A few years ago you could not attend a higher education conference without a session on green technology, and the sustainability movement. Emerging job training programs in wind and solar were equipping a new generation of energy workers with skills needed to secure high income jobs in clean energy markets. Campuses were doing their part to become…

  10. Experiences in Eliciting Security Requirements

    DTIC Science & Technology

    2006-12-01

    FODA ) FODA is a domain analysis and engineer- ing method that focuses on developing reusable assets [9]. By examining related software systems and...describe a trade-off analysis that we used to select a suitable requirements elici- tation method and present results detailed from a case study of one...disaster planning, and how to improve Medicare. Eventually, technology-oriented problems may emerge from these soft problems, but much more analysis is

  11. Free-space and underwater GHz data transmission using AlGaInN laser diode technology

    NASA Astrophysics Data System (ADS)

    Najda, S. P.; Perlin, P.; Suski, T.; Marona, L.; Boćkowski, M.; Leszczyński, M.; Wisniewski, P.; Czernecki, R.; Kucharski, R.; Targowski, G.; Watson, S.; Kelly, A. E.

    2016-05-01

    Laser diodes fabricated from the AlGaInN material system is an emerging technology for defence and security applications; in particular for free space laser communication. Conventional underwater communication is done acoustically with very slow data rates, short reach, and vulnurable for interception. AlGaInN blue-green laser diode technology allows the possibility of both airbourne links and underwater telecom that operate at very fast data rates (GHz), long reach (100's of metres underwater) and can also be quantum encrypted. The latest developments in AlGaInN laser diode technology are reviewed for defence and security applications. The AlGaInN material system allows for laser diodes to be fabricated over a very wide range of wavelengths from u.v., ~380nm, to the visible ~530nm, by tuning the indium content of the laser GaInN quantum well. Ridge waveguide laser diode structures are fabricated to achieve single mode operation with optical powers of <100mW. Visible light communications at high frequency (up to 2.5 Gbit/s) using a directly modulated 422nm Galliumnitride (GaN) blue laser diode is reported in free-space and underwater.

  12. Sensor Acquisition for Water Utilities: A Survey and Technology List

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Alai, M; Glascoe, L; Love, A

    2005-03-07

    The early detection of the deliberate biological and chemical contamination of water distribution systems is a necessary capability for securing the nation's water supply. Current and emerging early-detection technology capabilities and shortcomings need to be identified and assessed to provide government agencies and water utilities with an improved methodology for assessing the value of installing these technologies. The Department of Homeland Security (DHS) has tasked a multi-laboratory team to evaluate current and future needs to protect the nation's water distribution infrastructure by supporting an objective evaluation of current and new technologies. The primary deliverables from this Operational Technology Demonstration (OTD)more » are the following: (1) establishment of an advisory board for review and approval of testing protocols, technology acquisition processes and recommendations for technology test and evaluation in laboratory and field settings; (2) development of a technology acquisition process; (3) creation of laboratory and field testing and evaluation capability; and (4) testing of candidate technologies for insertion into a water early warning system. The initial phase of this study involves the development of two separate but complementary strategies to be reviewed by the advisory board: (1) a technology acquisition strategy, and (2) a technology evaluation strategy. Lawrence Livermore National Laboratory and Sandia National Laboratories are tasked with the first strategy, while Los Alamos, Pacific Northwest, and Oak Ridge National Laboratories are tasked with the second strategy. The first goal of the acquisition strategy is the development of a technology survey process that includes a review of previous sensor surveys and current test programs and then the development of a method to solicit and select existing and emerging sensor technologies for evaluation and testing. In this paper we discuss a survey of previous efforts by governmental agencies and private companies with the aim of facilitating a water sensor technology acquisition procedure. We provide a survey of previous sensor studies with regard to the use of Early Warning Systems (EWS) including earlier surveys, testing programs, and response studies. In the project we extend this earlier work by developing a list of important sensor specifications that are then used to help assemble a sensor selection criteria. A list of sensor technologies with their specifications is appended to this document. This list will assist the second goal of the project which is a recommendation of candidate technologies for laboratory and field testing.« less

  13. 47 CFR 0.185 - Responsibilities of the bureaus and staff offices.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... ORGANIZATION Organization Homeland Security, Defense and Emergency Preparedness Functions § 0.185... assistance to the Chief, Public Safety and Homeland Security Bureau in the performance of that person's duties with respect to homeland security, national security, emergency management and preparedness...

  14. 47 CFR 0.185 - Responsibilities of the bureaus and staff offices.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... ORGANIZATION Organization Homeland Security, Defense and Emergency Preparedness Functions § 0.185... assistance to the Chief, Public Safety and Homeland Security Bureau in the performance of that person's duties with respect to homeland security, national security, emergency management and preparedness...

  15. 47 CFR 0.185 - Responsibilities of the bureaus and staff offices.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... ORGANIZATION Organization Homeland Security, Defense and Emergency Preparedness Functions § 0.185... assistance to the Chief, Public Safety and Homeland Security Bureau in the performance of that person's duties with respect to homeland security, national security, emergency management and preparedness...

  16. Wireless networking for the dental office: current wireless standards and security protocols.

    PubMed

    Mupparapu, Muralidhar; Arora, Sarika

    2004-11-15

    Digital radiography has gained immense popularity in dentistry today in spite of the early difficulty for the profession to embrace the technology. The transition from film to digital has been happening at a faster pace in the fields of Orthodontics, Oral Surgery, Endodontics, Periodontics, and other specialties where the radiographic images (periapical, bitewing, panoramic, cephalometric, and skull radiographs) are being acquired digitally, stored within a server locally, and eventually accessed for diagnostic purposes, along with the rest of the patient data via the patient management software (PMS). A review of the literature shows the diagnostic performance of digital radiography is at least comparable to or even better than that of conventional radiography. Similarly, other digital diagnostic tools like caries detectors, cephalometric analysis software, and digital scanners were used for many years for the diagnosis and treatment planning purposes. The introduction of wireless charged-coupled device (CCD) sensors in early 2004 (Schick Technologies, Long Island City, NY) has moved digital radiography a step further into the wireless era. As with any emerging technology, there are concerns that should be looked into before adapting to the wireless environment. Foremost is the network security involved in the installation and usage of these wireless networks. This article deals with the existing standards and choices in wireless technologies that are available for implementation within a contemporary dental office. The network security protocols that protect the patient data and boost the efficiency of modern day dental clinics are enumerated.

  17. Video calls from lay bystanders to dispatch centers - risk assessment of information security.

    PubMed

    Bolle, Stein R; Hasvold, Per; Henriksen, Eva

    2011-09-30

    Video calls from mobile phones can improve communication during medical emergencies. Lay bystanders can be instructed and supervised by health professionals at Emergency Medical Communication Centers. Before implementation of video mobile calls in emergencies, issues of information security should be addressed. Information security was assessed for risk, based on the information security standard ISO/IEC 27005:2008. A multi-professional team used structured brainstorming to find threats to the information security aspects confidentiality, quality, integrity, and availability. Twenty security threats of different risk levels were identified and analyzed. Solutions were proposed to reduce the risk level. Given proper implementation, we found no risks to information security that would advocate against the use of video calls between lay bystanders and Emergency Medical Communication Centers. The identified threats should be used as input to formal requirements when planning and implementing video calls from mobile phones for these call centers.

  18. Video calls from lay bystanders to dispatch centers - risk assessment of information security

    PubMed Central

    2011-01-01

    Background Video calls from mobile phones can improve communication during medical emergencies. Lay bystanders can be instructed and supervised by health professionals at Emergency Medical Communication Centers. Before implementation of video mobile calls in emergencies, issues of information security should be addressed. Methods Information security was assessed for risk, based on the information security standard ISO/IEC 27005:2008. A multi-professional team used structured brainstorming to find threats to the information security aspects confidentiality, quality, integrity, and availability. Results Twenty security threats of different risk levels were identified and analyzed. Solutions were proposed to reduce the risk level. Conclusions Given proper implementation, we found no risks to information security that would advocate against the use of video calls between lay bystanders and Emergency Medical Communication Centers. The identified threats should be used as input to formal requirements when planning and implementing video calls from mobile phones for these call centers. PMID:21958387

  19. 48 CFR 552.239-70 - Information Technology Security Plan and Security Authorization.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 48 Federal Acquisition Regulations System 4 2011-10-01 2011-10-01 false Information Technology... Text of Provisions and Clauses 552.239-70 Information Technology Security Plan and Security Authorization. As prescribed in 539.7002(a), insert the following provision: Information Technology Security...

  20. 48 CFR 552.239-70 - Information Technology Security Plan and Security Authorization.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 48 Federal Acquisition Regulations System 4 2014-10-01 2014-10-01 false Information Technology... Text of Provisions and Clauses 552.239-70 Information Technology Security Plan and Security Authorization. As prescribed in 539.7002(a), insert the following provision: Information Technology Security...

  1. 48 CFR 552.239-70 - Information Technology Security Plan and Security Authorization.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 48 Federal Acquisition Regulations System 4 2012-10-01 2012-10-01 false Information Technology... Text of Provisions and Clauses 552.239-70 Information Technology Security Plan and Security Authorization. As prescribed in 539.7002(a), insert the following provision: Information Technology Security...

  2. 48 CFR 552.239-70 - Information Technology Security Plan and Security Authorization.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 48 Federal Acquisition Regulations System 4 2013-10-01 2013-10-01 false Information Technology... Text of Provisions and Clauses 552.239-70 Information Technology Security Plan and Security Authorization. As prescribed in 539.7002(a), insert the following provision: Information Technology Security...

  3. 6 CFR 5.30 - Notice of court-ordered and emergency disclosures.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Notice of court-ordered and emergency disclosures. 5.30 Section 5.30 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY DISCLOSURE OF RECORDS AND INFORMATION Privacy Act § 5.30 Notice of court-ordered and emergency disclosures...

  4. Online security and cyberbystander relations in mobilizing sex abuse intervention.

    PubMed

    Palasinski, Marek

    2012-10-01

    Two studies examined men's interventions in a virtual reality situation involving child grooming. In Study 1, 92 men observed an online encounter between an apparent minor and a sex offender. The results suggest that the bystander effect was stronger under computerized rather than user-assisted surveillance, and when the fellow cyberbystander was unknown rather than known. In Study 2, where 100 men observed the same encounter, the effect also emerged under computerized surveillance as long as the number unknown cyberbystanders was increased. Thus, vesting more responsibility for security in the average netizen rather than just in the automated abuse-detection technology is cautiously suggested, the relevance of which lies in increasing minors' health and safety.

  5. 77 FR 73509 - Emerging World Pharma, Inc.; Order of Suspension of Trading

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-12-10

    ... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] Emerging World Pharma, Inc.; Order of... lack of current and accurate information concerning the securities of Emerging World Pharma, Inc. (``Emerging World''). Emerging World is a Florida corporation purportedly based in Manassas, Virginia and...

  6. Secure Intra-Body Wireless Communications (SIWiC) System Project

    NASA Technical Reports Server (NTRS)

    Ahmad, Aftab; Doggett, Terrence P.

    2011-01-01

    SIWiC System is a project to investigate, design and implement future wireless networks of implantable sensors in the body. This futuristic project is designed to make use of the emerging and yet-to-emerge technologies, including ultra-wide band (UWB) for wireless communications, smart implantable sensors, ultra low power networking protocols, security and privacy for bandwidth and power deficient devices and quantum computing. Progress in each of these fronts is hindered by the needs of breakthrough. But, as we will see in this paper, these major challenges are being met or will be met in near future. SIWiC system is a network of in-situ wireless devices that are implanted to coordinate sensed data inside the body, such as symptoms monitoring collected internally, or biometric data collected of an outside object from within the intra-body network. One node has the capability of communicating outside the body to send data or alarm to a relevant authority, e.g., a remote physician.

