Sample records for security incident response

  1. Challenges of information security incident learning: An industrial case study in a Chinese healthcare organization.

    PubMed

    He, Ying; Johnson, Chris

    2017-12-01

    Security incidents can have negative impacts on healthcare organizations, and the security of medical records has become a primary concern of the public. However, previous studies showed that organizations had not effectively learned lessons from security incidents. Incident learning as an essential activity in the "follow-up" phase of security incident response lifecycle has long been addressed but not given enough attention. This paper conducted a case study in a healthcare organization in China to explore their current obstacles in the practice of incident learning. We interviewed both IT professionals and healthcare professionals. The results showed that the organization did not have a structured way to gather and redistribute incident knowledge. Incident response was ineffective in cycling incident knowledge back to inform security management. Incident reporting to multiple stakeholders faced a great challenge. In response to this case study, we suggest the security assurance modeling framework to address those obstacles.

  2. 10 CFR 1.46 - Office of Nuclear Security and Incident Response.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 1 2013-01-01 2013-01-01 false Office of Nuclear Security and Incident Response. 1.46 Section 1.46 Energy NUCLEAR REGULATORY COMMISSION STATEMENT OF ORGANIZATION AND GENERAL INFORMATION Headquarters Program Offices § 1.46 Office of Nuclear Security and Incident Response. The Office of Nuclear...

  3. 10 CFR 1.46 - Office of Nuclear Security and Incident Response.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 1 2010-01-01 2010-01-01 false Office of Nuclear Security and Incident Response. 1.46 Section 1.46 Energy NUCLEAR REGULATORY COMMISSION STATEMENT OF ORGANIZATION AND GENERAL INFORMATION Headquarters Program Offices § 1.46 Office of Nuclear Security and Incident Response. The Office of Nuclear...

  4. 10 CFR 1.46 - Office of Nuclear Security and Incident Response.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 1 2011-01-01 2011-01-01 false Office of Nuclear Security and Incident Response. 1.46 Section 1.46 Energy NUCLEAR REGULATORY COMMISSION STATEMENT OF ORGANIZATION AND GENERAL INFORMATION Headquarters Program Offices § 1.46 Office of Nuclear Security and Incident Response. The Office of Nuclear...

  5. 10 CFR 1.46 - Office of Nuclear Security and Incident Response.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 1 2014-01-01 2014-01-01 false Office of Nuclear Security and Incident Response. 1.46 Section 1.46 Energy NUCLEAR REGULATORY COMMISSION STATEMENT OF ORGANIZATION AND GENERAL INFORMATION Headquarters Program Offices § 1.46 Office of Nuclear Security and Incident Response. The Office of Nuclear...

  6. 10 CFR 1.46 - Office of Nuclear Security and Incident Response.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 1 2012-01-01 2012-01-01 false Office of Nuclear Security and Incident Response. 1.46 Section 1.46 Energy NUCLEAR REGULATORY COMMISSION STATEMENT OF ORGANIZATION AND GENERAL INFORMATION Headquarters Program Offices § 1.46 Office of Nuclear Security and Incident Response. The Office of Nuclear...

  7. 78 FR 43230 - Agency Information Collection Activities: Submission to OMB for Reinstatement, Without Change, of...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-07-19

    ... Insured Credit Unions to maintain an information security program and an incident response plan that... Federally Insured Credit Unions to maintain an information security program and an incident response plan... credit unions to develop a written security program to safeguard sensitive member information. This...

  8. 77 FR 14525 - Statement of Organization, Functions, and Delegations of Authority

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-03-12

    ... maintains the CDC Computer Security Incident Response Team; (4) performs cyber security incident reporting... systems planning and support; internal security and emergency preparedness; and management analysis and... security; education, training, and workforce development in information and IT disciplines; development and...

  9. 78 FR 53166 - Agency Information Collection Activities: Submission to OMB for Reinstatement, Without Change, of...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-08-28

    ... an information security program and an incident response plan that complies with Title V of the Gramm... credit union's procedures comply with the information security and incident response requirements. There... NATIONAL CREDIT UNION ADMINISTRATION Agency Information Collection Activities: Submission to OMB...

  10. 78 FR 38949 - Computer Security Incident Coordination (CSIC): Providing Timely Cyber Incident Response

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-06-28

    ... information as part of the research needed to write a NIST Special Publication (SP) to help Computer Security.... The NIST SP will identify technical standards, methodologies, procedures, and processes that facilitate prompt and effective response. This RFI requests information regarding technical best practices...

  11. DOE's Computer Incident Advisory Capability (CIAC)

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Schultz, E.

    1990-09-01

    Computer security is essential in maintaining quality in the computing environment. Computer security incidents, however, are becoming more sophisticated. The DOE Computer Incident Advisory Capability (CIAC) team was formed primarily to assist DOE sites in responding to computer security incidents. Among CIAC's other responsibilities are gathering and distributing information to DOE sites, providing training workshops, coordinating with other agencies, response teams, and vendors, creating guidelines for incident handling, and developing software tools. CIAC has already provided considerable assistance to DOE sites faced with virus infections and worm and hacker attacks, has issued over 40 information bulletins, and has developed andmore » presented a workshop on incident handling. CIAC's experience in helping sites has produced several lessons learned, including the need to follow effective procedures to avoid virus infections in small systems and the need for sound password management and system administration in networked systems. CIAC's activity and scope will expand in the future. 4 refs.« less

  12. Computer Security Incident Response Team Effectiveness: A Needs Assessment

    PubMed Central

    Van der Kleij, Rick; Kleinhuis, Geert; Young, Heather

    2017-01-01

    Computer security incident response teams (CSIRTs) respond to a computer security incident when the need arises. Failure of these teams can have far-reaching effects for the economy and national security. CSIRTs often have to work on an ad hoc basis, in close cooperation with other teams, and in time constrained environments. It could be argued that under these working conditions CSIRTs would be likely to encounter problems. A needs assessment was done to see to which extent this argument holds true. We constructed an incident response needs model to assist in identifying areas that require improvement. We envisioned a model consisting of four assessment categories: Organization, Team, Individual and Instrumental. Central to this is the idea that both problems and needs can have an organizational, team, individual, or technical origin or a combination of these levels. To gather data we conducted a literature review. This resulted in a comprehensive list of challenges and needs that could hinder or improve, respectively, the performance of CSIRTs. Then, semi-structured in depth interviews were held with team coordinators and team members of five public and private sector Dutch CSIRTs to ground these findings in practice and to identify gaps between current and desired incident handling practices. This paper presents the findings of our needs assessment and ends with a discussion of potential solutions to problems with performance in incident response. PMID:29312051

  13. Computer Security Incident Response Team Effectiveness: A Needs Assessment.

    PubMed

    Van der Kleij, Rick; Kleinhuis, Geert; Young, Heather

    2017-01-01

    Computer security incident response teams (CSIRTs) respond to a computer security incident when the need arises. Failure of these teams can have far-reaching effects for the economy and national security. CSIRTs often have to work on an ad hoc basis, in close cooperation with other teams, and in time constrained environments. It could be argued that under these working conditions CSIRTs would be likely to encounter problems. A needs assessment was done to see to which extent this argument holds true. We constructed an incident response needs model to assist in identifying areas that require improvement. We envisioned a model consisting of four assessment categories: Organization, Team, Individual and Instrumental. Central to this is the idea that both problems and needs can have an organizational, team, individual, or technical origin or a combination of these levels. To gather data we conducted a literature review. This resulted in a comprehensive list of challenges and needs that could hinder or improve, respectively, the performance of CSIRTs. Then, semi-structured in depth interviews were held with team coordinators and team members of five public and private sector Dutch CSIRTs to ground these findings in practice and to identify gaps between current and desired incident handling practices. This paper presents the findings of our needs assessment and ends with a discussion of potential solutions to problems with performance in incident response.

  14. College law enforcement and security department responses to alcohol-related incidents: a national study.

    PubMed

    Bernat, Debra H; Lenk, Kathleen M; Nelson, Toben F; Winters, Ken C; Toomey, Traci L

    2014-08-01

    Campus police and security personnel are often the first to respond to alcohol-related incidents on campus. The purpose of this study is to examine how campus law enforcement and security respond to alcohol-related incidents, and how consequences and communication differ based on characteristics of the incident. Directors of campus police/security from 343 colleges across the United States completed a survey regarding usual practice following serious, underage, and less serious alcohol incidents on and off campus. Campus law enforcement and security most commonly reported contacting campus officials. A minority reported issuing citations and referring students to the health center. Enforcement actions were more commonly reported for serious and underage incidents than for less serious incidents. Large (vs. small) colleges, public (vs. private) colleges, and those located in small (vs. large) towns more consistently reported taking actions against drinkers. Understanding how campus police and security respond to alcohol-related incidents is essential for reducing alcohol-related problems on college campuses. Copyright © 2014 by the Research Society on Alcoholism.

  15. I-WASTE: EPA's Suite of Homeland Security Decision Support ...

    EPA Pesticide Factsheets

    In the U.S., a single comprehensive approach to all-hazards domestic incident management has been established by the Department of Homeland Security through the National Response Framework. This helps prevent, prepare for, respond to, and recover from terrorist attacks, major disasters, and other emergencies. A significant component of responding to and recovering from wide-area or isolated events, whether natural, accidental, or intentional, is the management of waste resulting from the incident itself or from activities cleaning up after the incident. To facilitate the proper management of incident-derived waste, EPA developed the Incident Waste Assessment and Tonnage Estimator (I-WASTE). I-WASTE was developed by the U.S. EPA’s Homeland Security Research Program in partnership with EPA program and regional offices, other U.S. government agencies, industry, and state and local emergency response programs. Presenting the disaster waste tool at the ORD Tools Café held in EPA Region 7th on Dec 9th.

  16. Remote Sensing Laboratory - RSL

    ScienceCinema

    None

    2018-01-16

    One of the primary resources supporting homeland security is the Remote Sensing Laboratory, or RSL. The Laboratory creates advanced technologies for emergency response operations, radiological incident response, and other remote sensing activities. RSL emergency response teams are on call 24-hours a day, and maintain the capability to deploy domestically and internationally in response to threats involving the loss, theft, or release of nuclear or radioactive material. Such incidents might include Nuclear Power Plant accidents, terrorist incidents involving nuclear or radiological materials, NASA launches, and transportation accidents involving nuclear materials. Working with the US Department of Homeland Security, RSL personnel equip, maintain, and conduct training on the mobile detection deployment unit, to provide nuclear radiological security at major national events such as the super bowl, the Indianapolis 500, New Year's Eve celebrations, presidential inaugurations, international meetings and conferences, just about any event where large numbers of people will gather.

  17. Remote Sensing Laboratory - RSL

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    None

    2014-11-06

    One of the primary resources supporting homeland security is the Remote Sensing Laboratory, or RSL. The Laboratory creates advanced technologies for emergency response operations, radiological incident response, and other remote sensing activities. RSL emergency response teams are on call 24-hours a day, and maintain the capability to deploy domestically and internationally in response to threats involving the loss, theft, or release of nuclear or radioactive material. Such incidents might include Nuclear Power Plant accidents, terrorist incidents involving nuclear or radiological materials, NASA launches, and transportation accidents involving nuclear materials. Working with the US Department of Homeland Security, RSL personnel equip,more » maintain, and conduct training on the mobile detection deployment unit, to provide nuclear radiological security at major national events such as the super bowl, the Indianapolis 500, New Year's Eve celebrations, presidential inaugurations, international meetings and conferences, just about any event where large numbers of people will gather.« less

  18. Improving Cybersecurity Incident Response Team (CSIRT) Skills, Dynamics and Effectiveness

    DTIC Science & Technology

    2017-03-01

    recommendations for optimal CSIRT performance. 15. SUBJECT TERMS Cyber Incident Response, Response Teams, Cognitive Task Analysis 16. SECURITY...conducted a study of the cognitive , social, personality, and motivational requirements involved in cybersecurity incident response and then validated...corporate CSIRTs, and academic institution CSIRTs. • Survey of Non-Technical KSAOs. Previous known studies of CSIRTs did not examine cognitive , social, and

  19. 42 CFR 73.14 - Incident response.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ..., security breaches (including information systems), severe weather and other natural disasters, workplace... locations, (10) Site security and control, (11) Procedures for emergency evacuation, including type of...

  20. NSI security task: Overview

    NASA Technical Reports Server (NTRS)

    Tencati, Ron

    1991-01-01

    An overview is presented of the NASA Science Internet (NSI) security task. The task includes the following: policies and security documentation; risk analysis and management; computer emergency response team; incident handling; toolkit development; user consulting; and working groups, conferences, and committees.

  1. Report: Improvements Needed in CSB’s Identity and Access Management and Incident Response Security Functions

    EPA Pesticide Factsheets

    Report #18-P-0030, October 30, 2017. Weaknesses in the Identity and Access Management and Incident Response metric domains leave the CSB vulnerable to attacks occurring and not being detected in a timely manner.

  2. A terrorism response plan for hospital security and safety officers.

    PubMed

    White, Donald E

    2002-01-01

    Security and Safety managers in today's healthcare facilities need to factor terrorism response into their emergency management plans, separate from the customary disaster plans and the comparatively recent security plans. Terrorism incidents will likely be security occurrences that use a weapon of mass destruction to magnify the incidents into disasters. Facility Y2K Plans can provide an excellent framework for the detailed contingency planning needed for terrorism response by healthcare facilities. Tabbed binder notebooks, with bulleted procedures and contact points for each functional section, can provide security and safety officers with at-a-glance instructions for quick 24/7 implementation. Each functional section should focus upon what activities or severity levels trigger activation of the backup processes. Network with your countywide, regional, and/or state organizations to learn what your peers are doing. Comprehensively inventory your state, local, and commercial resources so that you have alternate providers readily available 24/7 to assist your facility upon disasters.

  3. 78 FR 77606 - Security Requirements for Facilities Storing Spent Nuclear Fuel

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-12-24

    ... regulatory basis; availability of responses to public comments. SUMMARY: The U.S. Nuclear Regulatory... to Carol Gallagher; telephone: 301-287- 3422; email: [email protected] . For technical... Nuclear Security and Incident Response, U.S. Nuclear Regulatory Commission, Washington, DC 20555-0001...

  4. 76 FR 24901 - Privacy Act of 1974; Department of Homeland Security United States Coast Guard-DHS/USCG-002...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-05-03

    .... USCG Critical Incident Stress Management-related records: Work-Life staff, Peers, Incident commander... leadership personnel regarding alleged work place violence incidents; USCG Critical Incident Stress... Work-Life Offices who are responsible for providing services for the related programs described above...

  5. The role of an open-space CCTV system in limiting alcohol-related assault injuries in a late-night entertainment precinct in a tropical Queensland city, Australia.

    PubMed

    Pointing, Shane; Hayes-Jonkers, Charmaine; Bohanna, India; Clough, Alan

    2012-02-01

    Closed circuit television (CCTV) systems which incorporate real-time communication links between camera room operators and on-the-ground security may limit injuries resulting from alcohol-related assault. This pilot study examined CCTV footage and operator records of security responses for two periods totalling 22 days in 2010-2011 when 30 alcohol-related assaults were recorded. Semistructured discussions were conducted with camera room operators during 18 h of observation. Camera operators were proactive, efficiently directing street security to assault incidents. The system intervened in 40% (n=12) of alcohol-related assaults, limiting possible injury. This included three incidents judged as potentially preventable. A further five (17%) assault incidents were also judged as potentially preventable, while 43% (n=13) happened too quickly for intervention. Case studies describe security intervention in each category. Further research is recommended, particularly to evaluate the effects on preventing injuries through targeted awareness training to improve responsiveness and enhance the preventative capacity of similar CCTV systems.

  6. 78 FR 9951 - Excepted Service

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-02-12

    ...) Not to exceed 3000 positions that require unique cyber security skills and knowledge to perform cyber..., distributed control systems security, cyber incident response, cyber exercise facilitation and management, cyber vulnerability detection and assessment, network and systems engineering, enterprise architecture...

  7. Secure scalable disaster electronic medical record and tracking system.

    PubMed

    Demers, Gerard; Kahn, Christopher; Johansson, Per; Buono, Colleen; Chipara, Octav; Griswold, William; Chan, Theodore

    2013-10-01

    Electronic medical records (EMRs) are considered superior in documentation of care for medical practice. Current disaster medical response involves paper tracking systems and radio communication for mass-casualty incidents (MCIs). These systems are prone to errors, may be compromised by local conditions, and are labor intensive. Communication infrastructure may be impacted, overwhelmed by call volume, or destroyed by the disaster, making self-contained and secure EMR response a critical capability. Report As the prehospital disaster EMR allows for more robust content including protected health information (PHI), security measures must be instituted to safeguard these data. The Wireless Internet Information System for medicAl Response in Disasters (WIISARD) Research Group developed a handheld, linked, wireless EMR system utilizing current technology platforms. Smart phones connected to radio frequency identification (RFID) readers may be utilized to efficiently track casualties resulting from the incident. Medical information may be transmitted on an encrypted network to fellow prehospital team members, medical dispatch, and receiving medical centers. This system has been field tested in a number of exercises with excellent results, and future iterations will incorporate robust security measures. A secure prehospital triage EMR improves documentation quality during disaster drills.

  8. FRMAC Operations Manual

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Frandsen, K.

    In the event of a major radiological incident, the Federal Radiological Monitoring and Assessment Center (FRMAC) will coordinate the federal agencies that have various statutory responsibilities. The FRMAC is responsible for coordinating all environmental radiological monitoring, sampling, and assessment activities for the response. This manual describes the FRMAC’s response activities in a radiological incident. It also outlines how FRMAC fits in the National Incident Management System (NIMS) under the National Response Framework (NRF) and describes the federal assets and subsequent operational activities which provide federal radiological monitoring and assessment of the affected areas. In the event of a potential ormore » existing major radiological incident, the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Site Office (NNSA/NSO) is responsible for establishing and managing the FRMAC during the initial phases.« less

  9. Target Capabilities List: A Companion to the National Preparedness Guidelines

    DTIC Science & Technology

    2007-09-01

    lowest possible geographic, organizational, and jurisdictional level using the principles in the National Incident Management System (NIMS). The...Response Plan. U.S. Department of Homeland Security. December 2004. 3. Biological Incident Annex. In the National Response Plan. U.S. Department of...elements of the continuum and improve interoperability, public safety and service agency practitioners should observe the following principles : Gain

  10. DOE Office of Scientific and Technical Information (OSTI.GOV)

    NSTec Environmental Restoration

    Homeland Security Presidential Directive HSPD-5 requires all federal departments and agencies to adopt a National Incident Management System (NIMS)/Incident Command System (ICS) and use it in their individual domestic incident management and emergency prevention, preparedness, response, recovery, and mitigation programs and activities, as well as in support of those actions taken to assist state and local entities. This system provides a consistent nationwide template to enable federal, state, local, and tribal governments, private-sector, and nongovernmental organizations to work together effectively and efficiently to prepare for, prevent, respond to, and recover from domestic incidents, regardless of cause, size, or complexity, includingmore » acts of catastrophic terrorism. This document identifies the operational concepts of the Federal Radiological Monitoring and Assessment Center's (FRMAC) implementation of the NIMS/ICS response structure under the National Response Plan (NRP). The construct identified here defines the basic response template to be tailored to the incident-specific response requirements. FRMAC's mission to facilitate interagency environmental data management, monitoring, sampling, analysis, and assessment and link this information to the planning and decision staff clearly places the FRMAC in the Planning Section. FRMAC is not a mitigating resource for radiological contamination but is present to conduct radiological impact assessment for public dose avoidance. Field monitoring is a fact-finding mission to support this effort directly. Decisions based on the assessed data will drive public protection and operational requirements. This organizational structure under NIMS is focused by the mission responsibilities and interface requirements following the premise to provide emergency responders with a flexible yet standardized structure for incident response activities. The coordination responsibilities outlined in the NRP are based on the NIMS/ICS construct and Unified Command (UC) for management of a domestic incident. The NRP Nuclear/Radiological Incident Annex (NUC) further provides requirements and protocols for coordinating federal government capabilities to respond to nuclear/radiological Incidents of National Significance (INS) and other radiological incidents. When a FRMAC is established, it operates under the parameters of NIMS as defined in the NRP. FRMAC and its operations have been modified to reflect NIMS/ICS concepts and principles and to facilitate working in a Unified Command structure. FRMAC is established at or near the scene of the incident to coordinate radiological monitoring and assessment and is established in coordination with the U.S. Department of Homeland Security (DHS); the coordinating agency; other federal agencies; and state, local, and tribal authorities. However, regardless of the coordinating agency designation, U.S. Department of Energy (DOE) coordinates radiological monitoring and assessment activities for the initial phases of the offsite federal incident response through the Radiological Assistance Program (RAP) and FRMAC assets. Monitoring and assessment data are managed by FRMAC in an accountable, secure, and retrievable format. Monitoring data interpretations, including exposure rate contours, dose projections, and any requested radiological assessments are to be provided to the DHS; to the coordinating agency; and to state, local, and tribal government agencies.« less

  11. A survey of pandemic influenza preparedness and response capabilities in Chicago area hospital security departments.

    PubMed

    Kimmerly, David P

    2009-01-01

    This article is a summary based on a December 2007 paper prepared by the author in partial fulfillment of the requirements for a master's degree in business and organizational security management at Webster University. The project described was intended to assess Chicago-area healthcare organization security departments' preparedness and response capabilities for a potential influenza pandemic. While the author says healthcare organizations are learning from the pandemics of the past, little research has been conducted on the requirements necessary within hospital security departments. The article explores staffing, planning, preparation and response capabilities within a healthcare security context to determine existing resources available to the healthcare security community. Eleven completed surveys were received from hospital security managers throughout the geographical Chicago area. They reveal that hospital security managers are conscious of the risks of a pandemic influenza outbreak. Yet, it was found that several gaps existed within hospital security department staffing and response capabilities, as hospital security departments may not have the available resources necessary to adequately maintain their operations during a pandemic incident.

  12. EPA’s Role in Emergency Response

    EPA Pesticide Factsheets

    EPA provides support when requested, or when state and local first responder capabilities have been exceeded, in response to chemical, oil, biological, and radiological releases and large-scale national emergencies, including homeland security incidents.

  13. A Decade of Experience: Which Network Structures Maximize Fire Service Capacity for Homeland Security Incidents in Metropolitan Regions?

    DTIC Science & Technology

    2011-12-01

    Pennsylvania Emergency Management Agency QHSR Quadrennial Homeland Security Review Report RCP Regional Catastrophic Preparedness SAA State...service has evolved from a single-purpose service focused on controlling fires to a multidimensional response element responsible for pre- hospital ... hospital preparedness program Preparedness Training for all personnel; training and network activities during prior year assist in preparedness

  14. Computer Simulation for Emergency Incident Management

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Brown, D L

    2004-12-03

    This report describes the findings and recommendations resulting from the Department of Homeland Security (DHS) Incident Management Simulation Workshop held by the DHS Advanced Scientific Computing Program in May 2004. This workshop brought senior representatives of the emergency response and incident-management communities together with modeling and simulation technologists from Department of Energy laboratories. The workshop provided an opportunity for incident responders to describe the nature and substance of the primary personnel roles in an incident response, to identify current and anticipated roles of modeling and simulation in support of incident response, and to begin a dialog between the incident responsemore » and simulation technology communities that will guide and inform planned modeling and simulation development for incident response. This report provides a summary of the discussions at the workshop as well as a summary of simulation capabilities that are relevant to incident-management training, and recommendations for the use of simulation in both incident management and in incident management training, based on the discussions at the workshop. In addition, the report discusses areas where further research and development will be required to support future needs in this area.« less

  15. Using incident response trees as a tool for risk management of online financial services.

    PubMed

    Gorton, Dan

    2014-09-01

    The article introduces the use of probabilistic risk assessment for modeling the incident response process of online financial services. The main contribution is the creation of incident response trees, using event tree analysis, which provides us with a visual tool and a systematic way to estimate the probability of a successful incident response process against the currently known risk landscape, making it possible to measure the balance between front-end and back-end security measures. The model is presented using an illustrative example, and is then applied to the incident response process of a Swedish bank. Access to relevant data is verified and the applicability and usability of the proposed model is verified using one year of historical data. Potential advantages and possible shortcomings are discussed, referring to both the design phase and the operational phase, and future work is presented. © 2014 Society for Risk Analysis.

  16. 10 CFR 70.5 - Communications.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... milling, the Agreement States of Colorado, Utah, Texas and Washington should be contacted. [48 FR 16032... 10 Energy 2 2012-01-01 2012-01-01 false Communications. 70.5 Section 70.5 Energy NUCLEAR... Director, Division of Security Policy, Office of Nuclear Security and Incident Response, U.S. Nuclear...

  17. Homeland security and the non-federal healthcare sector: evaluation of your incident command system (ICS).

    PubMed

    Blair, James D

    2005-01-01

    Healthcare and other private sector industries have lagged behind federal agencies in fulfilling their security readiness mission, according to the author. A comprehensive and timely resource is now available, he reports, to help healthcare officials in improving emergency response and preparedness.

  18. 76 FR 12745 - Privacy Act of 1974; Department of Homeland Security Office of Operations Coordination and...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-03-08

    ... Center Tracker Log is the underlying cumulative repository of responses to all-threats and all-hazards... cumulative repository of all NOC responses to threats, incidents, significant activities and Requests for...

  19. 76 FR 57636 - Privacy Act of 1974: Implementation and Amendment of Exemptions

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-09-16

    ..., application of the exemptions to the three new systems of records is necessary to protect information compiled... safety and security of employees in the workplace. Access to such information could allow the subject of...) Records; (8) SEC Security in the Workplace Incident Records; and (9) Investor Response Information System...

  20. I-WASTE: EPA’s Suite of Homeland Security Decision Support Tools for the Waste and Disaster Debris Management and Disposal

    EPA Science Inventory

    In the U.S., a single comprehensive approach to all-hazards domestic incident management has been established by the Department of Homeland Security through the National Response Framework. This helps prevent, prepare for, respond to, and recover from terrorist attacks, major di...

  1. 77 FR 39487 - Proposed Collection; Comment Request

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-07-03

    ... in any law enforcement or security matter on DLA property, which requires DLA Police response or... matter on DLA property, which requires DLA Police response or contact. Law Enforcement matters include... property, incident reports, blotters, qualifications, dispatching, and other police information management...

  2. Adequacy of US Hospital Security Preparedness for Mass Casualty Incidents: Critical Lessons From the Israeli Experience.

    PubMed

    Golabek-Goldman, Michele

    2016-01-01

    Due to Israel's threat environment, Israeli hospitals have developed effective and innovative security preparations for responding to all-hazards incidents. Although Israeli hospital preparedness has been the subject of international praise and attention, there has been a dearth of research focused specifically on applying Israeli hospital security measures to the US hospital setting to augment emergency planning. This study examined practical and cost-effective lessons from the Israeli experience for improving US hospital security preparedness for a wide range of mass casualty incidents, both natural and man-made. Sixty semi-structured interviews were conducted with officials throughout Israel's and America's health, defense, and emergency response communities. Hospital preparedness was examined and disaster drills were evaluated in both countries, with San Francisco hospitals analyzed as a case study. Qualitative analysis was conducted and recommendations were made on the basis of an all-hazards approach to emergency preparedness. US hospitals examined in this study had not undertaken crucial preparations for managing the security consequences of a large-scale disaster. Recommendations from Israel included installing permanent emergency signage, improving security perimeter protocols and training, increasing defense against primary and secondary attacks, enhancing coordination with law enforcement, the National Guard, and other outside security agencies, and conducting more frequent and realistic lockdown exercises. A number of US hospitals have overlooked the important role of security in emergency preparedness. This study analyzed practical and cost-effective security recommendations from Israel to remedy this dangerous deficiency in some US hospitals' disaster planning.

  3. 7 CFR 331.14 - Incident response. 6

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... other natural disasters; workplace violence; bomb threats and suspicious packages; and emergencies such... equipment, and their locations; (10) Site security and control; (11) Procedures for emergency evacuation...

  4. State of the Practice of Intrusion Detection Technologies

    DTIC Science & Technology

    2000-01-01

    security incident response teams ) - the role of IDS in threat management, such as defining alarm severity, monitoring, alerting, and policy-based...attacks in an effort to sneak under the radar of security specialists and intrusion detection software, a U.S. Navy network security team said today...to get the smoking gun," said Stephen Northcutt, head of the Shadow intrusion detection team at the Naval Surface Warfare Center. "To know what’s

  5. Structural Causes and Cyber Effects: A Response to Our Critics

    DTIC Science & Technology

    2015-01-01

    the incident, saying “North Korea’s attack on [Sony] reaf- firms that cyber threats pose one of the gravest national security dangers to the United...around the world to strengthen cyber - security , promote norms of acceptable state behavior, uphold freedom of expression, and ensure that the Internet... cyber working group that made progress toward “interna- tional cyberspace rules, and measures to boost dialogue and cooperation on cyber security .”15

  6. 9 CFR 121.14 - Incident response. 11

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... (including information systems); severe weather and other natural disasters; workplace violence; bomb threats... protective and emergency equipment, and their locations; (10) Site security and control; (11) Procedures for...

  7. Preventing School Bullying: Should Schools Prioritize an Authoritative School Discipline Approach over Security Measures?

    ERIC Educational Resources Information Center

    Gerlinger, Julie; Wo, James C.

    2016-01-01

    A common response to school violence features the use of security measures to deter serious and violent incidents. However, a second approach, based on school climate theory, suggests that schools exhibiting authoritative school discipline (i.e., high structure and support) might more effectively reduce school disorder. We tested these approaches…

  8. 75 FR 36505 - Notice of Public Webinar To Discuss the Applicability of 10 CFR 73.55 Requirements to Part 50...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-06-28

    ... (March 27, 2009; 74 FR 13925) and the other stakeholders. The purpose of this Webinar is to discuss the applicability of those security requirements to licensees with facilities in decommissioning or decommissioned... Security and Incident Response, U.S. Nuclear Regulatory Commission, Washington, DC 20555-0001; e-mail...

  9. Monitoring Responsibilities for Serious Incidents Involving Private Security Contractors Once U.S. Military Forces Leave Iraq Have Not Been Determined

    DTIC Science & Technology

    2011-07-29

    SPECIAL INSPE CTOR GENE RAL FOR IRAQ RECONSTRUCTION 400 Army Navy Drive • Arlington, Virginia 22202 July 29, 2011 LETTER FOR...11-019) In September 2007, Blackwater , Inc., a private security contractor (PSC) under contract with the Department of State (DoS), was involved in

  10. Homeland Security Presidential Directives

    EPA Pesticide Factsheets

    Three of these directives directly affect EPA's role in the national emergency response system: HSPD-5 Management of Domestic Incidents; HSPD-7 Critical Infrastructure Identification, Prioritization, and Protection; and HSPD-8 National Preparedness.

  11. Design of a Forecasting Service System for Monitoring of Vulnerabilities of Sensor Networks

    NASA Astrophysics Data System (ADS)

    Song, Jae-Gu; Kim, Jong Hyun; Seo, Dong Il; Kim, Seoksoo

    This study aims to reduce security vulnerabilities of sensor networks which transmit data in an open environment by developing a forecasting service system. The system is to remove or monitor causes of breach incidents in advance. To that end, this research first examines general security vulnerabilities of sensor networks and analyzes characteristics of existing forecasting systems. Then, 5 steps of a forecasting service system are proposed in order to improve security responses.

  12. [How to establish the hospital information system security policies].

    PubMed

    Gong, Qing-Yue; Shi, Cheng

    2008-03-01

    It is important to establish the hospital information system security policies. While these security policies are being established, a comprehensive consideration should be given to the acceptable levels of users, IT supporters and hospital managers. We should have a formal policy designing process that is consistently followed by all security policies. Reasons for establishing the security policies and their coverage and applicable objects should be stated clearly. Besides, each policy should define user's responsibilities and penalties of violation. Every organization will need some key policies, such as of information sources usage, remote access, information protection, perimeter security, and baseline host/device security. Security managing procedures are the mechanisms to enforce the policies. An incident-handling procedure is the most important security managing procedure for all organizations.

  13. Hospital security and patient elopement: protecting patients and your healthcare facility.

    PubMed

    Smith, Thomas A

    2012-01-01

    Regulatory and financial consequences of adverse events associated with patient elopements are bringing new challenges to healthcare security to develop policies and procedures to prevent and respond to such incidents. This article provides an overview of the problem of elopement in healthcare and what it means to the security function; gives a working knowledge of healthcare related standards and guidelines aimed at reducing patient elopement; and reviews the elements of an elopement prevention and response plan for your organization.

  14. Homeland security: sharing and managing critical incident information

    NASA Astrophysics Data System (ADS)

    Ashley, W. R., III

    2003-09-01

    Effective critical incident response for homeland security requires access to real-time information from many organizations. Command and control, as well as basic situational awareness, are all dependant on quickly communicating a dynamically changing picture to a variety of decision makers. For the most part, critical information management is not unfamiliar or new to the public safety community. However, new challenges present themselves when that information needs to be seamlessly shared across multiple organizations at the local, state and federal level in real-time. The homeland security problem does not lend itself to the traditional military joint forces planning model where activities shift from a deliberate planning process to a crisis action planning process. Rather, the homeland security problem is more similar to a traditional public safety model where the current activity state moves from complete inactivity or low-level attention to immediate crisis action planning. More often than not the escalation occurs with no warning or baseline information. This paper addresses the challenges of sharing critical incident information and the impacts new technologies will have on this problem. The value of current and proposed approaches will be critiqued for operational value and areas will be identified for further development.

  15. Coordinating management disciplines to build operational resilience in response to a major crisis situation.

    PubMed

    Drachal, Marcin

    2017-01-01

    Using case studies of the Ebola outbreak in Western Africa in 2014, and the terrorist attacks in Paris and Brussels in 2015 and 2016 respectively, this paper demonstrates how various resilience-related corporate functions contributed to effective crisis response. This paper describes the logical order of actions taken in each of the cases, and how the organisation prioritised its assets and coordinated activities to ensure the response was adequate, efficient and timely. The article demonstrates how business continuity, physical security, threat management, security intelligence and incident management worked together to support the organisation's crisis management structures in complex crisis situations.

  16. Empirical analysis of the effects of cyber security incidents.

    PubMed

    Davis, Ginger; Garcia, Alfredo; Zhang, Weide

    2009-09-01

    We analyze the time series associated with web traffic for a representative set of online businesses that have suffered widely reported cyber security incidents. Our working hypothesis is that cyber security incidents may prompt (security conscious) online customers to opt out and conduct their business elsewhere or, at the very least, to refrain from accessing online services. For companies relying almost exclusively on online channels, this presents an important business risk. We test for structural changes in these time series that may have been caused by these cyber security incidents. Our results consistently indicate that cyber security incidents do not affect the structure of web traffic for the set of online businesses studied. We discuss various public policy considerations stemming from our analysis.

  17. Certified Training for Nuclear and Radioactive Source Security Management.

    PubMed

    Johnson, Daniel

    2017-04-01

    Radioactive sources are used by hospitals, research facilities and industry for such purposes as diagnosing and treating illnesses, sterilising equipment and inspecting welds. Unfortunately, many States, regulatory authorities and licensees may not appreciate how people with malevolent intentions could use radioactive sources, and statistics confirm that a number of security incidents happen around the globe. The adversary could be common thieves, activists, insiders, terrorists and organised crime groups. Mitigating this risk requires well trained and competent staff who have developed the knowledge, attributes and skills necessary to successfully discharge their security responsibilities. The International Atomic Energy Agency and the World Institute for Nuclear Security are leading international training efforts. The target audience is a multi-disciplinary group of professionals with management responsibilities for security at facilities with radioactive sources. These efforts to promote training and competence amongst practitioners have been recognised at the 2014 and 2016 Nuclear Security and Nuclear Industry Summits. © The Author 2016. Published by Oxford University Press. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  18. Waste Management Decision-Making Process During a Homeland Security Incident Response

    EPA Pesticide Factsheets

    A step-by-step guide on how to make waste management-related decisions including how waste can be minimized, collected and treated, as well as where waste can be sent for staging, storage and final disposal.

  19. 33 CFR 135.303 - Definitions.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ....303 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) MARINE POLLUTION FINANCIAL RESPONSIBILITY AND COMPENSATION OFFSHORE OIL POLLUTION COMPENSATION FUND Notification of Pollution Incidents § 135.303 Definitions. As used in this subpart: Occurrences which pose an imminent...