  7. Nuclear threat in the post cold-war era. Monograph

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Kurey, W.S.

    1995-05-14

    This monograph discusses the nuclear threat that the United States faces following the downfall of the Soviet Union. The Russian and Chinese nuclear arsenals represent a formidable threat that must be countered and a new threat is emerging in the third world despite efforts to counter the proliferation of weapons of mass destruction. The monograph reviews the current status of both the Russian and Chinese arsenals and lists the programs that are being undertaken to modernize and improve their respective nuclear capabilities. Both nations are taking significant steps to preserve and improve their nuclear strike capability. The proliferation of nuclearmore » weapons technology, fissile material, and ballistic missiles in the third world is an emerging threat to national security interests. The lack of appropriate security measures during the on-going dismantling of the former Soviet nuclear arsenal presents an opportunity for rogue states and terrorist organizations to readily obtain the materials to produce their own nuclear weapons.« less

  8. Emerging national space launch programs: Economics and safeguards

    NASA Astrophysics Data System (ADS)

    Chow, Brian G.

    Most ballistic missile nonproliferation studies have focused on trends in the numbers and performance of missiles and the resulting security threats. This report concentrates on the economic viability of emerging national space launch programs and the prospects for imposing effective safeguards against the use of space launch technology for military missiles. For the convenience of discussion in this report, a reference to ballistic missiles hereafter means surface-to-surface guided ballistic missiles only. Space launch vehicles (SLV's) are surface-to-space ballistic missiles, and they will be referred to explicitly as 'space launch vehicles' or 'space launchers'. Surface-to-surface unguided ballistic missiles will be referred to as 'rockets.'

  9. 78 FR 69861 - Privacy Act of 1974; Department of Homeland Security, Federal Emergency Management Agency...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-11-21

    ... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [DHS-2013-0073] Privacy Act of 1974; Department of Homeland Security, Federal Emergency Management Agency, Federal Government--001 National Defense Executive Reserve System of Records AGENCY: Department of Homeland Security, Privacy Office...

  10. Metro Optical Networks for Homeland Security

    NASA Astrophysics Data System (ADS)

    Bechtel, James H.

    Metro optical networks provide an enticing opportunity for strengthening homeland security. Many existing and emerging fiber-optic networks can be adapted for enhanced security applications. Applications include airports, theme parks, sports venues, and border surveillance systems. Here real-time high-quality video and captured images can be collected, transported, processed, and stored for security applications. Video and data collection are important also at correctional facilities, courts, infrastructure (e.g., dams, bridges, railroads, reservoirs, power stations), and at military and other government locations. The scaling of DWDM-based networks allows vast amounts of data to be collected and transported including biometric features of individuals at security check points. Here applications will be discussed along with potential solutions and challenges. Examples of solutions to these problems are given. This includes a discussion of metropolitan aggregation platforms for voice, video, and data that are SONET compliant for use in SONET networks and the use of DWDM technology for scaling and transporting a variety of protocols. Element management software allows not only network status monitoring, but also provides optimized allocation of network resources through the use of optical switches or electrical cross connects.

  11. Genome Engineering and Agriculture: Opportunities and Challenges.

    PubMed

    Baltes, Nicholas J; Gil-Humanes, Javier; Voytas, Daniel F

    2017-01-01

    In recent years, plant biotechnology has witnessed unprecedented technological change. Advances in high-throughput sequencing technologies have provided insight into the location and structure of functional elements within plant DNA. At the same time, improvements in genome engineering tools have enabled unprecedented control over genetic material. These technologies, combined with a growing understanding of plant systems biology, will irrevocably alter the way we create new crop varieties. As the first wave of genome-edited products emerge, we are just getting a glimpse of the immense opportunities the technology provides. We are also seeing its challenges and limitations. It is clear that genome editing will play an increased role in crop improvement and will help us to achieve food security in the coming decades; however, certain challenges and limitations must be overcome to realize the technology's full potential. © 2017 Elsevier Inc. All rights reserved.

  12. Disruptive technologies and force transformation: a Canadian perspective (Keynote Address)

    NASA Astrophysics Data System (ADS)

    Moen, Ingar O.; Walker, Robert S.

    2005-05-01

    Transformation of Canada"s military forces is being pursued to ensure their relevancy and impact in light of the new defence and security environment. This environment is characterized by an increasingly complex spectrum of military operations spanning pre- and post-conflict, the emergence of an asymmetric threat that differs substantially from the peer-on-peer threat of the Cold War, and the globalization of science and technology. Disruptive technologies - those that have a profound impact on established practice - are increasingly shaping both the civil and military sectors, with advances in one sector now regularly seeding disruptions in the other. This paper postulates the likely sources of disruptive technologies over the next 10-20 years. It then looks at how science and technology investments can contribute to force transformation either to take advantage of or mitigate the effects of these disruptions.

  13. OpenID connect as a security service in Cloud-based diagnostic imaging systems

    NASA Astrophysics Data System (ADS)

    Ma, Weina; Sartipi, Kamran; Sharghi, Hassan; Koff, David; Bak, Peter

    2015-03-01

    The evolution of cloud computing is driving the next generation of diagnostic imaging (DI) systems. Cloud-based DI systems are able to deliver better services to patients without constraining to their own physical facilities. However, privacy and security concerns have been consistently regarded as the major obstacle for adoption of cloud computing by healthcare domains. Furthermore, traditional computing models and interfaces employed by DI systems are not ready for accessing diagnostic images through mobile devices. RESTful is an ideal technology for provisioning both mobile services and cloud computing. OpenID Connect, combining OpenID and OAuth together, is an emerging REST-based federated identity solution. It is one of the most perspective open standards to potentially become the de-facto standard for securing cloud computing and mobile applications, which has ever been regarded as "Kerberos of Cloud". We introduce OpenID Connect as an identity and authentication service in cloud-based DI systems and propose enhancements that allow for incorporating this technology within distributed enterprise environment. The objective of this study is to offer solutions for secure radiology image sharing among DI-r (Diagnostic Imaging Repository) and heterogeneous PACS (Picture Archiving and Communication Systems) as well as mobile clients in the cloud ecosystem. Through using OpenID Connect as an open-source identity and authentication service, deploying DI-r and PACS to private or community clouds should obtain equivalent security level to traditional computing model.

  14. 76 FR 78009 - Information Collection; Implementation of Information Technology Security Provision

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-12-15

    ...] Information Collection; Implementation of Information Technology Security Provision AGENCY: General Services... collection requirement regarding Implementation of Information Technology Security Provision. Public comments... Information Collection 3090- 0294, Implementation of Information Technology Security Provision, by any of the...

  15. 75 FR 43609 - Agency Information Collection Activities: Emergency Request

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-07-26

    ... SOCIAL SECURITY ADMINISTRATION Agency Information Collection Activities: Emergency Request The Social Security Administration (SSA) publishes a list of information collection packages requiring...) Social Security Administration, DCBFM, Attn: Reports Clearance Officer, 1340 Annex Building, 6401...

  16. Risks and responses to universal drinking water security.

    PubMed

    Hope, Robert; Rouse, Michael

    2013-11-13

    Risks to universal drinking water security are accelerating due to rapid demographic, climate and economic change. Policy responses are slow, uneven and largely inadequate to address the nature and scale of the global challenges. The challenges relate both to maintaining water security in increasingly fragile supply systems and to accelerating reliable access to the hundreds of millions who remain water-insecure. A conceptual framework illustrates the relationship between institutional, operational and financial risks and drinking water security outcomes. We apply the framework to nine case studies from rural and urban contexts in South Asia and sub-Saharan Africa. Case studies are purposively selected based on established and emerging examples of political, technological or institutional reforms that address water security risks. We find broad evidence that improved information flows reduce institutional costs and promote stronger and more transparent operational performance to increase financial sustainability. However, political barriers need to be overcome in all cases through internal or external interventions that require often decadal time frames and catalytic investments. No single model exists, though there is sufficient evidence to demonstrate that risks to drinking water security can be reduced even in the most difficult and challenging contexts.

  17. Social Mobilization, Influence, and Political Warfare: Unconventional Warfare Strategies for Shaping the 21st Century Security Environment

    DTIC Science & Technology

    2012-06-08

    This research effectively argues the existence and importance of the very “human dynamic” of social mobilization and social revolutions. While there...managed to mobilize activism and protest. Many emerged and achieved success without the luxury of modern media and communications technologies let alone...were able to achieve significant social and political effects using social mobilization and non-violent collective action. Activists in both Tunisia

  18. Expressing the sense of the House of Representatives with respect to supporting the goals and ideals of the seventh annual National Cybersecurity Awareness Month and supporting the efforts of the Department of Homeland Security to raise awareness of cyber threats and enhance cybersecurity in the United States.

    THOMAS, 111th Congress

    Rep. Clarke, Yvette D. [D-NY-11

    2010-09-29

    House - 11/01/2010 Referred to the Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  19. Laboratory security and emergency response guidance for laboratories working with select agents. Centers for Disease Control and Prevention.

    PubMed

    Richmond, Jonathan Y; Nesby-O'Dell, Shanna L

    2002-12-06

    In recent years, concern has increased regarding use of biologic materials as agents of terrorism, but these same agents are often necessary tools in clinical and research microbiology laboratories. Traditional biosafety guidelines for laboratories have emphasized use of optimal work practices, appropriate containment equipment, well-designed facilities, and administrative controls to minimize risk of worker injury and to ensure safeguards against laboratory contamination. The guidelines discussed in this report were first published in 1999 (U.S. Department of Health and Human Services/CDC and National Institutes of Health. Biosafety in microbiological and biomedical laboratories [BMBL]. Richmond JY, McKinney RW, eds. 4th ed. Washington, DC: US Department of Health and Human Services, 1999 [Appendix F]). In that report, physical security concerns were addressed, and efforts were focused on preventing unauthorized entry to laboratory areas and preventing unauthorized removal of dangerous biologic agents from the laboratory. Appendix F of BMBL is now being revised to include additional information regarding personnel risk assessments, and inventory controls. The guidelines contained in this report are intended for laboratories working with select agents under biosafety-level 2, 3, or 4 conditions as described in Sections II and III of BMBL. These recommendations include conducting facility risk assessments and developing comprehensive security plans to minimize the probability of misuse of select agents. Risk assessments should include systematic, site-specific reviews of 1) physical security; 2) security of data and electronic technology systems; 3) employee security; 4) access controls to laboratory and animal areas; 5) procedures for agent inventory and accountability; 6) shipping/transfer and receiving of select agents; 7) unintentional incident and injury policies; 8) emergency response plans; and 9) policies that address breaches in security. The security plan should be an integral part of daily operations. All employees should be well-trained and equipped, and the plan should be reviewed annually, at least.

  20. 47 CFR 0.186 - Emergency Relocation Board.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... Telecommunication FEDERAL COMMUNICATIONS COMMISSION GENERAL COMMISSION ORGANIZATION Organization Homeland Security, Defense and Emergency Preparedness Functions § 0.186 Emergency Relocation Board. (a) As specified in the...] Public Safety and Homeland Security Bureau ...

  1. 47 CFR 0.186 - Emergency Relocation Board.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... Telecommunication FEDERAL COMMUNICATIONS COMMISSION GENERAL COMMISSION ORGANIZATION Organization Homeland Security, Defense and Emergency Preparedness Functions § 0.186 Emergency Relocation Board. (a) As specified in the...] Public Safety and Homeland Security Bureau ...

  2. 47 CFR 0.186 - Emergency Relocation Board.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... Telecommunication FEDERAL COMMUNICATIONS COMMISSION GENERAL COMMISSION ORGANIZATION Organization Homeland Security, Defense and Emergency Preparedness Functions § 0.186 Emergency Relocation Board. (a) As specified in the...] Public Safety and Homeland Security Bureau ...

  3. 47 CFR 0.186 - Emergency Relocation Board.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... Telecommunication FEDERAL COMMUNICATIONS COMMISSION GENERAL COMMISSION ORGANIZATION Organization Homeland Security, Defense and Emergency Preparedness Functions § 0.186 Emergency Relocation Board. (a) As specified in the...] Public Safety and Homeland Security Bureau ...

  4. 47 CFR 0.186 - Emergency Relocation Board.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... Telecommunication FEDERAL COMMUNICATIONS COMMISSION GENERAL COMMISSION ORGANIZATION Organization Homeland Security, Defense and Emergency Preparedness Functions § 0.186 Emergency Relocation Board. (a) As specified in the...] Public Safety and Homeland Security Bureau ...

  5. Technosocial Predictive Analytics for Security Informatics

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Sanfilippo, Antonio P.; Gilbert, Nigel; Greaves, Mark

    2012-08-22

    Challenges to the security, health, and sustainable growth of our society keep escalating asymmetrically due to the growing pace of globalization and global change. The increasing velocity of information sharing, social networking, economic forces, and environmental change has resulted in a rapid increase in the number and frequency of “game-changing moments” that a community can face. Social movements that once took a decade to build now take a year; shifts in public opinion that once took a year to take root now take a couple of months. More and more frequently, these critical moments occur too suddenly for the affectedmore » communities to succeed in countering the consequent adversities or seizing the emerging opportunities. Now more than ever, we need anticipatory reasoning technologies to forecast and manage change in order to secure and improve our way of life and the environment we inhabit.« less

  6. A fast key generation method based on dynamic biometrics to secure wireless body sensor networks for p-health.

    PubMed

    Zhang, G H; Poon, Carmen C Y; Zhang, Y T

    2010-01-01

    Body sensor networks (BSNs) have emerged as a new technology for healthcare applications, but the security of communication in BSNs remains a formidable challenge yet to be resolved. The paper discusses the typical attacks faced by BSNs and proposes a fast biometric based approach to generate keys for ensuing confidentiality and authentication in BSN communications. The approach was tested on 900 segments of electrocardiogram. Each segment was 4 seconds long and used to generate a 128-bit key. The results of the study found that entropy of 96% of the keys were above 0.95 and 99% of the hamming distances calculated from any two keys were above 50 bits. Based on the randomness and distinctiveness of these keys, it is concluded that the fast biometric based approach has great potential to be used to secure communication in BSNs for health applications.

  7. Declining Global Per Capita Agricultural Production and Warming Oceans Threaten Food Security

    NASA Technical Reports Server (NTRS)

    Funk, Chris C.; Brown, Molly E.

    2009-01-01

    Despite accelerating globalization, most people still eat food that was grown locally. Developing countries with weak purchasing power tend to import as little food as possible from global markets, suffering consumption deficits during times of high prices or production declines. Local agricultural production, therefore, is critical to both food security and economic development among the rural poor. The level of local agricultural production, in turn, will be controlled by the amount and quality of arable land, the amount and quality of agricultural inputs (fertilizer, seeds, pesticides, etc.), as well as farm-related technology, practices, and policies. In this paper we discuss several emerging threats to global and regional food security, including declining yield gains that are failing to keep up with population increases, and warming in the tropical Indian Ocean and its impact on rainfall. If yields continue to grow more slowly than per capita harvested area, parts of Africa, Asia, and Central and Southern America will experience substantial declines in per capita cereal production. Global per capita cereal production will potentially decline by 14 percent between 2008 and 2030. Climate change is likely to further affect food production, particularly in regions that have very low yields due to lack of technology. Drought, caused by anthropogenic warming in the Indian and Pacific Oceans, may also reduce 21 st century food availability by disrupting Indian Ocean moisture transports and tilting the 21 st century climate toward a more El Nino-like state. The impacts of these circulation changes over Asia remain uncertain. For Africa, however, Indian Ocean warming appears to have already reduced main growing season rainfall along the eastern edge of tropical Africa, from southern Somalia to northern parts of the Republic of South Africa. Through a combination of quantitative modeling of food balances and an examination of climate change, we present an analysis of emerging threats to global food security.

  8. Declining global per capita agricultural production and warming oceans threaten food security

    USGS Publications Warehouse

    Funk, Christopher C.; Brown, Molly E.

    2009-01-01

    Despite accelerating globalization, most people still eat food that is grown locally. Developing countries with weak purchasing power tend to import as little food as possible from global markets, suffering consumption deficits during times of high prices or production declines. Local agricultural production, therefore, is critical to both food security and economic development among the rural poor. The level of local agricultural production, in turn, will be determined by the amount and quality of arable land, the amount and quality of agricultural inputs (fertilizer, seeds, pesticides, etc.), as well as farm-related technology, practices and policies. This paper discusses several emerging threats to global and regional food security, including declining yield gains that are failing to keep up with population increases, and warming in the tropical Indian Ocean and its impact on rainfall. If yields continue to grow more slowly than per capita harvested area, parts of Africa, Asia and Central and Southern America will experience substantial declines in per capita cereal production. Global per capita cereal production will potentially decline by 14% between 2008 and 2030. Climate change is likely to further affect food production, particularly in regions that have very low yields due to lack of technology. Drought, caused by anthropogenic warming in the Indian and Pacific Oceans, may also reduce 21st century food availability in some countries by disrupting moisture transports and bringing down dry air over crop growing areas. The impacts of these circulation changes over Asia remain uncertain. For Africa, however, Indian Ocean warming appears to have already reduced rainfall during the main growing season along the eastern edge of tropical Africa, from southern Somalia to northern parts of the Republic of South Africa. Through a combination of quantitative modeling of food balances and an examination of climate change, this study presents an analysis of emerging threats to global food security.

  9. Drone Technology and Future Aviation on This Week @NASA – August 5, 2016

    NASA Image and Video Library

    2016-08-05

    On Aug. 2, NASA’s Associate Administrator for Aeronautics Jaiwon Shin, representatives from the Federal Aviation Administration (FAA), aviation industry leaders and the academic research community participated in a workshop hosted by the White House Office of Science and Technology Policy (OSTP) to discuss Drones and the Future of Aviation. The event was designed to explore airspace integration issues; public and commercial uses; and safety, security, and privacy concerns related to this emerging technology. NASA is working with the FAA on a traffic management system that will enable pilots of these aircraft to fly safely in the national airspace. Also, Maryland Storms Imaged from Space, Io’s Collapsing Atmosphere, Orion Crew Module Moved, AstrOlympics, and more!

  10. Integrated Modeling, Mapping, and Simulation (IMMS) Framework for Exercise and Response Planning

    NASA Technical Reports Server (NTRS)

    Mapar, Jalal; Hoette, Trisha; Mahrous, Karim; Pancerella, Carmen M.; Plantenga, Todd; Yang, Christine; Yang, Lynn; Hopmeier, Michael

    2011-01-01

    EmergenCy management personnel at federal, stale, and local levels can benefit from the increased situational awareness and operational efficiency afforded by simulation and modeling for emergency preparedness, including planning, training and exercises. To support this goal, the Department of Homeland Security's Science & Technology Directorate is funding the Integrated Modeling, Mapping, and Simulation (IMMS) program to create an integrating framework that brings together diverse models for use by the emergency response community. SUMMIT, one piece of the IMMS program, is the initial software framework that connects users such as emergency planners and exercise developers with modeling resources, bridging the gap in expertise and technical skills between these two communities. SUMMIT was recently deployed to support exercise planning for National Level Exercise 2010. Threat, casualty. infrastructure, and medical surge models were combined within SUMMIT to estimate health care resource requirements for the exercise ground truth.

  11. 78 FR 17219 - Homeland Security Science and Technology Advisory Committee Meeting Cancellation

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-03-20

    ... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2013-0014] Homeland Security Science and...: Notice of Cancellation of the Federal Advisory Committee Meeting for Homeland Security Science and Technology Advisory Committee (HSSTAC). SUMMARY: The meeting of the Homeland Security Science and Technology...

  12. Selecting Security Technology Providers

    ERIC Educational Resources Information Center

    Schneider, Tod

    2009-01-01

    The world of security technology holds great promise, but it is fraught with opportunities for expensive missteps and misapplications. The quality of the security technology consultants and system integrators one uses will have a direct bearing on how well his school masters this complex subject. Security technology consultants help determine…

  13. Securing Real-Time Sessions in an IMS-Based Architecture

    NASA Astrophysics Data System (ADS)

    Cennamo, Paolo; Fresa, Antonio; Longo, Maurizio; Postiglione, Fabio; Robustelli, Anton Luca; Toro, Francesco

    The emerging all-IP mobile network infrastructures based on 3rd Generation IP Multimedia Subsystem philosophy are characterised by radio access technology independence and ubiquitous connectivity for mobile users. Currently, great focus is being devoted to security issues since most of the security threats presently affecting the public Internet domain, and the upcoming ones as well, are going to be suffered by mobile users in the years to come. While a great deal of research activity, together with standardisation efforts and experimentations, is carried out on mechanisms for signalling protection, very few integrated frameworks for real-time multimedia data protection have been proposed in a context of IP Multimedia Subsystem, and even fewer experimental results based on testbeds are available. In this paper, after a general overview of the security issues arising in an advanced IP Multimedia Subsystem scenario, a comprehensive infrastructure for real-time multimedia data protection, based on the adoption of the Secure Real-Time Protocol, is proposed; then, the development of a testbed incorporating such functionalities, including mechanisms for key management and cryptographic context transfer, and allowing the setup of Secure Real-Time Protocol sessions is presented; finally, experimental results are provided together with quantitative assessments and comparisons of system performances for audio sessions with and without the adoption of the Secure Real-Time Protocol framework.

  14. Cyber security with radio frequency interferences mitigation study for satellite systems

    NASA Astrophysics Data System (ADS)

    Wang, Gang; Wei, Sixiao; Chen, Genshe; Tian, Xin; Shen, Dan; Pham, Khanh; Nguyen, Tien M.; Blasch, Erik

    2016-05-01

    Satellite systems including the Global Navigation Satellite System (GNSS) and the satellite communications (SATCOM) system provide great convenience and utility to human life including emergency response, wide area efficient communications, and effective transportation. Elements of satellite systems incorporate technologies such as navigation with the global positioning system (GPS), satellite digital video broadcasting, and information transmission with a very small aperture terminal (VSAT), etc. The satellite systems importance is growing in prominence with end users' requirement for globally high data rate transmissions; the cost reduction of launching satellites; development of smaller sized satellites including cubesat, nanosat, picosat, and femtosat; and integrating internet services with satellite networks. However, with the promising benefits, challenges remain to fully develop secure and robust satellite systems with pervasive computing and communications. In this paper, we investigate both cyber security and radio frequency (RF) interferences mitigation for satellite systems, and demonstrate that they are not isolated. The action space for both cyber security and RF interferences are firstly summarized for satellite systems, based on which the mitigation schemes for both cyber security and RF interferences are given. A multi-layered satellite systems structure is provided with cross-layer design considering multi-path routing and channel coding, to provide great security and diversity gains for secure and robust satellite systems.