  20. 33 CFR 135.303 - Definitions.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ....303 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) MARINE POLLUTION FINANCIAL RESPONSIBILITY AND COMPENSATION OFFSHORE OIL POLLUTION COMPENSATION FUND Notification of Pollution Incidents § 135.303 Definitions. As used in this subpart: Occurrences which pose an imminent...

  1. 33 CFR 135.303 - Definitions.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ....303 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) MARINE POLLUTION FINANCIAL RESPONSIBILITY AND COMPENSATION OFFSHORE OIL POLLUTION COMPENSATION FUND Notification of Pollution Incidents § 135.303 Definitions. As used in this subpart: Occurrences which pose an imminent...

  2. Information-Pooling Bias in Collaborative Security Incident Correlation Analysis.

    PubMed

    Rajivan, Prashanth; Cooke, Nancy J

    2018-03-01

    Incident correlation is a vital step in the cybersecurity threat detection process. This article presents research on the effect of group-level information-pooling bias on collaborative incident correlation analysis in a synthetic task environment. Past research has shown that uneven information distribution biases people to share information that is known to most team members and prevents them from sharing any unique information available with them. The effect of such biases on security team collaborations are largely unknown. Thirty 3-person teams performed two threat detection missions involving information sharing and correlating security incidents. Incidents were predistributed to each person in the team based on the hidden profile paradigm. Participant teams, randomly assigned to three experimental groups, used different collaboration aids during Mission 2. Communication analysis revealed that participant teams were 3 times more likely to discuss security incidents commonly known to the majority. Unaided team collaboration was inefficient in finding associations between security incidents uniquely available to each member of the team. Visualizations that augment perceptual processing and recognition memory were found to mitigate the bias. The data suggest that (a) security analyst teams, when conducting collaborative correlation analysis, could be inefficient in pooling unique information from their peers; (b) employing off-the-shelf collaboration tools in cybersecurity defense environments is inadequate; and (c) collaborative security visualization tools developed considering the human cognitive limitations of security analysts is necessary. Potential applications of this research include development of team training procedures and collaboration tool development for security analysts.

  3. 33 CFR 133.7 - Requests: Amount.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 133.7 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) MARINE POLLUTION FINANCIAL RESPONSIBILITY AND COMPENSATION OIL SPILL LIABILITY TRUST FUND; STATE ACCESS § 133.7... amount anticipated for immediate removal action for a single oil pollution incident, but, in any event...

  4. 33 CFR 133.7 - Requests: Amount.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 133.7 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) MARINE POLLUTION FINANCIAL RESPONSIBILITY AND COMPENSATION OIL SPILL LIABILITY TRUST FUND; STATE ACCESS § 133.7... amount anticipated for immediate removal action for a single oil pollution incident, but, in any event...

  5. 33 CFR 133.7 - Requests: Amount.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 133.7 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) MARINE POLLUTION FINANCIAL RESPONSIBILITY AND COMPENSATION OIL SPILL LIABILITY TRUST FUND; STATE ACCESS § 133.7... amount anticipated for immediate removal action for a single oil pollution incident, but, in any event...

  6. 33 CFR 133.7 - Requests: Amount.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 133.7 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) MARINE POLLUTION FINANCIAL RESPONSIBILITY AND COMPENSATION OIL SPILL LIABILITY TRUST FUND; STATE ACCESS § 133.7... amount anticipated for immediate removal action for a single oil pollution incident, but, in any event...

  7. 33 CFR 133.7 - Requests: Amount.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 133.7 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) MARINE POLLUTION FINANCIAL RESPONSIBILITY AND COMPENSATION OIL SPILL LIABILITY TRUST FUND; STATE ACCESS § 133.7... amount anticipated for immediate removal action for a single oil pollution incident, but, in any event...

  8. Evaluation of anger management groups in a high-security hospital.

    PubMed

    Wilson, Claire; Gandolfi, Stacy; Dudley, Alison; Thomas, Brian; Tapp, James; Moore, Estelle

    2013-12-01

    Anger management programmes for offenders typically aim to improve the management of emotion associated with aggressive and antisocial behaviour. Such programmes have been quite extensively evaluated in prison and probation settings, but there is less published research in forensic mental health settings. This study aimed to evaluate anger management groups in a high-security hospital. Eighty-six patients were referred for a 20-session anger management intervention. Outcomes were self-reported experiences of anger and changes in institutionally documented incidents of aggression. Incident rates were retrospectively reviewed for all group graduates, where data were available, including a comparison group of graduates who acted as their own controls. Group graduates reported sustained reductions in feelings of anger and positive changes in their use of aggression in reaction to provocation. Some reduction in incidents of physical aggression was noted when group completers were compared with non-completers. Incidents of verbal aggression were observed to increase for graduates. There was also a trend towards improvement when treated men were compared with men on the waiting list. Our findings contribute to the growing evidence for anger management groups for aggressive men, although the low-base rate of incidents, typical of such a containing and therapeutic hospital setting, rendered the analysis of behavioural outcomes difficult. Anger management sessions for male forensic psychiatric patients can be effective in reducing incidents of physical aggression in response to provocation. Evaluation of treatments for anger is particularly difficult in secure and protective settings, where the aim is to keep incidents of actual physical aggression to a minimum. Further research of this kind is needed to test the value of self-reported reduction in angry feelings as an indicator of clinically useful progress. Copyright © 2013 John Wiley & Sons, Ltd.

  9. Attitudes toward the large-scale implementation of an incident reporting system.

    PubMed

    Braithwaite, Jeffrey; Westbrook, Mary; Travaglia, Joanne

    2008-06-01

    An electronic Incident Information Management System implemented system-wide by the Department of Health, New South Wales, Australia was evaluated. We hypothesized that health professionals (i) would support the system via utilization and favourable attitudes and (ii) that their usage and attitudes would vary according to profession with nurses being most, and doctors least, favourably disposed. An online, anonymous questionnaire survey of 2185 health practitioners. Undertaking system training, satisfaction with training, reporting incidents, incident reporting rates since system introduction and attitude questions focusing on use, security and evaluation of the system and workplace safety cultures. The first hypothesis received partial support. The majority of respondents had undertaken training and rated it highly. Most had reported incidents and maintained their previous reporting levels. Most attitudes regarding using the system and its security were favourable. Mixed attitudes were held about workplace safety cultures and the value of the system. Deficiencies in quality of reporting, feedback on incident reports and resources to analyse incident data were problems identified. The second hypothesis was confirmed. Nurses were most, and doctors least, likely to undertake training, report incidents and express favourable attitudes. Allied health responses were intermediate to those of the other professions. The system implementation was relatively successful, but more so with some professions. Problems identified indicated that expectations as to the goals achievable in the short term were optimistic, but these are amenable to planned interventions.

  10. Homeland Security Research Improves the Nation's Ability to ...

    EPA Pesticide Factsheets

    Technical Brief Homeland Security (HS) Research develops data, tools, and technologies to minimize the impact of accidents, natural disasters, terrorist attacks, and other incidents that can result in toxic chemical, biological or radiological (CBR) contamination. HS Research develops ways to detect contamination, sampling strategies, sampling and analytical methods, cleanup methods, waste management approaches, exposure assessment methods, and decision support tools (including water system models). These contributions improve EPA’s response to a broad range of environmental disasters.

  11. Structuring the Chief Information Security Officer Organization

    DTIC Science & Technology

    2015-09-07

    GP9 Objectively Evaluate Adherence CERT-RMM HRM Human Resource Management CERT-RMM ID Identity Management CERT-RMM IMC Incident Management and...Detect, triage, analyze, respond to, and recover from suspicious events and security incidents Security incident management IMC IR IR-1, IR- 2, IR-3...2015-TN-007 | SOFTWARE ENGINEERING INSTITUTE | CARNEGIE MELLON UNIVERSITY 6 Table 2: Source Acronyms3 CERT-RMM NIST 800-53 C2M2 IMC Incident

  12. Recent advances to address European Union Health Security from cross border chemical health threats.

    PubMed

    Duarte-Davidson, R; Orford, R; Wyke, S; Griffiths, M; Amlôt, R; Chilcott, R

    2014-11-01

    The European Union (EU) Decision (1082/2013/EU) on serious cross border threats to health was adopted by the European Parliament in November 2013, in recognition of the need to strengthen the capacity of Member States to coordinate the public health response to cross border threats, whether from biological, chemical, environmental events or events which have an unknown origin. Although mechanisms have been in place for years for reporting cross border health threats from communicable diseases, this has not been the case for incidents involving chemicals and/or environmental events. A variety of collaborative EU projects have been funded over the past 10 years through the Health Programme to address gaps in knowledge on health security and to improve resilience and response to major incidents involving chemicals. This paper looks at the EU Health Programme that underpins recent research activities to address gaps in resilience, planning, responding to and recovering from a cross border chemical incident. It also looks at how the outputs from the research programme will contribute to improving public health management of transnational incidents that have the potential to overwhelm national capabilities, putting this into context with the new requirements as the Decision on serious cross border threats to health as well as highlighting areas for future development. Crown Copyright © 2014. Published by Elsevier Ltd. All rights reserved.

  13. The Evolution of the Federal Monitoring and Assessment Center

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    NSTec Aerial Measurement System

    2012-07-31

    The Federal Radiological Monitoring and Assessment Center (FRMAC) is a federal emergency response asset whose assistance may be requested by the Department of Homeland Security (DHS), the Department of Defense (DoD), the Environmental Protection Agency (EPA), the Nuclear Regulatory Commission (NRC), and state and local agencies to respond to a nuclear or radiological incident. It is an interagency organization with representation from the Department of Energy’s National Nuclear Security Administration (DOE/NNSA), the Department of Defense (DoD), the Environmental Protection Agency (EPA), the Department of Health and Human Services (HHS), the Federal Bureau of Investigation (FBI), and other federal agencies. FRMAC,more » in its present form, was created in 1987 when the radiological support mission was assigned to the DOE’s Nevada Operations Office by DOE Headquarters. The FRMAC asset, including its predecessor entities, was created, grew, and evolved to function as a response to radiological incidents. Radiological emergency response exercises showed the need for a coordinated approach to managing federal emergency monitoring and assessment activities. The mission of FRMAC is to coordinate and manage all federal radiological environmental monitoring and assessment activities during a nuclear or radiological incident within the United States in support of state,local, tribal governments, DHS, and the federal coordinating agency. Radiological emergency response professionals with the DOE’s national laboratories support the Radiological Assistance Program (RAP), National Atmospheric Release Advisory Center (NARAC), the Aerial MeasuringSystem (AMS), and the Radiation Emergency Assistance Center/Training Site (REAC/TS). These teams support the FRMAC to provide: Atmospheric transport modeling; Radiation monitoring; Radiological analysis and data assessments; and Medical advice for radiation injuries In support of field operations, the FRMAC provides geographic information systems, communications, mechanical, electrical, logistics, and administrative support. The size of the FRMAC is tailored to the incident and is comprised of emergency response professionals drawn from across the federal government. State and local emergency response teams may also integrate their operations with FRMAC, but are not required to.« less

  14. Secure Utilization of Beacons and UAVs in Emergency Response Systems for Building Fire Hazard

    PubMed Central

    Seo, Seung-Hyun; Choi, Jung-In; Song, Jinseok

    2017-01-01

    An intelligent emergency system for hazard monitoring and building evacuation is a very important application area in Internet of Things (IoT) technology. Through the use of smart sensors, such a system can provide more vital and reliable information to first-responders and also reduce the incidents of false alarms. Several smart monitoring and warning systems do already exist, though they exhibit key weaknesses such as a limited monitoring coverage and security, which have not yet been sufficiently addressed. In this paper, we propose a monitoring and emergency response method for buildings by utilizing beacons and Unmanned Aerial Vehicles (UAVs) on an IoT security platform. In order to demonstrate the practicability of our method, we also implement a proof of concept prototype, which we call the UAV-EMOR (UAV-assisted Emergency Monitoring and Response) system. Our UAV-EMOR system provides the following novel features: (1) secure communications between UAVs, smart sensors, the control server and a smartphone app for security managers; (2) enhanced coordination between smart sensors and indoor/outdoor UAVs to expand real-time monitoring coverage; and (3) beacon-aided rescue and building evacuation. PMID:28946659

  15. Secure Utilization of Beacons and UAVs in Emergency Response Systems for Building Fire Hazard.

    PubMed

    Seo, Seung-Hyun; Choi, Jung-In; Song, Jinseok

    2017-09-25

    An intelligent emergency system for hazard monitoring and building evacuation is a very important application area in Internet of Things (IoT) technology. Through the use of smart sensors, such a system can provide more vital and reliable information to first-responders and also reduce the incidents of false alarms. Several smart monitoring and warning systems do already exist, though they exhibit key weaknesses such as a limited monitoring coverage and security, which have not yet been sufficiently addressed. In this paper, we propose a monitoring and emergency response method for buildings by utilizing beacons and Unmanned Aerial Vehicles (UAVs) on an IoT security platform. In order to demonstrate the practicability of our method, we also implement a proof of concept prototype, which we call the UAV-EMOR (UAV-assisted Emergency Monitoring and Response) system. Our UAV-EMOR system provides the following novel features: (1) secure communications between UAVs, smart sensors, the control server and a smartphone app for security managers; (2) enhanced coordination between smart sensors and indoor/outdoor UAVs to expand real-time monitoring coverage; and (3) beacon-aided rescue and building evacuation.

  16. The authority and responsibility of school officials in responding to cyberbullying.

    PubMed

    Willard, Nancy E

    2007-12-01

    Online social aggression, or cyberbullying, involves speech. Many incidents involve off-campus online speech that either creates or has the potential to create disruption at school or that may interfere with the targeted student's ability to participate in educational activities and programs. Addressing these situations requires an assessment of the extent of authority and responsibility of school officials to respond. "Authority" refers to the legally justified right to impose formal discipline. Because cyberbullying involves online speech, the question of legal authority necessarily involves addressing the balance between the student right of free speech and student safety and security. "Responsibility" refers to the legal obligation under negligence theory and civil rights laws to exercise reasonable precautions to protect students from online social aggression and to intervene in response to reports of actual incidents.

  17. Security Locks

    ERIC Educational Resources Information Center

    Hart, Kevin

    2010-01-01

    According to a 2008 "Year in Review" report by Educational Security Incidents, an online repository that collects data on higher education security issues, the total number of security incidents reported at universities and colleges worldwide rose to 173 in 2008, a 24.5 percent increase over 2007. The number of institutions…

  18. 33 CFR 135.307 - Notification contents.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Notification contents. 135.307 Section 135.307 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) MARINE POLLUTION FINANCIAL RESPONSIBILITY AND COMPENSATION OFFSHORE OIL POLLUTION COMPENSATION FUND Notification of Pollution Incidents § 135.307...

  19. NOAA Homeland Security Program Office

    Science.gov Websites

    Emergency Managment Institute IS 100.b - Introduction to Incident Command System IS 700.a - NIMS An Introduction IS 701.b - NIMS Multiagency Coordination System (MACS) Course IS 800.b - National Response Framework, An Introduction United States Coast Guard; Maritime Domain Awareness Privacy Act Statement

  20. 10 CFR 1.32 - Office of the Executive Director for Operations.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... of Nuclear Reactor Regulation, the Office of New Reactors, the Office of Nuclear Material Safety and... Section 1.32 Energy NUCLEAR REGULATORY COMMISSION STATEMENT OF ORGANIZATION AND GENERAL INFORMATION... Nuclear Regulatory Research, the Office of Nuclear Security and Incident Response, and the NRC Regional...

  1. 10 CFR 1.32 - Office of the Executive Director for Operations.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... of Nuclear Reactor Regulation, the Office of New Reactors, the Office of Nuclear Material Safety and... Section 1.32 Energy NUCLEAR REGULATORY COMMISSION STATEMENT OF ORGANIZATION AND GENERAL INFORMATION... Nuclear Regulatory Research, the Office of Nuclear Security and Incident Response, and the NRC Regional...

  2. 10 CFR 1.32 - Office of the Executive Director for Operations.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... of Nuclear Reactor Regulation, the Office of New Reactors, the Office of Nuclear Material Safety and... Section 1.32 Energy NUCLEAR REGULATORY COMMISSION STATEMENT OF ORGANIZATION AND GENERAL INFORMATION... Nuclear Regulatory Research, the Office of Nuclear Security and Incident Response, and the NRC Regional...

  3. 10 CFR 1.32 - Office of the Executive Director for Operations.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... of Nuclear Reactor Regulation, the Office of New Reactors, the Office of Nuclear Material Safety and... Section 1.32 Energy NUCLEAR REGULATORY COMMISSION STATEMENT OF ORGANIZATION AND GENERAL INFORMATION... Nuclear Regulatory Research, the Office of Nuclear Security and Incident Response, and the NRC Regional...

  4. 2012 Workplace and Gender Relations Survey of Active Duty Members. Tabulations of Responses

    DTIC Science & Technology

    2013-04-01

    closure on the incident .......................... k. Seek medical assistance ............................... l. Seek mental health assistance...242 k. Mental health care doesn’t work...244 l. Mental health care counseling may impact my security clearance ..... 246 GENDER-RELATED EXPERIENCES 27. During the past 12 months

  5. Improving the redistribution of the security lessons in healthcare: An evaluation of the Generic Security Template.

    PubMed

    He, Ying; Johnson, Chris

    2015-11-01

    The recurrence of past security breaches in healthcare showed that lessons had not been effectively learned across different healthcare organisations. Recent studies have identified the need to improve learning from incidents and to share security knowledge to prevent future attacks. Generic Security Templates (GSTs) have been proposed to facilitate this knowledge transfer. The objective of this paper is to evaluate whether potential users in healthcare organisations can exploit the GST technique to share lessons learned from security incidents. We conducted a series of case studies to evaluate GSTs. In particular, we used a GST for a security incident in the US Veterans' Affairs Administration to explore whether security lessons could be applied in a very different Chinese healthcare organisation. The results showed that Chinese security professional accepted the use of GSTs and that cyber security lessons could be transferred to a Chinese healthcare organisation using this approach. The users also identified the weaknesses and strengths of GSTs, providing suggestions for future improvements. Generic Security Templates can be used to redistribute lessons learned from security incidents. Sharing cyber security lessons helps organisations consider their own practices and assess whether applicable security standards address concerns raised in previous breaches in other countries. The experience gained from this study provides the basis for future work in conducting similar studies in other healthcare organisations. Copyright © 2015 Elsevier Ireland Ltd. All rights reserved.

  6. Acceptance and utilisation of the Incident Command System in first response and allied disciplines: an Ohio study.

    PubMed

    Decker, Russell J

    2011-10-01

    In response to the terrorist attacks of September 11th, 2001, an effort was made to establish a common and uniform command structure for use by the nation's first responder organisations, as well as those disciplines generally expected to assist first responders during a major incident or disaster. The result was the issuance of the National Incident Management System1 or NIMS by the US Department of Homeland Security in 2004. Included in the NIMS document was an embracing of the Incident Command System or ICS, long utilised in the fire service for the effective management of emergency response. The NIMS doctrine also identified certain allied disciplines that needed to adopt this new system for responding to major events. Some of these disciplines included specialised first response units, such as, bomb squads and hazardous materials teams. Other partner disciplines not usually associated with emergency response to include public health and public works were also included. This study will attempt to look at a single component of NIMS, specifically the Incident Command System, and measure its acceptance and utilisation by first responder organisations and selected allied disciplines in the state of Ohio. This is particularly important at this time since the US government is being forced to reduce budgets significantly and determine which laudable policies and programmes will be cut.

  7. Reflections on Leadership and Governance from the Incident Manager of Liberia's Ebola Response.

    PubMed

    Nyenswah, Tolbert

    The 2014-2016 epidemic of Ebola virus disease occurred in a region with a recent history of civil war, unstable health systems, and widespread poverty. Despite these contextual challenges, the national Ebola response in Liberia controlled transmission under strong leadership that was able to rapidly coordinate activities, to manage local and international players, and to adapt upon recognizing missteps. Such leadership has persisted to improve public health capacity in post-Ebola Liberia. This article highlights the progress made toward developing a resilient health security system with capacity to prevent, detect, and respond to disease threats before they reach epidemic level. In particular, Liberia's development of a Global Health Security Agenda roadmap, a Joint External Evaluation (JEE) report for International Health Regulation (2005) core capacities, and recent establishment of a National Public Health Institute are described. To better protect the country's population and the greater global community from health threats, emerging institutions and policies in Liberia will depend on leadership and governance that draws from the successes and lessons learned during the Ebola outbreak. The author provides insight based on his role as incident manager of Liberia's Ebola response.

  8. International Scavenging for First Responder Guidance and Tools: IAEA Products

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Stern, W.; Berthelot, L.; Bachner, K.

    In fiscal years (FY) 2016 and 2017, with support from the U.S. Department of Homeland Security (DHS), Brookhaven National Laboratory (BNL) examined the International Atomic Energy Agency (IAEA) radiological emergency response and preparedness products (guidance and tools) to determine which of these products could be useful to U.S. first responders. The IAEA Incident and Emergency Centre (IEC), which is responsible for emergency preparedness and response, offers a range of tools and guidance documents for responders in recognizing, responding to, and recovering from radiation emergencies and incidents. In order to implement this project, BNL obtained all potentially relevant tools and productsmore » produced by the IAEA IEC and analyzed these materials to determine their relevance to first responders in the U.S. Subsequently, BNL organized and hosted a workshop at DHS National Urban Security Technology Laboratory (NUSTL) for U.S. first responders to examine and evaluate IAEA products to consider their applicability to the United States. This report documents and describes the First Responder Product Evaluation Workshop, and provides recommendations on potential steps the U.S. federal government could take to make IAEA guidance and tools useful to U.S. responders.« less

  9. Development of an Automated Security Incident Reporting System (SIRS) for Bus Transit

    DOT National Transportation Integrated Search

    1986-12-01

    The security incident reporting system (sirs) is a microcomputer-based software program demonstrated at the metropolitan transit commission (mtc) in Minneapolis, mn. Sirs is designed to provide convenient storage, update and retrieval of security inc...

  10. Managing Materials and Wastes for Homeland Security Incidents

    EPA Pesticide Factsheets

    To provide information on waste management planning and preparedness before a homeland security incident, including preparing for the large amounts of waste that would need to be managed when an incident occurs, such as a large-scale natural disaster.

  11. Supporting U.S. Response to the Japanese Nuclear Crisis | ORAU

    ScienceCinema

    Crapo, John; Jakubowski, Ted

    2018-05-01

    When an earthquake and tsunami hit off the coast of Japan on March 11, 2011, and triggered a nuclear crisis, the U.S. immediately offered support. Among those tapped to assist was ORAU's National Security and Emergency Management team, which provided NNSA with technical and analytical nuclear incident support. Within 48 hours of the earthquake, ORAU emergency management experts accompanied the DOE Office of Emergency Response in deploying to Japan to support the U.S. Air Force Base in Yokota and the U.S. Embassy. A separate team from ORAU supported the NNSA Nuclear Incident Team, which served as the point of coordination for all support activities both in Japan and in the U.S.

  12. 10 CFR 37.77 - Advance notification of shipment of category 1 quantities of radioactive material.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... Policy, Office of Nuclear Security and Incident Response, U.S. Nuclear Regulatory Commission, Washington... 10 Energy 1 2014-01-01 2014-01-01 false Advance notification of shipment of category 1 quantities of radioactive material. 37.77 Section 37.77 Energy NUCLEAR REGULATORY COMMISSION PHYSICAL PROTECTION...

  13. Violence Prevention in Georgia's Rural Public School Systems: Perceptions of School Superintendents.

    ERIC Educational Resources Information Center

    Ballard, Chet

    1998-01-01

    Survey responses by superintendents in 81 of Georgia's 114 rural school districts covered violence prevention policies; use of searches, videocamera surveillance, metal detectors, security alarm systems, dress codes, and law enforcement officers on campus; incidence of removal of weapons and various forms of violence; student discipline programs;…

  14. Local, Regional and National Responses for Medical Management of a Radiological/Nuclear Incident

    PubMed Central

    Dainiak, Nicholas; Skudlarska, Beata; Albanese, Joseph

    2013-01-01

    Radiological and nuclear devices may be used by terrorists or may be the source of accidental exposure. A tiered approach has been recommended for response to a terrorist event wherein local, regional, state and federal assets become involved sequentially, as the magnitude in severity of the incident increases. State-wide hospital plans have been developed and published for Connecticut, New York and California. These plans address delineation of responsibilities of various categories of health professionals, protection of healthcare providers, identification and classification of individuals who might have been exposed to and/or contaminated by radiation and, in the case of Connecticut response plan, early management of victims. Regional response programs such as the New England Regional Health Compact (consisting of 6 member states) have been developed to manage consequences of radiation injury. The Department of Homeland Security is ultimately responsible for managing both health consequences and the crisis. Multiple US national response assets may be called upon for use in radiological incidents. These include agencies and programs that have been developed by the Department of Energy, the Environmental Protection Agency and the Department of Defense. Coordination of national, regional and state assets with local response efforts is necessary to provide a timely and efficient response. PMID:23447742

  15. Local, regional and national responses for medical management of a radiological/nuclear incident.

    PubMed

    Dainiak, Nicholas; Skudlarska, Beata; Albanese, Joseph

    2013-01-01

    Radiological and nuclear devices may be used by terrorists or may be the source of accidental exposure. A tiered approach has been recommended for response to a terrorist event wherein local, regional, state and federal assets become involved sequentially, as the magnitude in severity of the incident increases. State-wide hospital plans have been developed and published for Connecticut, New York and California. These plans address delineation of responsibilities of various categories of health professionals, protection of healthcare providers, identification and classification of individuals who might have been exposed to and/or contaminated by radiation and, in the case of Connecticut response plan, early management of victims. Regional response programs such as the New England Regional Health Compact (consisting of 6 member states) have been developed to manage consequences of radiation injury. The Department of Homeland Security is ultimately responsible for managing both health consequences and the crisis. Multiple US national response assets may be called upon for use in radiological incidents. These include agencies and programs that have been developed by the Department of Energy, the Environmental Protection Agency and the Department of Defense. Coordination of national, regional and state assets with local response efforts is necessary to provide a timely and efficient response.

  16. Measuring Human Performance within Computer Security Incident Response Teams

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    McClain, Jonathan T.; Silva, Austin Ray; Avina, Glory Emmanuel

    Human performance has become a pertinen t issue within cyber security. However, this research has been stymied by the limited availability of expert cyber security professionals. This is partly attributable to the ongoing workload faced by cyber security professionals, which is compound ed by the limited number of qualified personnel and turnover of p ersonnel across organizations. Additionally, it is difficult to conduct research, and particularly, openly published research, due to the sensitivity inherent to cyber ope rations at most orga nizations. As an alternative, the current research has focused on data collection during cyb er security training exercises. Thesemore » events draw individuals with a range of knowledge and experience extending from seasoned professionals to recent college gradu ates to college students. The current paper describes research involving data collection at two separate cyber security exercises. This data collection involved multiple measures which included behavioral performance based on human - machine transactions and questionnaire - based assessments of cyber security experience.« less

  17. MCPS School Safety & Security at a Glance 2011-2012

    ERIC Educational Resources Information Center

    Montgomery County Public Schools, 2012

    2012-01-01

    "MCPS School Safety and Security at a Glance" provides, in a single document, information about the reporting of incidents related to school safety and security, school climate, local school safety program descriptions, and serious incidents. Information is presented for each Montgomery County (Maryland) public school. While much of this…

  18. MCPS School Safety & Security at a Glance 2013-2014

    ERIC Educational Resources Information Center

    Montgomery County Public Schools, 2014

    2014-01-01

    "MCPS School Safety and Security at a Glance" provides, in a single document, information about the reporting of incidents related to school safety and security, school climate, local school safety program descriptions, and serious incidents. Information is presented for each Montgomery County (Maryland) public school. While much of this…

  19. MCPS School Safety & Security at a Glance 2012-2013

    ERIC Educational Resources Information Center

    Montgomery County Public Schools, 2013

    2013-01-01

    "MCPS School Safety and Security at a Glance" provides, in a single document, information about the reporting of incidents related to school safety and security, school climate, local school safety program descriptions, and serious incidents. Information is presented for each Montgomery County (Maryland) public school. While much of this…

  20. MCPS School Safety and Security at a Glance 2007-2008

    ERIC Educational Resources Information Center

    Montgomery County Public Schools, 2008

    2008-01-01

    "MCPS School Safety and Security at a Glance" provides, in a single document, information about the reporting of incidents related to school safety and security, including school climate, local school safety program descriptions, and serious incidents in all Montgomery County (Maryland) Public Schools. The information is presented for…

  1. Mass Casualty Decontamination in a Chemical or Radiological/Nuclear Incident with External Contamination: Guiding Principles and Research Needs

    PubMed Central

    Cibulsky, Susan M; Sokolowski, Danny; Lafontaine, Marc; Gagnon, Christine; Blain, Peter G.; Russell, David; Kreppel, Helmut; Biederbick, Walter; Shimazu, Takeshi; Kondo, Hisayoshi; Saito, Tomoya; Jourdain, Jean- René; Paquet, Francois; Li, Chunsheng; Akashi, Makoto; Tatsuzaki, Hideo; Prosser, Lesley

    2015-01-01

    Hazardous chemical, radiological, and nuclear materials threaten public health in scenarios of accidental or intentional release which can lead to external contamination of people.  Without intervention, the contamination could cause severe adverse health effects, through systemic absorption by the contaminated casualties as well as spread of contamination to other people, medical equipment, and facilities.  Timely decontamination can prevent or interrupt absorption into the body and minimize opportunities for spread of the contamination, thereby mitigating the health impact of the incident.  Although the specific physicochemical characteristics of the hazardous material(s) will determine the nature of an incident and its risks, some decontamination and medical challenges and recommended response strategies are common among chemical and radioactive material incidents.  Furthermore, the identity of the hazardous material released may not be known early in an incident.  Therefore, it may be beneficial to compare the evidence and harmonize approaches between chemical and radioactive contamination incidents.  Experts from the Global Health Security Initiative’s Chemical and Radiological/Nuclear Working Groups present here a succinct summary of guiding principles for planning and response based on current best practices, as well as research needs, to address the challenges of managing contaminated casualties in a chemical or radiological/nuclear incident. PMID:26635995

  2. Using agility to combat cyber attacks.

    PubMed

    Anderson, Kerry

    2017-06-01

    Some incident response practitioners feel that they have been locked in a battle with cyber criminals since the popular adoption of the internet. Initially, organisations made great inroads in preventing and containing cyber attacks. In the last few years, however, cyber criminals have become adept at eluding defence security technologies and rapidly modifying their exploit strategies for financial or political gains. Similar to changes in military combat tactics, cyber criminals utilise distributed attack cells, real-time communications, and rapidly mutating exploits to minimise the potential for detection. Cyber criminals have changed their attack paradigm. This paper describes a new incident response paradigm aimed at combating the new model of cyber attacks with an emphasis on agility to increase the organisation's ability to respond rapidly to these new challenges.

  3. Anatomy of a Security Operations Center

    NASA Technical Reports Server (NTRS)

    Wang, John

    2010-01-01

    Many agencies and corporations are either contemplating or in the process of building a cyber Security Operations Center (SOC). Those Agencies that have established SOCs are most likely working on major revisions or enhancements to existing capabilities. As principle developers of the NASA SOC; this Presenters' goals are to provide the GFIRST community with examples of some of the key building blocks of an Agency scale cyber Security Operations Center. This presentation viII include the inputs and outputs, the facilities or shell, as well as the internal components and the processes necessary to maintain the SOC's subsistence - in other words, the anatomy of a SOC. Details to be presented include the SOC architecture and its key components: Tier 1 Call Center, data entry, and incident triage; Tier 2 monitoring, incident handling and tracking; Tier 3 computer forensics, malware analysis, and reverse engineering; Incident Management System; Threat Management System; SOC Portal; Log Aggregation and Security Incident Management (SIM) systems; flow monitoring; IDS; etc. Specific processes and methodologies discussed include Incident States and associated Work Elements; the Incident Management Workflow Process; Cyber Threat Risk Assessment methodology; and Incident Taxonomy. The Evolution of the Cyber Security Operations Center viII be discussed; starting from reactive, to proactive, and finally to proactive. Finally, the resources necessary to establish an Agency scale SOC as well as the lessons learned in the process of standing up a SOC viII be presented.

  4. School Violence: Associations with Control, Security/Enforcement, Educational/Therapeutic Approaches, and Demographic Factors

    ERIC Educational Resources Information Center

    Nickerson, Amanda B.; Martens, Matthew P.

    2008-01-01

    This study examined the extent to which three approaches to violence prevention and response were associated with the incidence of school crime and disruption after accounting for the influence of demographic variables. Secondary data analyses were conducted with four subsets of the sample of principals who completed the National Center for…

  5. Interagency Biological Restoration Demonstration (IBRD): a collaborative approach to biological incident recovery.

    PubMed

    Crockett, Katie

    2011-09-01

    Following the terrorist attacks in 2001, much time and effort has been put toward improving catastrophic incident response. But recovery--the period following initial response that focuses on the long-term viability of the affected area--has received less attention. Recognizing the importance of being able to recover an area following a catastrophic incident, the Department of Defense, through its Defense Threat Reduction Agency (DTRA), and the Department of Homeland Security, through its Science and Technology Directorate (DHS S&T), created the Interagency Biological Restoration Demonstration (IBRD) program. IBRD was a 4-year program jointly managed and funded by DTRA and DHS S&T, the goal of which was to reduce the time and resources necessary to recover a wide urban area from an intentional release of Bacillus anthracis. Specific program objectives included understanding the social, economic, and operational interdependencies that affect recovery; establishing long-term coordination between the Departments of Defense and Homeland Security; developing strategic recovery/restoration plans; identifying and demonstrating technologies that support recovery; and exercising recovery activities and technology solutions. IBRD has made important first steps toward improving national preparedness in the area biological incident recovery. Specifically, IBRD has helped enhance the efficacy and efficiency of recovering large urban areas by developing consequence management guidance; identifying key S&T capabilities and integrating them with planning and guidance documents; and establishing key relationships across the federal interagency, federal-to-regional, civilian-to-military, and public-to-private stakeholders. Upon completion of IBRD in fall 2010, both DTRA and DHS S&T planned follow-on programs.

  6. MCPS School Safety and Security at a Glance 2008-2009

    ERIC Educational Resources Information Center

    Montgomery County Public Schools, 2009

    2009-01-01

    "MCPS School Safety and Security at a Glance" provides, in a single document, information about the reporting of incidents related to school safety and security, school climate, local school safety program descriptions, and serious incidents in all Montgomery County (Maryland) Public Schools. The information is presented for each school.…

  7. MCPS School Safety and Security at a Glance 2010-2011

    ERIC Educational Resources Information Center

    Montgomery County Public Schools, 2011

    2011-01-01

    "MCPS School Safety and Security at a Glance" provides, in a single document, information about the reporting of incidents related to school safety and security, school climate, local school safety program descriptions, and serious incidents in all Montgomery County (Maryland) Public Schools. The information is presented for each school.…

  8. MCPS School Safety and Security at a Glance 2009-2010

    ERIC Educational Resources Information Center

    Montgomery County Public Schools, 2010

    2010-01-01

    "MCPS School Safety and Security at a Glance" provides, in a single document, information about the reporting of incidents related to school safety and security, school climate, local school safety program descriptions, and serious incidents in all Montgomery County (Maryland) public schools. The information is presented for each school.…

  9. Economic Analysis of Cyber Security

    DTIC Science & Technology

    2006-07-01

    vulnerability databases and track the number of incidents reported by U.S. organizations. Many of these are private organizations, such as the security...VULNERABILITY AND ATTACK ESTIMATES Numerous organizations compile vulnerability databases and patch information, and track the number of reported incidents... database / security focus Databases of vulnerabilities identifying the software versions that are susceptible, including information on the method of

  10. Cybersecurity Lanes in the Road for the Department of Homeland Security

    DTIC Science & Technology

    2016-06-01

    20of%20Responsibility%20in%20the%20US%20Government- Joeli%20Field.pdf. 54 Ibid., 120. 55 “Preventing 9/11 in the Cyber World,” Information Management ...their emergency communications capabilities.”113 NCCIC is a “24x7 cyber situational awareness, incident response, and management center.”114 They share... Cyber World.” Information Management 47, no. 3 (May, 2013): 18. http://libproxy.nps.edu/login?url=http://search.proquest.com/docview/ 1430501590

  11. Organisational Pattern Driven Recovery Mechanisms

    NASA Astrophysics Data System (ADS)

    Giacomo, Valentina Di; Presenza, Domenico; Riccucci, Carlo

    The process of reaction to system failures and security attacks is strongly influenced by its infrastructural, procedural and organisational settings. Analysis of reaction procedures and practices from different domains (Air Traffic Management, Response to Computer Security Incident, Response to emergencies, recovery in Chemical Process Industry) highlight three key requirements for this activity: smooth collaboration and coordination among responders, accurate monitoring and management of resources and ability to adapt pre-established reaction plans to the actual context. The SERENITY Reaction Mechanisms (SRM) is the subsystem of the SERENITY Run-time Framework aimed to provide SERENITY aware AmI settings (i.e. socio-technical systems with highly distributed dynamic services) with functionalities to implement applications specific reaction strategies. The SRM uses SERENITY Organisational S&D Patterns as run-time models to drive these three key functionalities.