  15. AMPED Program Overview

    ScienceCinema

    Gur, Ilan

    2018-01-16

    An overview presentation about ARPA-E's AMPED program. AMPED projects seek to develop advanced sensing, control, and power management technologies that redefine the way we think about battery management. Energy storage can significantly improve U.S. energy independence, efficiency, and security by enabling a new generation of electric vehicles. While rapid progress is being made in new battery materials and storage technologies, few innovations have emerged in the management of advanced battery systems. AMPED aims to unlock enormous untapped potential in the performance, safety, and lifetime of today's commercial battery systems exclusively through system-level innovations, and is thus distinct from existing efforts to enhance underlying battery materials and architectures.

  16. Systems Security Engineering

    DTIC Science & Technology

    2010-08-22

    Commission (IEC). “Information technology — Security techniques — Code of practice for information security management ( ISO /IEC 27002 ...Information technology — Security techniques — Information security management systems —Requirements ( ISO /IEC 27002 ),”, “Information technology — Security...was a draft ISO standard on Systems and software engineering, Systems and software assurance [18]. Created by systems engineers for systems

  17. Connecting AAC devices to the world of information technology.

    PubMed

    Caves, Kevin; Shane, Howard C; DeRuyter, Frank

    2002-01-01

    Modern day information technology (IT) is converging around wireless networks. It is now possible to check E-mail and view information from the World Wide Web from commercially available mobile phones. For individuals with disabilities, the ability to access multiple and different types of information not only promises convenience, but also can help to promote independence and facilitate access to public and private information systems. There are many barriers to access for people with disabilities, including technological hurdles, security, privacy, and access to these emerging wireless technologies. However, legislation, advocacy, standards, and research and development can ensure that users of augmentative and alternative communication (AAC) and assistive technology have access to these technologies. This article provides a historical context for the field of AAC and IT development, a review of the current state of these technologies, a glimpse of the potential of wireless information access for the lives of AAC users, and a description of some of the barriers and enablers to making access available to users of AAC and assistive technologies.

  18. Changing Homeland Security: The Year in Review - 2008

    DTIC Science & Technology

    2009-01-01

    new opportunities for terrorist safe havens. The specter of homegrown terrorism has not abated. Naturalized citizens of Somali descent traveled to...34 • The Nature of Homeland Security: Now a Second Tier Policy Issue? • Organizing for Homeland Security: Possible Futures, Emerging Issues • The...emerging definitions of the homeland security mission space in 2009. The Nature of Homeland Security: Now a Second Tier Policy Issue? Has the bar

  19. A novel two-stage evaluation system based on a Group-G1 approach to identify appropriate emergency treatment technology schemes in sudden water source pollution accidents.

    PubMed

    Qu, Jianhua; Meng, Xianlin; Hu, Qi; You, Hong

    2016-02-01

    Sudden water source pollution resulting from hazardous materials has gradually become a major threat to the safety of the urban water supply. Over the past years, various treatment techniques have been proposed for the removal of the pollutants to minimize the threat of such pollutions. Given the diversity of techniques available, the current challenge is how to scientifically select the most desirable alternative for different threat degrees. Therefore, a novel two-stage evaluation system was developed based on a circulation-correction improved Group-G1 method to determine the optimal emergency treatment technology scheme, considering the areas of contaminant elimination in both drinking water sources and water treatment plants. In stage 1, the threat degree caused by the pollution was predicted using a threat evaluation index system and was subdivided into four levels. Then, a technique evaluation index system containing four sets of criteria weights was constructed in stage 2 to obtain the optimum treatment schemes corresponding to the different threat levels. The applicability of the established evaluation system was tested by a practical cadmium-contaminated accident that occurred in 2012. The results show this system capable of facilitating scientific analysis in the evaluation and selection of emergency treatment technologies for drinking water source security.

  20. 44 CFR 8.1 - Purpose.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... Emergency Management and Assistance FEDERAL EMERGENCY MANAGEMENT AGENCY, DEPARTMENT OF HOMELAND SECURITY GENERAL NATIONAL SECURITY INFORMATION § 8.1 Purpose. (a) Section 5.3(b) of Executive Order (EO) 12356, “National Security Information” requires agencies to promulgate implementing policies and regulations. To...

  1. 44 CFR 334.2 - Policy.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ..., each Federal department and agency shall prepare its national security emergency preparedness plans and... preparedness plans and programs to provide appropriate and effective response options for consideration in... Emergency Management and Assistance FEDERAL EMERGENCY MANAGEMENT AGENCY, DEPARTMENT OF HOMELAND SECURITY...

  2. SecureCore Security Architecture: Authority Mode and Emergency Management

    DTIC Science & Technology

    2007-10-16

    can shield first responders from social vultures (e.g., “ambulance chasers”) or malicious parties who could intentionally interfere with emergency...hierarchical design Communications Management: network communication Process Management...and Emergency Management 1 I. Introduction During many crises, first- responder access to sensitive, restricted emergency information is

  3. 76 FR 63679 - Advisory Committee on Small and Emerging Companies

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-10-13

    ... Committee on Small and Emerging Companies AGENCY: Securities and Exchange Commission. ACTION: Notice of meeting of SEC Advisory Committee on Small and Emerging Companies. SUMMARY: The Securities and Exchange Commission Advisory Committee on Small and Emerging Companies is providing notice that it will hold a public...

  4. 77 FR 2102 - Advisory Committee on Small and Emerging Companies

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-01-13

    ... Committee on Small and Emerging Companies AGENCY: Securities and Exchange Commission. ACTION: Notice of Meeting of SEC Advisory Committee on Small and Emerging Companies. SUMMARY: The Securities and Exchange Commission Advisory Committee on Small and Emerging Companies is providing notice that it will hold a public...

  5. 78 FR 56263 - HydroGen Corp., QueryObject Systems Corp., Security Intelligence Technologies, Inc., Skins, Inc...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-09-12

    ... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] HydroGen Corp., QueryObject Systems Corp., Security Intelligence Technologies, Inc., Skins, Inc., SLM Holdings, Inc., Spring Creek Healthcare Systems... securities of Security Intelligence Technologies, Inc. because it has not filed any periodic reports since...

  6. The research of network database security technology based on web service

    NASA Astrophysics Data System (ADS)

    Meng, Fanxing; Wen, Xiumei; Gao, Liting; Pang, Hui; Wang, Qinglin

    2013-03-01

    Database technology is one of the most widely applied computer technologies, its security is becoming more and more important. This paper introduced the database security, network database security level, studies the security technology of the network database, analyzes emphatically sub-key encryption algorithm, applies this algorithm into the campus-one-card system successfully. The realization process of the encryption algorithm is discussed, this method is widely used as reference in many fields, particularly in management information system security and e-commerce.

  7. Ensuring reliability in expansion schemes.

    PubMed

    Kamal-Uddin, Abu Sayed; Williams, Donald Leigh

    2005-01-01

    Existing electricity power supplies must serve, or be adapted to serve, the expansion of hospital buildings. With the existing power supply assets of many hospitals being up to 20 years old, assessing the security and reliability of the power system must be given appropriate priority to avoid unplanned outages due to overloads and equipment failures. It is imperative that adequate contingency is planned for essential and non-essential electricity circuits. This article describes the methodology undertaken, and the subsequent recommendations that were made, when evaluating the security and reliability of electricity power supplies to a number of major London hospitals. The methodology described aligns with the latest issue of NHS Estates HTM 2011 'Primary Electrical Infrastructure Emergency Electrical Services Design Guidance' (to which ERA Technology has contributed).

  8. The use of biometrics in the Personal Health Record (PHR).

    PubMed

    Bonney, Wilfred

    2011-01-01

    The emergence of the Personal Health Record (PHR) has made individual health information more readily accessible to a wide range of users including patients, consumers, practitioners, and healthcare providers. However, increased accessibility of PHR threatens the confidentiality, privacy, and security of personalized health information. Therefore, a need for robust and reliable forms of authentication is of prime concern. The concept of biometric authentication is now highly visible to healthcare providers as a technology to prevent unauthorized access to individual health information. Implementing biometric authentication mechanisms to protect PHR facilitates access control and secure exchange of health information. In this paper, a literature review is used to explore the key benefits, technical barriers, challenges, and ethical implications for using biometric authentication in PHR.

  9. Marine data security based on blockchain technology

    NASA Astrophysics Data System (ADS)

    Yang, Zhao; Xie, Weiwei; Huang, Lei; Wei, Zhiqiang

    2018-03-01

    With the development of marine observation technology and network technology, the volume of marine data growing rapidly. This brings new challenges for data storage and transmission. How to protect data security of marine big data has become an urgent problem. The traditional information security methods’ characteristic is centralization. These technologies cannot provide whole process protection, e.g., data storage, data management and application of data. The blockchain technology is a novel technology, which can keep the data security and reliability by using decentralized methodology. It has aroused wide interest in the financial field. In this paper, we describe the concept, characteristics and key technologies of blockchain technology and introduce it into the field of marine data security.

  10. Super Bugs, Resurgent and Emerging Diseases, and Pandemics: A National Security Perspective

    DTIC Science & Technology

    2008-01-01

    changeable – and it is hard for human technology to keep up with its capacity to outmaneuver us! Drug resistance to diseases once believed to be ― cured ...are monitored for trends in such indicators of illness as over-the counter pharmaceutical sales and absenteeism …or syndromic surveillance in which...additional data sources (e.g., over-the-counter pharmaceutical sales, child absenteeism ) in conjunction with this primary data source may greatly enhance

  11. Towards a quantum internet

    NASA Astrophysics Data System (ADS)

    Dür, Wolfgang; Lamprecht, Raphael; Heusler, Stefan

    2017-07-01

    A long-range quantum communication network is among the most promising applications of emerging quantum technologies. We discuss the potential of such a quantum internet for the secure transmission of classical and quantum information, as well as theoretical and experimental approaches and recent advances to realize them. We illustrate the involved concepts such as error correction, teleportation or quantum repeaters and consider an approach to this topic based on catchy visualizations as a context-based, modern treatment of quantum theory at high school.

  12. Flattening of Sustainment: The Interaction of Technology, Information, Force Structure, and the Emergence of Operational Logistics

    DTIC Science & Technology

    2009-05-21

    Leavenworth, Kansas AY 2009 Approved for Public Release; Distribution is Unlimited REPORT DOCUMENTATION PAGE Form Approved OMB No. 0704-0188...sustainment and security. Kellogg Brown and Root now known as KBR, The Flour Corporation and others as PMCs. 8Department of Defense, The Budget for Fiscal...Glantz and Jonathan House, When Titans Clashed: How the Red Army Stopped Hitler (Lawrence, KS: University Press of Kansas Press, 1995), 8. 23Joint

  13. Pricing the Future in the Seventeenth Century: Calculating Technologies in Competition.

    PubMed

    Deringer, William

    Time is money. But how much? What is money in the future worth to you today? This question of "present value" arises in myriad economic activities, from valuing financial securities to real estate transactions to governmental cost-benefit analysis-even the economics of climate change. In modern capitalist practice, one calculation offers the only "rational" way to answer: compound-interest discounting. In the early modern period, though, economic actors used at least two alternative calculating technologies for thinking about present value, including a vernacular technique called years purchase and discounting by simple interest. All of these calculations had different strengths and affordances, and none was unquestionably better or more "rational" than the others at the time. The history of technology offers distinct resources for understanding such technological competitions, and thus for understanding the emergence of modern economic temporality.