  12. Final Technical Report. Project Boeing SGS

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bell, Thomas E.

    Boeing and its partner, PJM Interconnection, teamed to bring advanced “defense-grade” technologies for cyber security to the US regional power grid through demonstration in PJM’s energy management environment. Under this cooperative project with the Department of Energy, Boeing and PJM have developed and demonstrated a host of technologies specifically tailored to the needs of PJM and the electric sector as a whole. The team has demonstrated to the energy industry a combination of processes, techniques and technologies that have been successfully implemented in the commercial, defense, and intelligence communities to identify, mitigate and continuously monitor the cyber security of criticalmore » systems. Guided by the results of a Cyber Security Risk-Based Assessment completed in Phase I, the Boeing-PJM team has completed multiple iterations through the Phase II Development and Phase III Deployment phases. Multiple cyber security solutions have been completed across a variety of controls including: Application Security, Enhanced Malware Detection, Security Incident and Event Management (SIEM) Optimization, Continuous Vulnerability Monitoring, SCADA Monitoring/Intrusion Detection, Operational Resiliency, Cyber Range simulations and hands on cyber security personnel training. All of the developed and demonstrated solutions are suitable for replication across the electric sector and/or the energy sector as a whole. Benefits identified include; Improved malware and intrusion detection capability on critical SCADA networks including behavioral-based alerts resulting in improved zero-day threat protection; Improved Security Incident and Event Management system resulting in better threat visibility, thus increasing the likelihood of detecting a serious event; Improved malware detection and zero-day threat response capability; Improved ability to systematically evaluate and secure in house and vendor sourced software applications; Improved ability to continuously monitor and maintain secure configuration of network devices resulting in reduced vulnerabilities for potential exploitation; Improved overall cyber security situational awareness through the integration of multiple discrete security technologies into a single cyber security reporting console; Improved ability to maintain the resiliency of critical systems in the face of a targeted cyber attack of other significant event; Improved ability to model complex networks for penetration testing and advanced training of cyber security personnel« less

  13. The importance of establishing a national health security preparedness index.

    PubMed

    Lumpkin, John R; Miller, Yoon K; Inglesby, Tom; Links, Jonathan M; Schwartz, Angela T; Slemp, Catherine C; Burhans, Robert L; Blumenstock, James; Khan, Ali S

    2013-03-01

    Natural disasters, infectious disease epidemics, terrorism, and major events like the nuclear incident at Fukushima all pose major potential challenges to public health and security. Events such as the anthrax letters of 2001, Hurricanes Katrina, Irene, and Sandy, severe acute respiratory syndrome (SARS) and West Nile virus outbreaks, and the 2009 H1N1 influenza pandemic have demonstrated that public health, emergency management, and national security efforts are interconnected. These and other events have increased the national resolve and the resources committed to improving the national health security infrastructure. However, as fiscal pressures force federal, state, and local governments to examine spending, there is a growing need to demonstrate both what the investment in public health preparedness has bought and where gaps remain in our nation's health security. To address these needs, the Association of State and Territorial Health Officials (ASTHO), through a cooperative agreement with the Centers for Disease Control and Prevention (CDC) Office of Public Health Preparedness and Response (PHPR), is creating an annual measure of health security and preparedness at the national and state levels: the National Health Security Preparedness Index (NHSPI).

  14. 6 CFR 27.105 - Definitions.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM... analyze key data from chemical facilities. Chemical-terrorism Vulnerability Information or CVI shall mean... or terrorist incident shall mean any incident or attempt that constitutes terrorism or terrorist...

  15. 6 CFR 27.105 - Definitions.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM... analyze key data from chemical facilities. Chemical-terrorism Vulnerability Information or CVI shall mean... or terrorist incident shall mean any incident or attempt that constitutes terrorism or terrorist...

  16. 6 CFR 27.105 - Definitions.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM... analyze key data from chemical facilities. Chemical-terrorism Vulnerability Information or CVI shall mean... or terrorist incident shall mean any incident or attempt that constitutes terrorism or terrorist...

  17. 6 CFR 27.105 - Definitions.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM... analyze key data from chemical facilities. Chemical-terrorism Vulnerability Information or CVI shall mean... or terrorist incident shall mean any incident or attempt that constitutes terrorism or terrorist...

  18. Protecting ICS Systems Within the Energy Sector from Cyber Attacks

    NASA Astrophysics Data System (ADS)

    Barnes, Shaquille

    Advance persistent threat (APT) groups are continuing to attack the energy sector through cyberspace, which poses a risk to our society, national security, and economy. Industrial control systems (ICSs) are not designed to handle cyber-attacks, which is why asset owners need to implement the correct proactive and reactive measures to mitigate the risk to their ICS environments. The Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) responded to 290 incidents for fiscal year 2016, where 59 of those incidents came from the Energy Sector. APT groups know how vulnerable energy sector ICS systems are and the destruction they can cause when they go offline such as loss of production, loss of life, and economic impact. Defending against APT groups requires more than just passive controls such as firewalls and antivirus solutions. Asset owners should implement a combination of best practices and active defense in their environment to defend against APT groups. Cyber-attacks against critical infrastructure will become more complex and harder to detect and respond to with traditional security controls. The purpose of this paper was to provide asset owners with the correct security controls and methodologies to help defend against APT groups.

  19. Analyzing the threat of unmanned aerial vehicles (UAV) to nuclear facilities

    DOE PAGES

    Solodov, Alexander; Williams, Adam; Al Hanaei, Sara; ...

    2017-04-18

    Unmanned aerial vehicles (UAV) are among the major growing technologies that have many beneficial applications, yet they can also pose a significant threat. Recently, several incidents occurred with UAVs violating privacy of the public and security of sensitive facilities, including several nuclear power plants in France. The threat of UAVs to the security of nuclear facilities is of great importance and is the focus of this work. This paper presents an overview of UAV technology and classification, as well as its applications and potential threats. We show several examples of recent security incidents involving UAVs in France, USA, and Unitedmore » Arab Emirates. Further, the potential threats to nuclear facilities and measures to prevent them are evaluated. The importance of measures for detection, delay, and response (neutralization) of UAVs at nuclear facilities are discussed. An overview of existing technologies along with their strength and weaknesses are shown. Finally, the results of a gap analysis in existing approaches and technologies is presented in the form of potential technological and procedural areas for research and development. Furthermore based on this analysis, directions for future work in the field can be devised and prioritized.« less

  20. Cyber Incidents Involving Control Systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Robert J. Turk

    2005-10-01

    The Analysis Function of the US-CERT Control Systems Security Center (CSSC) at the Idaho National Laboratory (INL) has prepared this report to document cyber security incidents for use by the CSSC. The description and analysis of incidents reported herein support three CSSC tasks: establishing a business case; increasing security awareness and private and corporate participation related to enhanced cyber security of control systems; and providing informational material to support model development and prioritize activities for CSSC. The stated mission of CSSC is to reduce vulnerability of critical infrastructure to cyber attack on control systems. As stated in the Incident Managementmore » Tool Requirements (August 2005) ''Vulnerability reduction is promoted by risk analysis that tracks actual risk, emphasizes high risk, determines risk reduction as a function of countermeasures, tracks increase of risk due to external influence, and measures success of the vulnerability reduction program''. Process control and Supervisory Control and Data Acquisition (SCADA) systems, with their reliance on proprietary networks and hardware, have long been considered immune to the network attacks that have wreaked so much havoc on corporate information systems. New research indicates this confidence is misplaced--the move to open standards such as Ethernet, Transmission Control Protocol/Internet Protocol, and Web technologies is allowing hackers to take advantage of the control industry's unawareness. Much of the available information about cyber incidents represents a characterization as opposed to an analysis of events. The lack of good analyses reflects an overall weakness in reporting requirements as well as the fact that to date there have been very few serious cyber attacks on control systems. Most companies prefer not to share cyber attack incident data because of potential financial repercussions. Uniform reporting requirements will do much to make this information available to Department of Homeland Security (DHS) and others who require it. This report summarizes the rise in frequency of cyber attacks, describes the perpetrators, and identifies the means of attack. This type of analysis, when used in conjunction with vulnerability analyses, can be used to support a proactive approach to prevent cyber attacks. CSSC will use this document to evolve a standardized approach to incident reporting and analysis. This document will be updated as needed to record additional event analyses and insights regarding incident reporting. This report represents 120 cyber security incidents documented in a number of sources, including: the British Columbia Institute of Technology (BCIT) Industrial Security Incident Database, the 2003 CSI/FBI Computer Crime and Security Survey, the KEMA, Inc., Database, Lawrence Livermore National Laboratory, the Energy Incident Database, the INL Cyber Incident Database, and other open-source data. The National Memorial Institute for the Prevention of Terrorism (MIPT) database was also interrogated but, interestingly, failed to yield any cyber attack incidents. The results of this evaluation indicate that historical evidence provides insight into control system related incidents or failures; however, that the limited available information provides little support to future risk estimates. The documented case history shows that activity has increased significantly since 1988. The majority of incidents come from the Internet by way of opportunistic viruses, Trojans, and worms, but a surprisingly large number are directed acts of sabotage. A substantial number of confirmed, unconfirmed, and potential events that directly or potentially impact control systems worldwide are also identified. Twelve selected cyber incidents are presented at the end of this report as examples of the documented case studies (see Appendix B).« less

  1. Nuclear security and radiological preparedness for the olympic games, athens 2004: lessons learned for organizing major public events.

    PubMed

    Kamenopoulou, Vassiliki; Dimitriou, Panayiotis; Hourdakis, Constantine J; Maltezos, Antonios; Matikas, Theodore; Potiriadis, Constantinos; Camarinopoulos, Leonidas

    2006-10-01

    In light of the exceptional circumstances that arose from hosting the Olympic Games in Athens in 2004 and from recent terrorist events internationally, Greece attributes the highest priority to security issues. According to its statutory role, the Greek Atomic Energy Commission is responsible for emergency preparedness and response in case of nuclear and radiological events, and advises the Government on the measures and interventions necessary to protect the public. In this context, the Commission participated in the Nuclear, Radiological, Biological, and Chemical Threat National Emergency Plan, specially developed for the Olympic Games, and coordinated by the Olympic Games Security Division. The objective of this paper is to share the experience gained during the organization of the Olympic Games and to present the nuclear security program implemented prior to, during, and beyond the Games, in order to prevent, detect, assess, and respond to the threat of nuclear terrorism. This program adopted a multi-area coverage of nuclear security, including physical protection of nuclear and radiological facilities, prevention of smuggling of radioactive materials through borders, prevention of dispersion of these materials into the Olympic venues, enhancement of emergency preparedness and response to radiological events, upgrading of the technical infrastructure, establishment of new procedures for assessing the threat and responding to radiological incidents, and training personnel belonging to several organizations involved in the National Emergency Response Plan. Finally, the close cooperation of Greek Authorities with the International Atomic Energy Agency and the U.S. Department of Energy, under the coordination of the Greek Atomic Energy Commission, is also discussed.

  2. Interference between active implanted medical devices and electromagnetic field emitting devices is rare but real: results of an incidence study in a population of physicians in France.

    PubMed

    Hours, Martine; Khati, Inès; Hamelin, Joel

    2014-03-01

    Assessing the behavior of active implanted medical devices (AIMDs) in response to electromagnetic field (EMF) transmitters is a current issue of great importance. Given the numerous telecommunication systems and our lack of knowledge as to the impact of electromagnetic effects, this study investigated the reality of possible AIMD disturbance by EMFs by interviewing health professionals. A self-administered postal questionnaire was sent to almost 5,000 physicians in five specialties: cardiology; endocrinology; ears, nose, and throat; urology; and neurology. It collected data on the existence and annual number of incidents observed and the conditions under which they occurred, the EMF sources involved, and the means of managing the malfunctions. A total of 1,188 physicians agreed to participate. Sixteen percent of participants reported cases of implant failure, three-quarters of whom, mainly in cardiology, reported rates of at least one incident per year-amounting to more than 100 incidents per year in all. Severity appeared to be moderate (discomfort or transient symptoms), but frequently required resetting or, more rarely, replacing the device. Some serious incidents were, however, reported. The sources implicated were basically of two types: electronic security systems (antitheft and airport gates) and medical electromagnetic radiation devices. These incidents were poorly reported within the public health system, preventing follow-up and effective performance of alert and surveillance functions. Although minor, the risk of interference between EMF sources and AIMDs is real and calls for vigilance. It particularly concerns antitheft and airport security gates, though other sources may also cause incidents. ©2013, The Authors. Journal compilation ©2013 Wiley Periodicals, Inc.

  3. 33 CFR 105.255 - Security measures for access control.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... and facilities; (4) Granting access to only those responding to the security incident or threat... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Security measures for access... SECURITY MARITIME SECURITY MARITIME SECURITY: FACILITIES Facility Security Requirements § 105.255 Security...

  4. Is your station secure?

    PubMed

    Patrick, Richard W

    2003-07-01

    All department personnel must practice and assure safety and security of stations, vehicles, equipment and related items. Keep vehicle bay doors closed unless the bays are physically occupied by a department member. When responding or leaving the station, ensure, after exiting the bay, that the door is closed. If confronted with questions pertaining to department operations, including SOPs and SOGs, box alarms, response patterns, training times, member rosters/addresses, etc., do not provide the information. Document the incident and immediately report it. Should the inquiry appear extremely unusual in nature, do not hesitate to contact law enforcement. Emergency service personnel should be educated on a periodic basis and remain vigilant at all times.

  5. Domestic embedded reporter program: saving lives and securing tactical operations

    DTIC Science & Technology

    2017-03-01

    estimated to average 1 hour per response, including the time for reviewing instruction, searching existing data sources, gathering and maintaining the...13. ABSTRACT (maximum 200 words) Advances in technology have provided journalists the tools to obtain and share real- time information during domestic...terrorist and mass-shooting incidents. This real- time information-sharing compromises the safety of first responders, victims, and reporters. Real

  6. Report to Congress on innovative safety and security technology solutions for alternative transportation facilities

    DOT National Transportation Integrated Search

    2017-05-01

    This research collected information on the frequency and impact of safety and security incidents (threats) at selected facilities and identified priority incidents at each facility. A customized all hazards approach was used to determine the ha...

  7. 78 FR 57839 - Request for Information on Computer Security Incident Coordination (CSIC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-09-20

    ... Institute of Standards and Technology (NIST), United States Department of Commerce. ACTION: Notice, extension of comment period. SUMMARY: NIST is extending the deadline for submitting comments relating to Computer Security Incident Coordination. NIST experienced technical difficulties with receiving email...

  8. Water System Security and Resilience in Homeland Security Research

    EPA Pesticide Factsheets

    EPA's water security research provides tools needed to improve infrastructure security and to recover from an attack or contamination incident involving chemical, biological, or radiological (CBR) agents or weapons.

  9. Safer environment makes sense for all.

    PubMed

    Frith, Sue

    2011-06-01

    Sue Frith, deputy head of the NHS Security Management Service (NHS SMS), explains the organisation's important role in advising, and supporting, security staff at NHS hospitals in dealing with incidents ranging from verbal abuse to serious violence and aggression. Arguing that security in the NHS is "everyone's business", she explains both a range of processes and initiatives,already in place to safeguard people and assets, and discusses recent developments, such as a new incident reporting website, designed to help keep patients, staff, visitors, and property, at healthcare facilities safe and secure.

  10. Evaluating the Reliability of Emergency Response Systems for Large-Scale Incident Operations

    PubMed Central

    Jackson, Brian A.; Faith, Kay Sullivan; Willis, Henry H.

    2012-01-01

    Abstract The ability to measure emergency preparedness—to predict the likely performance of emergency response systems in future events—is critical for policy analysis in homeland security. Yet it remains difficult to know how prepared a response system is to deal with large-scale incidents, whether it be a natural disaster, terrorist attack, or industrial or transportation accident. This research draws on the fields of systems analysis and engineering to apply the concept of system reliability to the evaluation of emergency response systems. The authors describe a method for modeling an emergency response system; identifying how individual parts of the system might fail; and assessing the likelihood of each failure and the severity of its effects on the overall response effort. The authors walk the reader through two applications of this method: a simplified example in which responders must deliver medical treatment to a certain number of people in a specified time window, and a more complex scenario involving the release of chlorine gas. The authors also describe an exploratory analysis in which they parsed a set of after-action reports describing real-world incidents, to demonstrate how this method can be used to quantitatively analyze data on past response performance. The authors conclude with a discussion of how this method of measuring emergency response system reliability could inform policy discussion of emergency preparedness, how system reliability might be improved, and the costs of doing so. PMID:28083267

  11. Retrospective review of adverse incidents involving passengers seated in wheeled mobility devices while traveling in large accessible transit vehicles.

    PubMed

    Frost, Karen L; Bertocci, Gina

    2010-04-01

    Characterize wheeled mobility device (WhMD) adverse incidents on large accessible transit vehicles (LATVs) based on vehicle motion, WhMD activity during incident, incident scenario and injury. Retrospective records review. WhMD passengers traveling on LATVs while remaining seated in their. Adverse incidents characterized based on vehicle motion, WhMD activity during incident, and incident scenario. Injury characterized based on outcome, medical attention sought, vehicle activity, WhMD activity and incident scenario. 115 WhMD-related incident reports for years 2000-2005 were analyzed. Most incidents occurred when the LATV was stopped (73.9%), during ingress/egress (42.6%), and at the securement station (33.9%) when the LATV was moving. The combination of WhMD tipping and passenger falling (43.4%) occurred most frequently, and was 1.8 times more likely to occur during ingress/egress than at the securement station. One-third (33.6%) of all incidents resulted in injury, and injuries were equally distributed between ingress/egress (43.6%) and at the securement station (43.6%). WhMD users have a greater chance of incurring injury during ingress/egress than during transit. Research is needed to objectively assess real world transportation experiences of WhMD passengers, and to assess the adequacy of existing federal legislation/guidelines for accessible ramps used in public transportation. Copyright 2009 IPEM. Published by Elsevier Ltd. All rights reserved.

  12. Space-Derived Transparency: Players, Policies, Implications, and Synergies

    NASA Astrophysics Data System (ADS)

    Kinnan, C. J.

    2001-06-01

    Space-derived transparency will become a common means of monitoring, preventing, and mitigating crises, verifying compliance with treaties and law, and enabling confidence and security building measures. Democratization and globalization, the proliferation of information technologies, the availability of commercial space high-resolution imagery, and the growing influence of NGOs invite this question: What is (space-derived) transparency and what effect does it have on US security policy? Three camps have emerged in the debate -Horaeists who seek to build a transnational society through complete transparency; Preservationists, mostly military, who fear the threat to national security, want to deny most space-derived information to non-traditional/non-state actors; and Synergists who seek to capitalize on the best of both camps. There is evidence suggesting that space-derived transparency is an inevitable trend and will resist even the best means of preservationist control. Space-derived transparency may change the dynamic of the security environment by introducing new players into the policy fomentation and implementation process. These players, if not properly schooled in imagery analysis or the potential effects of their use of misinterpreted space-derived imagery, could force policy makers to make fast, ill-considered decisions in order to respond to incidents. In some cases this fast response will defuse potential crises and in other situations these rushed decisions might result in policies without considering the potential consequences, which could turn incidents into crises. Space-derived transparency is a step forward into the future for each camp . . . the challenge for the United States lies in forging synergies in an increasingly transparent world while maintaining the balance between openness and security.

  13. Homeland security and public health: role of the Department of Veterans Affairs, the US Department of Homeland Security, and implications for the public health community.

    PubMed

    Koenig, Kristi L

    2003-01-01

    The terrorist attacks of 11 September 2001 led to the largest US Government transformation since the formation of the Department of Defense following World War II. More than 22 different agencies, in whole or in part, and >170,000 employees were reorganized to form a new Cabinet-level Department of Homeland Security (DHS), with the primary mission to protect the American homeland. Legislation enacted in November 2002 transferred the entire Federal Emergency Management Agency and several Department of Health and Human Services (HHS) assets to DHS, including the Office of Emergency Response, and oversight for the National Disaster Medical System, Strategic National Stockpile, and Metropolitan Medical Response System. This created a potential separation of "health" and "medical" assets between the DHS and HHS. A subsequent presidential directive mandated the development of a National Incident Management System and an all-hazard National Response Plan. While no Department of Veterans Affairs (VA) assets were targeted for transfer, the VA remains the largest integrated healthcare system in the nation with important support roles in homeland security that complement its primary mission to provide care to veterans. The Emergency Management Strategic Healthcare Group (EMSHG) within the VA's medical component, the Veteran Health Administration (VHA), is the executive agent for the VA's Fourth Mission, emergency management. In addition to providing comprehensive emergency management services to the VA, the EMSHG coordinates medical back-up to the Department of Defense, and assists the public via the National Disaster Medical System and the National Response Plan. This article describes the VA's role in homeland security and disasters, and provides an overview of the ongoing organizational and operational changes introduced by the formation of the new DHS. Challenges and opportunities for public health are highlighted.

  14. The U.S. Government’s Employment of Private Security Companies Abroad

    DTIC Science & Technology

    2012-03-14

    discharges by PSCs from May 2008 to February 2009. These incidents included reported responses to attacks and negligent discharges.36 Military...ICoC into contracts, enabling the use of contract law, other tort law and applicable criminal law to enforce those standards in court . . . Some...enforcement of these standards through applicable tort and criminal law.97 In conclusion, PSCs will likely remain a part of the Operational

  15. Security, Violent Events, and Anticipated Surge Capabilities of Emergency Departments in Washington State.

    PubMed

    Weyand, Jonathan S; Junck, Emily; Kang, Christopher S; Heiner, Jason D

    2017-04-01

    Over the past 15 years, violent threats and acts against hospital patients, staff, and providers have increased and escalated. The leading area for violence is the emergency department (ED) given its 24/7 operations, role in patient care, admissions gateway, and center for influxes during acute surge events. This investigation had three objectives: to assess the current security of Washington State EDs; to estimate the prevalence of and response to threats and violence in Washington State EDs; and to appraise the Washington State ED security capability to respond to acute influxes of patients, bystanders, and media during acute surge events. A voluntary, blinded, 28-question Web-based survey developed by emergency physicians was electronically delivered to all 87 Washington State ED directors in January 2013. We evaluated responses by descriptive statistical analyses. Analyses occurred after 90% (78/87) of ED directors responded. Annual censuses of the EDs ranged from < 20,000 to 100,000 patients and represented the entire spectrum of practice environments, including critical access hospitals and a regional quaternary referral medical center. Thirty-four of 75 (45%) reported the current level of security was inadequate, based on the general consensus of their ED staff. Nearly two-thirds (63%) of EDs had 24-hour security personnel coverage, while 28% reported no assigned security personnel. Security personnel training was provided by 45% of hospitals or healthcare systems. Sixty-nine of 78 (88%) respondents witnessed or heard about violent threats or acts occurring in their ED. Of these, 93% were directed towards nursing staff, 90% towards physicians, 74% towards security personnel, and 51% towards administrative personnel. Nearly half (48%) noted incidents directed towards another patient, and 50% towards a patient's family or friend. These events were variably reported to the hospital administration. After an acute surge event, 35% believed the initial additional security response would not be adequate, with 26% reporting no additional security would be available within 15 minutes. Our study reveals the variability of ED security staffing and a heterogeneity of capabilities throughout Washington State. These deficiencies and vulnerabilities highlight the need for other EDs and regional emergency preparedness planners to conduct their own readiness assessments.

  16. 49 CFR 1572.103 - Disqualifying criminal offenses.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ..., or conspiracy to commit sedition. (3) Treason, or conspiracy to commit treason. (4) A federal crime... crime. (5) A crime involving a transportation security incident. A transportation security incident is a... disruption, or economic disruption in a particular area, as defined in 46 U.S.C. 70101. The term “economic...

  17. 49 CFR 1572.103 - Disqualifying criminal offenses.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ..., or conspiracy to commit sedition. (3) Treason, or conspiracy to commit treason. (4) A federal crime... crime. (5) A crime involving a transportation security incident. A transportation security incident is a... disruption, or economic disruption in a particular area, as defined in 46 U.S.C. 70101. The term “economic...

  18. 49 CFR 1572.103 - Disqualifying criminal offenses.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ..., or conspiracy to commit sedition. (3) Treason, or conspiracy to commit treason. (4) A federal crime... crime. (5) A crime involving a transportation security incident. A transportation security incident is a... disruption, or economic disruption in a particular area, as defined in 46 U.S.C. 70101. The term “economic...

  19. Security breaches: tips for assessing and limiting your risks.

    PubMed

    Coons, Leeanne R

    2011-01-01

    As part of their compliance planning, medical practices should undergo a risk assessment to determine any vulnerability within the practice relative to security breaches. Practices should also implement safeguards to limit their risks. Such safeguards include facility access controls, information and electronic media management, use of business associate agreements, and education and enforcement. Implementation of specific policies and procedures to address security incidents is another critical step that medical practices should take as part of their security incident prevention plan. Medical practices should not only develop policies and procedures to prevent, detect, contain, and correct security violations, but should make sure that such policies and procedures are actually implemented in their everyday operations.

  20. Unauthorised absences from leave from an Australian security hospital.

    PubMed

    Scott, Russ; Goel, Vikram; Neillie, Darren; Stedman, Terry; Meehan, Tom

    2014-04-01

    To consider incidents relating to absences without permission from authorised leave from a security hospital. A retrospective audit over a 10-year period of all critical incidents relating to leave from the High Security Inpatient Services, Brisbane, Australia. There has been a low incidence of patients absenting themselves without permission from leave. Of the 12 patients who went absent without permission over the 10-year study period, only one patient was reported to have committed an offence and no patient seriously self-harmed. Attention to patient selection and risk management strategies have been effective in minimising the risk to patients and to the community as a direct result of absences without permission from authorised leave.

  1. 33 CFR 101.300 - Preparedness communications.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... transportation security incident, the COTP will, when appropriate, communicate to the port stakeholders, vessels....300 Section 101.300 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARITIME SECURITY: GENERAL Communication (Port-Facility-Vessel) § 101.300 Preparedness...

  2. Resources planning for radiological incidents management

    NASA Astrophysics Data System (ADS)

    Hamid, Amy Hamijah binti Ab.; Rozan, Mohd Zaidi Abd; Ibrahim, Roliana; Deris, Safaai; Yunus, Muhd. Noor Muhd.

    2017-01-01

    Disastrous radiation and nuclear meltdown require an intricate scale of emergency health and social care capacity planning framework. In Malaysia, multiple agencies are responsible for implementing radiological and nuclear safety and security. This research project focused on the Radiological Trauma Triage (RTT) System. This system applies patient's classification based on their injury and level of radiation sickness. This classification prioritizes on the diagnostic and treatment of the casualties which include resources estimation of the medical delivery system supply and demand. Also, this system consists of the leading rescue agency organization and disaster coordinator, as well as the technical support and radiological medical response teams. This research implemented and developed the resources planning simulator for radiological incidents management. The objective of the simulator is to assist the authorities in planning their resources while managing the radiological incidents within the Internal Treatment Area (ITA), Reception Area Treatment (RAT) and Hospital Care Treatment (HCT) phases. The majority (75%) of the stakeholders and experts, who had been interviewed, witnessed and accepted that the simulator would be effective to resolve various types of disaster and resources management issues.

  3. Mobile detection assessment and response systems (MDARS): a force protection physical security operational success

    NASA Astrophysics Data System (ADS)

    Shoop, Brian; Johnston, Michael; Goehring, Richard; Moneyhun, Jon; Skibba, Brian

    2006-05-01

    MDARS is a Semi-autonomous unmanned ground vehicle with intrusion detection & assessment, product & barrier assessment payloads. Its functions include surveillance, security, early warning, incident first response and product and barrier status primarily focused on a depot/munitions security mission at structured/semi-structured facilities. MDARS is in Systems Development and Demonstration (SDD) under the Product Manager for Force Protection Systems (PM-FPS). MDARS capabilities include semi-autonomous navigation, obstacle avoidance, motion detection, day and night imagers, radio frequency tag inventory/barrier assessment and audio challenge and response. Four SDD MDARS Patrol Vehicles have been undergoing operational evaluation at Hawthorne Army Depot, NV (HWAD) since October 2004. Hawthorne personnel were trained to administer, operate and maintain the system in accordance with the US Army Military Police School (USAMPS) Concept of Employment and the PM-FPS MDARS Integrated Logistic Support Plan. The system was subjected to intensive periods of evaluation under the guidance and control of the Army Test and Evaluation Center (ATEC) and PM-FPS. Significantly, in terms of User acceptance, the system has been under the "operational control" of the installation performing security and force protection missions in support of daily operations. This evaluation is intended to assess MDARS operational effectiveness in an operational environment. Initial observations show that MDARS provides enhanced force protection, can potentially reduce manpower requirements by conducting routine tasks within its design capabilities and reduces Soldier exposure in the initial response to emerging incidents and situations. Success of the MDARS program has been instrumental in the design and development of two additional robotic force protection programs. The first was the USAF Force Protection Battle Lab sponsored Remote Detection Challenge & Response (REDCAR) concept demonstration executed by the Air Force Robotics Lab (AFRL). The REDCAR used an MDARS PUV as the central robotic technology and expanded the concept to incorporate a smaller high speed platform (SCOUT) equipped with lethal, non-lethal and challenge components as an engagement platform and, in a marsupial configuration on the MDARS, a small UGV that can be deployed to investigate close quarters areas. The Family of Integrated Rapid Response Equipment (FIRRE) program further expands these concepts by incorporating and adapting other mobile/tactical force protection equipment with a more robust Unmanned Ground Vehicle into an "Expeditionary" configuration to provide the current force with a rapidly deployable force protection system that can operate in austere less structured and protected environments. A USAMPS/ MANCEN sponsored "FIRRE System Demonstration" in Iraq is scheduled to begin in FY '07.

  4. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Crapo, John; Jakubowski, Ted

    When an earthquake and tsunami hit off the coast of Japan on March 11, 2011, and triggered a nuclear crisis, the U.S. immediately offered support. Among those tapped to assist was ORAU's National Security and Emergency Management team, which provided NNSA with technical and analytical nuclear incident support. Within 48 hours of the earthquake, ORAU emergency management experts accompanied the DOE Office of Emergency Response in deploying to Japan to support the U.S. Air Force Base in Yokota and the U.S. Embassy. A separate team from ORAU supported the NNSA Nuclear Incident Team, which served as the point of coordinationmore » for all support activities both in Japan and in the U.S.« less

  5. International Cyber Incident Repository System: Information Sharing on a Global Scale

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Joyce, Amanda L.; Evans, PhD, Nathaniel; Tanzman, Edward A.

    According to the 2016 Internet Security Threat Report, the largest number of cyber attacks were recorded last year (2015), reaching a total of 430 million incidents throughout the world. As the number of cyber incidents increases, the need for information and intelligence sharing increases, as well. This fairly large increase in cyber incidents is driving the need for an international cyber incident data reporting system. The goal of the cyber incident reporting system is to make available shared and collected information about cyber events among participating international parties. In its 2014 report, Insurance Industry Working Session Readout Report-Insurance for CyberRelatedmore » Critical Infrastructure Loss: Key Issues, on the outcomes of a working session on cyber insurance, the U.S. Department of Homeland Security observed that “many participants cited the need for a secure method through which organizations could pool and share cyber incident information” and noted that one underwriter emphasized the importance of internationally harmonized data taxonomies. This cyber incident data reporting system could benefit all nations that take part in reporting incidents to provide a more common operating picture. In addition, this reporting system could allow for trending and anticipated attacks and could potentially benefit participating members by enabling them to get in front of potential attacks. The purpose of this paper is to identify options for consideration for such a system in fostering cooperative cyber defense.« less

  6. Managing multiple-casualty incidents: a rural medical preparedness training assessment.

    PubMed

    Glow, Steven D; Colucci, Vincent J; Allington, Douglas R; Noonan, Curtis W; Hall, Earl C

    2013-08-01

    The objectives of this study were to develop a novel training model for using mass-casualty incident (MCI) scenarios that trained hospital and prehospital staff together using Microsoft Visio, images from Google Earth and icons representing first responders, equipment resources, local hospital emergency department bed capacity, and trauma victims. The authors also tested participants' knowledge in the areas of communications, incident command systems (ICS), and triage. Participants attended Managing Multiple-Casualty Incidents (MCIs), a one-day training which offered pre- and post-tests, two one-hour functional exercises, and four distinct, one-hour didactic instructional periods. Two MCI functional exercises were conducted. The one-hour trainings focused on communications, National Incident Management Systems/Incident Command Systems (NIMS/ICS) and professional roles and responsibilities in NIMS and triage. The trainings were offered throughout communities in western Montana. First response resource inventories and general manpower statistics for fire, police, Emergency Medical Services (EMS), and emergency department hospital bed capacity were determined prior to MCI scenario construction. A test was given prior to and after the training activities. A total of 175 firefighters, EMS, law enforcement, hospital personnel or other first-responders completed the pre- and post-test. Firefighters produced higher baseline scores than all other disciplines during pre-test analysis. At the end of the training all disciplines demonstrated significantly higher scores on the post-test when compared with their respective baseline averages. Improvements in post-test scores were noted for participants from all disciplines and in all didactic areas: communications, NIMS/ICS, and triage. Mass-casualty incidents offer significant challenges for prehospital and emergency room workers. Fire, Police and EMS personnel must secure the scene, establish communications, define individuals' roles and responsibilities, allocate resources, triage patients, and assign transport priorities. After emergency department notification and in advance of arrival, emergency department personnel must assess available physical resources and availability and type of manpower, all while managing patients already under their care. Mass-casualty incident trainings should strengthen the key, individual elements essential to well-coordinated response such as communications, incident management system and triage. The practice scenarios should be matched to the specific resources of the community. The authors also believe that these trainings should be provided with all disciplines represented to eliminate training "silos," to allow for discussion of overlapping jurisdictional or organizational responsibilities, and to facilitate team building.

  7. Investigation and Remediation Records Concerning Incidents of Weapons Discharges by Private Security Contractors Can Be Improved

    DTIC Science & Technology

    2009-07-28

    Incidents of Weapons Discharges by Private Security Contractors Can Be Improved 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6...for Iraq Reconstruction,400 Army Navy Drive,Arlington,VA,22202-4704 8. PERFORMING ORGANIZATION REPORT NUMBER 9. SPONSORING/MONITORING AGENCY NAME(S...Defense’s (DoD) oversight of incidents involving the firing—or discharge —of weapons reported from May 2008 through February 2009 by its PSCs

  8. Enhancing Natural Killer Cell Mediated Targeting and Responses to Myeloid Leukemias

    DTIC Science & Technology

    2017-10-01

    Syndromes , AML – Acute Myeloid Leukemia, BiKE – Bi-specific Killer Engager, TriKE – Tri-specific Killer E 16. SECURITY CLASSIFICATION OF: 17...Natural Killer CML – Chronic Myeloid Leukemia MDS – Myelodysplastic Syndromes AML – Acute Myeloid Leukemia BiKE – Bi-specific Killer Engager TriKE...incidence of myeloid malignancies is increased due to exposure to ionizing radiation , chemicals, and other agents during deployment. Although

  9. Federal Government Information Systems Security Management and Governance Are Pacing Factors for Innovation

    ERIC Educational Resources Information Center

    Edwards, Gregory

    2011-01-01

    Security incidents resulting from human error or subversive actions have caused major financial losses, reduced business productivity or efficiency, and threatened national security. Some research suggests that information system security frameworks lack emphasis on human involvement as a significant cause for security problems in a rapidly…

  10. Constructing a resilience index for the Enhanced Critical Infrastructure Protection Program

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Fisher, R. E.; Bassett, G. W.; Buehring, W. A.

    2010-10-14

    Following recommendations made in Homeland Security Presidential Directive 7, which established a national policy for the identification and increased protection of critical infrastructure and key resources (CIKR) by Federal departments and agencies, the U.S. Department of Homeland Security (DHS) in 2006 developed the Enhanced Critical Infrastructure Protection (ECIP) program. The ECIP program aimed to provide a closer partnership with state, regional, territorial, local, and tribal authorities in fulfilling the national objective to improve CIKR protection. The program was specifically designed to identify protective measures currently in place in CIKR and to inform facility owners/operators of the benefits of new protectivemore » measures. The ECIP program also sought to enhance existing relationships between DHS and owners/operators of CIKR and to build relationships where none existed (DHS 2008; DHS 2009). In 2009, DHS and its protective security advisors (PSAs) began assessing CIKR assets using the ECIP program and ultimately produced individual protective measure and vulnerability values through the protective measure and vulnerability indices (PMI/VI). The PMI/VI assess the protective measures posture of individual facilities at their 'weakest link,' allowing for a detailed analysis of the most vulnerable aspects of the facilities (Schneier 2003), while maintaining the ability to produce an overall protective measures picture. The PMI has six main components (physical security, security management, security force, information sharing, protective measures assessments, and dependencies) and focuses on actions taken by a facility to prevent or deter the occurrence of an incident (Argonne National Laboratory 2009). As CIKR continue to be assessed using the PMI/VI and owners/operators better understand how they can prevent or deter incidents, academic research, practitioner emphasis, and public policy formation have increasingly focused on resilience as a necessary component of the risk management framework and infrastructure protection. This shift in focus toward resilience complements the analysis of protective measures by taking into account the three other phases of risk management: mitigation, response, and recovery (Figure 1). Thus, the addition of a robust resilience index (RI) to the established PMI/VI provides vital information to owners/operators throughout the risk management process. Combining a pre-incident focus with a better understanding of resilience, as well as potential consequences from damaged CIKR, allows owners/operators to better understand different ways to decrease risk by (1) increasing physical security measures to prevent an incident, (2) supplementing redundancy to mitigate the effects of an incident, and (3) enhancing emergency action and business continuity planning to increase the effectiveness of recovery procedures. Information provided by the RI methodology is also used by facility owners/operators to better understand how their facilities compare to similar sector/subsector sites and to help them make risk-based decisions. This report provides an overview of the RI methodology developed to estimate resilience and provide resilience comparisons for sectors and subsectors. The information will be used to (1) assist DHS in analyzing existing response and recovery methods and programs at facilities and (2) identify potential ways to increase resilience. The RI methodology is based on principles of Appreciative Inquiry, which is 'the coevolutionary search for the best in people, their organizations, and the relevant world around them' (Cooperrider et al. 2005). Appreciative Inquiry identifies the best of 'what is' and helps to envision 'what might be.' The ECIP program and the RI represent a new model (using Appreciative Inquiry principles) for information sharing between government and industry (Fisher and Petit 2010). A 'dashboard' display, which provides an interactive tool - rather than a static report, presents the results of the RI in a convenient format. Additional resilience measures can be modeled to illustrate how such actions would impact the asset's RI value.« less

  11. A topology visualization early warning distribution algorithm for large-scale network security incidents.

    PubMed

    He, Hui; Fan, Guotao; Ye, Jianwei; Zhang, Weizhe

    2013-01-01

    It is of great significance to research the early warning system for large-scale network security incidents. It can improve the network system's emergency response capabilities, alleviate the cyber attacks' damage, and strengthen the system's counterattack ability. A comprehensive early warning system is presented in this paper, which combines active measurement and anomaly detection. The key visualization algorithm and technology of the system are mainly discussed. The large-scale network system's plane visualization is realized based on the divide and conquer thought. First, the topology of the large-scale network is divided into some small-scale networks by the MLkP/CR algorithm. Second, the sub graph plane visualization algorithm is applied to each small-scale network. Finally, the small-scale networks' topologies are combined into a topology based on the automatic distribution algorithm of force analysis. As the algorithm transforms the large-scale network topology plane visualization problem into a series of small-scale network topology plane visualization and distribution problems, it has higher parallelism and is able to handle the display of ultra-large-scale network topology.

  12. A Computer Security Course in the Undergraduate Computer Science Curriculum.

    ERIC Educational Resources Information Center

    Spillman, Richard

    1992-01-01

    Discusses the importance of computer security and considers criminal, national security, and personal privacy threats posed by security breakdown. Several examples are given, including incidents involving computer viruses. Objectives, content, instructional strategies, resources, and a sample examination for an experimental undergraduate computer…

  13. Distributed fluorescent optical fiber proximity sensor: Towards a proof of concept

    NASA Astrophysics Data System (ADS)

    Gălătuș, Ramona; Faragó, Paul; Miluski, Piotr; Valles, Juan-Antonio

    2018-06-01

    Fluorescent fibers are optical fibers which emit light as a response to an incident phenomenon, usually an incident light. Operation depends on the doping dyes, which determine specific fluorescence and optical characteristics useful in the development of optical sensors. In this work we propose a low-cost distributed proximity sensor implemented using a red fluorescent fiber, to provide a security option for a surface plasmon resonance system. Operation of the proposed sensor relies on having the incident illumination intensity varied by the presence or absence of an obstacle in the vicinity of the sensing element. This will influence the radiated fluorescence accordingly. The proposed setup for the implementation of the optical proximity sensor assumes having a high brightness LED deployed for axial fiber illumination and a blue LED for side illumination. Electronic processing then accounts for gain and digitization. Measurement results of the prototype validate the proposed concept.

  14. Security, Violent Events, and Anticipated Surge Capabilities of Emergency Departments in Washington State

    PubMed Central

    Weyand, Jonathan S.; Junck, Emily; Kang, Christopher S.; Heiner, Jason D.

    2017-01-01

    Introduction Over the past 15 years, violent threats and acts against hospital patients, staff, and providers have increased and escalated. The leading area for violence is the emergency department (ED) given its 24/7 operations, role in patient care, admissions gateway, and center for influxes during acute surge events. This investigation had three objectives: to assess the current security of Washington State EDs; to estimate the prevalence of and response to threats and violence in Washington State EDs; and to appraise the Washington State ED security capability to respond to acute influxes of patients, bystanders, and media during acute surge events. Methods A voluntary, blinded, 28-question Web-based survey developed by emergency physicians was electronically delivered to all 87 Washington State ED directors in January 2013. We evaluated responses by descriptive statistical analyses. Results Analyses occurred after 90% (78/87) of ED directors responded. Annual censuses of the EDs ranged from < 20,000 to 100,000 patients and represented the entire spectrum of practice environments, including critical access hospitals and a regional quaternary referral medical center. Thirty-four of 75 (45%) reported the current level of security was inadequate, based on the general consensus of their ED staff. Nearly two-thirds (63%) of EDs had 24-hour security personnel coverage, while 28% reported no assigned security personnel. Security personnel training was provided by 45% of hospitals or healthcare systems. Sixty-nine of 78 (88%) respondents witnessed or heard about violent threats or acts occurring in their ED. Of these, 93% were directed towards nursing staff, 90% towards physicians, 74% towards security personnel, and 51% towards administrative personnel. Nearly half (48%) noted incidents directed towards another patient, and 50% towards a patient’s family or friend. These events were variably reported to the hospital administration. After an acute surge event, 35% believed the initial additional security response would not be adequate, with 26% reporting no additional security would be available within 15 minutes. Conclusion Our study reveals the variability of ED security staffing and a heterogeneity of capabilities throughout Washington State. These deficiencies and vulnerabilities highlight the need for other EDs and regional emergency preparedness planners to conduct their own readiness assessments. PMID:28435498

  15. Wireless just-in-time training of mobile skilled support personnel

    NASA Astrophysics Data System (ADS)

    Bandera, Cesar; Marsico, Michael; Rosen, Mitchel; Schlegel, Barry

    2006-05-01

    Skilled Support Personnel (SSP) serve emergency response organizations during an emergency incident, and include laborers, operating engineers, carpenters, ironworkers, sanitation workers and utility workers. SSP called to an emergency incident rarely have recent detailed training on the chemical, biological, radiological, nuclear and/or explosives (CBRNE) agents or the personal protection equipment (PPE) relevant to the incident. This increases personal risk to the SSP and mission risk at the incident site. Training for SSP has been identified as a critical need by the National Institute for Environmental Health Sciences, Worker Education and Training Program. We present a system being developed to address this SSP training shortfall by exploiting a new training paradigm called just-in-time training (JITT) made possible by advances in distance learning and cellular telephony. In addition to the current conventional training at regularly scheduled instructional events, SSP called to an emergency incident will have secure access to short (<5 minutes) training modules specific to the incident and derived from the Occupational Safety and Health Administration (OSHA) Disaster Site Worker Course. To increase retention, each learning module incorporates audio, video, interactive simulations, graphics, animation, and assessment designed for the user interface of most current cell phones. Engineering challenges include compatibility with current cell phone technologies and wireless service providers, integration with the incident management system, and SCORM compliance.

  16. Insecurity, polio vaccination rates, and polio incidence in northwest Pakistan.

    PubMed

    Verma, Amol A; Jimenez, Marcia P; Tangermann, Rudolf H; Subramanian, S V; Razak, Fahad

    2018-02-13

    Pakistan is one of three countries in which endemic transmission of poliovirus has never been stopped. Insecurity is often cited but poorly studied as a barrier to eradicating polio. We analyzed routinely collected health data from 32 districts of northwest Pakistan and constructed an index of insecurity based on journalistic reports of the monthly number of deaths and injuries resulting from conflict-related security incidents. The primary outcomes were the monthly incidence of paralytic polio cases within each district between 2007 and 2014 and the polio vaccination percentage from 666 district-level vaccination campaigns between 2007 and 2009, targeting ∼5.7 million children. Multilevel Poisson regression controlling for time and district fixed effects was used to model the association between insecurity, vaccinator access, vaccination rates, and polio incidence. The number of children inaccessible to vaccinators was 19.7% greater (95% CI: 19.2-20.2%), and vaccination rates were 5.3% lower (95% CI: 5.2-5.3%) in "high-insecurity" campaigns compared with "secure" campaigns. The unadjusted mean vaccination rate was 96.3% (SD = 8.6) in secure campaigns and 88.3% (SD = 19.2) in high-insecurity campaigns. Polio incidence was 73.0% greater (95% CI: 30-131%) during high-insecurity months (unadjusted mean = 0.13 cases per million people, SD = 0.71) compared with secure months (unadjusted mean = 1.23 cases per million people, SD = 4.28). Thus, insecurity was associated with reduced vaccinator access, reduced polio vaccination, and increased polio incidence in northwest Pakistan. These findings demonstrate that insecurity is an important obstacle to global polio eradication.

  17. Report: Fiscal Year 2006 Federal Information Security Management Act Report Status of EPA’s Computer Security Program

    EPA Pesticide Factsheets

    Report #2006-S-00008, September 25, 2006. Although the Agency has made substantial progress to improve its security program, the OIG identified weaknesses in the Agency’s incident reporting practices.

  18. Systematic implementation of spectral CT with a photon counting detector for liquid security inspection

    NASA Astrophysics Data System (ADS)

    Xu, Xiaofei; Xing, Yuxiang; Wang, Sen; Zhang, Li

    2018-06-01

    X-ray liquid security inspection system plays an important role in homeland security, while the conventional dual-energy CT (DECT) system may have a big deviation in extracting the atomic number and the electron density of materials in various conditions. Photon counting detectors (PCDs) have the capability of discriminating the incident photons of different energy. The technique becomes more and more mature in nowadays. In this work, we explore the performance of a multi-energy CT imaging system with a PCD for liquid security inspection in material discrimination. We used a maximum-likelihood (ML) decomposition method with scatter correction based on a cross-energy response model (CERM) for PCDs so that to improve the accuracy of atomic number and electronic density imaging. Experimental study was carried to examine the effectiveness and robustness of the proposed system. Our results show that the concentration of different solutions in physical phantoms can be reconstructed accurately, which could improve the material identification compared to current available dual-energy liquid security inspection systems. The CERM-base decomposition and reconstruction method can be easily used to different applications such as medical diagnosis.

  19. 46 CFR 4.03-2 - Serious marine incident.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 46 Shipping 1 2014-10-01 2014-10-01 false Serious marine incident. 4.03-2 Section 4.03-2 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY PROCEDURES APPLICABLE TO THE PUBLIC MARINE CASUALTIES AND INVESTIGATIONS Definitions § 4.03-2 Serious marine incident. The term serious marine incident includes the...

  20. 46 CFR 4.03-2 - Serious marine incident.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 46 Shipping 1 2013-10-01 2013-10-01 false Serious marine incident. 4.03-2 Section 4.03-2 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY PROCEDURES APPLICABLE TO THE PUBLIC MARINE CASUALTIES AND INVESTIGATIONS Definitions § 4.03-2 Serious marine incident. The term serious marine incident includes the...

  1. 46 CFR 4.03-2 - Serious marine incident.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 46 Shipping 1 2012-10-01 2012-10-01 false Serious marine incident. 4.03-2 Section 4.03-2 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY PROCEDURES APPLICABLE TO THE PUBLIC MARINE CASUALTIES AND INVESTIGATIONS Definitions § 4.03-2 Serious marine incident. The term serious marine incident includes the...

  2. 46 CFR 4.03-2 - Serious marine incident.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 46 Shipping 1 2011-10-01 2011-10-01 false Serious marine incident. 4.03-2 Section 4.03-2 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY PROCEDURES APPLICABLE TO THE PUBLIC MARINE CASUALTIES AND INVESTIGATIONS Definitions § 4.03-2 Serious marine incident. The term serious marine incident includes the...

  3. 46 CFR 4.03-2 - Serious marine incident.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 46 Shipping 1 2010-10-01 2010-10-01 false Serious marine incident. 4.03-2 Section 4.03-2 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY PROCEDURES APPLICABLE TO THE PUBLIC MARINE CASUALTIES AND INVESTIGATIONS Definitions § 4.03-2 Serious marine incident. The term serious marine incident includes the...

  4. 33 CFR 150.830 - Reporting a pollution incident.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Reporting a pollution incident. 150.830 Section 150.830 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY... pollution incident. Oil pollution incidents involving a deepwater port are reported according to §§ 135.305...

  5. 33 CFR 150.830 - Reporting a pollution incident.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 33 Navigation and Navigable Waters 2 2011-07-01 2011-07-01 false Reporting a pollution incident. 150.830 Section 150.830 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY... pollution incident. Oil pollution incidents involving a deepwater port are reported according to §§ 135.305...

  6. 33 CFR 150.830 - Reporting a pollution incident.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 33 Navigation and Navigable Waters 2 2013-07-01 2013-07-01 false Reporting a pollution incident. 150.830 Section 150.830 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY... pollution incident. Oil pollution incidents involving a deepwater port are reported according to §§ 135.305...

  7. 33 CFR 150.830 - Reporting a pollution incident.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 33 Navigation and Navigable Waters 2 2012-07-01 2012-07-01 false Reporting a pollution incident. 150.830 Section 150.830 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY... pollution incident. Oil pollution incidents involving a deepwater port are reported according to §§ 135.305...

  8. 33 CFR 150.830 - Reporting a pollution incident.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 33 Navigation and Navigable Waters 2 2014-07-01 2014-07-01 false Reporting a pollution incident. 150.830 Section 150.830 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY... pollution incident. Oil pollution incidents involving a deepwater port are reported according to §§ 135.305...

  9. Design of the national health security preparedness index.

    PubMed

    Uzun Jacobson, Evin; Inglesby, Tom; Khan, Ali S; Rajotte, James C; Burhans, Robert L; Slemp, Catherine C; Links, Jonathan M

    2014-01-01

    The importance of health security in the United States has been highlighted by recent emergencies such as the H1N1 influenza pandemic, Superstorm Sandy, and the Boston Marathon bombing. The nation's health security remains a high priority today, with federal, state, territorial, tribal, and local governments, as well as nongovernment organizations and the private sector, engaging in activities that prevent, protect, mitigate, respond to, and recover from health threats. The Association of State and Territorial Health Officials (ASTHO), through a cooperative agreement with the Centers for Disease Control and Prevention (CDC) Office of Public Health Preparedness and Response (OPHPR), led an effort to create an annual measure of health security preparedness at the national level. The collaborative released the National Health Security Preparedness Index (NHSPI(™)) in December 2013 and provided composite results for the 50 states and for the nation as a whole. The Index results represent current levels of health security preparedness in a consistent format and provide actionable information to drive decision making for continuous improvement of the nation's health security. The overall 2013 National Index result was 7.2 on the reported base-10 scale, with areas of greater strength in the domains of health surveillance, incident and information management, and countermeasure management. The strength of the Index relies on the interdependencies of the many elements in health security preparedness, making the sum greater than its parts. Moving forward, additional health security-related disciplines and measures will be included alongside continued validation efforts.

  10. Security System Responsive to Optical Fiber Having Bragg Grating

    NASA Technical Reports Server (NTRS)

    Gary, Charles K. (Inventor); Ozcan, Meric (Inventor)

    1997-01-01

    An optically responsive electronic lock is disclosed comprising an optical fiber serving as a key and having Bragg gratings placed therein. Further, an identification system is disclosed which has the optical fiber serving as means for tagging and identifying an object. The key or tagged object is inserted into a respective receptacle and the Bragg gratings cause the optical fiber to reflect a predetermined frequency spectra pattern of incident light which is detected by a decoder and compared against a predetermined spectrum to determine if an electrical signal is generated to either operate the lock or light a display of an authentication panel.

  11. 49 CFR 1542.307 - Incident management.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 49 Transportation 9 2013-10-01 2013-10-01 false Incident management. 1542.307 Section 1542.307 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION... Incident management. (a) Each airport operator must establish procedures to evaluate bomb threats, threats...

  12. 49 CFR 1542.307 - Incident management.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 49 Transportation 9 2012-10-01 2012-10-01 false Incident management. 1542.307 Section 1542.307 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION... Incident management. (a) Each airport operator must establish procedures to evaluate bomb threats, threats...

  13. 49 CFR 1542.307 - Incident management.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 49 Transportation 9 2014-10-01 2014-10-01 false Incident management. 1542.307 Section 1542.307 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION... Incident management. (a) Each airport operator must establish procedures to evaluate bomb threats, threats...

  14. 49 CFR 1542.307 - Incident management.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 9 2011-10-01 2011-10-01 false Incident management. 1542.307 Section 1542.307 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION... Incident management. (a) Each airport operator must establish procedures to evaluate bomb threats, threats...

  15. Incorporating Global Information Security and Assurance in I.S. Education

    ERIC Educational Resources Information Center

    White, Garry L.; Hewitt, Barbara; Kruck, S. E.

    2013-01-01

    Over the years, the news media has reported numerous information security incidents. Because of identity theft, terrorism, and other criminal activities, President Obama has made information security a national priority. Not only is information security and assurance an American priority, it is also a global issue. This paper discusses the…

  16. Radiological emergency: Malaysian preparedness and response.

    PubMed

    Yusof, Mohd Abd Wahab; Ali, Hamrah Mohd

    2011-07-01

    Planning and preparation in advance for radiological emergencies can help to minimise potential public health and environmental threats if and when an actual emergency occurs. During the planning process, emergency response organisations think through how they would respond to each type of incident and the resources that will be needed. In Malaysia, planning, preparation for and response to radiological emergencies involve many parties. In the event of a radiological emergency and if it is considered a disaster, the National Security Council, the Atomic Energy Licensing Board and the Malaysian Nuclear Agency (Nuclear Malaysia) will work together with other federal agencies, state and local governments, first responders and international organisations to monitor the situation, contain the release, and clean up the contaminated site. Throughout the response, these agencies use their protective action guidelines. This paper discusses Malaysian preparedness for, and response to, any potential radiological emergency.

  17. Laboratory security and emergency response guidance for laboratories working with select agents. Centers for Disease Control and Prevention.

    PubMed

    Richmond, Jonathan Y; Nesby-O'Dell, Shanna L

    2002-12-06

    In recent years, concern has increased regarding use of biologic materials as agents of terrorism, but these same agents are often necessary tools in clinical and research microbiology laboratories. Traditional biosafety guidelines for laboratories have emphasized use of optimal work practices, appropriate containment equipment, well-designed facilities, and administrative controls to minimize risk of worker injury and to ensure safeguards against laboratory contamination. The guidelines discussed in this report were first published in 1999 (U.S. Department of Health and Human Services/CDC and National Institutes of Health. Biosafety in microbiological and biomedical laboratories [BMBL]. Richmond JY, McKinney RW, eds. 4th ed. Washington, DC: US Department of Health and Human Services, 1999 [Appendix F]). In that report, physical security concerns were addressed, and efforts were focused on preventing unauthorized entry to laboratory areas and preventing unauthorized removal of dangerous biologic agents from the laboratory. Appendix F of BMBL is now being revised to include additional information regarding personnel risk assessments, and inventory controls. The guidelines contained in this report are intended for laboratories working with select agents under biosafety-level 2, 3, or 4 conditions as described in Sections II and III of BMBL. These recommendations include conducting facility risk assessments and developing comprehensive security plans to minimize the probability of misuse of select agents. Risk assessments should include systematic, site-specific reviews of 1) physical security; 2) security of data and electronic technology systems; 3) employee security; 4) access controls to laboratory and animal areas; 5) procedures for agent inventory and accountability; 6) shipping/transfer and receiving of select agents; 7) unintentional incident and injury policies; 8) emergency response plans; and 9) policies that address breaches in security. The security plan should be an integral part of daily operations. All employees should be well-trained and equipped, and the plan should be reviewed annually, at least.

  18. Security practices and regulatory compliance in the healthcare industry.

    PubMed

    Kwon, Juhee; Johnson, M Eric

    2013-01-01

    Securing protected health information is a critical responsibility of every healthcare organization. We explore information security practices and identify practice patterns that are associated with improved regulatory compliance. We employed Ward's cluster analysis using minimum variance based on the adoption of security practices. Variance between organizations was measured using dichotomous data indicating the presence or absence of each security practice. Using t tests, we identified the relationships between the clusters of security practices and their regulatory compliance. We utilized the results from the Kroll/Healthcare Information and Management Systems Society telephone-based survey of 250 US healthcare organizations including adoption status of security practices, breach incidents, and perceived compliance levels on Health Information Technology for Economic and Clinical Health, Health Insurance Portability and Accountability Act, Red Flags rules, Centers for Medicare and Medicaid Services, and state laws governing patient information security. Our analysis identified three clusters (which we call leaders, followers, and laggers) based on the variance of security practice patterns. The clusters have significant differences among non-technical practices rather than technical practices, and the highest level of compliance was associated with hospitals that employed a balanced approach between technical and non-technical practices (or between one-off and cultural practices). Hospitals in the highest level of compliance were significantly managing third parties' breaches and training. Audit practices were important to those who scored in the middle of the pack on compliance. Our results provide security practice benchmarks for healthcare administrators and can help policy makers in developing strategic and practical guidelines for practice adoption.

  19. Security practices and regulatory compliance in the healthcare industry

    PubMed Central

    Kwon, Juhee; Johnson, M Eric

    2013-01-01

    Objective Securing protected health information is a critical responsibility of every healthcare organization. We explore information security practices and identify practice patterns that are associated with improved regulatory compliance. Design We employed Ward's cluster analysis using minimum variance based on the adoption of security practices. Variance between organizations was measured using dichotomous data indicating the presence or absence of each security practice. Using t tests, we identified the relationships between the clusters of security practices and their regulatory compliance. Measurement We utilized the results from the Kroll/Healthcare Information and Management Systems Society telephone-based survey of 250 US healthcare organizations including adoption status of security practices, breach incidents, and perceived compliance levels on Health Information Technology for Economic and Clinical Health, Health Insurance Portability and Accountability Act, Red Flags rules, Centers for Medicare and Medicaid Services, and state laws governing patient information security. Results Our analysis identified three clusters (which we call leaders, followers, and laggers) based on the variance of security practice patterns. The clusters have significant differences among non-technical practices rather than technical practices, and the highest level of compliance was associated with hospitals that employed a balanced approach between technical and non-technical practices (or between one-off and cultural practices). Conclusions Hospitals in the highest level of compliance were significantly managing third parties’ breaches and training. Audit practices were important to those who scored in the middle of the pack on compliance. Our results provide security practice benchmarks for healthcare administrators and can help policy makers in developing strategic and practical guidelines for practice adoption. PMID:22955497

  20. 78 FR 27276 - Privacy Act; System of Records: Security Records, State-36

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-05-09

    ... records maintained in State-36, Security Records, capture data related to incidents and threats affecting..., or witnesses associated with investigations into possible unlawful activity conducted by the Bureau... Security; individuals subject to investigations conducted on behalf of other Federal agencies; and...

  1. Landscape design strategies for post-disaster reconstructions based on traditional ethical wisdom

    NASA Astrophysics Data System (ADS)

    Yi, Shouli; Hu, Di; Gao, Suping; Lei, Ting; Chen, Qibin

    2018-03-01

    In the face of the black swan events which frequently happened globally, I take the earthquake of Ya'an, happened at 4.20 in Sichuan, as an example of my subject. The results indicate that the social responsibility of landscape architects is a post-disaster reconstruction of a material and spiritual homeland for victims and mental care for individuals, which specifically reflected in the process of rebuilding victims' sense of security. The reconstruction of a sense of security must follow certain ethics and moralities which embody the ecological wisdom. We take a typical case of Ya'an Lushan Snow Mountain Village-the earthquake distress area, we found the incidence of disease was up to 68.6% through the PTSD analysis, indicating the overall absence of a sense of security. To solve the problem and reconstruct people's mental and material homeland, the article discussed the strategies and solutions to post-disaster landscape design based on traditional ethical wisdom.

  2. [Cancer incidence in a Cancer Care Unit of the Mexican Social Security Institute (IMSS) in Toluca, Mexico].

    PubMed

    Gómez-Villanueva, Angel; Chacón Sánchez, Jesús; Santillán Arreygue, Leopoldo; Sánchez González, Yolanda; Romero-Figueroa, María del Socorro

    2014-01-01

    In 2000, malignant tumors were responsible for 12% of nearly 56 million deaths that occurred in the world from all causes. To determine the incidence of cancer in a Cancer Care Unit of IMSS in Toluca, Mexico. Prospective cross-sectional study; we identified the primary tumor, age, family history of cancer, comorbidities, risk factors, and ECOG in patients with newly diagnosed cancer. We identified 446 cases, 66.1% were women. The age group of age 50 to 59 had the highest number of cases (98). The most common cancers in women are breast, cervical, and ovarian cancer, and in men, testicular, prostate, and colorectal cancer. The most common cancers in both sexes were breast cancer, cervical cancer, colorectal cancer, ovarian cancer, and testicular cancer.

  3. Study on Information Security and e-Trust in Spanish households

    NASA Astrophysics Data System (ADS)

    Aguado, José

    The study on Information Security and e-Trust in Spanish households has been conducted by INTECO (The National Institute of Communication Technologies) through the Information Security Observatory. It is a study on the incidence and trust of users in the Internet by means of measuring the frequency of the episodes of individual risk in a wide sample of users that are monitored online on a monthly basis, combining quantitative data of incidences (monthly scans of home computers) and qualitative perception data (quarterly surveys). The study is supplied with data from more than 3,000 households with Internet connection, spread across the whole country.

  4. False alarms and incorrect rejections in an information security center: correlation with the frequency of incidents.

    PubMed

    Bruno, Thiers; Abrahão, Julia

    2012-01-01

    This study examines the actions taken by operators aimed at preventing and combating information security incidents at a banking organization. The work utilizes the theoretical framework of ergonomics and cognitive psychology. The method is workplace ergonomic analysis. Its focus is directed towards examining the cognitive dimension of the work environment with special attention to the occurrence of correlations between variability in incident frequency and the results of sign detection actions. It categorizes 45,142 operator decisions according to the theory of signal detection (Sternberg, 2000). It analyzes the correlation between incident proportions (indirectly associated with the cognitive efforts demanded from the operator) and operator decisions. The study demonstrated the existence of a positive correlation between incident proportions and false positive decisions (false alarms). However, this correlation could not be observed in relation to decisions of the false-negative type (incorrect rejection).

  5. 2016 Earth System Grid Federation Annual Report

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Williams, Dean N.

    The Earth System Grid Federation (ESGF) experienced a major setback in June 2015, when it experienced a security incident that brought all systems to a halt for more than half a year. However, federation developers and management committee members turned the incident into an opportunity to dramatically upgrade the system security and functionality and to develop planning and policy documents to guide ESGF evolution and success. Moreover, despite the incident, ESGF developer working teams continue to make strong and significant progress on various enhancement projects that will help ensure ESGF can meet the needs of the climate community in themore » coming years.« less

  6. Distributed fluorescent optical fiber proximity sensor: Towards a proof of concept.

    PubMed

    Gălătuș, Ramona; Faragó, Paul; Miluski, Piotr; Valles, Juan-Antonio

    2018-06-05

    Fluorescent fibers are optical fibers which emit light as a response to an incident phenomenon, usually an incident light. Operation depends on the doping dyes, which determine specific fluorescence and optical characteristics useful in the development of optical sensors. In this work we propose a low-cost distributed proximity sensor implemented using a red fluorescent fiber, to provide a security option for a surface plasmon resonance system. Operation of the proposed sensor relies on having the incident illumination intensity varied by the presence or absence of an obstacle in the vicinity of the sensing element. This will influence the radiated fluorescence accordingly. The proposed setup for the implementation of the optical proximity sensor assumes having a high brightness LED deployed for axial fiber illumination and a blue LED for side illumination. Electronic processing then accounts for gain and digitization. Measurement results of the prototype validate the proposed concept. Copyright © 2018 Elsevier B.V. All rights reserved.

  7. Nevada National Security Site Environmental Report 2016

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Wills

    This Nevada National Security Site Environmental Report (NNSSER) was prepared to satisfy DOE Order DOE O 231.1B, “Environment, Safety and Health Reporting.” Its purpose is to (1) report compliance status with environmental standards and requirements, (2) present results of environmental monitoring of radiological and nonradiological effluents, (3) report estimated radiological doses to the public from releases of radioactive material, (4) summarize environmental incidents of noncompliance and actions taken in response to them, (5) describe the National Nuclear Security Administration Nevada Field Office (NNSA/NFO) Environmental Management System and characterize its performance, and (6) highlight significant environmental programs and efforts. This NNSSERmore » summarizes data and compliance status for calendar year 2016 at the Nevada National Security Site (NNSS) and its two Nevada-based support facilities, the North Las Vegas Facility (NLVF) and the Remote Sensing Laboratory–Nellis (RSL-Nellis). It also addresses environmental restoration (ER) projects conducted at the Tonopah Test Range (TTR) and the Nevada Test and Training Range (NTTR). NNSA/NFO directs the management and operation of the NNSS and six sites across the nation. In addition to the NNSA itself, the six sites include two in Nevada (NLVF and RSL-Nellis) and four in other states (RSL-Andrews in Maryland, Livermore Operations in California, Los Alamos Operations in New Mexico, and Special Technologies Laboratory in California). Los Alamos, Lawrence Livermore, and Sandia National Laboratories are the principal organizations that sponsor and implement the nuclear weapons programs at the NNSS. National Security Technologies, LLC (NSTec), is the current Management and Operating contractor accountable for the successful execution of work and ensuring that work is performed in compliance with environmental regulations. The six sites all provide support to enhance the NNSS as a location for its multiple missions. The three major NNSS missions include National Security/Defense, Environmental Management, and Nondefense. The major programs that support these missions are Stockpile Stewardship and Management, Nonproliferation and Counterterrorism, Nuclear Emergency Response, Strategic Partnership Projects, Environmental Restoration, Waste Management, Conservation and Renewable Energy, Other Research and Development, and Infrastructure. The major facilities that support the programs include the U1a Facility, Big Explosives Experimental Facility (BEEF), Device Assembly Facility, Dense Plasma Focus Facility, Joint Actinide Shock Physics Experimental Research Facility, Radiological/Nuclear Countermeasures Test and Evaluation Complex, Nonproliferation Test and Evaluation Complex (NPTEC), Radiological/Nuclear Weapons of Mass Destruction Incident Exercise Site, the Area 5 Radioactive Waste Management Complex (RWMC), and the Area 3 Radioactive Waste Management Site (RWMS).« less

  8. Cancer incidence and mortality in children in the Mexican Social Security Institute (1996-2013).

    PubMed

    Fajardo-Gutiérrez, Arturo; González-Miranda, Guadalupe; Pachuca-Vázquez, Adriana; Allende-López, Aldo; Fajardo-Yamamoto, Liria Mitzuko; Rendón-Macías, Mario Enrique

    2016-04-01

    To identify the cancer incidence and mortality in Mexican Social Security Institute beneficiary (MSSI-B) children during 1996-2013. Both cancer cases (n=4 728) and deaths (n=2 378) were analyzed in MSSI-B children who were registered in five states of the Mexican Republic. The incidence and mortality trends and the incidences (rate x 1 000 000 children / year) of the type of cancer, age, sex, and place of residence were obtained. For both indicators (incidence and mortality), there was a downward trend for the period of 1996-2001 and a stable trend for 2002-2013. This occurred in the overall mortality and incidence trends of the Estado de México and Chiapas and in the leukemia and the acute lymphoid subgroups. The annual overall incidence was 128 cases per 1 000 000 children. Leukemia, lymphomas, and central nervous system tumors were the principal cancer groups. Cancer mortality for the period of 2002-2013 did not diminish. Interinstitutional and/or international research should be designed to improve the care of these children.

  9. An analysis of nurses' post-incident manual restraint reports.

    PubMed

    Ryan, C J; Bowers, L

    2006-10-01

    Manual restraint techniques are associated with the management of violence in psychiatric settings. Restraint effectiveness and acceptability are under scrutiny, yet the nature and frequency of who or what were involved in restraint episodes have not previously been fully described or understood. The aim of this study was to describe the nature and frequency of manual restraint-related events and their components. This study was carried out using content analyses of nurses' post-incident reports from a psychiatric unit situated within a general hospital, and from its associated medium-secure unit. Requests for restraint occurred at the rate of about once per day, and the majority related to patients' ill-directed frustration, resistance to containment and their desire to leave the ward. Only half of responses to conflicts resulted in restraint implementation. The majority of restraint activities occurred during the afternoon and night. Male patients and detained patients were more frequent participants in restraint interventions. To a lesser extent, police, ambulance, fire services, hospital security, visitors and ex-patients were also involved in restraint episodes. Injuries were rare. In conclusion, training in restraint skills, clinical audit of adverse incidents, and research into psychiatric aggression all need to take into account the association of restraint with the enforcement of detention and treatment of acutely ill patients. The coupling of restraint with medication requires examination of its safety and efficacy. Interagency training may enable the essential services involved to coordinate restraint activities more effectively.

  10. An Information Security Control Assessment Methodology for Organizations

    ERIC Educational Resources Information Center

    Otero, Angel R.

    2014-01-01

    In an era where use and dependence of information systems is significantly high, the threat of incidents related to information security that could jeopardize the information held by organizations is more and more serious. Alarming facts within the literature point to inadequacies in information security practices, particularly the evaluation of…

  11. Barriers to Securing Data on Bluetooth®-Enabled Mobile Devices: A Phenomenological Study

    ERIC Educational Resources Information Center

    Hines, Natasha

    2015-01-01

    Company data on mobile devices is vulnerable and subject to unauthorized access. The general problem is that information security incidents compromise the integrity and authenticity of electronic data. The specific problem is that organizational security policies, procedures, and training do not adequately address the vulnerabilities associated…

  12. Reducing Incongruity of Perceptions Related to Information Risk: Dialogical Action Research in Organizations

    ERIC Educational Resources Information Center

    Sedlack, Derek J.