  14. Electrochemical advanced oxidation processes as decentralized water treatment technologies to remediate domestic washing machine effluents.

    PubMed

    Dos Santos, Alexsandro Jhones; Costa, Emily Cintia Tossi de Araújo; da Silva, Djalma Ribeiro; Garcia-Segura, Sergi; Martínez-Huitle, Carlos Alberto

    2018-03-01

    Water scarcity is one of the major concerns worldwide. In order to secure this appreciated natural resource, management and development of water treatment technologies are mandatory. One feasible alternative is the consideration of water recycling/reuse at the household scale. Here, the treatment of actual washing machine effluent by electrochemical advanced oxidation processes was considered. Electrochemical oxidation and electro-Fenton technologies can be applied as decentralized small-scale water treatment devices. Therefore, efficient decolorization and total organic abatement have been followed. The results demonstrate the promising performance of solar photoelectro-Fenton process, where complete color and organic removal was attained after 240 min of treatment under optimum conditions by applying a current density of 66.6 mA cm -2 . Thus, electrochemical technologies emerge as promising water-sustainable approaches.

  15. Emerging Genomic Tools for Legume Breeding: Current Status and Future Prospects

    PubMed Central

    Pandey, Manish K.; Roorkiwal, Manish; Singh, Vikas K.; Ramalingam, Abirami; Kudapa, Himabindu; Thudi, Mahendar; Chitikineni, Anu; Rathore, Abhishek; Varshney, Rajeev K.

    2016-01-01

    Legumes play a vital role in ensuring global nutritional food security and improving soil quality through nitrogen fixation. Accelerated higher genetic gains is required to meet the demand of ever increasing global population. In recent years, speedy developments have been witnessed in legume genomics due to advancements in next-generation sequencing (NGS) and high-throughput genotyping technologies. Reference genome sequences for many legume crops have been reported in the last 5 years. The availability of the draft genome sequences and re-sequencing of elite genotypes for several important legume crops have made it possible to identify structural variations at large scale. Availability of large-scale genomic resources and low-cost and high-throughput genotyping technologies are enhancing the efficiency and resolution of genetic mapping and marker-trait association studies. Most importantly, deployment of molecular breeding approaches has resulted in development of improved lines in some legume crops such as chickpea and groundnut. In order to support genomics-driven crop improvement at a fast pace, the deployment of breeder-friendly genomics and decision support tools seems appear to be critical in breeding programs in developing countries. This review provides an overview of emerging genomics and informatics tools/approaches that will be the key driving force for accelerating genomics-assisted breeding and ultimately ensuring nutritional and food security in developing countries. PMID:27199998

  16. 78 FR 41954 - TA-W-82,634, Prudential Global Business Technology Solutions Central Security Services Dresher...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-07-12

    ... Business Technology Solutions Central Security Services Iselin, New Jersey; TA-W-82,634B, Prudential Global Business Technology Solutions Central Security Services Plymouth, Minnesota; TA- W-82,634C, Prudential Global Business Technology Solutions Central Security Services Scottsdale, Arizona; TA-W-82,634D...

  17. Digital security technology simplified.

    PubMed

    Scaglione, Bernard J

    2007-01-01

    Digital security technology is making great strides in replacing analog and other traditional security systems including CCTV card access, personal identification and alarm monitoring applications. Like any new technology, the author says, it is important to understand its benefits and limitations before purchasing and installing, to ensure its proper operation and effectiveness. This article is a primer for security directors on how digital technology works. It provides an understanding of the key components which make up the foundation for digital security systems, focusing on three key aspects of the digital security world: the security network, IP cameras and IP recorders.

  18. Adequacy of US Hospital Security Preparedness for Mass Casualty Incidents: Critical Lessons From the Israeli Experience.

    PubMed

    Golabek-Goldman, Michele

    2016-01-01

    Due to Israel's threat environment, Israeli hospitals have developed effective and innovative security preparations for responding to all-hazards incidents. Although Israeli hospital preparedness has been the subject of international praise and attention, there has been a dearth of research focused specifically on applying Israeli hospital security measures to the US hospital setting to augment emergency planning. This study examined practical and cost-effective lessons from the Israeli experience for improving US hospital security preparedness for a wide range of mass casualty incidents, both natural and man-made. Sixty semi-structured interviews were conducted with officials throughout Israel's and America's health, defense, and emergency response communities. Hospital preparedness was examined and disaster drills were evaluated in both countries, with San Francisco hospitals analyzed as a case study. Qualitative analysis was conducted and recommendations were made on the basis of an all-hazards approach to emergency preparedness. US hospitals examined in this study had not undertaken crucial preparations for managing the security consequences of a large-scale disaster. Recommendations from Israel included installing permanent emergency signage, improving security perimeter protocols and training, increasing defense against primary and secondary attacks, enhancing coordination with law enforcement, the National Guard, and other outside security agencies, and conducting more frequent and realistic lockdown exercises. A number of US hospitals have overlooked the important role of security in emergency preparedness. This study analyzed practical and cost-effective security recommendations from Israel to remedy this dangerous deficiency in some US hospitals' disaster planning.

  19. Information Security: A Scientometric Study of the Profile, Structure, and Dynamics of an Emerging Scholarly Specialty

    ERIC Educational Resources Information Center

    Olijnyk, Nicholas Victor

    2014-01-01

    The central aim of the current research is to explore and describe the profile, dynamics, and structure of the information security specialty. This study's objectives are guided by four research questions: 1. What are the salient features of information security as a specialty? 2. How has the information security specialty emerged and evolved from…

  20. 78 FR 69099 - Agency Information Collection Activities: Submission for OMB Review; Comment Request

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-11-18

    ... DEPARTMENT OF HOMELAND SECURITY Federal Emergency Management Agency [Docket ID: FEMA-2013-0034... addressed to the Desk Officer for the Department of Homeland Security, Federal Emergency Management Agency... . SUPPLEMENTARY INFORMATION: Collection of Information Title: FEMA Preparedness Grants: Homeland Security Grant...

  1. 78 FR 50430 - Agency Information Collection Activities: Submission for OMB Review; Comment Request

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-08-19

    ... DEPARTMENT OF HOMELAND SECURITY Federal Emergency Management Agency [Docket ID: FEMA-2013-0020... addressed to the Desk Officer for the Department of Homeland Security, Federal Emergency Management Agency... . SUPPLEMENTARY INFORMATION: Collection of Information Title: FEMA Preparedness Grants: Port Security Grant...

  2. 32 CFR 2400.42 - Security Officer.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.42 Security...

  3. 32 CFR 2400.42 - Security Officer.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.42 Security...

  4. 32 CFR 2400.42 - Security Officer.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.42 Security...

  5. 32 CFR 2400.42 - Security Officer.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.42 Security...

  6. 32 CFR 2400.42 - Security Officer.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.42 Security...

  7. 31 CFR 9.8 - Emergency action.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 31 Money and Finance: Treasury 1 2011-07-01 2011-07-01 false Emergency action. 9.8 Section 9.8 Money and Finance: Treasury Office of the Secretary of the Treasury EFFECTS OF IMPORTED ARTICLES ON THE NATIONAL SECURITY § 9.8 Emergency action. In emergency situations or when in his judgment national security...

  8. Security aspects of electronic data interchange between a state health department and a hospital emergency department.

    PubMed

    Magnuson, J A; Klockner, Rocke; Ladd-Wilson, Stephen; Zechnich, Andrew; Bangs, Christopher; Kohn, Melvin A

    2004-01-01

    Electronic emergency department reporting provides the potential for enhancing local and state surveillance capabilities for a wide variety of syndromes and reportable conditions. The task of protecting data confidentiality and integrity while developing electronic data interchange between a hospital emergency department and a state public health department proved more complex than expected. This case study reports on the significant challenges that had to be resolved to accomplish this goal; these included application restrictions and incompatibilities, technical malfunctions, changing standards, and insufficient dedicated resources. One of the key administrative challenges was that of coordinating project security with enterprise security. The original project has evolved into an ongoing pilot, with the health department currently receiving secure data from the emergency department at four-hour intervals. Currently, planning is underway to add more emergency departments to the project.

  9. 75 FR 18516 - Homeland Security Science and Technology Advisory Committee

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-04-12

    ... Technology Advisory Committee AGENCY: Science and Technology Directorate, DHS. ACTION: Committee Management; notice of closed Federal Advisory Committee meeting SUMMARY: The Homeland Security Science and Technology.... DATES: The Homeland Security Science and Technology Advisory Committee will meet April 20, 2010 from 8...

  10. Use of a wireless local area network in an orthodontic clinic.

    PubMed

    Mupparapu, Muralidhar; Binder, Robert E; Cummins, John M

    2005-06-01

    Radiographic images and other patient records, including medical histories, demographics, and health insurance information, can now be stored digitally and accessed via patient management programs. However, digital image acquisition and diagnosis and treatment planning are independent tasks, and each is time consuming, especially when performed at different computer workstations. Networking or linking the computers in an office enhances access to imaging and treatment planning tools. Access can be further enhanced if the entire network is wireless. Thanks to wireless technology, stand-alone, desk-bound personal computers have been replaced with mobile, hand-held devices that can communicate with each other and the rest of the world via the Internet. As with any emerging technology, some issues should be kept in mind when adapting to the wireless environment. Foremost is network security. Second is the choice of mobile hardware devices that are used by the orthodontist, office staff, and patients. This article details the standards and choices in wireless technology that can be implemented in an orthodontic clinic and suggests how to select suitable mobile hardware for accessing or adding data to a preexisting network. The network security protocols discussed comply with HIPAA regulations and boost the efficiency of a modern orthodontic clinic.

  11. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Backus, George A.; Strickland, James Hassler

    Globally, there is no lack of security threats. Many of them demand priority engagement and there can never be adequate resources to address all threats. In this context, climate is just another aspect of global security and the Arctic just another region. In light of physical and budgetary constraints, new security needs must be integrated and prioritized with existing ones. This discussion approaches the security impacts of climate from that perspective, starting with the broad security picture and establishing how climate may affect it. This method provides a different view from one that starts with climate and projects it, inmore » isolation, as the source of a hypothetical security burden. That said, the Arctic does appear to present high-priority security challenges. Uncertainty in the timing of an ice-free Arctic affects how quickly it will become a security priority. Uncertainty in the emergent extreme and variable weather conditions will determine the difficulty (cost) of maintaining adequate security (order) in the area. The resolution of sovereignty boundaries affects the ability to enforce security measures, and the U.S. will most probably need a military presence to back-up negotiated sovereignty agreements. Without additional global warming, technology already allows the Arctic to become a strategic link in the global supply chain, possibly with northern Russia as its main hub. Additionally, the multinational corporations reaping the economic bounty may affect security tensions more than nation-states themselves. Countries will depend ever more heavily on the global supply chains. China has particular needs to protect its trade flows. In matters of security, nation-state and multinational-corporate interests will become heavily intertwined.« less

  12. Economic Incentives for Cybersecurity: Using Economics to Design Technologies Ready for Deployment

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Vishik, Claire; Sheldon, Frederick T; Ott, David