    2012-01-01

    A critical overreliance on the technical dimension of information security has recently shifted toward more robust, organizationally focused information security methods to countermand $54 billion lost from computer security incidents. Developing a more balanced approach is required since protecting information is not an all or nothing…

  13. Getting Employees Involved in Information Security: The Case of Strong Passwords

    ERIC Educational Resources Information Center

    Taylor, Richard G.

    2009-01-01

    With the increasing amount and severity of information security incidents, organizations are constantly looking for better ways to protect their information. The implementation of physical safeguards such as firewalls and intrusion detection systems is an integral part on an organization's overall information security; however these safeguards…

  14. 46 CFR 16.240 - Serious marine incident testing requirements.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 46 Shipping 1 2010-10-01 2010-10-01 false Serious marine incident testing requirements. 16.240 Section 16.240 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MERCHANT MARINE OFFICERS AND SEAMEN CHEMICAL TESTING Required Chemical Testing § 16.240 Serious marine incident testing requirements. The...

  15. 46 CFR 16.240 - Serious marine incident testing requirements.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 46 Shipping 1 2012-10-01 2012-10-01 false Serious marine incident testing requirements. 16.240 Section 16.240 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MERCHANT MARINE OFFICERS AND SEAMEN CHEMICAL TESTING Required Chemical Testing § 16.240 Serious marine incident testing requirements. The...

  16. 46 CFR 16.240 - Serious marine incident testing requirements.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 46 Shipping 1 2014-10-01 2014-10-01 false Serious marine incident testing requirements. 16.240 Section 16.240 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MERCHANT MARINE OFFICERS AND SEAMEN CHEMICAL TESTING Required Chemical Testing § 16.240 Serious marine incident testing requirements. The...

  17. 46 CFR 16.240 - Serious marine incident testing requirements.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 46 Shipping 1 2013-10-01 2013-10-01 false Serious marine incident testing requirements. 16.240 Section 16.240 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MERCHANT MARINE OFFICERS AND SEAMEN CHEMICAL TESTING Required Chemical Testing § 16.240 Serious marine incident testing requirements. The...

  18. 46 CFR 16.240 - Serious marine incident testing requirements.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 46 Shipping 1 2011-10-01 2011-10-01 false Serious marine incident testing requirements. 16.240 Section 16.240 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MERCHANT MARINE OFFICERS AND SEAMEN CHEMICAL TESTING Required Chemical Testing § 16.240 Serious marine incident testing requirements. The...

  19. The Benefits of Collaborative Processes for Establishing All Hazard Incident Management Teams in Urban Area Security Initiative Regions

    DTIC Science & Technology

    2013-09-01

    incidents beyond wild land fires.15 This journal article also noted that national IMTs provided command functions at the World Trade Center on September...11, 2001, Hurricane Katrina in 2005 and search and recovery efforts following the Space Shuttle Columbia disaster.16 Because of the utility and...Management Team SWA Southwest Area SWCC Southwest Coordination Center UASI Urban Area Security Initiative UAWG Urban Area Working Group

  20. Los Alamos National Laboratory emergency management plan. Revision 1

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Ramsey, G.F.

    1998-07-15

    The Laboratory has developed this Emergency Management Plan (EMP) to assist in emergency planning, preparedness, and response to anticipated and actual emergencies. The Plan establishes guidance for ensuring safe Laboratory operation, protection of the environment, and safeguarding Department of Energy (DOE) property. Detailed information and specific instructions required by emergency response personnel to implement the EMP are contained in the Emergency Management Plan Implementing Procedure (EMPIP) document, which consists of individual EMPIPs. The EMP and EMPIPs may be used to assist in resolving emergencies including but not limited to fires, high-energy accidents, hazardous material releases (radioactive and nonradioactive), security incidents,more » transportation accidents, electrical accidents, and natural disasters.« less

  1. Remediation following Man-made or Natural Disasters -Homeland Security Research

    EPA Pesticide Factsheets

    EPA develops procedures mitigate contamination and to remediate the environment following public health and environmental incidents and disasters. Contamination incidents involving urban areas could require the decontamination of

  2. 10 CFR 1049.9 - Firearms and firearms incidents.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... immediately, and to the SPR Project Management Office Security Division within 24 hours. The Strategic... FORCE OFFICERS OF THE STRATEGIC PETROLEUM RESERVE § 1049.9 Firearms and firearms incidents. (a...

  3. 10 CFR 1049.9 - Firearms and firearms incidents.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... immediately, and to the SPR Project Management Office Security Division within 24 hours. The Strategic... FORCE OFFICERS OF THE STRATEGIC PETROLEUM RESERVE § 1049.9 Firearms and firearms incidents. (a...

  4. THE ROLE OF THE CONSEQUENCE MANAGEMENT HOME TEAM IN THE FUKUSHIMA DAIICHI RESPONSE

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Pemberton, Wendy; Mena, RaJah; Beal, William

    The Consequence Management Home Team is a U.S. Department of Energy/National Nuclear Security Administration asset. It assists a variety of response organizations with modeling; radiological operations planning; field monitoring techniques; and the analysis, interpretation, and distribution of radiological data. These reach-back capabilities are activated quickly to support public safety and minimize the social and economic impact of a nuclear or radiological incident. In the Fukushima Daiichi response, the Consequence Management Home Team grew to include a more broad range of support than was historically planned. From the early days of the response to the continuing involvement in supporting late phasemore » efforts, each stage of the Consequence Management Home Team support had distinct characteristics in terms of management of incoming data streams as well as creation of products. Regardless of stage, the Consequence Management Home Team played a critical role in the Fukushima Daiichi response effort.« less

  5. 49 CFR 171.16 - Detailed hazardous materials incident reports.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... quantity of hazardous waste; (3) A specification cargo tank with a capacity of 1,000 gallons or greater..., DC 20590-0001, or an electronic Hazardous Material Incident Report to the Information System Manager..., submit a written or electronic copy of the Hazardous Materials Incident Report to the FAA Security Field...

  6. 49 CFR 171.16 - Detailed hazardous materials incident reports.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... quantity of hazardous waste; (3) A specification cargo tank with a capacity of 1,000 gallons or greater..., DC 20590-0001, or an electronic Hazardous Material Incident Report to the Information System Manager..., submit a written or electronic copy of the Hazardous Materials Incident Report to the FAA Security Field...

  7. 49 CFR 171.16 - Detailed hazardous materials incident reports.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... quantity of hazardous waste; (3) A specification cargo tank with a capacity of 1,000 gallons or greater..., DC 20590-0001, or an electronic Hazardous Material Incident Report to the Information System Manager..., submit a written or electronic copy of the Hazardous Materials Incident Report to the FAA Security Field...

  8. 18 CFR 39.7 - Enforcement of Reliability Standards.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... violation that relates to a Cybersecurity Incident or that would jeopardize the security of the Bulk-Power... lawful, including a proceeding involving a Cybersecurity Incident. For a nonpublic proceeding, the user...

  9. 18 CFR 39.7 - Enforcement of Reliability Standards.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... violation that relates to a Cybersecurity Incident or that would jeopardize the security of the Bulk-Power... lawful, including a proceeding involving a Cybersecurity Incident. For a nonpublic proceeding, the user...

  10. 18 CFR 39.7 - Enforcement of Reliability Standards.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... violation that relates to a Cybersecurity Incident or that would jeopardize the security of the Bulk-Power... lawful, including a proceeding involving a Cybersecurity Incident. For a nonpublic proceeding, the user...

  11. 18 CFR 39.7 - Enforcement of Reliability Standards.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... violation that relates to a Cybersecurity Incident or that would jeopardize the security of the Bulk-Power... lawful, including a proceeding involving a Cybersecurity Incident. For a nonpublic proceeding, the user...

  12. Liberty and Security in a Changing World: Report and Recommendations of The President’s Review Group on Intelligence and Communications Technologies

    DTIC Science & Technology

    2013-12-12

    self-government and economic growth. The United States Government should reaffirm the 2011 International Strategy for Cyberspace. It should stress ...intimidated, or cowed by government officials. If they are, it is “We the People” who will suffer. Part of the responsibility of our free press is...noted that if a similar or worse incident or series of attacks were to occur in the future, many Americans, in the fear and heat of the moment

  13. Preventing Large-Scale Controlled Substance Diversion From Within the Pharmacy

    PubMed Central

    Martin, Emory S.; Dzierba, Steven H.; Jones, David M.

    2013-01-01

    Large-scale diversion of controlled substances (CS) from within a hospital or heath system pharmacy is a rare but growing problem. It is the responsibility of pharmacy leadership to scrutinize control processes to expose weaknesses. This article reviews examples of large-scale diversion incidents and diversion techniques and provides practical strategies to stimulate enhanced CS security within the pharmacy staff. Large-scale diversion from within a pharmacy department can be averted by a pharmacist-in-charge who is informed and proactive in taking effective countermeasures. PMID:24421497

  14. Database Security: What Students Need to Know

    ERIC Educational Resources Information Center

    Murray, Meg Coffin

    2010-01-01

    Database security is a growing concern evidenced by an increase in the number of reported incidents of loss of or unauthorized exposure to sensitive data. As the amount of data collected, retained and shared electronically expands, so does the need to understand database security. The Defense Information Systems Agency of the US Department of…

  15. Strategies to Minimize the Effects of Information Security Threats on Business Performance

    ERIC Educational Resources Information Center

    Okoye, Stella Ifeyinwa

    2017-01-01

    Business leaders in Nigeria are concerned about the high rates of business failure and economic loss from security incidents and may not understand strategies for reducing the effects of information security threats on business performance. Guided by general systems theory and transformational leadership theory, the focus of this exploratory…

  16. Child maltreatment among U.S. East Coast migrant farm workers.

    PubMed

    Larson, O W; Doris, J; Alvarez, W F

    1987-01-01

    This paper reports findings from a study that was conducted in 1983 to determine the incidence and patterns of child maltreatment among migrant farm worker families who reside in or travel through the Atlantic coastal region known as the Eastern Stream. These results are based on responses to a multipurpose mailed questionnaire that was administered to a sample of 2,207 migrant educators. Educational personnel from 14 of the 22 Eastern Stream states participated in this survey, which was designed to elicit information on the incidence of maltreatment in this population. The survey considered 13 different indicators of child abuse and neglect and six maltreatment forms. Another segment of the instrumentation secured information on the migrant population with which the respondents had direct contact so that an incidence rate could be formulated. The study conclusively established that the incidence of child maltreatment rate among migrant farm worker families, as perceived by migrant educators, was substantially higher than the rate observed for the population as a whole or even for families with approximately the same socioeconomic status. Comparative data are presented to place this primary research result in perspective and a more precise overall incidence estimate is derived. Differential rates of abuse and neglect within the migrant population and the factors that contribute to them are also considered.

  17. The burden of terrorism in Malaysia.

    PubMed

    Abul Aziz, Azhar

    2003-01-01

    In the peace-loving, moderate and progressive country of Muslim-dominated Malaysia, violence generally is alien to the culture. Terrorism initially took shape during the post-independence, communist era by jungle recalcitrant actions. In recent years, this has been superceded by a more internationally related trend of violence. Only very few incidents were based locally, while the majority were linked to international groups or organizations abroad, including the Kumpulan Mujahidin Malaysia (KMM), Jemaah Islamiyah (JI), and the Abu Sayyaf Group (ASG). Kidnapping with ransom seemed to have been the most commone modus operandi, while killing and robbery accounted for very few of these incidents. The number of victims in each event so far has been small, and smaller for those physically harmed or killed. This pattern of terrorist attacks suggests that the current level of provision of emergency medical services is sufficient to handle such incidents. Recent advances in local emergency medicine also have witnessed the establishment of various teaching and training modules, a pivotal role played by university hospitals and supported by the Ministry of Health. However, the spate of ongoing events of mass destruction such as the conflict in Israel/Palestine, wars in Afghanistan and Iraq, the World Trade Center and Pentagon tragedies of 11 September 2001, and the Bali bombing in Indonesia, remain as great concerns to Malaysians. Both the government and the people of Malaysia abhor such unjustified uses of terror, and take every measure to curtail them. The National Security Council policies of Arahan No. 18 and Arahan No. 20 detail specific roles and responsibilities of various agencies in managing terrorism and disasters respectively, while the use of the stern Internal Security Act that allows indefinite detention without trial, evidently has been an efficient intelligence and security apparatus. With more recent developments of terrorist events regionally and globally, Malaysia continues to face an ongoing threat from such activities. Various measures have been and will be actively undertaken both by government and non-governmental agencies in facing these challenges.

  18. Nevada National Security Site Environmental Report 2011

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Cathy Wills, ed

    2012-09-12

    This report was prepared to meet the information needs of the public and the requirements and guidelines of the U.S. Department of Energy (DOE) for annual site environmental reports. It was prepared by National Security Technologies, LLC (NSTec), for the U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office (NNSA/NSO). This and previous years reports, called Annual Site Environmental Reports (ASERs), Nevada Test Site Environmental Reports (NTSERs), and, beginning in 2010, Nevada National Security Site Environmental Reports (NNSSERs), are posted on the NNSA/NSO website at http://www.nv.energy.gov/library/publications/aser.aspx. This NNSSER was prepared to satisfy DOE Order DOE O 231.1B, 'Environment,more » Safety and Health Reporting.' Its purpose is to (1) report compliance status with environmental standards and requirements, (2) present results of environmental monitoring of radiological and nonradiological effluents, (3) report estimated radiological doses to the public from releases of radioactive material, (4) summarize environmental incidents of noncompliance and actions taken in response to them, (5) describe the NNSA/NSO Environmental Management System and characterize its performance, and (6) highlight significant environmental programs and efforts. This NNSSER summarizes data and compliance status for calendar year 2011 at the Nevada National Security Site (NNSS) (formerly the Nevada Test Site) and its two support facilities, the North Las Vegas Facility (NLVF) and the Remote Sensing Laboratory-Nellis (RSL-Nellis). It also addresses environmental restoration (ER) projects conducted at the Tonopah Test Range (TTR). Through a Memorandum of Agreement, NNSA/NSO is responsible for the oversight of TTR ER projects, and the Sandia Site Office of NNSA (NNSA/SSO) has oversight of all other TTR activities. NNSA/SSO produces the TTR annual environmental report available at http://www.sandia.gov/news/publications/environmental/index.html.« less

  19. Handbook of emergency management for state-level transportation agencies.

    DOT National Transportation Integrated Search

    2010-03-01

    The Department of Homeland Security has mandated specific systems and techniques for the management of emergencies in the United States, including the Incident Command System, the National Incident Management System, Emergency Operations Plans, Emerg...

  20. 18 CFR 39.7 - Enforcement of Reliability Standards.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... violation that relates to a Cybersecurity Incident or that would jeopardize the security of the Bulk-Power... Cybersecurity Incident. For a nonpublic proceeding, the user, owner or operator of the Bulk-Power System that is...

  1. 46 CFR 148.115 - Report of incidents.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 46 Shipping 5 2013-10-01 2013-10-01 false Report of incidents. 148.115 Section 148.115 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) DANGEROUS CARGOES CARRIAGE OF BULK SOLID MATERIALS THAT REQUIRE SPECIAL HANDLING Minimum Transportation Requirements § 148.115 Report of incidents. (a) When a fire or other hazardous condition...

  2. [Work-related disability among postal employees: incidence, duration, and social security costs in 2008].

    PubMed

    Mascarenhas, Flávia Alves Neves; Barbosa-Branco, Anadergh

    2014-06-01

    This study analyzed the characteristics of Brazilian postal workers that received sick leave benefits in 2008. The databases were from the Unified Benefits System (SUB) and the National Registry of Social Information (CNIS). The incidence rate was 556.5 benefits per 10,000 employees, and the leading causes of work-related sick leave were injuries, musculoskeletal disorders, and mental disorders. Areas most frequently reported in injuries were knees and legs, wrists and hands, ankles and feet, and shoulders and arms, with higher incidence rates in men. Women were more affected by musculoskeletal disorders and mental disorders. Average sick leave lasted longer in men, and the incidence of benefits increased with age. The States with the highest incidence rates were Mato Grosso do Sul, Goiás, and Santa Catarina, and security benefits averaged BRL 1,847.00. Postal work may involve additional risk of injuries to the limbs, due to the long distances carrying heavy weight, assault, and dog bites.

  3. No weapons in the weapons lab

    NASA Astrophysics Data System (ADS)

    Trebino, Rick

    2010-03-01

    I spent 12 years working at a top-secret nuclear-weapons lab that had its own dedicated force of heavily armed security guards. Of course, security-related incidents were rare, so the guards' main challenge was simply staying awake.

  4. Chemical plants remain vulnerable to terrorists: a call to action.

    PubMed

    Lippin, Tobi Mae; McQuiston, Thomas H; Bradley-Bull, Kristin; Burns-Johnson, Toshiba; Cook, Linda; Gill, Michael L; Howard, Donna; Seymour, Thomas A; Stephens, Doug; Williams, Brian K

    2006-09-01

    U.S. chemical plants currently have potentially catastrophic vulnerabilities as terrorist targets. The possible consequences of these vulnerabilities echo from the tragedies of the Bhopal incident in 1984 to the terrorist attacks on 11 September 2001 and, most recently, Hurricanes Katrina and Rita. Findings from a 2004 nationwide participatory research study of 125 local union leaders at sites with very large volumes of highly hazardous chemicals suggest that voluntary efforts to achieve chemical plant security are not succeeding. Study respondents reported that companies had only infrequently taken actions that are most effective in preventing or in preparing to respond to a terrorist threat. In addition, companies reportedly often failed to involve key stakeholders, including workers, local unions, and the surrounding communities, in these efforts. The environmental health community thus has an opportunity to play a key role in advocating for and supporting improvements in prevention of and preparation for terrorist attacks. Policy-level recommendations to redress chemical site vulnerabilities and the related ongoing threats to the nation's security are as follows: a) specify detailed requirements for chemical site assessment and security ; b) mandate audit inspections supported by significant penalties for cases of noncompliance ; c) require progress toward achieving inherently safer processes, including the minimizing of storage of highly hazardous chemicals ; d) examine and require additional effective actions in prevention, emergency preparedness, and response and remediation ; e) mandate and fund the upgrading of emergency communication systems ; and f) involve workers and community members in plan creation and equip and prepare them to prevent and respond effectively to an incident.

  5. Chemical Plants Remain Vulnerable to Terrorists: A Call to Action

    PubMed Central

    Lippin, Tobi Mae; McQuiston, Thomas H.; Bradley-Bull, Kristin; Burns-Johnson, Toshiba; Cook, Linda; Gill, Michael L.; Howard, Donna; Seymour, Thomas A.; Stephens, Doug; Williams, Brian K.

    2006-01-01

    U.S. chemical plants currently have potentially catastrophic vulnerabilities as terrorist targets. The possible consequences of these vulnerabilities echo from the tragedies of the Bhopal incident in 1984 to the terrorist attacks on 11 September 2001 and, most recently, Hurricanes Katrina and Rita. Findings from a 2004 nationwide participatory research study of 125 local union leaders at sites with very large volumes of highly hazardous chemicals suggest that voluntary efforts to achieve chemical plant security are not succeeding. Study respondents reported that companies had only infrequently taken actions that are most effective in preventing or in preparing to respond to a terrorist threat. In addition, companies reportedly often failed to involve key stakeholders, including workers, local unions, and the surrounding communities, in these efforts. The environmental health community thus has an opportunity to play a key role in advocating for and supporting improvements in prevention of and preparation for terrorist attacks. Policy-level recommendations to redress chemical site vulnerabilities and the related ongoing threats to the nation’s security are as follows: a) specify detailed requirements for chemical site assessment and security; b) mandate audit inspections supported by significant penalties for cases of noncompliance; c) require progress toward achieving inherently safer processes, including the minimizing of storage of highly hazardous chemicals; d) examine and require additional effective actions in prevention, emergency preparedness, and response and remediation; e) mandate and fund the upgrading of emergency communication systems; and f) involve workers and community members in plan creation and equip and prepare them to prevent and respond effectively to an incident. PMID:16966080

  6. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Tsai, H. C.; Chen, K.; Liu, Y. Y.

    The US Department of Energy (DOE) [Environmental Management (EM), Office of Packaging and Transportation (EM-45)] Packaging Certification Program (PCP) has developed a radiofrequency identification (RFID) tracking and monitoring system for the management of nuclear materials packages during storage and transportation. The system, developed by the PCP team at Argonne National Laboratory, involves hardware modification, application software development, secured database and web server development, and irradiation experiments. In April 2008, Argonne tested key features of the RFID tracking and monitoring system in a weeklong, 1700 mile (2736 km) demonstration employing 14 empty type B fissile material drums of three designs (modelsmore » 9975, 9977 and ES-3100) that have been certified for shipment by the DOE and the US Nuclear Regulatory Commission. The demonstration successfully integrated global positioning system (GPS) technology for vehicle tracking, satellite/cellular (general packet radio service, or GPRS) technologies for wireless communication, and active RFID tags with multiple sensors (seal integrity, shock, temperature, humidity and battery status) on drums. In addition, the demonstration integrated geographic information system (GIS) technology with automatic alarm notifications of incidents and generated buffer zone reports for emergency response and management of staged incidents. The demonstration was sponsored by EM and the US National Nuclear Security Administration, with the participation of Argonne, Savannah River and Oak Ridge National Laboratories. Over 50 authorised stakeholders across the country observed the demonstration via secured Internet access. The DOE PCP and national laboratories are working on several RFID system implementation projects at selected DOE sites, as well as continuing device and systems development and widening applications beyond DOE sites and possibly beyond nuclear materials to include other radioactive materials.« less

  7. Developing useful transit-related crime and incident data

    DOT National Transportation Integrated Search

    2000-04-01

    Transit agencies have an obligation to provide a reasonably safe and secure system for their patrons and employees. Transit management must make decisions regarding the best use of police, security personnel, and other resources to reduce crime and i...

  8. The power of environment.

    PubMed

    Westbury, Becky

    2015-06-01

    In Ten tips for normal birth, the Royal College of Midwives (RCM) (2014) advocates the building of nests; creating an environment that helps women to feel safe and secure during birth, as this can improve women's experiences and likelihood of normal birth. Furthermore, a private, undisturbed and dark environment, where women feel calm and safe can promote the release of oxytocin, the hormone responsible for uterine contractions and thought to promote the release of the pain relieving hormones endorphins (Uvnas Moberg 2003). When this is not achieved, women can experience fear-tension-pain syndrome, impeding labour progress and causing increased levels of pain (Dick-Read 2013). In addition, birth space has the potential to encourage the promotion of normality through providing space to mobilise, and alternative furniture to enable upright birth positions. Midwives should help women to create a birth space in which they feel safe, calm and secure, to promote normality and increase the incidence of normal birth (RCM 2014).

  9. Situational Awareness of Network System Roles (SANSR)

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Huffer, Kelly M; Reed, Joel W

    In a large enterprise it is difficult for cyber security analysts to know what services and roles every machine on the network is performing (e.g., file server, domain name server, email server). Using network flow data, already collected by most enterprises, we developed a proof-of-concept tool that discovers the roles of a system using both clustering and categorization techniques. The tool's role information would allow cyber analysts to detect consequential changes in the network, initiate incident response plans, and optimize their security posture. The results of this proof-of-concept tool proved to be quite accurate on three real data sets. Wemore » will present the algorithms used in the tool, describe the results of preliminary testing, provide visualizations of the results, and discuss areas for future work. Without this kind of situational awareness, cyber analysts cannot quickly diagnose an attack or prioritize remedial actions.« less

  10. Building a Successful Security Infrastructure: What You Want vs. What You Need vs. What You Can Afford

    NASA Technical Reports Server (NTRS)

    Crabb, Michele D.; Woodrow, Thomas S. (Technical Monitor)

    1995-01-01

    With the fast growing popularity of the Internet, many organizations are racing to get onto the on-ramp to the Information Superhighway. However, with frequent headlines such as 'Hackers' break in at General Electric raises questions about the Net's Security', 'Internet Security Imperiled - Hackers steal data that could threaten computers world-wide' and 'Stanford Computer system infiltrated; Security fears grow', organizations find themselves rethinking their approach to the on-ramp. Is the Internet safe? What do I need to do to protect my organization? Will hackers try to break into my systems? These are questions many organizations are asking themselves today. In order to safely travel along the Information Superhighway, organizations need a strong security framework. Developing such a framework for a computer site, whether it be just a few dozen hosts or several thousand hosts is not an easy task. The security infrastructure for a site is often developed piece-by-piece in response to security incidents which have affected that site over time. Or worse yet, no coordinated effort has been dedicated toward security. The end result is that many sites are still poorly prepared to handle the security dangers of the Internet. This paper presents guidelines for building a successful security infrastructure. The problem is addressed in a cookbook style method. First is a discussion on how to identify your assets and evaluate the threats to those assets; next are suggestions and tips for identifying the weak areas in your security armor. Armed with this information we can begin to think about what you really need for your site and what you can afford. In this stage of the process we examine the different categories of security tools and products that are available and then present some tips for deciding what is best for your site.

  11. LANL continuity of operations plan

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Senutovitch, Diane M

    2010-12-22

    The Los Alamos National Laboratory (LANL) is a premier national security research institution, delivering scientific and engineering solutions for the nation's most crucial and complex problems. Our primary responsibility is to ensure the safety, security, and reliability of the nation's nuclear stockpile. LANL emphasizes worker safety, effective operational safeguards and security, and environmental stewardship, outstanding science remains the foundation of work at the Laboratory. In addition to supporting the Laboratory's core national security mission, our work advances bioscience, chemistry, computer science, earth and environmental sciences, materials science, and physics disciplines. To accomplish LANL's mission, we must ensure that the Laboratorymore » EFs continue to be performed during a continuity event, including localized acts of nature, accidents, technological or attack-related emergencies, and pandemic or epidemic events. The LANL Continuity of Operations (COOP) Plan documents the overall LANL COOP Program and provides the operational framework to implement continuity policies, requirements, and responsibilities at LANL, as required by DOE 0 150.1, Continuity Programs, May 2008. LANL must maintain its ability to perform the nation's PMEFs, which are: (1) maintain the safety and security of nuclear materials in the DOE Complex at fixed sites and in transit; (2) respond to a nuclear incident, both domestically and internationally, caused by terrorist activity, natural disaster, or accident, including mobilizing the resources to support these efforts; and (3) support the nation's energy infrastructure. This plan supports Continuity of Operations for Los Alamos National Laboratory (LANL). This plan issues LANL policy as directed by the DOE 0 150.1, Continuity Programs, and provides direction for the orderly continuation of LANL EFs for 30 days of closure or 60 days for a pandemic/epidemic event. Initiation of COOP operations may be required to support an allhazards event, including a national security emergency, major fire, catastrophic natural disaster, man-made disaster, terrorism event, or technological disaster by rendering LANL buildings, infrastructure, or Technical Areas unsafe, temporarily unusable, or inaccessible.« less

  12. Improved security monitoring method for network bordary

    NASA Astrophysics Data System (ADS)

    Gao, Liting; Wang, Lixia; Wang, Zhenyan; Qi, Aihua

    2013-03-01

    This paper proposes a network bordary security monitoring system based on PKI. The design uses multiple safe technologies, analysis deeply the association between network data flow and system log, it can detect the intrusion activities and position invasion source accurately in time. The experiment result shows that it can reduce the rate of false alarm or missing alarm of the security incident effectively.

  13. 48 CFR 25.302-4 - Policy.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... performing private security functions in designated areas are addressed at 32 CFR part 159, entitled “Private... for weapons; registering and identifying armored vehicles, helicopters, and other military vehicles; and reporting specified incidents in which personnel performing private security functions under a...

  14. The politics of protection: aid, human rights discourse, and power relations in Kyaka II settlement, Uganda.

    PubMed

    Clark-Kazak, Christina R

    2010-01-01

    This paper explores the conceptualisation and application of 'protection' by the United Nations High Commissioner (UNHCR), Ugandan government, and Congolese refugees in Kyaka II refugee settlement, Uganda. Analysing the origins and consequences of a demonstration against school fees, and drawing on other ethnographic data, it explores how different interpretations of this incident reflect different conceptions of, and approaches to, protection. Ugandan government officials viewed the demonstration as a security incident; Congolese and Ugandan adults responded with increased monitoring and 'sheltering' of children and young people; students justified the demonstration as a legitimate manifestation of their rights; while UNHCR promoted assistance and resettlement. The paper argues that prevailing protection responses, including 'sensitisation', sheltering, and resettlement, are de-contextualised from daily realities and fail to address the underlying power relations that undermine protection. It concludes with recommendations on how international refugee agencies can reorient assistance to address protection concerns in refugee contexts.

  15. Identifying and tracking attacks on networks: C3I displays and related technologies

    NASA Astrophysics Data System (ADS)

    Manes, Gavin W.; Dawkins, J.; Shenoi, Sujeet; Hale, John C.

    2003-09-01

    Converged network security is extremely challenging for several reasons; expanded system and technology perimeters, unexpected feature interaction, and complex interfaces all conspire to provide hackers with greater opportunities for compromising large networks. Preventive security services and architectures are essential, but in and of themselves do not eliminate all threat of compromise. Attack management systems mitigate this residual risk by facilitating incident detection, analysis and response. There are a wealth of attack detection and response tools for IP networks, but a dearth of such tools for wireless and public telephone networks. Moreover, methodologies and formalisms have yet to be identified that can yield a common model for vulnerabilities and attacks in converged networks. A comprehensive attack management system must coordinate detection tools for converged networks, derive fully-integrated attack and network models, perform vulnerability and multi-stage attack analysis, support large-scale attack visualization, and orchestrate strategic responses to cyber attacks that cross network boundaries. We present an architecture that embodies these principles for attack management. The attack management system described engages a suite of detection tools for various networking domains, feeding real-time attack data to a comprehensive modeling, analysis and visualization subsystem. The resulting early warning system not only provides network administrators with a heads-up cockpit display of their entire network, it also supports guided response and predictive capabilities for multi-stage attacks in converged networks.

  16. Electromechanical acoustic liner

    NASA Technical Reports Server (NTRS)

    Sheplak, Mark (Inventor); Cattafesta, III, Louis N. (Inventor); Nishida, Toshikazu (Inventor); Horowitz, Stephen Brian (Inventor)

    2007-01-01

    A multi-resonator-based system responsive to acoustic waves includes at least two resonators, each including a bottom plate, side walls secured to the bottom plate, and a top plate disposed on top of the side walls. The top plate includes an orifice so that a portion of an incident acoustical wave compresses gas in the resonators. The bottom plate or the side walls include at least one compliant portion. A reciprocal electromechanical transducer coupled to the compliant portion of each of the resonators forms a first and second transducer/compliant composite. An electrical network is disposed between the reciprocal electromechanical transducer of the first and second resonator.

  17. Food terrorism and food defense on the Web.

    PubMed

    Taylor, Mary Kay

    2008-01-01

    Global food supplies are at risk of both accidental and deliberate contamination. As past incidents have demonstrated, food terrorism may cause social, economic, and political disruption. The United States increased its efforts to protect its food after 9/11 by broadening the roles of existing agencies, including the U.S. Department of Agriculture and the Food and Drug Administration, and by making coordination of food defense the responsibility of the Department of Homeland Security. However, weaknesses in the system remain. This article presents background information and Web sites useful for consumers, industry representatives, students, researchers, policy makers, and the librarians that serve them.

  18. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Barr, Jonathan L.; Taira, Randal Y.; Orr, Heather M.

    The purpose of this document is to describe the operating concepts, capabilities, and benefits of RAMS including descriptions of how the system implementations can improve emergency response, damage assessment, task prioritization, and situation awareness. This CONOPS provides general information on operational processes and procedures required to utilize RAMS, and expected performance benefits of the system. The primary audiences for this document are the end users of RAMS (including flight operators and incident commanders) and the RAMS management team. Other audiences include interested offices within the Department of Homeland Security (DHS), and officials from other state and local jurisdictions who wantmore » to implement similar systems.« less

  19. 10 CFR 37.7 - Communications.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... regulations in this part may be sent as follows: (a) By mail addressed to: ATTN: Document Control Desk... Management Programs; or Director, Division of Security Policy, Office of Nuclear Security and Incident... electronic submission, for example, Electronic Information Exchange, or CD-ROM. Electronic submissions must...

  20. Detection of total hip arthroplasties at airport security checkpoints - how do updated security measures affect patients?

    PubMed

    Issa, Kimona; Pierce, Todd P; Gwam, Chukwuweieke; Festa, Anthony; Scillia, Anthony J; Mont, Michael A

    2018-03-01

    There have been historical reports on the experiences of patients with total hip arthroplasty (THA) passing through standard metal detectors at airports. The purpose of this study was to analyse those who had recently passed through airport security and the incidence of: (i) triggering of the alarm; (ii) extra security searches; and (iii) perceived inconvenience. A questionnaire was given to 125 patients with a THA during a follow-up appointment. Those who had passed through airport security after January 2014 met inclusion criteria. A survey was administered that addressed the number of encounters with airport security, frequency of metal detector activation, additional screening procedures utilised, whether security officials required prosthesis documentation, and perceived inconvenience. 51 patients met inclusion criteria. 10 patients (20%) reported triggered security scanners. 4 of the 10 patients stated they had surgical hardware elsewhere in the body. 13 of the 51 patients (25%) believed that having their THA increased the inconvenience of traveling. This is different from the historical cohort with standard metal detectors which patients reported a greater incidence of alarm triggering (n = 120 of 143; p = 0.0001) and perceived inconvenience (n = 99 of 143; p = 0.0001). The percentage of patients who have THA triggering security alarms has decreased. Furthermore, the number of patients who feel that their prosthesis caused traveling inconvenience has decreased. We feel that this decrease in alarms triggered and improved perceptions about inconvenience are related to the increased usage of new technology.

  1. 78 FR 53736 - Submission for OMB Review; Comment Request

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-08-30

    ...: Title, Associated Form and OMB Number: Defense Industrial Base Cyber Security/Information Assurance (DIB CS/IA) Cyber Incident Reporting; OMB Control Number 0704-0489. Type of Request: Reinstatement without.... The requested information supports the collaborative cyber threat information sharing and incident...

  2. Correlation Research of Medical Security Management System Network Platform in Medical Practice

    NASA Astrophysics Data System (ADS)

    Jie, Wang; Fan, Zhang; Jian, Hao; Li-nong, Yu; Jun, Fei; Ping, Hao; Ya-wei, Shen; Yue-jin, Chang

    Objective-The related research of medical security management system network in medical practice. Methods-Establishing network platform of medical safety management system, medical security network host station, medical security management system(C/S), medical security management system of departments and sections, comprehensive query, medical security disposal and examination system. Results-In medical safety management, medical security management system can reflect the hospital medical security problem, and can achieve real-time detection and improve the medical security incident detection rate. Conclusion-The application of the research in the hospital management implementation, can find hospital medical security hidden danger and the problems of medical disputes, and can help in resolving medical disputes in time and achieve good work efficiency, which is worth applying in the hospital practice.

  3. Civil and forensic patients in secure psychiatric settings: a comparison.

    PubMed

    Galappathie, Nuwan; Khan, Sobia Tamim; Hussain, Amina

    2017-06-01

    Aims and method To evaluate differences between male patients in secure psychiatric settings in the UK based on whether they are detained under civil or forensic sections of the Mental Health Act 1983. A cohort of patients discharged from a secure psychiatric hospital were evaluated for length of stay and frequency of risk-related incidents. Results Overall, 84 patients were included in the study: 52 in the forensic group and 32 in the civil group. Civil patients had more frequent incidents of aggression, sex offending, fire-setting and vulnerability, whereas forensic patients had more frequent episodes of self-harm. Clinical implications Secure hospitals should ensure treatment programmes are tailored to each patient's needs. Civil patients require greater emphasis on treatment of their mental illness, whereas forensic patients have additional offence-related treatment needs. Regular liaison between forensic and general adult services is essential to help ensure patients can return to appropriate settings at the earliest opportunity in their recovery.

  4. The National Response Plan and the Problems in the Evaluation and Assessment of the Unconventional Modes of Terrorism

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    LeMone, David V.; Gibbs, Shawn G.; Winston, John W. Jr.