    Cybersecurity practice lags behind cyber technology achievements. Solutions designed to address many problems may and do exist but frequently cannot be broadly deployed due to economic constraints. Whereas security economics focuses on the cost/benefit analysis and supply/demand, we believe that more sophisticated theoretical approaches, such as economic modeling, rarely utilized, would derive greater societal benefits. Unfortunately, today technologists pursuing interesting and elegant solutions have little knowledge of the feasibility for broad deployment of their results and cannot anticipate the influences of other technologies, existing infrastructure, and technology evolution, nor bring the solutions lifecycle into the equation. Additionally, potentially viable solutionsmore » are not adopted because the risk perceptions by potential providers and users far outweighs the economic incentives to support introduction/adoption of new best practices and technologies that are not well enough defined. In some cases, there is no alignment with redominant and future business models as well as regulatory and policy requirements. This paper provides an overview of the economics of security, reviewing work that helped to define economic models for the Internet economy from the 1990s. We bring forward examples of potential use of theoretical economics in defining metrics for emerging technology areas, positioning infrastructure investment, and building real-time response capability as part of software development. These diverse examples help us understand the gaps in current research. Filling these gaps will be instrumental for defining viable economic incentives, economic policies, regulations as well as early-stage technology development approaches, that can speed up commercialization and deployment of new technologies in cybersecurity.« less

  13. OpenID Connect as a security service in cloud-based medical imaging systems.

    PubMed

    Ma, Weina; Sartipi, Kamran; Sharghigoorabi, Hassan; Koff, David; Bak, Peter

    2016-04-01

    The evolution of cloud computing is driving the next generation of medical imaging systems. However, privacy and security concerns have been consistently regarded as the major obstacles for adoption of cloud computing by healthcare domains. OpenID Connect, combining OpenID and OAuth together, is an emerging representational state transfer-based federated identity solution. It is one of the most adopted open standards to potentially become the de facto standard for securing cloud computing and mobile applications, which is also regarded as "Kerberos of cloud." We introduce OpenID Connect as an authentication and authorization service in cloud-based diagnostic imaging (DI) systems, and propose enhancements that allow for incorporating this technology within distributed enterprise environments. The objective of this study is to offer solutions for secure sharing of medical images among diagnostic imaging repository (DI-r) and heterogeneous picture archiving and communication systems (PACS) as well as Web-based and mobile clients in the cloud ecosystem. The main objective is to use OpenID Connect open-source single sign-on and authorization service and in a user-centric manner, while deploying DI-r and PACS to private or community clouds should provide equivalent security levels to traditional computing model.

  14. 32 CFR 245.6 - Abbreviations and acronyms.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ...—Domestic Event Network DHS—Department of Homeland Security DND—Department of National Defence (Canada) DoD...) MISCELLANEOUS PLAN FOR THE EMERGENCY SECURITY CONTROL OF AIR TRAFFIC (ESCAT) Explanation of Terms, Acronyms and... Order ESCAT—Emergency Security Control of Air Traffic FAA—Federal Aviation Administration IFR—Instrument...

  15. Infrared sensing of non-observable human biometrics

    NASA Astrophysics Data System (ADS)

    Willmore, Michael R.

    2005-05-01

    Interest and growth of biometric recognition technologies surged after 9/11. Once a technology mainly used for identity verification in law enforcement, biometrics are now being considered as a secure means of providing identity assurance in security related applications. Biometric recognition in law enforcement must, by necessity, use attributes of human uniqueness that are both observable and vulnerable to compromise. Privacy and protection of an individual's identity is not assured during criminal activity. However, a security system must rely on identity assurance for access control to physical or logical spaces while not being vulnerable to compromise and protecting the privacy of an individual. The solution resides in the use of non-observable attributes of human uniqueness to perform the biometric recognition process. This discussion will begin by presenting some key perspectives about biometric recognition and the characteristic differences between observable and non-observable biometric attributes. An introduction to the design, development, and testing of the Thermo-ID system will follow. The Thermo-ID system is an emerging biometric recognition technology that uses non-observable patterns of infrared energy naturally emanating from within the human body. As with all biometric systems, the infrared patterns recorded and compared within the Thermo-ID system are unique and individually distinguishable permitting a link to be confirmed between an individual and a claimed or previously established identity. The non-observable characteristics of infrared patterns of human uniqueness insure both the privacy and protection of an individual using this type of biometric recognition system.

  16. Practical Quantum Cryptography for Secure Free-Space Communications

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Buttler, W.T.; Hughes, R.J.; Kwiat, P.G.

    1999-02-01

    Quantum cryptography is an emerging technology in which two parties may simultaneously generate shared, secret cryptographic key material using the transmission of quantum states of light. The security of these transmissions is based on the inviolability of the laws of quantum mechanics and information-theoretically secure post-processing methods. An adversary can neither successfully tap the quantum transmissions, nor evade detection, owing to Heisenberg's uncertainty principle. In this paper we describe the theory of quantum cryptography, and the most recent results from our experimental free-space system with which we have demonstrated for the first time the feasibility of quantum key generation overmore » a point-to-point outdoor atmospheric path in daylight. We achieved a transmission distance of 0.5 km, which was limited only by the length of the test range. Our results provide strong evidence that cryptographic key material could be generated on demand between a ground station and a satellite (or between two satellites), allowing a satellite to be securely re-keyed on orbit. We present a feasibility analysis of surface-to-satellite quantum key generation.« less

  17. A Novel QKD-based Secure Edge Router Architecture Design for Burst Confidentiality in Optical Burst Switched Networks

    NASA Astrophysics Data System (ADS)

    Balamurugan, A. M.; Sivasubramanian, A.

    2014-06-01

    The Optical Burst Switching (OBS) is an emergent result to the technology issue that could achieve a viable network in future. They have the ability to meet the bandwidth requisite of those applications that call for intensive bandwidth. The field of optical transmission has undergone numerous advancements and is still being researched mainly due to the fact that optical data transmission can be done at enormous speeds. The concept of OBS is still far from perfection facing issues in case of security threat. The transfer of optical switching paradigm to optical burst switching faces serious downfall in the fields of burst aggregation, routing, authentication, dispute resolution and quality of service (QoS). This paper proposes a framework based on QKD based secure edge router architecture design to provide burst confidentiality. The QKD protocol offers high level of confidentiality as it is indestructible. The design architecture was implemented in FPGA using diverse models and the results were taken. The results show that the proposed model is suitable for real time secure routing applications of the Optical burst switched networks.

  18. [The program of Founding Research Centers for Emerging and Reemerging Infectious Diseases: the present status and future prospects].

    PubMed

    Okamoto, Yoshiko; Nagai, Yoshiyuki

    2007-12-01

    The program of Founding Research Centers for Emerging and Reemerging Infectious Diseases was commenced in 2005 with an outline for Japanese universities and research institutions to establish bilateral collaboration research bases in countries where emerging and reemerging infections are breaking out or will likely break out. So far, six universities and two institutions are participating in the program and ten collaboration bases have been established in six countries (five in Asia and one in Africa). Each research base aims to contribute to the security and safety of the partner and own countries by facilitating better understanding of infectious diseases, technology innovation in diagnosis, therapy and prevention, and human resources development. The experiences of the Reseau International des Instituts Pasteur (RIIP), France, and the Wellcome Trust Southeast Asian Tropical Medicine Research Units (Oxford Network), United Kingdom, which appear to share similar missions, suggest that infectious diseases research that is based on overseas research bases can produce first-time results through the building of long-term mutual trust with the counterparts. By referring to these networks as models, Japan's program should be implemented over the long run but not be based on a short-time perspective. Thus, secure funding is a major issue.

  19. Biometric Methods for Secure Communications in Body Sensor Networks: Resource-Efficient Key Management and Signal-Level Data Scrambling

    NASA Astrophysics Data System (ADS)

    Bui, Francis Minhthang; Hatzinakos, Dimitrios

    2007-12-01

    As electronic communications become more prevalent, mobile and universal, the threats of data compromises also accordingly loom larger. In the context of a body sensor network (BSN), which permits pervasive monitoring of potentially sensitive medical data, security and privacy concerns are particularly important. It is a challenge to implement traditional security infrastructures in these types of lightweight networks since they are by design limited in both computational and communication resources. A key enabling technology for secure communications in BSN's has emerged to be biometrics. In this work, we present two complementary approaches which exploit physiological signals to address security issues: (1) a resource-efficient key management system for generating and distributing cryptographic keys to constituent sensors in a BSN; (2) a novel data scrambling method, based on interpolation and random sampling, that is envisioned as a potential alternative to conventional symmetric encryption algorithms for certain types of data. The former targets the resource constraints in BSN's, while the latter addresses the fuzzy variability of biometric signals, which has largely precluded the direct application of conventional encryption. Using electrocardiogram (ECG) signals as biometrics, the resulting computer simulations demonstrate the feasibility and efficacy of these methods for delivering secure communications in BSN's.

  20. Governing through time: preparing for future threats to health and security.

    PubMed

    Samimian-Darash, Limor

    2011-09-01

    During preparations for the Second Gulf War, Israel considered universal smallpox vaccination. In doing so, it faced a problem: how to legitimise carrying out a security action against an uncertain future danger (smallpox pandemic), when this action carried specific, known risks (vaccine complications). To solve this problem, the Israeli preparedness system created a new domain through which the security action could reach its goal with minimum risk: first responders (a group of medical personnel and security forces). First-responder vaccination represents a shift in the form of 'securing health' and in the governmental technology applied to this goal, in which past, present, and future occurrences are governed to enable the execution of a security action. Through this practice, risks are not located in the present or in the future but in a 'shared' temporal space and thus can be seen as existing simultaneously. Preparedness for emerging future biological events, then, involves more than questioning how the future is contingent on the present and how the present is contingent on the future's perception; it also recognises the need for a new time positioning that allows operating on both present and future risks simultaneously. Governing these risks, then, means governing through time. © 2011 The Author. Sociology of Health & Illness © 2011 Foundation for the Sociology of Health & Illness/Blackwell Publishing Ltd.

  1. 6 CFR 7.23 - Emergency release of classified information.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ....23 Section 7.23 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CLASSIFIED...) The Secretary of Homeland Security has delegated to certain DHS employees the authority to disclose... emergency situations when there is an imminent threat to life or in defense of the homeland. (b) In...

  2. 78 FR 50436 - Agency Information Collection Activities: Submission for OMB Review; Comment Request

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-08-19

    ... Justification Template. Abstract: The TSGP is an important component of the Department of Homeland Security's... DEPARTMENT OF HOMELAND SECURITY Federal Emergency Management Agency [Docket ID: FEMA-2013-0022... addressed to the Desk Officer for the Department of Homeland Security, Federal Emergency Management Agency...

  3. 75 FR 11191 - Privacy Act of 1974; Retirement of Department of Homeland Security Federal Emergency Management...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-03-10

    ... 20472. For privacy issues please contact: Mary Ellen Callahan (703-235- 0780), Chief Privacy Officer... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary Privacy Act of 1974; Retirement of Department of Homeland Security Federal Emergency Management Agency System of Records AGENCY: Privacy Office...

  4. 76 FR 34886 - General Services Administration Acquisition Regulation; Implementation of Information Technology...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-06-15

    ... Acquisition Regulation; Implementation of Information Technology Security Provision AGENCY: Office of... information technology (IT) supplies, services and systems with security requirements. DATES: Effective Date... effective date that include information technology (IT) supplies, services and systems with security...

  5. 76 FR 4079 - Information Technology (IT) Security

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-01-24

    ... Technology (IT) Security AGENCY: National Aeronautics and Space Administration. ACTION: Final rule. SUMMARY: NASA is revising the NASA FAR Supplement (NFS) to update requirements related to Information Technology... Security clause. However, due to the critical importance of protecting the Agency's Information Technology...