    In the wake of the events of 9/11, a presidential mandate ordered the development of a master plan to enable governmental agencies to not only seamlessly cooperate but also rapidly react to disasters. The National Response Plan (NRP) is the document in force (December 2004). It was developed to provide a framework for response to catastrophic events whether those events are natural or man-made. Homeland Security, the coordinating entity, is an integral and critical part of that plan. The NRP is a direct outgrowth of the Initial National Response Plan and operates in tandem with the National Incident Management Systemmore » (NIMS). NIMS was the first real attempt to amalgamate the capabilities and resources of some 22 governmental entities, non-governmental organizations (NGOs), and the private sector. The effectiveness of this system's response to natural disasters has been tested with reference to its performance during the 2005 late summer-early fall series of catastrophic hurricanes (Katrina, Rita, and Wilma). Ongoing evaluation of the response by the system indicates that there are significant lessons to be learned from system errors that occurred from the federal to local levels of government. Nevertheless, the conclusion would seem to be that Homeland Security's organizational structure of NIMS combined with protocols developed in the NRP represents an excellent response to both natural and man-made catastrophes. The lessons learned in these natural occurrences (chain of command failures and missteps from first responders to national level, periodic inaccurate and irresponsible news reporting, evacuation capabilities, quarantine problems, etc.) are directly applicable to potential man-made disaster events. In the yet largely untested areas of man-made disasters, the NRP document forms the basis for responding to terrorism as well as accidental man-made related incidents. There are two major categories of terrorism: conventional and unconventional. Conventional terrorism would include such acts as: assassination, kidnapping, hostage taking, non-nuclear explosive devices, etc. The two NRP categories of catastrophic events and oil and hazardous materials contain sections considered to be in the area of conventional terrorism. Of potentially greater immediate concern are the four major modes of unconventional terrorism that are recognized: cyber-, biological (including agro-), chemical, and nuclear. The problem is to arrive at a mutually agreed upon order of importance of both conventional and unconventional terrorism categories. Consequent ranking of these modes enables the prioritization of those areas in which our limited national human and financial resources are to be expended and allocated (funding of research and development, commitment and selection of personnel, costs distribution, operational time-frame, information distribution level, etc.). Ranking of the terror modes will at best be difficult because of a lack of understanding of the potential impacts of each mode as well as the inherent vested bureaucratic and non-bureaucratic interests and biases. All cases of radiation-related incidents may be considered to be manmade with a potentially significant majority of those incidents assigned to a terrorism origin. Man-made accidental occurrences would be handled with a similar NRP response as would be expected in the case of a terrorist event. Radiation-related devices include the RDDs (Radioactive Dispersal Devices) and nuclear fission and fusion weapons of mass destruction (WMD). Pragmatically, the most likely scenario to develop would involve RDD utilization. This conclusion would seem to be reasonable in view of the current apparent capabilities and sophistication required to construct, transport, and deliver a nuclear WMD. (authors)« less

  5. Lawrence Livermore National Laboratory`s Computer Security Short Subjects Videos: Hidden Password, The Incident, Dangerous Games and The Mess; Computer Security Awareness Guide

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    NONE

    A video on computer security is described. Lonnie Moore, the Computer Security Manager, CSSM/CPPM at Lawrence Livermore National Laboratory (LLNL) and Gale Warshawsky, the Coordinator for Computer Security Education and Awareness at LLNL, wanted to share topics such as computer ethics, software piracy, privacy issues, and protecting information in a format that would capture and hold an audience`s attention. Four Computer Security Short Subject videos were produced which ranged from 1--3 minutes each. These videos are very effective education and awareness tools that can be used to generate discussions about computer security concerns and good computing practices.

  6. Highly-Sensitive Thin Film THz Detector Based on Edge Metal-Semiconductor-Metal Junction.

    PubMed

    Jeon, Youngeun; Jung, Sungchul; Jin, Hanbyul; Mo, Kyuhyung; Kim, Kyung Rok; Park, Wook-Ki; Han, Seong-Tae; Park, Kibog

    2017-12-04

    Terahertz (THz) detectors have been extensively studied for various applications such as security, wireless communication, and medical imaging. In case of metal-insulator-metal (MIM) tunnel junction THz detector, a small junction area is desirable because the detector response time can be shortened by reducing it. An edge metal-semiconductor-metal (EMSM) junction has been developed with a small junction area controlled precisely by the thicknesses of metal and semiconductor films. The voltage response of the EMSM THz detector shows the clear dependence on the polarization angle of incident THz wave and the responsivity is found to be very high (~2,169 V/W) at 0.4 THz without any antenna and signal amplifier. The EMSM junction structure can be a new and efficient way of fabricating the nonlinear device THz detector with high cut-off frequency relying on extremely small junction area.

  7. Never ever? Characteristics, outcomes and motivations of patients who abscond or escape: A 5-year review of escapes and absconds from two medium and low secure forensic units.

    PubMed

    Mezey, Gillian; Durkin, Catherine; Dodge, Liam; White, Sarah

    2015-12-01

    Absconds and escapes by psychiatric patients from secure forensic psychiatric settings create public anxiety and are poorly understood. To describe secure hospital patients who escape from within the secure perimeter or abscond, and test for differences between these groups. Escapes and absconds between 2008 and 2012 from the medium and low secure forensic psychiatric inpatient units of two London National Health Service Trusts were identified through the Trusts' databases. Demographic, offending, mental health and incident data were extracted from records for each. Seventy-seven incidents, involving 54 patients, were identified over the five years. These were 13 escapes involving 12 patients, representing a rate of 0.04 per 1000 bed days, and 64 absconds involving 42 patients, a rate of 0.26 per 1000 bed days; 15 (28%) patients were absent without leave more than once. Over half of the patients came back voluntarily within 24 hours of leaving. Over 50% of them had drunk alcohol or taken drugs while away from the unit. Escapees were more likely to be transferred prisoners and to have planned their escape, less likely to return to the unit voluntarily and away longer than patients who absconded. Offending was rare during unauthorised leave--just three offences among the 77 incidents; self-harm was more likely. Motives for absconding included: wanting freedom or drink or drugs, family worries and/or dissatisfaction with aspects of treatment. Escapes or absconding from secure healthcare units have different characteristics, but may best be prevented by convergent strategies. Relational security is likely to be as important for foiling plans for the former as it is for reducing boredom, building strong family support and managing substance misuse in the latter. Copyright © 2015 John Wiley & Sons, Ltd.

  8. Nevada National Security Site Environmental Report 2010

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    C. Wills, ed.

    2011-09-13

    This NNSSER was prepared to satisfy DOE Order DOE O 231.1B, “Environment, Safety and Health Reporting.” Its purpose is to (1) report compliance status with environmental standards and requirements, (2) present results of environmental monitoring of radiological and nonradiological effluents, (3) report estimated radiological doses to the public from releases of radioactive material, (4) summarize environmental incidents of noncompliance and actions taken in response to them, (5) describe the NNSA/NSO Environmental Management System and characterize its performance, and (6) highlight significant environmental programs and efforts. This NNSSER summarizes data and compliance status for calendar year 2010 at the Nevada Nationalmore » Security Site (NNSS) (formerly the Nevada Test Site) and its two support facilities, the North Las Vegas Facility (NLVF) and the Remote Sensing Laboratory–Nellis (RSL-Nellis). It also addresses environmental restoration (ER) projects conducted at the Tonopah Test Range (TTR). Through a Memorandum of Agreement, NNSA/NSO is responsible for the oversight of TTR ER projects, and the Sandia Site Office of NNSA (NNSA/SSO) has oversight of all other TTR activities. NNSA/SSO produces the TTR annual environmental report available at http://www.sandia.gov/news/publications/environmental/index.html.« less

  9. Test Design Document for the Technology Demonstration of the Joint Network Defence and Management System (JNDMS) Project

    DTIC Science & Technology

    2006-10-25

    at this site: Timestamp IP Address Description Severity 2003 Sep 03 14:52:28 150.24.11.1 Security-Trojan- Sub7 18 2003 Sep 03 14:52:33...150.24.11.2 Security-Trojan- Sub7 18 2003 Sep 03 14:52:38 150.24.11.3 Security-Trojan- Sub7 18 4. The Security Analyst clicks on one of the lines in this...table: Severity Parameter Name Value Descriptive Details Location 3 HMCS Iroquois Type of Incident 2 Security-Trojan- Sub7 Asset Type 1 Workstation

  10. Physical security equipment for combating terrorism

    NASA Astrophysics Data System (ADS)

    Toscano, Michael

    2002-08-01

    The objective of the Department of Defense Physical Security Equipment (DoD PSE) RDT&E program is to provide end users within the four Services with the most efficient and productive physical security (PS) at the most reasonable cost to ensure the effective protection of DoD resources. These resources include personnel, nuclear weapons, classified information, materiel, and readiness assets. As a result of the1996 Khobar Towers terrorist bombing incident, the DoD PSE program began to receive additional funding in 1997 for Force Protection Commercial-Off-The-Shelf (FP COTS) equipment evaluation and testing. The FP COTS testing applies to all available technologies, which are considered effective for DoD use. Successive terrorist incidents occurring since Khobar Towers have resulted in increasing focus on the demonstration and validation of equipment necessary to combat the ubiquitously asymmetric terrorist threat.

  11. Technical solutions for mitigating security threats caused by health professionals in clinical settings.

    PubMed

    Fernandez-Aleman, Jose Luis; Belen Sanchez Garcia, Ana; Garcia-Mateos, Gines; Toval, Ambrosio

    2015-08-01

    The objective of this paper is to present a brief description of technical solutions for health information system security threats caused by inadequate security and privacy practices in healthcare professionals. A literature search was carried out in ScienceDirect, ACM Digital Library and IEEE Digital Library to find papers reporting technical solutions for certain security problems in information systems used in clinical settings. A total of 17 technical solutions were identified: measures for password security, the secure use of e-mail, the Internet, portable storage devices, printers and screens. Although technical safeguards are essential to the security of healthcare organization's information systems, good training, awareness programs and adopting a proper information security policy are particularly important to prevent insiders from causing security incidents.

  12. Cyber Security Testing and Training Programs for Industrial Control Systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Daniel Noyes

    2012-03-01

    Service providers rely on industrial control systems (ICS) to manage the flow of water at dams, open breakers on power grids, control ventilation and cooling in nuclear power plants, and more. In today's interconnected environment, this can present a serious cyber security challenge. To combat this growing challenge, government, private industry, and academia are working together to reduce cyber risks. The Idaho National Laboratory (INL) is a key contributor to the Department of Energy National SCADA Test Bed (NSTB) and the Department of Homeland Security (DHS) Control Systems Security Program (CSSP), both of which focus on improving the overall securitymore » posture of ICS in the national critical infrastructure. In support of the NSTB, INL hosts a dedicated SCADA testing facility which consists of multiple control systems supplied by leading national and international manufacturers. Within the test bed, INL researchers systematically examine control system components and work to identify vulnerabilities. In support of the CSSP, INL develops and conducts training courses which are designed to increase awareness and defensive capabilities for IT/Control System professionals. These trainings vary from web-based cyber security trainings for control systems engineers to more advanced hands-on training that culminates with a Red Team/ Blue Team exercise that is conducted within an actual control systems environment. INL also provides staffing and operational support to the DHS Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) Security Operations Center which responds to and analyzes control systems cyber incidents across the 18 US critical infrastructure sectors.« less

  13. The Impact of 'Being There': Psychiatric Staff Attitudes on the Use of Restraint.

    PubMed

    Dahan, Sagit; Levi, Galit; Behrbalk, Pnina; Bronstein, Israel; Hirschmann, Shmuel; Lev-Ran, Shaul

    2018-03-01

    The practice of mechanically restraining psychiatric patients is constantly under debate, and staff attitudes are considered a central factor influencing restraining practices. The aim of this study was to explore associations between psychiatric staff members' presence and participation in incidences of restraint and attitudes towards mechanical restraints. Staff members (psychiatrists, nurses, paramedical staff; N = 143 working in a government psychiatric hospital in Israel) completed a questionnaire including personal information, participation in incidents of restraint and attitudes towards mechanical restraints. Items were categorized into the following categories: security and care; humiliation and offending; control; order; education and punishment. Compared to those who were not present during restraint, staff members who were present agreed significantly less with statements indicating that restraints are humiliating and offending and agreed more with statements indicating that restraints are used primarily for security and care (p < .05). Among those present in incidences of restraint, staff members who physically participated in restraint agreed significantly more with statements indicating that restraints are a means for security, care and order, and less with statements indicating restraints are humiliating and offending, compared to those present but not physically participating in restraint (p < .05). These findings highlight the importance of proximity of staff members to incidences of restraints. This may have implications in understanding the professional and social discourse concerning mechanical restraints.

  14. [Security material for venous peripheral..catheterization evaluation in an emergency ward].

    PubMed

    Romero Ruiz, Adolfo; Jiménez Ruiz, Manuel; Rodríguez Navarro, Luis Miguel; Muñoz Pascual, José Carlos; Ramos Rueda, M del Carmen; Torres Pérez, Luis

    2007-06-01

    Venous canalization can be one of the most frequent causes of accidents due to an accidental puncture. To carry out activities which serve to lessen these misfortunes, bearing high biological risk, should become a priority for sanitary institutions and for their professionals. Inside a global strategy which deals with this aspect and with the objective of evaluating the convenience these instruments have in our center the authors made a practical evaluation on a series of them to discover their technical viability and their subjective consideration by professionals who employ them. For motives related to the practices of the ward in which this research took place, an emergency ward, the authors intentionally chose two passive instruments, available on the market, and three nurses who received 120 sample security catheters, 60 each for products A and B, to carry out habitual clinical practices, alongside a pad of paper on which to record any incidents. Regarding instrument A, 30 incidents, 52.6%, were detected while 37 sample procedures occurred. Regarding instrument B, 4 incidents, 7.01%, were detected while 47 sample procedures occurred. In absolute terms, neither of the two instruments demonstrated problems of an insecure manner; which is to say neither produced a situation related to the appearance of mis fortunate incidents associated to accidental punctures. The lower number of incidents with instrument B appears to be related to the habitual use of a conventional cathetec not a security one, produced by the same manufacturer in our center This research project was subsidized by the Sanitary Research Fund, PI 051265.

  15. 44 CFR 8.3 - Senior FEMA official responsible for the information security program.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... responsible for the information security program. 8.3 Section 8.3 Emergency Management and Assistance FEDERAL EMERGENCY MANAGEMENT AGENCY, DEPARTMENT OF HOMELAND SECURITY GENERAL NATIONAL SECURITY INFORMATION § 8.3 Senior FEMA official responsible for the information security program. The Director of the Security...

  16. 3 CFR 8460 - Proclamation 8460 of December 2, 2009. Critical Infrastructure Protection Month, 2009

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... the United States of America A Proclamation Critical infrastructure protection is an essential element... have a debilitating effect on security, national economic security, public health or safety. From water... country's essential resources are safe and capable of recovering from disruptive incidents. The Department...

  17. 75 FR 33794 - Privacy Act of 1974; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-06-15

    ... storage media. Retrievability: Data from accident prevention studies is retrieved by name, Social Security... changes will be effective on June 14, 2010, unless comments are received that would result in a contrary..., Social Security Number (SSN), age, or gender. Accident and incident case records are retrieved by date of...

  18. Today's School Security

    ERIC Educational Resources Information Center

    Kennedy, Mike

    2012-01-01

    Outbreaks of violence at education institutions typically do not rise to the horrific levels of Virginia Tech, Columbine High School, or Oikos University. But incidents that threaten school security--bullying, hazing, online harassment--take place in every month of the year and may occur in any classroom or campus from coast to coast. Schools and…

  19. Campus Police/Media Relations.

    ERIC Educational Resources Information Center

    Mullendore, Philip

    California state statutes and a series of court cases have required campus security and police departments to release information about incidents occurring on campus to the media and the general public. Despite the law and case decisions, recent studies reveal campus police and security officials are still reluctant to release information to the…

  20. Re-Casting the U.S.-Mexico Border Security Net

    DTIC Science & Technology

    2014-03-01

    the best fence money can buy , and they counter us with a 2,500-year-old technology.214 The incident proved that these organizations are extremely...created a demand that has attracted illicit activity. DTOs have expanded their franchises to increase the size of their profits. Border security

  1. Detection of Total Knee Arthroplasties at Airport Security Checkpoints: How Do Updated Security Measures Affect Patients?

    PubMed

    Issa, Kimona; Pierce, Todd P; Gwam, Chukwuweieke; Goljan, Peter; Festa, Anthony; Scillia, Anthony J; Mont, Michael A

    2017-07-01

    Airport security measures continue to be updated with the incorporation of the new body scanners and automatic target recognition software. The purpose of this study was analyze the incidence of: (1) triggering the security alarm; (2) extra security searches; (3) perceived inconvenience; and (4) presence of other surgical hardware in those who underwent total knee arthroplasty (TKA) and passed through airport security. A questionnaire was given to 125 consecutive patients with a TKA. Those who passed through airport security after January 2014 were considered for inclusion. A questionnaire was administered that addressed the number of encounters with airport security, metal detector activation, additional screening procedures, and perceived inconvenience. Out of the 125 patients, 53 met inclusion criteria. Out of the 53 patients, 20 (38%) reported that their prosthesis triggered a metal detector. Out of the 20 patients, 8 (40%) who reported triggering of metal detectors also reported the presence of surgical hardware elsewhere in the body. Eighteen of the 53 patients (34%) believed having a TKA was inconvenient for airplane travel. Compared with the historical cohort, alarms were triggered in 70 of 97 patients ( p  = 0.0001) and 50 of 97 reported inconvenience when traveling ( n  = 50 of 97 patients; p  = 0.04). The incidences of those who underwent TKA triggering alarms and perceiving inconvenience when passing through airport security have decreased from previously published studies. This is most likely due to the recent updates and modifications to screening. As these security measures are modified and implant designs continue to evolve, this is an area of investigation that should continue. Thieme Medical Publishers 333 Seventh Avenue, New York, NY 10001, USA.

  2. "Crypto-Display" in Dual-Mode Metasurfaces by Simultaneous Control of Phase and Spectral Responses.

    PubMed

    Yoon, Gwanho; Lee, Dasol; Nam, Ki Tae; Rho, Junsuk

    2018-06-26

    Although conventional metasurfaces have demonstrated many promising functionalities in light control by tailoring either phase or spectral responses of subwavelength structures, simultaneous control of both responses has not been explored yet. Here, we propose a concept of dual-mode metasurfaces that enables simultaneous control of phase and spectral responses for two kinds of operation modes of transmission and reflection, respectively. In the transmission mode, the dual-mode metasurface acts as conventional metasurfaces by tailoring phase distribution of incident light. In the reflection mode, a reflected colored image is produced under white light illumination. We also experimentally demonstrate a crypto-display as one application of the dual-mode metasurface. The crypto-display looks a normal reflective display under white light illumination but generates a hologram that reveals the encrypted phase information under single-wavelength coherent light illumination. Because two operation modes do not affect each other, the crypto-display can have applications in security techniques.

  3. Pilot Alcohol Violations Reported in U.S. Newspapers, 1990–2006

    PubMed Central

    Kraus, Chadd K.; Li, Guohua

    2009-01-01

    Introduction Alcohol violations by airline pilots are rare yet remain a public concern. Such incidents often generate widespread news coverage. This study examines the frequency and characteristics of alcohol violation incidents involving airline pilots reported in U.S. newspapers. Methods The database of Lexis-Nexis™, which contains full-text articles for over 350 newspapers, was searched to identify alcohol violation incidents involving airline pilots in the U.S. between January 1990 and June 2006. Information pertaining to the pilot, flight, blood alcohol concentration (BAC), and consequence was ascertained for each incident based on the newspaper coverage. Results During the study period, newspapers reported on a total of 13 incidents of alcohol violations involving 17 pilots. All but two of the incidents occurred during January 2002 through June 2006. The majority (85%) of the incidents were first identified by airport personnel, such as security screeners, based on suspicion of alcohol use by the pilot. Subsequent alcohol testing revealed a mean BAC of 90 mg/dL (ranging from 10 mg · dL−1 to 182 mg · dL−1). Of the 17 pilots, 6 were known to be prosecuted criminally, including 5 who were sentenced to jail terms. Discussion Incidents of alcohol violations by airline pilots reported in U.S. newspapers have increased in recent years. This increase is likely due in part to increased detection resulting from enhanced aviation security and enforcement following the September 2001 terrorist attacks. PMID:17183928

  4. Chemical and Biological National Security Program (CBNP) Annual Report FY2002 Overview Local Integration of NARAC With Cities (LINC)

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Ermak, D L; Nasstrom, J S; Tull, J E

    The objective of the Local Integration of NARAC With Cities (LINC) project is to demonstrate the capability for providing local government agencies with advanced, CBNP-developed operational atmospheric plume prediction capabilities that can be seamlessly integrated with appropriate federal agency support for homeland security. LINC's approach is to integrate Lawrence Livermore National Laboratory's (LLNL) National Atmospheric Release Advisory Center (NARAC) tools and services with local emergency management and response centers. In the event of an airborne chemical or biological agent release in an urban area, large portions of the city and even the surrounding suburbs may be affected by the airbornemore » plume, depending on the type of agent, size of release, dissemination mechanism and ambient meteorological conditions. The goal of LINC is to provide real-time predictions that would be used by emergency managers and responders (fire, police, hazmat, etc.) to map the extent and effects of hazardous airborne material. Prompt predictions are provided to guide first responders in determining protective actions to be taken (use of personal protective equipment, evacuation, sheltering in place, etc.), safe locations for incident command posts, and critical facilities that may be at risk (hospitals, schools, etc.). LINC also provides response teams from multiple jurisdictions (local, state, and federal) with tools to effectively share information regarding the areas and populations at risk. The ultimate goal of LINC is a seamless and coordinated nationwide system that integrates NARAC prediction and situation awareness resources with the appropriate local, state and federal agencies for homeland security applications ranging from planning to emergency response to consequence assessment and attribution.« less

  5. 46 CFR 148.02-5 - Report of hazardous materials incidents.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 46 Shipping 5 2010-10-01 2010-10-01 false Report of hazardous materials incidents. 148.02-5 Section 148.02-5 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) DANGEROUS CARGOES CARRIAGE OF SOLID HAZARDOUS MATERIALS IN BULK Vessel Requirements § 148.02-5 Report of hazardous materials...

  6. 46 CFR 122.212 - Mandatory chemical testing following serious marine incidents.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 46 Shipping 4 2013-10-01 2013-10-01 false Mandatory chemical testing following serious marine incidents. 122.212 Section 122.212 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) SMALL... PASSENGERS OPERATIONS Marine Casualties and Voyage Records § 122.212 Mandatory chemical testing following...

  7. A Dangerous Occupation? Violence in Public Libraries.

    ERIC Educational Resources Information Center

    Farrugia, Sarah

    2002-01-01

    Outlines the problem of violence in U.S. and British public libraries, including groups incidents, drunks, unruly youths, and irate patrons. Library staff face managerial apathy and reluctance to tackle. Discusses the reasons for violence, suggests measures to reduce threats and deal with incidents, risk assessment, security measures and staff…

  8. Evaluating Computer-Related Incidents on Campus

    ERIC Educational Resources Information Center

    Rothschild, Daniel; Rezmierski, Virginia

    2004-01-01

    The Computer Incident Factor Analysis and Categorization (CIFAC) Project at the University of Michigan began in September 2003 with grants from EDUCAUSE and the National Science Foundation (NSF). The project's primary goal is to create a best-practices security framework for colleges and universities based on rigorous quantitative analysis of…

  9. Maintaining Traceability in an Evolving Distributed Computing Environment

    NASA Astrophysics Data System (ADS)

    Collier, I.; Wartel, R.

    2015-12-01

    The management of risk is fundamental to the operation of any distributed computing infrastructure. Identifying the cause of incidents is essential to prevent them from re-occurring. In addition, it is a goal to contain the impact of an incident while keeping services operational. For response to incidents to be acceptable this needs to be commensurate with the scale of the problem. The minimum level of traceability for distributed computing infrastructure usage is to be able to identify the source of all actions (executables, file transfers, pilot jobs, portal jobs, etc.) and the individual who initiated them. In addition, sufficiently fine-grained controls, such as blocking the originating user and monitoring to detect abnormal behaviour, are necessary for keeping services operational. It is essential to be able to understand the cause and to fix any problems before re-enabling access for the user. The aim is to be able to answer the basic questions who, what, where, and when concerning any incident. This requires retaining all relevant information, including timestamps and the digital identity of the user, sufficient to identify, for each service instance, and for every security event including at least the following: connect, authenticate, authorize (including identity changes) and disconnect. In traditional grid infrastructures (WLCG, EGI, OSG etc.) best practices and procedures for gathering and maintaining the information required to maintain traceability are well established. In particular, sites collect and store information required to ensure traceability of events at their sites. With the increased use of virtualisation and private and public clouds for HEP workloads established procedures, which are unable to see 'inside' running virtual machines no longer capture all the information required. Maintaining traceability will at least involve a shift of responsibility from sites to Virtual Organisations (VOs) bringing with it new requirements for their logging infrastructures. VOs indeed need to fulfil a new operational role and become fully active participants in the incident response process. We present an analysis of the changing requirements to maintain traceability for virtualised and cloud based workflows with particular reference to the work of the WLCG Traceability Working Group.

  10. Standardized emergency management system and response to a smallpox emergency.

    PubMed

    Kim-Farley, Robert J; Celentano, John T; Gunter, Carol; Jones, Jessica W; Stone, Rogelio A; Aller, Raymond D; Mascola, Laurene; Grigsby, Sharon F; Fielding, Jonathan E

    2003-01-01

    The smallpox virus is a high-priority, Category-A agent that poses a global, terrorism security risk because it: (1) easily can be disseminated and transmitted from person to person; (2) results in high mortality rates and has the potential for a major public health impact; (3) might cause public panic and social disruption; and (4) requires special action for public health preparedness. In recognition of this risk, the Los Angeles County Department of Health Services (LAC-DHS) developed the Smallpox Preparedness, Response, and Recovery Plan for LAC to prepare for the possibility of an outbreak of smallpox. A unique feature of the LAC-DHS plan is its explicit use of the Standardized Emergency Management System (SEMS) framework for detailing the functions needed to respond to a smallpox emergency. The SEMS includes the Incident Command System (ICS) structure (management, operations, planning/intelligence, logistics, and finance/administration), the mutual-aid system, and the multi/interagency coordination required during a smallpox emergency. Management for incident command includes setting objectives and priorities, information (risk communications), safety, and liaison. Operations includes control and containment of a smallpox outbreak including ring vaccination, mass vaccination, adverse events monitoring and assessment, management of confirmed and suspected smallpox cases, contact tracing, active surveillance teams and enhanced hospital-based surveillance, and decontamination. Planning/intelligence functions include developing the incident action plan, epidemiological investigation and analysis of smallpox cases, and epidemiological assessment of the vaccination coverage status of populations at risk. Logistics functions include receiving, handling, inventorying, and distributing smallpox vaccine and vaccination clinic supplies; personnel; transportation; communications; and health care of personnel. Finally, finance/administration functions include monitoring costs related to the smallpox emergency, procurement, and administrative aspects that are not handled by other functional divisions of incident command systems. The plan was developed and is under frequent review by the LAC-DHS Smallpox Planning Working Group, and is reviewed periodically by the LAC Bioterrorism Advisory Committee, and draws upon the Smallpox Response Plan and Guidelines of the Centers for Disease Control and Prevention (CDC) and recommendations of the Advisory Committee on Immunization Practices (ACIP). The Smallpox Preparedness, Response, and Recovery Plan, with its SEMS framework and ICS structure, now is serving as a model for the development of LAC-DHS plans for responses to other terrorist or natural-outbreak responses.

  11. Lightweight autonomous chemical identification system (LACIS)

    NASA Astrophysics Data System (ADS)

    Lozos, George; Lin, Hai; Burch, Timothy

    2012-06-01

    Smiths Detection and Intelligent Optical Systems have developed prototypes for the Lightweight Autonomous Chemical Identification System (LACIS) for the US Department of Homeland Security. LACIS is to be a handheld detection system for Chemical Warfare Agents (CWAs) and Toxic Industrial Chemicals (TICs). LACIS is designed to have a low limit of detection and rapid response time for use by emergency responders and could allow determination of areas having dangerous concentration levels and if protective garments will be required. Procedures for protection of responders from hazardous materials incidents require the use of protective equipment until such time as the hazard can be assessed. Such accurate analysis can accelerate operations and increase effectiveness. LACIS is to be an improved point detector employing novel CBRNE detection modalities that includes a militaryproven ruggedized ion mobility spectrometer (IMS) with an array of electro-resistive sensors to extend the range of chemical threats detected in a single device. It uses a novel sensor data fusion and threat classification architecture to interpret the independent sensor responses and provide robust detection at low levels in complex backgrounds with minimal false alarms. The performance of LACIS prototypes have been characterized in independent third party laboratory tests at the Battelle Memorial Institute (BMI, Columbus, OH) and indoor and outdoor field tests at the Nevada National Security Site (NNSS). LACIS prototypes will be entering operational assessment by key government emergency response groups to determine its capabilities versus requirements.

  12. Evidence-based patient decontamination: an integral component of mass exposure chemical incident planning and response.

    PubMed

    Leary, Adam D; Schwartz, Michael D; Kirk, Mark A; Ignacio, Joselito S; Wencil, Elaine B; Cibulsky, Susan M

    2014-06-01

    Decontaminating patients who have been exposed to hazardous chemicals can directly benefit the patients' health by saving lives and reducing the severity of toxicity. While the importance of decontaminating patients to prevent the spread of contamination has long been recognized, its role in improving patient health outcomes has not been as widely appreciated. Acute chemical toxicity may manifest rapidly-often minutes to hours after exposure. Patient decontamination and emergency medical treatment must be initiated as early as possible to terminate further exposure and treat the effects of the dose already absorbed. In a mass exposure chemical incident, responders and receivers are faced with the challenges of determining the type of care that each patient needs (including medical treatment, decontamination, and behavioral health support), providing that care within the effective window of time, and protecting themselves from harm. The US Department of Health and Human Services and Department of Homeland Security have led the development of national planning guidance for mass patient decontamination in a chemical incident to help local communities meet these multiple, time-sensitive health demands. This report summarizes the science on which the guidance is based and the principles that form the core of the updated approach.

  13. [Experience feedback committee: a method for patient safety improvement].

    PubMed

    François, P; Sellier, E; Imburchia, F; Mallaret, M-R

    2013-04-01

    An experience feedback committee (CREX, Comité de Retour d'EXpérience) is a method which contributes to the management of safety of care in a medical unit. Originally used for security systems of civil aviation, the method has been adapted to health care facilities and successfully implemented in radiotherapy units and in other specialties. We performed a brief review of the literature for studies reporting data on CREX established in hospitals. The review was performed using the main bibliographic databases and Google search results. The CREX is designed to analyse incidents reported by professionals. The method includes monthly meetings of a multi-professional committee that reviews the reported incidents, chooses a priority incident and designates a "pilot" responsible for investigating the incident. The investigation of the incident involves a systemic analysis method and a written synthesis presented at the next meeting of the committee. The committee agrees on actions for improvement that are suggested by the analysis and follows their implementation. Systems for the management of health care, including reporting systems, are organized into three levels: the medical unit, the hospital and the country as a triple loop learning process. The CREX is located in the base level, short loop of risk management and allows direct involvement of care professionals in patient safety. Safety of care has become a priority of health systems. In this context, the CREX can be a useful vehicle for the implementation of a safety culture in medical units. Copyright © 2013 Elsevier Masson SAS. All rights reserved.

  14. Examining the Effectiveness of the Circle of Security Parenting DVD Program

    ERIC Educational Resources Information Center

    Rostad, Whitney Louise

    2014-01-01

    Child maltreatment continues to occur at alarming rates, and while several interventions currently exist for use with parents to minimize the incidence of child maltreatment (Daro & McCurdy, 2007), many can be time consuming for service providers "and" consumers. One program, the Circle of Security (COS), lasts 20 weeks with weekly…

  15. Breaching the security of the Kaiser Permanente Internet patient portal: the organizational foundations of information security.

    PubMed

    Collmann, Jeff; Cooper, Ted

    2007-01-01

    This case study describes and analyzes a breach of the confidentiality and integrity of personally identified health information (e.g. appointment details, answers to patients' questions, medical advice) for over 800 Kaiser Permanente (KP) members through KP Online, a web-enabled health care portal. The authors obtained and analyzed multiple types of qualitative data about this incident including interviews with KP staff, incident reports, root cause analyses, and media reports. Reasons at multiple levels account for the breach, including the architecture of the information system, the motivations of individual staff members, and differences among the subcultures of individual groups within as well as technical and social relations across the Kaiser IT program. None of these reasons could be classified, strictly speaking, as "security violations." This case study, thus, suggests that, to protect sensitive patient information, health care organizations should build safe organizational contexts for complex health information systems in addition to complying with good information security practice and regulations such as the Health Insurance Portability and Accountability Act (HIPAA) of 1996.

  16. Injury patterns in clashes between citizens and security forces during forced evacuation.

    PubMed

    Schwartz, D; Bar-Dayan, Y

    2008-10-01

    Clashes between state security forces and civilian populations can lead to mass casualty incidents (MCI), challenging emergency medical service (EMS) systems, hospitals and medical management systems. In January 2006, clashes erupted between Israeli security forces and settlers, around the forced evacuation of the Amona outpost. Data collected during the events and in subsequent formal debriefings were processed to identify the specifics of an MCI caused by forced evacuation. Pre-event preparedness, time and types of injuries encountered were evaluated among evacuated civilians and security forces members, their transport to hospitals, care received and follow-up. The event is described according to DISAST-CIR methodology. Data were entered on MS Excel (2003) and analysis was carried out using SPSS version 12. 4000 police personnel (backed by army forces) clashed for 12 h with approximately 5000 settlers. 229 injured (174 settlers and 55 security personnel) were cared for at six receiving hospitals. A total of 16 were evacuated by aeromedical evacuation, including one severely head-injured policeman. Settlers used sticks, stones and cement blocks, whereas police used mounted riders, batons and shields. Head injuries were the most common injuries among settlers (50%), whereas extremity injuries dominated among security forces members (72.7%). Large-scale clashes between state security forces and citizens may cause numerous injuries, even if firearms and explosives are not used. Despite the fact that almost all injuries were mild, the incident burdened local medical teams, EMS and Jerusalem hospitals. A predominance of head injuries was found among injured settlers and extremity injuries among injured security forces.

  17. Real Time Big Data Analytics for Predicting Terrorist Incidents

    ERIC Educational Resources Information Center

    Toure, Ibrahim

    2017-01-01

    Terrorism is a complex and evolving phenomenon. In the past few decades, we have witnessed an increase in the number of terrorist incidents in the world. The security and stability of many countries is threatened by terrorist groups. Perpetrators now use sophisticated weapons and the attacks are more and more lethal. Currently, terrorist incidents…

  18. Blueprint for Safer Campuses

    ERIC Educational Resources Information Center

    Thrower, Raymond H.; Healy, Steven J.; Lynch, Michael; Margolis, Gary J.; Stafford, Dolores; Taylor, William

    2009-01-01

    The impact of the rampage shootings at Virginia Tech on April 16, 2007 continues to be felt across the U.S. and the world. Clearly this incident, along with other active shooter incidents that have occurred since the Virginia Tech tragedy, has impacted one's awareness of campus safety and security. A number of states, other governmental entities,…

  19. School Crisis Teams within an Incident Command System

    ERIC Educational Resources Information Center

    Nickerson, Amanda B.; Brock, Stephen E.; Reeves, Melissa A.

    2006-01-01

    Despite the increasing attention given to the need for schools to be prepared to respond in a variety of crisis situations, there is a lack of information about how to coordinate with multiple agencies following a crisis. This article describes the U. S. Department of Homeland Security's (2004) National Incident Management System and its Incident…

  20. Assessing The Response Of Alpine Natura 2000 Habitat Changes By Using Dual Polarized (VV/VH) COSMO-SkyMed Imagery

    NASA Astrophysics Data System (ADS)

    Spindler, N.; Polychronaki, A.; Notarnicola, C.

    2013-12-01

    Grasslands cover nearly one quarter of the earth's surface. They are not only a habitat for a diversity of species and therefore an important focus in the Natura 2000 framework but also a crucial factor in the scope of food security and the associated crop estimation as a forage base. Since both topics are strongly linked they are addressed in this study with two main objectives using weather independent satellite data. Initially, we aimed to understand the backscatter mechanism of COSMO-SkyMed X-band dual pol using two different incidence angles for selected Natura conservation sites. In a second step, we then related the backscatter coefficients to a MODIS LAI product. Results indicated a separation potential for different Natura 2000 grasslands types with a difference of 2dB. The associated backscatter signal with the LAI data demonstrated a good correlation values for natural grasslands using low incidence angles.

  1. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Mahan, Robert E.; Fluckiger, Jerry D.; Clements, Samuel L.

    This document was developed to provide guidance for the implementation of secure data transfer in a complex computational infrastructure representative of the electric power and oil and natural gas enterprises and the control systems they implement. For the past 20 years the cyber security community has focused on preventative measures intended to keep systems secure by providing a hard outer shell that is difficult to penetrate. Over time, the hard exterior, soft interior focus changed to focus on defense-in-depth adding multiple layers of protection, introducing intrusion detection systems, more effective incident response and cleanup, and many other security measures. Despitemore » much larger expenditures and more layers of defense, successful attacks have only increased in number and severity. Consequently, it is time to re-focus the conventional approach to cyber security. While it is still important to implement measures to keep intruders out, a new protection paradigm is warranted that is aimed at discovering attempted or real compromises as early as possible. Put simply, organizations should take as fact that they have been, are now, or will be compromised. These compromises may be intended to steal information for financial gain as in the theft of intellectual property or credentials that lead to the theft of financial resources, or to lie silent until instructed to cause physical or electronic damage and/or denial of services. This change in outlook has been recently confirmed by the National Security Agency [19]. The discovery of attempted and actual compromises requires an increased focus on monitoring events by manual and/or automated log monitoring, detecting unauthorized changes to a system's hardware and/or software, detecting intrusions, and/or discovering the exfiltration of sensitive information and/or attempts to send inappropriate commands to ICS/SCADA (Industrial Control System/Supervisory Control And Data Acquisition) systems.« less

  2. Homeland Security

    EPA Pesticide Factsheets

    Provides an overview of EPA's homeland security roles and responsibilities, and links to specific homeland security issues: water security, research, emergency response, recovery, and waste management.

  3. Opportunities to Improve Processes for Reporting, Investigating, and Remediating Serious Incidents Involving Private Security Contractors in Iraq

    DTIC Science & Technology

    2009-04-30

    Iraq Reconstruction,400 Army Navy Drive,Arlington,VA,22202-4704 8. PERFORMING ORGANIZATION REPORT NUMBER 9. SPONSORING/MONITORING AGENCY NAME(S...contractor, Blackwater , that resulted in the death of 17 Iraqi civilians. As a result of the incident, DoD and DoS agreed on core standards...have surfaced over the years concerning the oversight, control, cost, and legal status of PSCs, the Blackwater incident in September 2007, during which

  4. 9 CFR 121.14 - Incident response. 11

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... response plan. 12 The incident response plan must be coordinated with any entity-wide plans, kept in the... contacting APHIS. (b) The incident response plan must fully describe the entity's response procedures for the... actions to contain such agent or toxin. (c) The incident response plan must also contain the following...

  5. Improvement of a Chemical Storage Room Ventilation System

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Yousif, Emad; Al-Dahhan, Wedad; Abed, Rashed Nema

    Scientists at universities across Iraq are actively working to report actual incidents and accidents occurring in their laboratories, as well as structural improvements made to improve safety and security, to raise awareness and encourage openness, leading to widespread adoption of robust Chemical Safety and Security (CSS) practices. This manuscript is the third in a series of five case studies describing laboratory incidents, accidents, and laboratory improvements. We summarize an improvement to the chemical storage room ventilation system at Al-Nahrain University to create and maintain a safe working atmosphere in an area where chemicals are stored and handled, using US andmore » European design practices, standards, and regulations.« less

  6. Safe and Secure Schools Assessment. Public School Information. Legislative Report, 2008

    ERIC Educational Resources Information Center

    Idaho State Department of Education, 2008

    2008-01-01

    As a result of high profile shootings and critical incidents in schools on a national level, combined with the lack of a cohesive, standardized approach to safety and security in Idaho Schools, Superintendent Tom Luna requested an appropriation to address this issue and the Legislature allocated 5150.000 in FY 2008 for the Safe and Secure…

  7. The Impact of the Structure, Function, and Resources of the Campus Security Office on Campus Safety

    ERIC Educational Resources Information Center

    Bennett, Patricia Anne

    2012-01-01

    The topic of this dissertation is college and university safety. This national quantitative study utilized resource dependency theory to examine relationships between the incidence of reported campus crimes and the structure, function, and resources of campus security offices. This study uncovered a difference in reported total crime rates,…

  8. Securing Information in the Healthcare Industry: Network Security, Incident Management, and Insider Threat

    DTIC Science & Technology

    2010-09-23

    Chris, ―An Analysis of Breaches Affecting 500 or More Individuals in Healthcare‖, HITRUST, August 2010. 2. ―2009 Annual Study: Cost of a Data Breach ,‖ Ponemon...penalties for willful neglect • Loss of human life? — While many concerns focus on a data breach , some vulnerabilities can be more severe

  9. 49 CFR 1.45 - Delegations to the Director of the Office of Intelligence, Security and Emergency Response.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... Intelligence, Security and Emergency Response. 1.45 Section 1.45 Transportation Office of the Secretary of... Delegations to the Director of the Office of Intelligence, Security and Emergency Response. The Director of Intelligence, Security, and Emergency Response is delegated authority to: (a) Carry out the functions related...

  10. 49 CFR 1.45 - Delegations to the Director of the Office of Intelligence, Security and Emergency Response.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... Intelligence, Security and Emergency Response. 1.45 Section 1.45 Transportation Office of the Secretary of... Delegations to the Director of the Office of Intelligence, Security and Emergency Response. The Director of Intelligence, Security, and Emergency Response is delegated authority to: (a) Carry out the functions related...

  11. 49 CFR 1.45 - Delegations to the Director of the Office of Intelligence, Security and Emergency Response.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... Intelligence, Security and Emergency Response. 1.45 Section 1.45 Transportation Office of the Secretary of... Delegations to the Director of the Office of Intelligence, Security and Emergency Response. The Director of Intelligence, Security, and Emergency Response is delegated authority to: (a) Carry out the functions related...

  12. AVIATION SECURITY: FAA’s Actions to Study Responsibilities and Funding for Airport Security and to Certify Screening Companies

    DTIC Science & Technology

    1999-02-01

    Actions to Study Responsibilities and Funding for Airport Security and to Certify Screening Companies DISTRIBUTION STATEMENT A Approved for...local law enforcement support relating to air carrier and airport security measures. The funding of the security operations is divided among FAA, the...generally agreed with the current division of airport security responsibilities. These officials stated that the continuity of screening would be

  13. 9 CFR 121.14 - Incident response. 10

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... response plan 11 based upon a site specific risk assessment. The incident response plan must be coordinated... assistance and guidance may be obtained by contacting APHIS. (b) The incident response plan must fully... or infected with a select agent. (d) The incident response plan must also contain the following...

  14. The Military Dimensions of U.S.-China Security Cooperation: Retrospective and Future Prospects

    DTIC Science & Technology

    2010-09-01

    the island a focal point of their attention.17 The PLA’s renewed focus on Taiwan was endorsed, if not driven, by the top leadership of the CCP. On 13...34incidents." The ,0 For details of this incident from an American perspective, see John Keefe , Anatomy of the EP-3 Incident, April 2001 (Alexandria, VA...relationship been subjected to this on-again-off- again cycle? One reason is that both sides have perceived the costs of suspending military contacts

  15. 36 CFR 1260.20 - Who is responsible for the declassification of classified national security Executive Branch...

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... declassification of classified national security Executive Branch information that has been accessioned by NARA... ADMINISTRATION DECLASSIFICATION DECLASSIFICATION OF NATIONAL SECURITY INFORMATION Responsibilities § 1260.20 Who is responsible for the declassification of classified national security Executive Branch information...

  16. Hydrocentric view of Agro-ecosystem Resiliency to Extreme Hydrometeorological and Climate Events in the High Plains, US.

    NASA Astrophysics Data System (ADS)

    Munoz-Arriola, Francisco; Sharma, Ashutosh; Werner, Katherine; Chacon, Juan-Carlos; Corzo, Gerald; Goyal, Manish-Kumar

    2017-04-01

    An increasing incidence of Hydrometeorological and Climate Extreme Events (EHCEs) is challenging food, water, and ecosystem services security at local to global contexts. This study aims to understand how a large-scale representation of agroecosystems and ecosystems respond to EHCE in the Northern Highplains, US. To track such responses the Variable Infiltration Capacity model (VIC) Land Surface Hydrology model was used and two experiments were implemented. The first experiment uses the LAI MODIS15A2 product to capture dynamic responses of vegetation with a time span from 2000 to 2013. The second experiment used a climatological fixed seasonal cycle calculated as the average from the 2000-2013 dynamic MODIS15A2 product to isolate vegetation from soil physical responses. Based on the analyses of multiple hydrological variables and state variables and high-level organization of agroecosystems and ecosystems, we evidence how the influence of droughts and anomalously wet conditions affect hydrological resilience at large scale.

  17. Use of after action reports (AARs) to promote organizational and systems learning in emergency preparedness.

    PubMed

    Savoia, Elena; Agboola, Foluso; Biddinger, Paul D

    2012-08-01

    Many public health and healthcare organizations use formal knowledge management practices to identify and disseminate the experiences gained over time. The "lessons-learned" approach is one such example of knowledge management practice applied to the wider concept of organizational learning. In the field of emergency preparedness, the lessons-learned approach stands on the assumption that learning from experience improves practice and minimizes avoidable deaths and negative economic and social consequences of disasters. In this project, we performed a structured review of AARs to analyze how lessons learned from the response to real-incidents may be used to maximize knowledge management and quality improvement practices such as the design of public health emergency preparedness (PHEP) exercises. We chose as a source of data the "Lessons Learned Information Sharing (LLIS.gov)" system, a joined program of the U.S. Department of Homeland Security DHS and FEMA that serves as the national, online repository of lessons learned, best practices, and innovative ideas. We identified recurring challenges reported by various states and local public health agencies in the response to different types of incidents. We also strove to identify the limitations of systematic learning that can be achieved due to existing weaknesses in the way AARs are developed.

  18. Use of After Action Reports (AARs) to Promote Organizational and Systems Learning in Emergency Preparedness

    PubMed Central

    Savoia, Elena; Agboola, Foluso; Biddinger, Paul D.

    2012-01-01

    Many public health and healthcare organizations use formal knowledge management practices to identify and disseminate the experiences gained over time. The “lessons-learned” approach is one such example of knowledge management practice applied to the wider concept of organizational learning. In the field of emergency preparedness, the lessons-learned approach stands on the assumption that learning from experience improves practice and minimizes avoidable deaths and negative economic and social consequences of disasters. In this project, we performed a structured review of AARs to analyze how lessons learned from the response to real-incidents may be used to maximize knowledge management and quality improvement practices such as the design of public health emergency preparedness (PHEP) exercises. We chose as a source of data the “Lessons Learned Information Sharing (LLIS.gov)” system, a joined program of the U.S. Department of Homeland Security DHS and FEMA that serves as the national, online repository of lessons learned, best practices, and innovative ideas. We identified recurring challenges reported by various states and local public health agencies in the response to different types of incidents. We also strived to identify the limitations of systematic learning that can be achieved due to existing weaknesses in the way AARs are developed. PMID:23066408

  19. State Security Breach Response Laws: State-by-State Summary Table. Using Data to Improve Education: A Legal Reference Guide to Protecting Student Privacy and Data Security

    ERIC Educational Resources Information Center

    Data Quality Campaign, 2011

    2011-01-01

    Under security breach response laws, businesses--and sometimes state and governmental agencies--are required to inform individuals when the security, confidentiality or integrity of their personal information has been compromised. This resource provides a state-by-state analysis of security breach response laws. [The Data Quality Campaign has…

  20. 49 CFR 1.69 - Delegations to the Director of Intelligence, Security, and Emergency Response.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 1 2010-10-01 2010-10-01 false Delegations to the Director of Intelligence... Intelligence, Security, and Emergency Response. The Director of Intelligence, Security, and Emergency Response is delegated authority for the following: (a) Intelligence and Security. Carry out the functions...

  1. 49 CFR 1.69 - Delegations to the Director of Intelligence, Security, and Emergency Response.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 1 2011-10-01 2011-10-01 false Delegations to the Director of Intelligence... Intelligence, Security, and Emergency Response. The Director of Intelligence, Security, and Emergency Response is delegated authority for the following: (a) Intelligence and Security. Carry out the functions...

  2. 45 CFR 1336.67 - Security and collateral: Responsibilities of the Loan Administrator.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ...) As a Credit Factor. The availability of collateral security normally is considered an important... 45 Public Welfare 4 2010-10-01 2010-10-01 false Security and collateral: Responsibilities of the... Fund Demonstration Project § 1336.67 Security and collateral: Responsibilities of the Loan...

  3. Using database reports to reduce workplace violence: Perceptions of hospital stakeholders

    PubMed Central

    Arnetz, Judith E.; Hamblin, Lydia; Ager, Joel; Aranyos, Deanna; Essenmacher, Lynnette; Upfal, Mark J.; Luborsky, Mark

    2016-01-01

    BACKGROUND Documented incidents of violence provide the foundation for any workplace violence prevention program. However, no published research to date has examined stakeholders’ preferences for workplace violence data reports in healthcare settings. If relevant data are not readily available and effectively summarized and presented, the likelihood is low that they will be utilized by stakeholders in targeted efforts to reduce violence. OBJECTIVE To discover and describe hospital system stakeholders’ perceptions of database-generated workplace violence data reports. PARTICIPANTS Eight hospital system stakeholders representing Human Resources, Security, Occupational Health Services, Quality and Safety, and Labor in a large, metropolitan hospital system. METHODS The hospital system utilizes a central database for reporting adverse workplace events, including incidents of violence. A focus group was conducted to identify stakeholders’ preferences and specifications for standardized, computerized reports of workplace violence data to be generated by the central database. The discussion was audio-taped, transcribed verbatim, processed as text, and analyzed using stepwise content analysis. RESULTS Five distinct themes emerged from participant responses: Concerns, Etiology, Customization, Use, and Outcomes. In general, stakeholders wanted data reports to provide “the big picture,” i.e., rates of occurrence; reasons for and details regarding incident occurrence; consequences for the individual employee and/or the workplace; and organizational efforts that were employed to deal with the incident. CONCLUSIONS Exploring stakeholder views regarding workplace violence summary reports provided concrete information on the preferred content, format, and use of workplace violence data. Participants desired both epidemiological and incident-specific data in order to better understand and work to prevent the workplace violence occurring in their hospital system. PMID:25059315

  4. Using database reports to reduce workplace violence: Perceptions of hospital stakeholders.

    PubMed

    Arnetz, Judith E; Hamblin, Lydia; Ager, Joel; Aranyos, Deanna; Essenmacher, Lynnette; Upfal, Mark J; Luborsky, Mark

    2015-01-01

    Documented incidents of violence provide the foundation for any workplace violence prevention program. However, no published research to date has examined stakeholders' preferences for workplace violence data reports in healthcare settings. If relevant data are not readily available and effectively summarized and presented, the likelihood is low that they will be utilized by stakeholders in targeted efforts to reduce violence. To discover and describe hospital system stakeholders' perceptions of database-generated workplace violence data reports. Eight hospital system stakeholders representing Human Resources, Security, Occupational Health Services, Quality and Safety, and Labor in a large, metropolitan hospital system. The hospital system utilizes a central database for reporting adverse workplace events, including incidents of violence. A focus group was conducted to identify stakeholders' preferences and specifications for standardized, computerized reports of workplace violence data to be generated by the central database. The discussion was audio-taped, transcribed verbatim, processed as text, and analyzed using stepwise content analysis. Five distinct themes emerged from participant responses: Concerns, Etiology, Customization, Use, and Outcomes. In general, stakeholders wanted data reports to provide ``the big picture,'' i.e., rates of occurrence; reasons for and details regarding incident occurrence; consequences for the individual employee and/or the workplace; and organizational efforts that were employed to deal with the incident. Exploring stakeholder views regarding workplace violence summary reports provided concrete information on the preferred content, format, and use of workplace violence data. Participants desired both epidemiological and incident-specific data in order to better understand and work to prevent the workplace violence occurring in their hospital system.

  5. Teaching Laboratory Renovation

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Al-Zuhairi, Ali Jassim; Al-Dahhan, Wedad; Hussein, Falah

    Scientists at universities across Iraq are actively working to report actual incidents and accidents occurring in their laboratories, as well as structural improvements made to improve safety and security, to raise awareness and encourage openness, leading to widespread adoption of robust Chemical Safety and Security (CSS) practices. The improvement of students’ understanding of concepts in science and its applications, practical scientific skills and understanding of how science and scientists work in laboratory experiences have been considered key aspects of education in science for over 100 years. Facility requirements for the necessary level of safety and security combined with specific requirementsmore » relevant to the course to be conducted dictate the structural design of a particular laboratory, and the design process must address both. This manuscript is the second in a series of five case studies describing laboratory incidents, accidents, and laboratory improvements. We summarize the process used to guide a major renovation of the chemistry instructional laboratory facilities at Al-Nahrain University and discuss lessons learned from the project.« less

  6. Integrating hospitals into community emergency preparedness planning.

    PubMed

    Braun, Barbara I; Wineman, Nicole V; Finn, Nicole L; Barbera, Joseph A; Schmaltz, Stephen P; Loeb, Jerod M

    2006-06-06

    Strong community linkages are essential to a health care organization's overall preparedness for emergencies. To assess community emergency preparedness linkages among hospitals, public health officials, and first responders and to investigate the influence of community hazards, previous preparation for an event requiring national security oversight, and experience responding to actual disasters. With expert advice from an advisory panel, a mailed questionnaire was used to assess linkage issues related to training and drills, equipment, surveillance, laboratory testing, surge capacity, incident management, and communication. A simple random sample of 1750 U.S. medical-surgical hospitals. Of 678 hospital representatives that agreed to participate, 575 (33%) completed the questionnaire in early 2004. Respondents were hospital personnel responsible for environmental safety, emergency management, infection control, administration, emergency services, and security. Prevalence and breadth of participation in community-wide planning; examination of 17 basic elements in a weighted analysis. In a weighted analysis, most hospitals (88.2% [95% CI, 84.1% to 92.3%]) engaged in community-wide drills and exercises, and most (82.2% [CI, 77.8% to 86.5%]) conducted a collaborative threat and vulnerability analysis with community responders. Of all respondents, 57.3% (CI, 52.1% to 62.5%) reported that their community plans addressed the hospital's need for additional supplies and equipment, and 73.0% (CI, 68.1% to 77.9%) reported that decontamination capacity needs were addressed. Fewer reported a direct link to the Health Alert Network (54.4% [CI, 49.3% to 59.5%]) and around-the-clock access to a live voice from a public health department (40.0% [CI, 35.0% to 45.0%]). Performance on many of 17 basic elements was better in large and urban hospitals and was associated with a high number of perceived hazards, previous national security event preparation, and experience in actual response. Responses reflect hospitals' self-perception of linkages. The quality of linkages and the extent of possible biases favoring positive responses were not assessed. In this baseline assessment, most hospitals reported substantial integration. However, results suggest that relationships between hospitals, public health departments, and other critical response entities are not adequately robust. Suggestions for enhancing linkages are discussed.

  7. 42 CFR 73.14 - Incident response.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... under this part must develop and implement a written incident response plan. 2 The incident response plan must be coordinated with any entity-wide plans, kept in the workplace, and available to employees... imposed by other statutes or regulations. (b) The incident response plan must fully describe the entity's...

  8. Conception of a course for professional training and education in the field of computer and mobile forensics

    NASA Astrophysics Data System (ADS)

    Kröger, Knut; Creutzburg, Reiner

    2012-06-01

    IT security and computer forensics are important components in the information technology. From year to year, incidents and crimes increase that target IT systems or was done with their help. More and more companies and authorities have security problems in their own IT infrastructure. To respond to these incidents professionally, it is important to have well trained staff. The fact that many agencies and companies work with very sensitive data makes it necessary to further train the own employees in the field of IT forensics. Motivated by these facts, a training concept, which allows the creation of practical exercises, is presented in this paper. The focus is on the practical implementation of forensic important relationships.

  9. A profile of social security child beneficiaries and their families: sociodemographic and economic characteristics.

    PubMed

    Tamborini, Christopher R; Cupito, Emily; Shoffner, Dave

    2011-01-01

    Using a rich dataset that links the Census Bureau's Survey of Income and Program Participation calendar-year 2004 file with Social Security benefit records, this article provides a portrait of the sociodemographic and economic characteristics of Social Security child beneficiaries. We find that the incidence ofbenefit receipt in the child population differs substantially across individual and family-level characteristics. Average benefit amounts also vary across subgroups and benefit types. The findings provide a better understanding of the importance of Social Security to families with beneficiary children. Social Security is a major source of family income for many child beneficiaries, particularly among those with low income or family heads with lower education and labor earnings.

  10. 49 CFR 1.44 - Office of Intelligence, Security and Emergency Response.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 49 Transportation 1 2013-10-01 2013-10-01 false Office of Intelligence, Security and Emergency... DELEGATION OF POWERS AND DUTIES Office of the Secretary Ost Officials § 1.44 Office of Intelligence, Security and Emergency Response. The Director of the Office of Intelligence, Security and Emergency Response is...

  11. 49 CFR 1.44 - Office of Intelligence, Security and Emergency Response.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 49 Transportation 1 2014-10-01 2014-10-01 false Office of Intelligence, Security and Emergency... DELEGATION OF POWERS AND DUTIES Office of the Secretary Ost Officials § 1.44 Office of Intelligence, Security and Emergency Response. The Director of the Office of Intelligence, Security and Emergency Response is...

  12. 49 CFR 1.44 - Office of Intelligence, Security and Emergency Response.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 49 Transportation 1 2012-10-01 2012-10-01 false Office of Intelligence, Security and Emergency... DELEGATION OF POWERS AND DUTIES Office of the Secretary Ost Officials § 1.44 Office of Intelligence, Security and Emergency Response. The Director of the Office of Intelligence, Security and Emergency Response is...

  13. The contribution of working conditions and social support to the onset of depressive and anxiety disorders among male and female employees.

    PubMed

    Plaisier, Inger; de Bruijn, Jeanne G M; de Graaf, Ron; ten Have, Margreet; Beekman, Aartjan T F; Penninx, Brenda W J H

    2007-01-01

    Poor working conditions may be an important source of stress and may therefore contribute to the development of depressive and anxiety disorders. Social support may act as a buffer and protect against the development of depression or anxiety in the face of poor working conditions. With longitudinal data from the Netherlands Mental Health Survey and Incidence Study (NEMESIS), the effect of working conditions and social support on the incidence of depressive and anxiety disorders was examined among 2646 working men and women, aged 18 through 65 years. Three dimensions of self reported working conditions were assessed: psychological demands, decision latitude and job security. Social support was assessed through validated scales for daily emotional support. About 10.5% of working women and 4.6% among working men developed an incident depressive and/or anxiety disorder over 2 years. Psychological demands predicted the incidence of depressive and anxiety disorders in both men and women (RR per score increase=2.29, 95% CI: 1.44-3.63), whereas decision latitude and job security did not. Social support protected against the incidence of depressive and anxiety disorders. This effect was stronger for men compared to women. Social support did not buffer the unfavorable mental effect of working conditions. Women were more likely to report low levels of decision latitude, whereas men reported higher psychological demands. Working conditions did not explain sex differences in the incidence of depressive and anxiety disorders.

  14. The Arctic: A Wait and See Approach to Defending the Homeland

    DTIC Science & Technology

    2017-12-01

    power (diplomacy, information, military and economics).49  Protect the homeland–ensure safety and security of the American people through secure...this thesis.40 LOE 1 states the highest priority for the Federal Government is “protecting the American people , our sovereign territory and rights... power , ensures movement of people and commerce and provides the ability to respond to emergencies and incidents.51

  15. Incident Management Capability Metrics Version 0.1

    DTIC Science & Technology

    2007-04-01

    guidance for proactively securing and hardening their infrastructure, for example6: • ISO 17799 ( ISO /IEC 17799:2005) [ ISO 2005a] • ISO 27001 ( ISO /IEC... 27001 :2005) [ ISO 2005b] • Control Objectives for Information and related Technology (COBIT) [ITGI 2006...security management systems – Requirements ( ISO /IEC 27001 :2005).http://www.iso.org/ iso /en/CatalogueDetailPage.CatalogueDetail?CSNUMBER=421 03 (2005

  16. 2008 Homeland Security S and T Stakeholders Conference West. Volume 4. Wednesday

    DTIC Science & Technology

    2008-01-16

    www.npia.police.uk Polonium 210 Interoperability - lessons Major Incident - CBRN Images courtesy of BBC www.npia.police.uk Boscastle 2007...Washington Training Session 37: Preparing First Responders for Food Systems Disasters Jerry Gillespie, DVM, PhD Director, Western Institute for... Food Safety and Security Training Session 39: Technology Adoption & Innovation 1 Dr. Neal Thornberry, Innovation Chair Graduate School of

  17. [Fatal incidents by crowd crush during mass events. (Un)preventable phenomenon?].

    PubMed

    Wagner, U; Fälker, A; Wenzel, V

    2013-01-01

    Crowd crushes with dozens or even hundreds of casualties have occurred several times at the Hajj in Saudi Arabia and also in soccer stadiums in Western Europe. As fatal accidents after human stampedes during mass events occur very rarely and are usually accompanied by many years of criminal court proceedings in order to identify underlying responsible mechanisms and culprits, it is very difficult to draw conclusions and formulate precautions from an emergency medical point of view. This study analyzed a fatal crowd crush which occurred on 4 December 1999 following the "Air & Style" snowboard contest with approximately 22,000 people attending in the Bergisel stadium in Innsbruck, Austria. Firstly, focused interviews were conducted with professional rescuers, police and physicians and secondly publicly available court records dealing with this incident in the district court of Innsbruck, Austria were analyzed. During the snowboard contest 87 emergency medical technicians, 6 emergency physicians, 1 leading emergency physician, 21 policemen and 140 security personnel were present. Following the accident additionally some 100 emergency medical technicians, 36 emergency medical service vehicles and 4 physician-staffed emergency medical service vehicles responded to the scene. The deadly crowd crush resulting in 6 fatalities, 4 patients still in a vegetative state and 38 injured, was due to a severe crowd accumulation at one stadium exit, which was not recognized and dispersed in time. Construction of the exit in line with darkness, steep slope and slippery surface contributed adversely to this dangerous situation, although panic did not occur at any time. Unfortunately, there is no patent remedy to completely prevent fatal accidents by a crowd crush at mass events. If planning is initiated early, sufficient material and personnel reserves are kept in reserve and despite conflicting interests of the organizers, the host community, security, police and emergency medical services, a joint concept is designed and followed, the risk of a severe incident can be kept to a minimum. Each involved party including the spectators have to be aware of their responsibility in order to contribute to the success and safety of the mass event. A comprehensive and critical review of all facts and implementation of conclusions implies a time and financial burden but has a positive impact on the success and safety of mass events.

  18. 17 CFR 38.1051 - General requirements.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... either: (1) Infrastructure and personnel resources of its own that are sufficient to ensure timely... systems malfunctions; (2) Cyber security incidents or targeted threats that actually or potentially...

  19. 17 CFR 38.1051 - General requirements.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... either: (1) Infrastructure and personnel resources of its own that are sufficient to ensure timely... systems malfunctions; (2) Cyber security incidents or targeted threats that actually or potentially...

  20. 14 CFR 1203.202 - Responsibilities.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION INFORMATION SECURITY PROGRAM NASA Information Security Program § 1203.202 Responsibilities. (a) The Chairperson, NASA Information Security...) Ensuring effective compliance with and implementation of “the Order” and the Information Security Oversight...

  1. 14 CFR 1203.202 - Responsibilities.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION INFORMATION SECURITY PROGRAM NASA Information Security Program § 1203.202 Responsibilities. (a) The Chairperson, NASA Information Security...) Ensuring effective compliance with and implementation of “the Order” and the Information Security Oversight...

  2. Critical infrastructure protection.

    PubMed

    Deitz, Kim M

    2012-01-01

    Current government policies for protecting the nation's critical infrastructure are described in this article which focuses on hospital disaster planning and incident management and the significant role of Security in infrastructure protection

  3. Forecasting of Information Security Related Incidents: Amount of Spam Messages as a Case Study

    NASA Astrophysics Data System (ADS)

    Romanov, Anton; Okamoto, Eiji

    With the increasing demand for services provided by communication networks, quality and reliability of such services as well as confidentiality of data transfer are becoming ones of the highest concerns. At the same time, because of growing hacker's activities, quality of provided content and reliability of its continuous delivery strongly depend on integrity of data transmission and availability of communication infrastructure, thus on information security of a given IT landscape. But, the amount of resources allocated to provide information security (like security staff, technical countermeasures and etc.) must be reasonable from the economic point of view. This fact, in turn, leads to the need to employ a forecasting technique in order to make planning of IT budget and short-term planning of potential bottlenecks. In this paper we present an approach to make such a forecasting for a wide class of information security related incidents (ISRI) — unambiguously detectable ISRI. This approach is based on different auto regression models which are widely used in financial time series analysis but can not be directly applied to ISRI time series due to specifics related to information security. We investigate and address this specifics by proposing rules (special conditions) of collection and storage of ISRI time series, adherence to which improves forecasting in this subject field. We present an application of our approach to one type of unambiguously detectable ISRI — amount of spam messages which, if not mitigated properly, could create additional load on communication infrastructure and consume significant amounts of network capacity. Finally we evaluate our approach by simulation and actual measurement.

  4. Engineering Software for Interoperability through Use of Enterprise Architecture Techniques

    DTIC Science & Technology

    2003-03-01

    Response Home/ Business Security . To detect flood conditions (i.e. excess water levels) within the monitored area and alert authorities, as necessary...Response; Fire Detection & Response; and Flood Detection & Response. Functional Area Description Intruder Detection & Response Home/ Business ... Security . To monitor and detect unauthorized entry into the secured area and sound alarms/alert authorities, as necessary. Fire Detection

  5. 6 CFR 7.11 - Components' responsibilities.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... INFORMATION Administration § 7.11 Components' responsibilities. Each DHS component shall appoint a security... security information; (b) Report violations of the provisions of this regulation to the Chief Security... component acquire adequate security education and training, as required by the DHS classified information...

  6. Security Certification Challenges in a Cloud Computing Delivery Model

    DTIC Science & Technology

    2010-04-27

    Relevant Security Standards, Certifications, and Guidance  NIST SP 800 series  ISO /IEC 27001 framework  Cloud Security Alliance  Statement of...CSA Domains / Cloud Features ISO 27001 Cloud Service Provider Responsibility Government Agency Responsibility Analyze Security gaps Compensating

  7. 32 CFR 322.4 - Responsibilities.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... physical security requirements for the protection of personal information and ensure that such requirements... NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICES PRIVACY ACT PROGRAM § 322.4 Responsibilities. (a) The... Associate Director for Human Resources Services or designee shall: (1) Establish the physical security...

  8. Report: Information Security Series: Security Practices Comprehensive Environmental Response, Compensation, and Liability Information System

    EPA Pesticide Factsheets

    Report #2006-P-00019, March 28, 2006. OSWER’s implemented practices to ensure production servers were being monitored for known vulnerabilities and personnel with significant security responsibility completed the Agency’s recommended security training.

  9. Food insecurity and mental health: an analysis of routine primary care data of pregnant women in the Born in Bradford cohort.

    PubMed

    Power, Madeleine; Uphoff, Eleonora; Kelly, Brian; Pickett, Kate E

    2017-04-01

    Since 2008, use of food banks has risen sharply in the UK; however, evidence on the epidemiology of UK food insecurity is sparse. The aim of this study was to describe the trajectory of common mental disorder across the pre-pregnancy, pregnancy and postnatal period for food secure compared with food insecure women. Data from the Born in Bradford (BiB) cohort, the nested BiB1000 study and primary care records were linked based on National Health Service (NHS) numbers. Data linkage was completed for 1297, and primary care records were available from 18 months prior to 40 months after birth of the cohort child. Incidence rates of common mental disorders per 1000 patient years at risk were compared between food secure and insecure women, and for Pakistani compared with white British women, in 10 6-month periods around pregnancy. Poisson regression was used to calculate incidence rate ratios, adjusted for ethnicity and exposure. Food insecurity was significantly associated with an increased risk of common mental disorder before and during pregnancy (incidence rate ratio 1.9, 95% confidence interval 1.3 to 2.8, p=0.001) and after giving birth (incidence rate ratio 1.3, 95% confidence interval 1.0 to 1.7, p=0.029). Our study shows that food insecure women have worse mental health than food secure women, and that this difference is most pronounced for white British pregnant women. These findings provide evidence for concerns expressed by public health experts that food insecurity may become the next public health emergency. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/.

  10. 78 FR 71629 - Technical Resource for Incident Prevention (TRIPwire) User Registration

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-11-29

    ...), Office of Infrastructure Protection (IP), Protective Security Coordination Division (PSCD), Office for... INFORMATION CONTACT: William Cooper, DHS/NPPD/IP/PSCD/OBP, [email protected] . SUPPLEMENTARY...

  11. Verbal abuse and physical assault in the emergency department: Rates of violence, perceptions of safety, and attitudes towards security.

    PubMed

    Partridge, Bradley; Affleck, Julia

    2017-08-01

    Emergency Department (ED) workers are prone to occupational violence, however the extent and impact of this may not be evenly felt across all roles in the ED. Explore: 1) the rate of verbal abuse and physical assaults experienced by ED staff, 2) perceptions of safety, 3) attitudes towards security officers, and 4) formal reporting of incidents. 330 ED workers were surveyed at four public hospitals in one metropolitan health service district in Queensland, Australia, including 179 nurses, 83 medical staff, 44 administration staff, 14 allied health, and 9 operational. Nurses were more likely to have been physically assaulted in the last six months and were less likely to feel safe. Most ED staff across all roles experienced verbal abuse. Nurses were better than medical staff at reporting instances of occupational violence although overall reporting across all roles was low. Staff who thought that security officers respond to incidents quickly and are a visible presence in the ED were more likely to feel safe in the ED. Workers in the ED, particularly nurses, experience high rates of verbal abuse and physical aggression and there may be a case for having designated security guards in the ED. Copyright © 2017 College of Emergency Nursing Australasia. Published by Elsevier Ltd. All rights reserved.

  12. Associations Between Functional Movement Screening, the Y Balance Test, and Injuries in Coast Guard Training.

    PubMed

    Cosio-Lima, Ludmila; Knapik, Joseph J; Shumway, Richard; Reynolds, Katy; Lee, Youngil; Greska, Eric; Hampton, Michael

    2016-07-01

    Tests that have the ability to predict injuries in various military and athletic populations are important because of the role they could play in primary prevention. Functional Movement Screen (FMS) and Y Balance Tests (YBT) may provide this prognostic ability. This study examined the association between injuries and age, physical characteristics, FMS, and upper and lower body YBTs among Coast Guard Maritime Security Response Team (MSRT) candidates. Thirty-one male Coast Guard Maritime Security Response Team candidates were administered the 7 FMS tests and lower- and upper-body YBTs before their intense 2-month training course. Age, height, weight, and body mass index were also obtained. Physical training-related injuries were recorded during the course. Injury incidence was 41%. Older age and lower scores on either FMS or the upper-body YBT were associated with higher injury risk. Performance of the lower-body YBT was not associated with injury risk. This is the first investigation showing that lower scores on the upper-body YBT were associated with higher injury risk and is in consonance with previous investigations demonstrating associations between lower FMS scores and higher injury risk. Certain limitations need to be addressed. Future studies should determine if FMS and the YBTs have prognostic ability in other populations. Reprint & Copyright © 2016 Association of Military Surgeons of the U.S.

  13. Meet EPA Physical Scientist Lukas Oudejans

    EPA Pesticide Factsheets

    Lukas Oudejans, Ph.D. is a physical scientist working in EPA’s National Homeland Security Research Center. His research focuses on preparing cleanup options for the agency following a disaster incident.