  6. Cloud based emergency health care information service in India.

    PubMed

    Karthikeyan, N; Sukanesh, R

    2012-12-01

    A hospital is a health care organization providing patient treatment by expert physicians, surgeons and equipments. A report from a health care accreditation group says that miscommunication between patients and health care providers is the reason for the gap in providing emergency medical care to people in need. In developing countries, illiteracy is the major key root for deaths resulting from uncertain diseases constituting a serious public health problem. Mentally affected, differently abled and unconscious patients can't communicate about their medical history to the medical practitioners. Also, Medical practitioners can't edit or view DICOM images instantly. Our aim is to provide palm vein pattern recognition based medical record retrieval system, using cloud computing for the above mentioned people. Distributed computing technology is coming in the new forms as Grid computing and Cloud computing. These new forms are assured to bring Information Technology (IT) as a service. In this paper, we have described how these new forms of distributed computing will be helpful for modern health care industries. Cloud Computing is germinating its benefit to industrial sectors especially in medical scenarios. In Cloud Computing, IT-related capabilities and resources are provided as services, via the distributed computing on-demand. This paper is concerned with sprouting software as a service (SaaS) by means of Cloud computing with an aim to bring emergency health care sector in an umbrella with physical secured patient records. In framing the emergency healthcare treatment, the crucial thing considered necessary to decide about patients is their previous health conduct records. Thus a ubiquitous access to appropriate records is essential. Palm vein pattern recognition promises a secured patient record access. Likewise our paper reveals an efficient means to view, edit or transfer the DICOM images instantly which was a challenging task for medical practitioners in the past years. We have developed two services for health care. 1. Cloud based Palm vein recognition system 2. Distributed Medical image processing tools for medical practitioners.

  7. Technology-Enabled Crime, Policing and Security

    ERIC Educational Resources Information Center

    McQuade, Sam

    2006-01-01

    Crime, policing and security are enabled by and co-evolve with technologies that make them possible. As criminals compete with security and policing officials for technological advantage perpetually complex crime, policing and security results in relatively confusing and therefore unmanageable threats to society. New, adaptive and ordinary crimes…

  8. Grids for Dummies: Featuring Earth Science Data Mining Application

    NASA Technical Reports Server (NTRS)

    Hinke, Thomas H.

    2002-01-01

    This viewgraph presentation discusses the concept and advantages of linking computers together into data grids, an emerging technology for managing information across institutions, and potential users of data grids. The logistics of access to a grid, including the use of the World Wide Web to access grids, and security concerns are also discussed. The potential usefulness of data grids to the earth science community is also discussed, as well as the Global Grid Forum, and other efforts to establish standards for data grids.

  9. Analysis of the United States Computer Emergency Readiness Team’s (U.S. CERT) EINSTEIN III Intrusion Detection System, and Its Impact on Privacy

    DTIC Science & Technology

    2013-03-01

    Arlington, VA 22202–4302, and to the Office of Management and Budget, Paperwork Reduction Project (0704–0188) Washington DC 20503. 1. AGENCY USE ONLY...University, 2004 Submitted in partial fulfillment of the requirements for the degree of MASTER OF SCIENCE IN INFORMATION TECHNOLOGY MANAGEMENT...Fulp Second Reader Dr. Dan Boger Chair, Department of Information Sciences iv THIS PAGE INTENTIONALLY LEFT BLANK v ABSTRACT To secure

  10. Strengthening Multidisciplinary Research on Climate and Environmental Change

    NASA Astrophysics Data System (ADS)

    Beer, Tom; Li, Jianping; Alverson, Keith

    2014-08-01

    The difficulty with multidisciplinary research is finding common ground for scientists, whose approach to a particular scientific problem can differ radically. For example, there is agreement between the geophysical community and the food science and technology community that food security is an important issue. However, the climate change community sees possible solutions coming from more detailed studies on the links between climate change and agriculture, whereas the food science community sees possible solutions emerging from studies of food logistics and supply chains.

  11. Worldwide Emerging Environmental Issues Affecting the U.S. Military. May 2007 Report

    DTIC Science & Technology

    2007-05-01

    Change…………………………….…….4 6.2 Nuclear Nonproliferation Treaty Stalemate Continues…………………………..…..5 6.3 Stockholm Convention on POPs Adopts Evaluation but...cooperation and implementation of the Convention on Desertification; and strengthen international cooperation in scientific research and technology transfer...Environmental Security Issues––May 2007 5 AC/UNU Millennium Project 6.3 Stockholm Convention on POPs Adopts

  12. 78 FR 8160 - President's National Security Telecommunications Advisory Committee

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-02-05

    ... matters related to national security and emergency preparedness telecommunications policy. Agenda: The... and Emergency Preparedness Implications of a Nationwide Public Safety Broadband Network. The report...

  13. 14 CFR 1274.937 - Security requirements for unclassified information technology resources.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... information technology resources. 1274.937 Section 1274.937 Aeronautics and Space NATIONAL AERONAUTICS AND... Conditions § 1274.937 Security requirements for unclassified information technology resources. Security Requirements for Unclassified Information Technology Resources July 2002 (a) The Recipient shall be responsible...

  14. 14 CFR 1274.937 - Security requirements for unclassified information technology resources.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... information technology resources. 1274.937 Section 1274.937 Aeronautics and Space NATIONAL AERONAUTICS AND... Conditions § 1274.937 Security requirements for unclassified information technology resources. Security Requirements for Unclassified Information Technology Resources July 2002 (a) The Recipient shall be responsible...

  15. 14 CFR 1274.937 - Security requirements for unclassified information technology resources.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... information technology resources. 1274.937 Section 1274.937 Aeronautics and Space NATIONAL AERONAUTICS AND... Conditions § 1274.937 Security requirements for unclassified information technology resources. Security Requirements for Unclassified Information Technology Resources July 2002 (a) The Recipient shall be responsible...

  16. 14 CFR 1274.937 - Security requirements for unclassified information technology resources.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... information technology resources. 1274.937 Section 1274.937 Aeronautics and Space NATIONAL AERONAUTICS AND... Conditions § 1274.937 Security requirements for unclassified information technology resources. Security Requirements for Unclassified Information Technology Resources July 2002 (a) The Recipient shall be responsible...

  17. Design and validation of inert homemade explosive simulants for X-ray-based inspection systems

    NASA Astrophysics Data System (ADS)

    Faust, Anthony A.; Nacson, Sabatino; Koffler, Bruce; Bourbeau, Éric; Gagne, Louis; Laing, Robin; Anderson, C. J.

    2014-05-01

    Transport Canada (TC), the Canadian Armed Forces, and other public security agencies have an interest in the assessment of the potential utility of advanced explosives detection technologies to aid in the detection and interdiction of commercial grade, military grade, and homemade or improvised explosives (HME or IE). The availability of suitable, non-hazardous, non-toxic, explosive simulants is of concern when assessing the potential utility of such detection systems. Lack of simulants limits the training opportunities, and ultimately the detection probability, of security personnel using these systems. While simulants for commercial and military grade explosives are available for a wide variety of detection technologies, the design and production of materials to simulate improvised explosives has not kept pace with this emerging threat. Funded by TC and the Canadian Safety and Security Program, Defence Research and Development Canada (DRDC), Visiontec Systems, and Optosecurity engaged in an effort to develop inert, non-toxic Xray interrogation simulants for IE materials such as ammonium nitrate, potassium chlorate, and triacetone triperoxide. These simulants were designed to mimic key X-ray interrogation-relevant material properties of real improvised explosives, principally their bulk density and effective atomic number. Different forms of the simulants were produced and tested, simulating the different explosive threat formulations that could be encountered by front line security workers. These simulants comply with safety and stability requirements, and as best as possible match form and homogeneity. This paper outlines the research program, simulant design, and validation.

  18. A review of integration strategies for solid oxide fuel cells

    NASA Astrophysics Data System (ADS)

    Zhang, Xiongwen; Chan, S. H.; Li, Guojun; Ho, H. K.; Li, Jun; Feng, Zhenping

    Due to increasing oil and gas demand, the depletion of fossil resources, serious global warming, efficient energy systems and new energy conversion processes are urgently needed. Fuel cells and hybrid systems have emerged as advanced thermodynamic systems with great promise in achieving high energy/power efficiency with reduced environmental loads. In particular, due to the synergistic effect of using integrated solid oxide fuel cell (SOFC) and classical thermodynamic cycle technologies, the efficiency of the integrated system can be significantly improved. This paper reviews different concepts/strategies for SOFC-based integration systems, which are timely transformational energy-related technologies available to overcome the threats posed by climate change and energy security.

  19. Workshop on Emerging Technology and Data Analytics for Behavioral Health.

    PubMed

    Kotz, David; Lord, Sarah E; O'Malley, A James; Stark, Luke; Marsch, Lisa A

    2018-06-20

    Wearable and portable digital devices can support self-monitoring for patients with chronic medical conditions, individuals seeking to reduce stress, and people seeking to modify health-related behaviors such as substance use or overeating. The resulting data may be used directly by a consumer, or shared with a clinician for treatment, a caregiver for assistance, or a health coach for support. The data can also be used by researchers to develop and evaluate just-in-time interventions that leverage mobile technology to help individuals manage their symptoms and behavior in real time and as needed. Such wearable systems have huge potential for promoting delivery of anywhere-anytime health care, improving public health, and enhancing the quality of life for many people. The Center for Technology and Behavioral Health at Dartmouth College, a P30 "Center of Excellence" supported by the National Institute on Drug Abuse at the National Institutes of Health, conducted a workshop in February 2017 on innovations in emerging technology, user-centered design, and data analytics for behavioral health, with presentations by a diverse range of experts in the field. The workshop focused on wearable and mobile technologies being used in clinical and research contexts, with an emphasis on applications in mental health, addiction, and health behavior change. In this paper, we summarize the workshop panels on mobile sensing, user experience design, statistics and machine learning, and privacy and security, and conclude with suggested research directions for this important and emerging field of applying digital approaches to behavioral health. Workshop insights yielded four key directions for future research: (1) a need for behavioral health researchers to work iteratively with experts in emerging technology and data analytics, (2) a need for research into optimal user-interface design for behavioral health technologies, (3) a need for privacy-oriented design from the beginning of a novel technology, and (4) the need to develop new analytical methods that can scale to thousands of individuals and billions of data points. ©David Kotz, Sarah E Lord, A James O'Malley, Luke Stark, Lisa A. Marsch. Originally published in JMIR Research Protocols (http://www.researchprotocols.org), 20.06.2018.

  20. 75 FR 8384 - Agency Information Collection Activities: Proposed Collection; Comment Request, 1660-NEW; FEMA...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-02-24

    ... DEPARTMENT OF HOMELAND SECURITY Federal Emergency Management Agency [Docket ID FEMA-2010-0006... Preparedness Grants: State Homeland Security Program (SHSP) Tribal AGENCY: Federal Emergency Management Agency...-NEW; FEMA Form 089-22, SHSP-Tribal Investment Justification Template. SUMMARY: The Federal Emergency...

  1. 75 FR 17151 - Agency Information Collection Activities: Submission for OMB Review; Comment Request, OMB No...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-04-05

    ... DEPARTMENT OF HOMELAND SECURITY Federal Emergency Management Agency [Docket ID: FEMA-2009-0001...; FEMA Preparedness Grants: Homeland Security Grant Program (HSGP) AGENCY: Federal Emergency Management.... 1660-NEW; FEMA Form 089-1, HSGP Investment Justification. SUMMARY: The Federal Emergency Management...

  2. Homeland Security

    EPA Pesticide Factsheets

    Provides an overview of EPA's homeland security roles and responsibilities, and links to specific homeland security issues: water security, research, emergency response, recovery, and waste management.

  3. Emergency situations and deaf people in Israel: Communication obstacles and recommendations

    PubMed Central

    Tannenbaum-Baruchi, Carolina; Feder-Bubis, Paula; Adini, Bruria; Aharonson-Daniel, Limor

    2014-01-01

    The absence of the ability to hear sounds in deaf people is an obstacle to optimal communication in a predominantly hearing world. Emergency situations harbor sufficient challenge for the hearing person and pose even greater barriers for the deaf and hard of hearing. During disasters and emergency situations, deaf people have great difficulty in obtaining and sharing information, increasing their dependence on others. This article focuses on the experience of deaf people during a period of security threat, when missiles from the Gaza strip were aimed at the civilian population in Southern Israel, in 2009. The aim of this article is to illustrate the complexities that deaf citizens experienced, and describe their coping mechanisms. A qualitative study including 15 heterogeneous-background Deaf participants interviewed by a researcher that belongs to the deaf community using a multiple-method facilitated questionnaire. Data was analyzed using grounded theory methodology principles. Main categories that arose from data analysis were communication problems during emergencies, the pager as a questionable warning device about emergencies (due to timing and content/context issues of its use), and the implications of the location of deaf people at time of emergency. Various channels for conveying information should be examined and created in order to maximize the heterogeneous deaf community's ability to receive vital information during an emergency. Professional sign language interpreters are necessary during emergencies, helping to reduce both dependence on informal sources (such as family members, including minors, friends, neighbors, by-standers) and risk. The development of new technologies may bear potential help for deaf persons during emergencies. Being a socio-linguistic minority, it is recommended to ensure these technologies will be accessible to the whole deaf community. PMID:28229005

  4. Recent developments in terahertz sensing technology

    NASA Astrophysics Data System (ADS)

    Shur, Michael

    2016-05-01

    Terahertz technology has found numerous applications for the detection of biological and chemical hazardous agents, medical diagnostics, detection of explosives, providing security in buildings, airports, and other public spaces, shortrange covert communications (in the THz and sub-THz windows), and applications in radio astronomy and space research. The expansion of these applications will depend on the development of efficient electronic terahertz sources and sensitive low-noise terahertz detectors. Schottky diode frequency multipliers have emerged as a viable THz source technology reaching a few THz. High speed three terminal electronic devices (FETs and HBTs) have entered the THz range (with cutoff frequencies and maximum frequencies of operation above 1 THz). A new approach called plasma wave electronics recently demonstrated an efficient terahertz detection in GaAs-based and GaN-based HEMTs and in Si MOS, SOI, FINFETs and in FET arrays. This progress in THz electronic technology has promise for a significant expansion of THz applications.

  5. 48 CFR 1352.239-72 - Security requirements for information technology resources.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... information technology resources. 1352.239-72 Section 1352.239-72 Federal Acquisition Regulations System... Clauses 1352.239-72 Security requirements for information technology resources. As prescribed in 48 CFR 1339.270(b), insert the following clause: Security Requirements for Information Technology Resources...

  6. 48 CFR 1352.239-72 - Security requirements for information technology resources.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... information technology resources. 1352.239-72 Section 1352.239-72 Federal Acquisition Regulations System... Clauses 1352.239-72 Security requirements for information technology resources. As prescribed in 48 CFR 1339.270(b), insert the following clause: Security Requirements for Information Technology Resources...

  7. 48 CFR 1352.239-72 - Security requirements for information technology resources.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... information technology resources. 1352.239-72 Section 1352.239-72 Federal Acquisition Regulations System... Clauses 1352.239-72 Security requirements for information technology resources. As prescribed in 48 CFR 1339.270(b), insert the following clause: Security Requirements for Information Technology Resources...

  8. 48 CFR 1352.239-72 - Security requirements for information technology resources.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... information technology resources. 1352.239-72 Section 1352.239-72 Federal Acquisition Regulations System... Clauses 1352.239-72 Security requirements for information technology resources. As prescribed in 48 CFR 1339.270(b), insert the following clause: Security Requirements for Information Technology Resources...

  9. 48 CFR 1352.239-72 - Security requirements for information technology resources.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... information technology resources. 1352.239-72 Section 1352.239-72 Federal Acquisition Regulations System... Clauses 1352.239-72 Security requirements for information technology resources. As prescribed in 48 CFR 1339.270(b), insert the following clause: Security Requirements for Information Technology Resources...

  10. Secure Dynamic access control scheme of PHR in cloud computing.

    PubMed

    Chen, Tzer-Shyong; Liu, Chia-Hui; Chen, Tzer-Long; Chen, Chin-Sheng; Bau, Jian-Guo; Lin, Tzu-Ching

    2012-12-01

    With the development of information technology and medical technology, medical information has been developed from traditional paper records into electronic medical records, which have now been widely applied. The new-style medical information exchange system "personal health records (PHR)" is gradually developed. PHR is a kind of health records maintained and recorded by individuals. An ideal personal health record could integrate personal medical information from different sources and provide complete and correct personal health and medical summary through the Internet or portable media under the requirements of security and privacy. A lot of personal health records are being utilized. The patient-centered PHR information exchange system allows the public autonomously maintain and manage personal health records. Such management is convenient for storing, accessing, and sharing personal medical records. With the emergence of Cloud computing, PHR service has been transferred to storing data into Cloud servers that the resources could be flexibly utilized and the operation cost can be reduced. Nevertheless, patients would face privacy problem when storing PHR data into Cloud. Besides, it requires a secure protection scheme to encrypt the medical records of each patient for storing PHR into Cloud server. In the encryption process, it would be a challenge to achieve accurately accessing to medical records and corresponding to flexibility and efficiency. A new PHR access control scheme under Cloud computing environments is proposed in this study. With Lagrange interpolation polynomial to establish a secure and effective PHR information access scheme, it allows to accurately access to PHR with security and is suitable for enormous multi-users. Moreover, this scheme also dynamically supports multi-users in Cloud computing environments with personal privacy and offers legal authorities to access to PHR. From security and effectiveness analyses, the proposed PHR access scheme in Cloud computing environments is proven flexible and secure and could effectively correspond to real-time appending and deleting user access authorization and appending and revising PHR records.

  11. Securing Information Technology in Healthcare

    PubMed Central

    Anthony, Denise; Campbell, Andrew T.; Candon, Thomas; Gettinger, Andrew; Kotz, David; Marsch, Lisa A.; Molina-Markham, Andrés; Page, Karen; Smith, Sean W.; Gunter, Carl A.; Johnson, M. Eric

    2014-01-01

    Dartmouth College’s Institute for Security, Technology, and Society conducted three workshops on securing information technology in healthcare, attended by a diverse range of experts in the field. This article summarizes the three workshops. PMID:25379030

  12. A review of security of electronic health records.

    PubMed

    Win, Khin Than

    The objective of this study is to answer the research question, "Are current information security technologies adequate for electronic health records (EHRs)?" In order to achieve this, the following matters have been addressed in this article: (i) What is information security in the context of EHRs? (ii) Why is information security important for EHRs? and (iii) What are the current technologies for information security available to EHRs? It is concluded that current EHR security technologies are inadequate and urgently require improvement. Further study regarding information security of EHRs is indicated.

  13. 78 FR 39302 - Agency Information Collection Activities: Submission for OMB Review; Comment Request

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-07-01

    ... DEPARTMENT OF HOMELAND SECURITY Federal Emergency Management Agency [Docket ID: FEMA-2013-0008... addressed to the Desk Officer for the Department of Homeland Security, Federal Emergency Management Agency... Management Agency, Department of Homeland Security. [FR Doc. 2013-15646 Filed 6-28-13; 8:45 am] BILLING CODE...

  14. Development of an ease-of-use remote healthcare system architecture using RFID and networking technologies.

    PubMed

    Lin, Shih-Sung; Hung, Min-Hsiung; Tsai, Chang-Lung; Chou, Li-Ping

    2012-12-01

    The study aims to provide an ease-of-use approach for senior patients to utilize remote healthcare systems. An ease-of-use remote healthcare system (RHS) architecture using RFID (Radio Frequency Identification) and networking technologies is developed. Specifically, the codes in RFID tags are used for authenticating the patients' ID to secure and ease the login process. The patient needs only to take one action, i.e. placing a RFID tag onto the reader, to automatically login and start the RHS and then acquire automatic medical services. An ease-of-use emergency monitoring and reporting mechanism is developed as well to monitor and protect the safety of the senior patients who have to be left alone at home. By just pressing a single button, the RHS can automatically report the patient's emergency information to the clinic side so that the responsible medical personnel can take proper urgent actions for the patient. Besides, Web services technology is used to build the Internet communication scheme of the RHS so that the interoperability and data transmission security between the home server and the clinical server can be enhanced. A prototype RHS is constructed to validate the effectiveness of our designs. Testing results show that the proposed RHS architecture possesses the characteristics of ease to use, simplicity to operate, promptness in login, and no need to preserve identity information. The proposed RHS architecture can effectively increase the willingness of senior patients who act slowly or are unfamiliar with computer operations to use the RHS. The research results can be used as an add-on for developing future remote healthcare systems.

  15. Management of the Defense Technology Security Administration Year 2000 Program

    DTIC Science & Technology

    1998-11-03

    caller is fully protected Acronyms DTSA Defense Technology Security Administration Y2K Year 2000 INSPECTOR GENERAL DEPARTMENT OF DEFENSE 400 ARMY NAVY...accordance with the DoD Management Plan Defense Technology Security Administration. The Defense Technology Security Administration ( DTSA ) was established...in 1985 as a field activity of the Office of the Secretary of Defense By establishing DTSA , the DoD role in export controls was centralized and

  16. Secure and Resilient Cloud Computing for the Department of Defense

    DTIC Science & Technology

    2015-07-21

    that addresses that threat model, and (3) integrate the technology into a usable, secure, resilient cloud test bed. Underpinning this work is the...risks for the DoD’s acquisition of secure, resilient cloud technology by providing proofs of concept, technology maturity, integration demonstrations...we need a strategy for integrating LLSRC technology with the cloud services and applications that need to be secured. The LLSRC integration

  17. Ready to Respond: Case Studies in Campus Safety and Security

    ERIC Educational Resources Information Center

    Hyatt, James A.

    2010-01-01

    Is your campus primed for the next big emergency? The National Campus Safety and Security Project (NCSSP), led by NACUBO, sought to help colleges and universities develop comprehensive emergency management plans that address the four phases of emergency management: prevention/mitigation, preparedness, response, and recovery. A major component of…

  18. 48 CFR 2452.239-71 - Information Technology Virus Security.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 48 Federal Acquisition Regulations System 6 2014-10-01 2014-10-01 false Information Technology... Provisions and Clauses 2452.239-71 Information Technology Virus Security. As prescribed in 2439.107(b), insert the following clause: Information Technology Virus Security (FEB 2006) (a) The contractor hereby...

  19. 48 CFR 2452.239-71 - Information Technology Virus Security.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 48 Federal Acquisition Regulations System 6 2013-10-01 2013-10-01 false Information Technology... Provisions and Clauses 2452.239-71 Information Technology Virus Security. As prescribed in 2439.107(b), insert the following clause: Information Technology Virus Security (FEB 2006) (a) The contractor hereby...

  20. 48 CFR 2452.239-71 - Information Technology Virus Security.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 48 Federal Acquisition Regulations System 6 2012-10-01 2012-10-01 false Information Technology... Provisions and Clauses 2452.239-71 Information Technology Virus Security. As prescribed in 2439.107(b), insert the following clause: Information Technology Virus Security (FEB 2006) (a) The contractor hereby...

Top