  14. Association of Current Work and Sleep Situations with Excessive Daytime Sleepiness and Medical Incidents among Japanese Physicians

    PubMed Central

    Kaneita, Yoshitaka; Ohida, Takashi

    2011-01-01

    Objective: The aim of the present study was to clarify the current work and sleep situations of physicians in Japan and to clarify the association between these situations and excessive daytime sleepiness as well as medical incidents. Methods: A self-administered questionnaire survey was conducted among the members of the Japan Medical Association in 2008. The randomly selected subjects comprised 3,000 male physicians and 1,500 female physicians. Results: Valid responses were obtained from 3,486 physicians (2,298 men and 1,188 women). Mean sleep duration was 6 h 36 min for men and 6 h 8 min for women. The prevalence of lack of rest due to sleep deprivation was 30.4% among men and 36.6% among women; the prevalence of insomnia was 21.0% and 18.1%, respectively; and the prevalence of EDS was 3.5%. The adjusted odds ratio for EDS was high for physicians who reported short sleep duration, lack of rest due to sleep deprivation, and a high frequency of on-call/overnight work. Physicians who had experienced a medical incident within the previous one month accounted for 19.0% of participants. The adjusted odds ratio for medical incidents was high for those subjected to long working hours, high frequency of on-call/overnight works, lack of rest due to sleep deprivation, and insomnia. Conclusion: In order to facilitate optimal health management for physicians as well as securing medical safety, it is important to fully consider the work and sleep situations of physicians. Citation: Kaneita Y; Ohida T. Association of current work and sleep situations with excessive daytime sleepiness and medical incidents among Japanese physicians. J Clin Sleep Med 2011;7(5):512-522. PMID:22003348

  15. 42 CFR 73.14 - Incident response.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... under this part must develop and implement a written incident response plan based upon a site specific risk assessment.2 The incident response plan must be coordinated with any entity-wide plans, kept in... response plan must fully describe the entity's response procedures for the theft, loss, or release of a...

  16. 42 CFR 73.14 - Incident response.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... under this part must develop and implement a written incident response plan based upon a site specific risk assessment.2 The incident response plan must be coordinated with any entity-wide plans, kept in... response plan must fully describe the entity's response procedures for the theft, loss, or release of a...

  17. Global Climate Change, Food Security and the U.S. Food System

    NASA Technical Reports Server (NTRS)

    Brown, Molly Elizabeth; Walsh, Margaret; Hauser, Rachel; Murray, Anthony; Jadin, Jenna; Baklund, Peter; Robinson, Paula

    2013-01-01

    Climate change influences on the major pillars of food security. Each of the four elements of food security (availability,access,utilization,andstability) is vulnerable to changes in climate. For example,reductions in production related to regional drought influence food availability at multiple scales. Changes in price influences the ability of certain populations to purchase food (access). Utilization maybe affected when production zones shift, reducing the availability of preferred or culturally appropriate types of food within a region. Stability of the food supply may be highly uncertain given an increased incidence of extreme climatic events and their influence on production patterns.

  18. The economic well-being of Social Security beneficiaries, with an emphasis on divorced beneficiaries.

    PubMed

    Weaver, D A

    1997-01-01

    There are numerous types of benefits paid under the Social Security programs of the United States, with each type of benefit having its own set of eligibility rules and benefit formula. It is likely that there is an association between the type of benefit a person receives and the economic circumstances of the beneficiary. This article explores that association using records from the Current Population Survey exactly matched to administrative records from the Social Security Administration. Divorced beneficiaries are a particular focus of this article. Type of benefit is found to be a strong predictor of economic well-being. Two large groups of beneficiaries, retired-worker and aged married spouse beneficiaries, are fairly well-off. Other types of beneficiaries tend to resemble the overall U.S. population or are decidedly worse off. Divorced spouse beneficiaries have an unusually high incidence of poverty and an unusually high incidence of serious health problems. A proposal to increase benefits for these beneficiaries is evaluated. Results of the analyses indicate that much of the additional Government expenditures would be received by those with low income.

  19. Political Influence on Japanese Nuclear and Security Policy: New Forces Face Large Obstacles

    DTIC Science & Technology

    2014-02-01

    Fukushima incident immediately triggered a resurgence of the anti- nuclear power movement in Japan, and quickly enlarged it to national scale.80...Bottom-up Activism,” Asia-Pacific Issues 103 (January 2012). 57 time passes after the Fukushima incidents. Anti- nuclear -power sentiment in Japan...spread well beyond the areas immediately affected by either the Fukushima disasters themselves or by other nuclear plants

  20. In the Shadow of the Durand Line: Security, Stability, and the Future of Pakistan and Afghanistan

    DTIC Science & Technology

    2009-06-01

    130 From: “Balchistan: Terrorist Related Incidents,” http://satp.org/satporgtp/countries/pakistan/ Balochistan /index.html (accessed Apr 1, 2009...satporgtp/countries/pakistan/ Balochistan /index.html (accessed Apr 2, 2009). 59 60 and has over the years clearly operated covertly and overtly in...satporgtp/countries/pakistan/ Balochistan /index.html (accessed Apr 2, 2009). Balchistan: Terrorist Related Incidents. South Asian Terrorism Portal

  1. Factors influencing nurse supervisor competence: a critical incident analysis study.

    PubMed

    Arvidsson, Barbro; Fridlund, Bengt

    2005-05-01

    The aim of the study was to identify factors related to critical incidents that influence the competence of nurse supervisors. Nurse supervisors require considerable competence in order to help supervisees to reflect on their clinical work and to interpret the needs of the patient. A qualitative approach involving the critical incident technique was used. Critical incidents were collected by means of self-reports from 25 nurse supervisors. Two main areas emerged: a professional and a personal stance. The professional stance described the nurse supervisors' awareness of the importance of creating a secure learning environment and facilitating reflection. The supervisors structured the material and created awareness of fundamental nursing values. The second main area, personal stance, described the nurse supervisors' behaviour when they gave the participating nurses the opportunity to work through the experiences gained in the daily provision of nursing care. Although they experienced lack of self-assurance during the supervision session, they also expressed security regarding their own performance as nurse supervisors. Nurse supervisors need to include more nursing theory and focus on the nursing process as well as being aware of their own shortcomings and resources. One way for the supervisor to scrutinize his/her actions is to discuss and examine them with a more experienced nurse supervisor colleague.

  2. NCRP Program Area Committee 3: Nuclear and Radiological Security and Safety [Update on the Ncrp Program Area Committee 3 Activities: Nuclear And Radiological Security and Safety

    DOE PAGES

    Ansari, Armin; Buddemeier, Brooke

    2018-02-01

    The National Council on Radiation Protection and Measurements (NCRP) Program Area Committee (PAC) 3 covers the broad subject of nuclear and radiological security and safety and provides guidance and recommendations for response to nuclear and radiological incidents of both an accidental and deliberate nature. In 2017, PAC 3 Scientific Committee 3-1 completed the development of Guidance for Emergency Responder Dosimetry, and began development of a companion commentary on operational aspects of that guidance. PAC 3 members also organized the technical program for the 2017 Annual Meeting of the NCRP on “Assessment of National Efforts in Emergency Preparedness for Nuclear Terrorism:more » Is There a Need for Realignment to Close Remaining Gaps.” Based on discussions and presentations at the annual meeting, PAC 3 is working to develop a commentary on the subject that could serve as a roadmap for focusing our national efforts on the most pressing needs for preparing the nation for nuclear and radiological emergencies. PAC 3 is also engaged in active discussions, exploring the landscape of priority issues for its future activities. Lastly, an important consideration in this discussion is the extent of NCRP’s present and potential future resources to support the work of its scientific committees.« less

  3. NCRP Program Area Committee 3: Nuclear and Radiological Security and Safety [Update on the Ncrp Program Area Committee 3 Activities: Nuclear And Radiological Security and Safety

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Ansari, Armin; Buddemeier, Brooke

    The National Council on Radiation Protection and Measurements (NCRP) Program Area Committee (PAC) 3 covers the broad subject of nuclear and radiological security and safety and provides guidance and recommendations for response to nuclear and radiological incidents of both an accidental and deliberate nature. In 2017, PAC 3 Scientific Committee 3-1 completed the development of Guidance for Emergency Responder Dosimetry, and began development of a companion commentary on operational aspects of that guidance. PAC 3 members also organized the technical program for the 2017 Annual Meeting of the NCRP on “Assessment of National Efforts in Emergency Preparedness for Nuclear Terrorism:more » Is There a Need for Realignment to Close Remaining Gaps.” Based on discussions and presentations at the annual meeting, PAC 3 is working to develop a commentary on the subject that could serve as a roadmap for focusing our national efforts on the most pressing needs for preparing the nation for nuclear and radiological emergencies. PAC 3 is also engaged in active discussions, exploring the landscape of priority issues for its future activities. Lastly, an important consideration in this discussion is the extent of NCRP’s present and potential future resources to support the work of its scientific committees.« less

  4. Maintenance and Testing of Fume Cupboard

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hussein, Falah H.; Al-Dahhan, Wedad H.; Al-Zuhairi, Ali Jassim

    Scientists at universities across Iraq are actively working to report actual incidents and accidents occurring in their laboratories, as well as structural improvements made to improve safety and security, to raise awareness and encourage openness, leading to widespread adoption of robust Chemical Safety and Security (CSS) practices. This manuscript highlights the importance of periodic maintenance on fume cupboards, and is the fourth in a series of five case studies describing laboratory incidents, accidents, and laboratory improvements. In this study, we describe a situation in which the ventilation capacity of the fume cupboard in the undergraduate chemistry laboratories at Al-Nahrain Universitymore » had decreased to an unacceptable level. The CSS Committee investigated and found the ducting system had been blocked by plastic sheets and dead birds. All the ducts have since been cleaned, and four extra ventilation fans have been installed to further increase ventilation capacity. By openly sharing what happened along with the lessons learned from the accident, we hope to minimize the possibility of another researcher being injured in a similar incident in the future.« less

  5. An Enhanced Secure Identity-Based Certificateless Public Key Authentication Scheme for Vehicular Sensor Networks.

    PubMed

    Li, Congcong; Zhang, Xi; Wang, Haiping; Li, Dongfeng

    2018-01-11

    Vehicular sensor networks have been widely applied in intelligent traffic systems in recent years. Because of the specificity of vehicular sensor networks, they require an enhanced, secure and efficient authentication scheme. Existing authentication protocols are vulnerable to some problems, such as a high computational overhead with certificate distribution and revocation, strong reliance on tamper-proof devices, limited scalability when building many secure channels, and an inability to detect hardware tampering attacks. In this paper, an improved authentication scheme using certificateless public key cryptography is proposed to address these problems. A security analysis of our scheme shows that our protocol provides an enhanced secure anonymous authentication, which is resilient against major security threats. Furthermore, the proposed scheme reduces the incidence of node compromise and replication attacks. The scheme also provides a malicious-node detection and warning mechanism, which can quickly identify compromised static nodes and immediately alert the administrative department. With performance evaluations, the scheme can obtain better trade-offs between security and efficiency than the well-known available schemes.

  6. 6 CFR 5.6 - Responses to requests.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Responses to requests. 5.6 Section 5.6 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY DISCLOSURE OF RECORDS AND INFORMATION Freedom of Information Act § 5.6 Responses to requests. (a) Acknowledgements of requests. On receipt of a...

  7. 6 CFR 5.4 - Responsibility for responding to requests.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Responsibility for responding to requests. 5.4 Section 5.4 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY DISCLOSURE OF RECORDS AND INFORMATION Freedom of Information Act § 5.4 Responsibility for responding to requests. (a) In...

  8. 32 CFR 2004.10 - Responsibilities of the Director, Information Security Oversight Office (ISOO) [102(b)]. 1

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... Relating to National Defense INFORMATION SECURITY OVERSIGHT OFFICE, NATIONAL ARCHIVES AND RECORDS... Responsibilities of the Director, Information Security Oversight Office (ISOO) [102(b)]. 1 1 Bracketed references... 32 National Defense 6 2011-07-01 2011-07-01 false Responsibilities of the Director, Information...

  9. 32 CFR 2004.10 - Responsibilities of the Director, Information Security Oversight Office (ISOO) [102(b)]. 1

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... Relating to National Defense INFORMATION SECURITY OVERSIGHT OFFICE, NATIONAL ARCHIVES AND RECORDS... Responsibilities of the Director, Information Security Oversight Office (ISOO) [102(b)]. 1 1 Bracketed references... 32 National Defense 6 2010-07-01 2010-07-01 false Responsibilities of the Director, Information...

  10. 32 CFR 2700.42 - Responsibility for safeguarding classified information.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... responsibility. (b) Security and Top Secret Control Officers. The Director, OMSN, and the Status Liaison Officer, Saipan, are assigned specific security responsibilities as Security Officer and Top Secret Control Officer. (c) Handling. All documents bearing the terms “Top Secret,” “Secret” and “Confidential” shall be...

  11. 44 CFR 8.3 - Senior FEMA official responsible for the information security program.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 44 Emergency Management and Assistance 1 2010-10-01 2010-10-01 false Senior FEMA official... Senior FEMA official responsible for the information security program. The Director of the Security Division, has been designated as the senior official to direct and administer the FEMA information security...

  12. 76 FR 63811 - Structural Reforms To Improve the Security of Classified Networks and the Responsible Sharing and...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-10-13

    ... Structural Reforms To Improve the Security of Classified Networks and the Responsible Sharing and... classified national security information (classified information) on computer networks, it is hereby ordered as follows: Section 1. Policy. Our Nation's security requires classified information to be shared...

  13. Association of Pulmonary Tuberculosis and HIV in the Mexican Institute of Social Security, 2006-2014.

    PubMed

    Cabrera-Gaytán, David Alejandro; Niebla-Fuentes, María Del Rosario; Padilla-Velázquez, Rosario; Valle-Alvarado, Gabriel; Arriaga-Nieto, Lumumba; Rojas-Mendoza, Teresita; Rosado-Quiab, Ulises; Grajales-Muñiz, Concepción; Vallejos-Parás, Alfonso

    2016-01-01

    Tuberculosis and HIV remain a public health problem in developed countries. The objective of this study was to analyze the incidence trends of pulmonary TB and HIV comorbidity and treatment outcomes according to HIV during the period 2006 to 2014 in the Mexican Institute of Social Security. Analyzed data from this registry including pulmonary tuberculosis patients aged 15 years and older who had been diagnosed during the years 2006 to 2014 in the Mexican Institute of Social Security. The outcomes that we use were incidents rate, failure to treatment and death. Regression models were used to quantify associations between pulmonary tuberculosis and HIV mortality. During the study period, 31,352 patients were registered with pulmonary tuberculosis. The incidence rate observed during 2014 was 11.6 case of PTB per 100,000. The incidence rate for PTB and HIV was 0.345 per 100,000. The PTB incidence rate decreased by 0.07%, differences found in the PTB incidence rate by sex since in women decreased by 5.52% and in man increase by 3.62%. The pulmonary TB with HIV incidence rate decreased by 16.3% during the study period (In women increase 4.81% and in man decrease 21.6%). Analysis of PTB associated with HIV by age groups revealed that the highest incidence rates were observed for the 30 to 44 years old group. Meanwhile, the highest incidence rates of PTB without HIV occurred among the 60 and more years old individuals. We did not find statistically significant differences between treatment failure and PTB patients with HIV and without HIV. The treatment failure was associated with sex and the region of the patient. We found a strong association between HIV and the probability of dying during treatment. Our data suggested that patients suffering from both conditions (PTB and HIV) have no difference in the probability of failure of treatment contrary to other reports. Hypotheses to this is adherence to tuberculosis treatment with people living with HIV/AIDS, detection of PTB in patients suffering from HIV/AIDS or PTB patients on antiretroviral therapy were more likely to have successful treatment outcomes than those not on antiretroviral treatment. We have found that PTB and HIV increases the probability of dying during treatment compared to the cases of PTB without HIV, consistent with published other study HIV increases the mortality rates associated with PTB. No association between pulmonary tuberculosis with HIV and treatment failure was observed, but pulmonary tuberculosis and HIV increases the probability of dying during treatment compared to the pulmonary tuberculosis cases without HIV.

  14. Recent Federal Policies Affecting the Cybersecurity and Resiliency Landscape

    DTIC Science & Technology

    2014-01-23

    Mellon University Homeland Security Act of 2002 Was introduced in the aftermath of • September 11 attacks • mailings of anthrax spores Established...natural disasters, cyber incidents, industrial accidents, pandemics , acts of terrorism, sabotage, and destructive criminal activity targeting critical...August 21, 1963 (NCS) • After September 11 − HSPD 1, 5, 7, 8, 12, 20, 21 − Homeland Security Act of 2002 − PS-PREP • After Mailings of Anthrax

  15. Validating a Method for Enhanced Communications and Situational Awareness at the Incident Command Level

    DTIC Science & Technology

    2006-03-01

    operations, and other applications for the MITOC that are beneficial to national security. It will illustrate how the concept was validated by the...of the potential impact on funding, a concern was noted in discussion among members of the National Emergency Management Association (NEMA) in their...This concept of a “virtual” Homeland Security-focused National Laboratory was comprised of the combined resources of the public and private

  16. Investigation of a “Sharps” Incident

    DOE PAGES

    Cournoyer, Michael Edward; Trujillo, Stanley; Schreiber, Stephen Bruce

    2016-08-03

    Special nuclear material research, process development, technology demonstration, and manufacturing capabilities are provided at the Los Alamos National Laboratory Plutonium Facility. Engineered barriers provide the most effective protection from radioactive and hazardous materials. The Worker Safety Security Team augments these passive safety feature by investigating incidents to identify appropriate prevention and mitigation measures. “Learning Teams” facilitate employee feedback loop and integration toward process improvement. Here, this article reports an investigation of a “Sharps” incident and reviews a case study of a technician that cuts his left thumb while making a gasket. Causal analysis of the sharps incident uncovered contributing factorsmore » that created the environment in which the incident occurred. Finally, latent organizational conditions that created error-likely situations or weakened defenses were identified and controlled. Effective improvements that reduce the probability or consequence of similar sharps incidents were implemented.« less

  17. Aviation Security: Vulnerabilities in, and Alternatives for, Preboard Screening Security Operations

    DTIC Science & Technology

    2001-09-25

    establishing the certification program. This regulation is particularly significant because it is to include requirements mandated by the Airport Security Improvement...Assessment of Airport Security Screener Performance and Retention, Sept. 15, 2000. Page 8 GAO-01-1171T Criteria for Assessing Shifting responsibility for...airline and airport security officials to assess each option for reassigning screening responsibility against the key criteria- Specifically, we asked

  18. Security Assistance International Logistics, Training, and Technical Assistance Support Policy and Responsibilities

    DTIC Science & Technology

    2000-01-24

    Security Administration ( DTSA ). d. Reporting requirements (1) General. Army organizations with security assistance responsibility for ad- ministering...by the Department of State (DOS) and the Director, Defense Technology Security Administration ( DTSA ). The term “munitions case” includes in its scope...also formulate the Army position for ARSTAF coordination before responding to Defense Technology Security Agency ( DTSA ). AR 12-1 • 24 January 2000

  19. Reducing the Consequences of a Nuclear Detonation.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Buddemeier, B R

    2007-11-09

    The 2002 National Strategy to Combat Weapons of Mass Destruction states that 'the United States must be prepared to respond to the use of WMD against our citizens, our military forces, and those of friends and allies'. Scenario No.1 of the 15 Department of Homeland Security national planning scenarios is an improvised nuclear detonation in the national capitol region. An effective response involves managing large-scale incident response, mass casualty, mass evacuation, and mass decontamination issues. Preparedness planning activities based on this scenario provided difficult challenges in time critical decision making and managing a large number of casualties within the hazardmore » area. Perhaps even more challenging is the need to coordinate a large scale response across multiple jurisdictions and effectively responding with limited infrastructure and resources. Federal response planning continues to make improvements in coordination and recommending protective actions, but much work remains. The most critical life-saving activity depends on actions taken in the first few minutes and hours of an event. The most effective way to reduce the enormous national and international social and economic disruptions from a domestic nuclear explosion is through planning and rapid action, from the individual to the federal response. Anticipating response resources for survivors based on predicted types and distributions of injuries needs to be addressed.« less

  20. Department of Homeland Security

    MedlinePlus

    ... Release Joint Technical Alerts on Malicious North Korean Cyber Activity Today, DHS and FBI released a pair ... María Provide Feedback to DHS Protect Myself from Cyber Attacks Report Cyber Incidents Prepare My Family for ...

  1. 78 FR 13366 - Information Collection Request: Technical Resource for Incident Prevention (TRIPwire) User...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-02-27

    ..., electronic, mechanical, or other technological collection techniques or other forms of information technology...' suitability to access the secure environment. The information collected during the TRIPwire user registration...

  2. Fire and Explosion Hazards Expected in a Laboratory

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Rasool, Shireen R.; Al-Dahhan, Wedad; Al-Zuhairi, Ali Jassim

    Scientists at universities across Iraq are actively working to report actual incidents and accidents occurring in their laboratories, as well as structural improvements made to improve safety and security, to raise awareness and encourage openness, leading to widespread adoption of robust Chemical Safety and Security (CSS) practices. This manuscript is the fifth in a series of five case studies describing laboratory incidents, accidents, and laboratory improvements. In this study, we summarize unsafe practices involving the improper installation of a Gas Chromatograph (GC) at an Iraqi university which, if not corrected, could have resulted in a dangerous fire and explosion. Wemore » summarize the identified infractions and highlight lessons learned. By openly sharing the experiences at the university involved, we hope to minimize the possibility of another researcher being injured due to similarly unsafe practices in the future.« less

  3. Transitions: Managing the Transfer of Security Responsibility

    DTIC Science & Technology

    2010-02-05

    Index 1.2_Transitions-ConceptNote_v2.0_draft Index Transitions: Managing the Transfer of Security Responsibility A Concept Paper...reporting burden for the collection of information is estimated to average 1 hour per response , including the time for reviewing instructions...TITLE AND SUBTITLE Transitions: Managing the Transfer of Security Responsibility 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6

  4. The National Institute of Justice's Technology Efforts to Meet the Evolving Needs of the Responder Community

    NASA Astrophysics Data System (ADS)

    Boyd, D.

    2002-05-01

    The National Institute of Justice (NIJ) is the research arm of the Department of Justice. Through its Office of Science & Technology (OS&T), NIJ has actively pursued development of better tools for public safety agencies to combat terrorism since 1997, when, pursuant to the Anti-Terrorism and Effective Penalty Act of 1996 (P.L. 104 -132), it began development of technology to better enable law enforcement agencies to combat terrorism. NIJ quickly realized that effectively combating terrorism required a multi disciplinary, multi agency response. Additionally, it came to understand that, as noted by the Gilmore Commission, the best way to prepare the responder community to deal with the consequences of terrorist incidents, was to ``emphasize programs and initiatives that build appropriately on existing State and local capabilities for other emergencies and disasters.'' For example, an effective critical incident management system is just as important to the ability to deal with a terrorist attack, such as occurred at the World Trade Center, as with a major natural disaster or the crash of a commercial airliner or passenger train. Consequently, NIJ's efforts have evolved to focus on the responder community's common, unaddressed needs for better tools to deal with critical incidents. The Institutes efforts focus on five technology areas: infrastructure security, personnel location, explosives detection and remediation, communications and information technology and training, and development of standards.

  5. The significance of organizational factors for the incidence of bullying.

    PubMed

    Agervold, Mogens

    2009-06-01

    It is frequently assumed that a poor psychosocial working environment will create conditions that encourage bullying. However, few studies have examined this assumption while comparing work environment ratings of bullied and non-bullied employees who work in the same organization and/or department. The objective of this study was to examine the relationship between organizational factors and the incidence of acts of bullying based on two different approaches: the first by comparing bullied with no-bullied, the second by comparing departments with widespread bullying with departments with little bullying. The study was a part of a general survey study of the work environment and employee well-being in 12 different local social security offices. A total of 898 persons participated in the study (a response rate of 88%). First, the results showed a clear relationship between bullying and fear of organizational change; secondly, weak, but significant, correlations between bullying and other organizational factors; thirdly, the subsequent analyses compared departments in which bullying were most widespread with the rest of the departments. The results supported the hypothesis that departments that suffer from much bullying also have a poorer psychosocial work environment, results that support the assumption that organizational factors such as changes in one's position, pressure of work, performance demands, autocratic management and role conflict and lack of role clarity, as well as a poor social climate can contribute to the emergence of higher incidences of bullying.

  6. 6 CFR 5.5 - Timing of responses to requests.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Timing of responses to requests. 5.5 Section 5.5 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY DISCLOSURE OF RECORDS AND INFORMATION Freedom of Information Act § 5.5 Timing of responses to requests. (a) In general. Components...

  7. 6 CFR 5.22 - Responsibility for responding to requests for access to records.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Responsibility for responding to requests for access to records. 5.22 Section 5.22 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY DISCLOSURE OF RECORDS AND INFORMATION Privacy Act § 5.22 Responsibility for responding to requests...

  8. 6 CFR 5.23 - Responses to requests for access to records.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Responses to requests for access to records. 5.23 Section 5.23 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY DISCLOSURE OF RECORDS AND INFORMATION Privacy Act § 5.23 Responses to requests for access to records. (a...

  9. Linux Incident Response Volatile Data Analysis Framework

    ERIC Educational Resources Information Center

    McFadden, Matthew

    2013-01-01

    Cyber incident response is an emphasized subject area in cybersecurity in information technology with increased need for the protection of data. Due to ongoing threats, cybersecurity imposes many challenges and requires new investigative response techniques. In this study a Linux Incident Response Framework is designed for collecting volatile data…

  10. The Battle for Fallujah: Al Fajr -- the Myth-buster

    DTIC Science & Technology

    2009-09-01

    leads was to determine which event (or events) was the catalyst for the insurgency. We proposed it was the March 2004 Blackwater incident. Mr. Saif...Rahman, chief of staff for Dr. Hachem al-Hassani, disagreed: The Blackwater incident was not the catalyst. Resentment was already bub- bling beneath...the surface.The anger among the Fallujans simply manifested itself in their treatment of the men from the Blackwater Personal Security De- tachment.30

  11. Securing health sensing using integrated circuit metric.

    PubMed

    Tahir, Ruhma; Tahir, Hasan; McDonald-Maier, Klaus

    2015-10-20

    Convergence of technologies from several domains of computing and healthcare have aided in the creation of devices that can help health professionals in monitoring their patients remotely. An increase in networked healthcare devices has resulted in incidents related to data theft, medical identity theft and insurance fraud. In this paper, we discuss the design and implementation of a secure lightweight wearable health sensing system. The proposed system is based on an emerging security technology called Integrated Circuit Metric (ICMetric) that extracts the inherent features of a device to generate a unique device identification. In this paper, we provide details of how the physical characteristics of a health sensor can be used for the generation of hardware "fingerprints". The obtained fingerprints are used to deliver security services like authentication, confidentiality, secure admission and symmetric key generation. The generated symmetric key is used to securely communicate the health records and data of the patient. Based on experimental results and the security analysis of the proposed scheme, it is apparent that the proposed system enables high levels of security for health monitoring in resource optimized manner.

  12. Securing Health Sensing Using Integrated Circuit Metric

    PubMed Central

    Tahir, Ruhma; Tahir, Hasan; McDonald-Maier, Klaus

    2015-01-01

    Convergence of technologies from several domains of computing and healthcare have aided in the creation of devices that can help health professionals in monitoring their patients remotely. An increase in networked healthcare devices has resulted in incidents related to data theft, medical identity theft and insurance fraud. In this paper, we discuss the design and implementation of a secure lightweight wearable health sensing system. The proposed system is based on an emerging security technology called Integrated Circuit Metric (ICMetric) that extracts the inherent features of a device to generate a unique device identification. In this paper, we provide details of how the physical characteristics of a health sensor can be used for the generation of hardware “fingerprints”. The obtained fingerprints are used to deliver security services like authentication, confidentiality, secure admission and symmetric key generation. The generated symmetric key is used to securely communicate the health records and data of the patient. Based on experimental results and the security analysis of the proposed scheme, it is apparent that the proposed system enables high levels of security for health monitoring in resource optimized manner. PMID:26492250

  13. Association of current work and sleep situations with excessive daytime sleepiness and medical incidents among Japanese physicians.

    PubMed

    Kaneita, Yoshitaka; Ohida, Takashi

    2011-10-15

    The aim of the present study was to clarify the current work and sleep situations of physicians in Japan and to clarify the association between these situations and excessive daytime sleepiness as well as medical incidents. A self-administered questionnaire survey was conducted among the members of the Japan Medical Association in 2008. The randomly selected subjects comprised 3,000 male physicians and 1,500 female physicians. Valid responses were obtained from 3,486 physicians (2,298 men and 1,188 women). Mean sleep duration was 6 h 36 min for men and 6 h 8 min for women. The prevalence of lack of rest due to sleep deprivation was 30.4% among men and 36.6% among women; the prevalence of insomnia was 21.0% and 18.1%, respectively; and the prevalence of EDS was 3.5%. The adjusted odds ratio for EDS was high for physicians who reported short sleep duration, lack of rest due to sleep deprivation, and a high frequency of on-call/overnight work. Physicians who had experienced a medical incident within the previous one month accounted for 19.0% of participants. The adjusted odds ratio for medical incidents was high for those subjected to long working hours, high frequency of on-call/overnight works, lack of rest due to sleep deprivation, and insomnia. In order to facilitate optimal health management for physicians as well as securing medical safety, it is important to fully consider the work and sleep situations of physicians.

  14. Biosafety Practices and Emergency Response at the Idaho National Laboratory and Los Alamos National Laboratory

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Frank F. Roberto; Dina M. Matz

    2008-03-01

    Strict federal regulations govern the possession, use, and transfer of pathogens and toxins with potential to cause harm to the public, either through accidental or deliberate means. Laboratories registered through either the Centers for Disease Control and Prevention (CDC), the U.S. Dept. of Agriculture (USDA), or both, must prepare biosafety, security, and incident response plans, conduct drills or exercises on an annual basis, and update plans accordingly. At the Idaho National Laboratory (INL), biosafety, laboratory, and emergency management staff have been working together for 2 years to satisfy federal and DOE/NNSA requirements. This has been done through the establishment ofmore » plans, training, tabletop and walk-through exercises and drills, and coordination with local and regional emergency response personnel. Responding to the release of infectious agents or toxins is challenging, but through familiarization with the nature of the hazardous biological substances or organisms, and integration with laboratory-wide emergency response procedures, credible scenarios are being used to evaluate our ability to protect workers, the public, and the environment from agents we must work with to provide for national biodefense.« less

  15. [Unplanned pregnancies among women soldiers in the IDF--an overview].

    PubMed

    Yagil, Yael; Elran, Einat; Tarchitzky, Orly; Levy, Yeheskel; Ashkenazi, Isaac

    2005-08-01

    According to the Security Service Law in Israel, a pregnant soldier serving her compulsory military service, who decides to continue with the pregnancy, is discharged from military service. If she wishes to terminate the pregnancy (TOP) and continue serving in the army, she is referred to a civilian pregnancy termination committee. This article aims to examine the incidence of pregnancies amongst soldiers during their compulsory military service (ages 18-20 years) and characterize the populations at risk. Data reflecting yearly incidence of pregnancies, number of TOPs, discharges from military duty as a result of continuation of pregnancy and missed abortions amongst soldiers during their compulsory military duty were derived from the military social services records for the period 1997-2003. Socio-demographic variables, number of prior pregnancies, age of pregnancy, means of TOP, relationship with the other parent and his involvement regarding the pregnancy, were obtained from military records between the years 2002-2003. The reported yearly incidence of pregnancies in 1997 was 18.6 per 1000 soldiers during their compulsory military service. In 2003, the incidence rose to 21.5 per 1000. The incidence of continuation of pregnancy, TOPs and missed abortions remained unchanged. Number-wise, the pregnancies occurred most often in Israeli-born, high-school educated young women. When stratifying by country of birth, however, the percentage of pregnancies within subgroups varied significantly. Half of the pregnancies were terminated by pharmaceutical means. In the majority of cases, the pregnancy resulted from a relationship lasting over half a year with a male partner, who was aware of the pregnancy and involved with the decisions regarding its outcome. In recent years there has been a rise in the reported yearly incidence of pregnancies among soldiers aged 18-20 years serving their compulsory military service. These findings reiterate the need to increase the efforts in implementing sex education programs amongst educators and the responsible military authorities.

  16. Assessing and improving cross-border chemical incident preparedness and response across Europe.

    PubMed

    Stewart-Evans, James; Hall, Lisbeth; Czerczak, Slawomir; Manley, Kevin; Dobney, Alec; Hoffer, Sally; Pałaszewska-Tkacz, Anna; Jankowska, Agnieszka

    2014-11-01

    Good practices in emergency preparedness and response for chemical incidents include practices specific to the different functions of exposure assessment (e.g., within the monitoring function, the use of mobile monitoring equipment; within the modelling function, the use of rapid dispersion models with integrated mapping software) and generic practices to engage incident response stakeholders to maximise exposure assessment capabilities (e.g., sharing protocols and pre-prepared information and multi-agency training and exercising). Such practices can optimise cross-border collaboration. A wide range of practices have been implemented across MSs during chemical incident response, particularly during incidents that have cross-border and trans-boundary impacts. This paper proposes a self-assessment methodology to enable MSs, or organisations within MSs, to examine exposure assessment capabilities and communication pathways between exposure assessors and public health risk assessors. Where gaps exist, this methodology provides links to good practices that could improve response, communication and collaboration across local, regional and national borders. A fragmented approach to emergency preparedness for chemical incidents is a major obstacle to improving cross-border exposure assessment. There is no one existing body or structure responsible for all aspects of chemical incident preparedness and response in the European Union. Due to the range of different organisations and networks involved in chemical incident response, emergency preparedness needs to be drawn together. A number of recommendations are proposed, including the use of networks of experts which link public health risk assessors with experts in exposure assessment, in order to coordinate and improve chemical incident emergency preparedness. The EU's recent Decision on serious cross-border threats to health aims to facilitate MSs' compliance with the International Health Regulations, which require reporting and communication regarding significant chemical incidents. This provides a potential route to build on in order to improve chemical incident preparedness and response across Europe. Copyright © 2014 Elsevier Ltd. All rights reserved.

  17. Emergency response to mass casualty incidents in Lebanon.

    PubMed

    El Sayed, Mazen J

    2013-08-01

    The emergency response to mass casualty incidents in Lebanon lacks uniformity. Three recent large-scale incidents have challenged the existing emergency response process and have raised the need to improve and develop incident management for better resilience in times of crisis. We describe some simple emergency management principles that are currently applied in the United States. These principles can be easily adopted by Lebanon and other developing countries to standardize and improve their emergency response systems using existing infrastructure.

  18. 5 CFR 9701.410 - DHS responsibilities.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 9701.410 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Performance Management § 9701.410 DHS responsibilities. In carrying out its...

  19. Robotics for port security

    NASA Astrophysics Data System (ADS)

    Smuda, William; Freiburger, Lonnie A.; Gerhart, Grant R.; Mallon, Lawrence

    2004-09-01

    The capacity through the use of robots with on board visual, NBC and HAZMAT sensors to rapidly and continuously screen convoys and staged exposed assets would be a force multiplier and measurably improve base and force protection at both inbound and outbound DOD and commercial facilities. This paper chronicles our experiment with the ODIS robot at the Ports of Los Angeles (POLA) and Long Beach (POLB) in July of 2003. POLA & POLB are responsible for moving over 30% of the United States trade goods. Queues of 54" container trucks routinely exceed 100 trucks, extending for over a mile from the port entrances. Spotted equipment and convoys at staging areas are a high visibility and value assets to a terrorist incident. The POLA/POLB scenario is also representative of TRANSCOM operations at the port of Basra during current operation in Iraq. The California Highway Patrol is responsible for physically inspecting these vehicles for roadworthiness and contraband, a dangerous and dirty job. We will also discuss the use of ODIS robots for this task.

  20. Emergency department workers' perceptions of security officers' effectiveness during violent events.

    PubMed

    Gillespie, Gordon Lee; Gates, Donna M; Miller, Margaret; Howard, Patricia Kunz

    2012-01-01

    The emergency department (ED) is among the most at-risk settings for violence by patients and visitors against ED workers. A first response to potential or actual events of workplace violence is often contacting hospital security officers for assistance. The purpose of this study is to describe ED workers' views of security officers' effectiveness during actual events of verbal and/or physical violence. Healthcare workers (n=31) from an urban pediatric ED in the Midwest United States. Participants were interviewed regarding their experiences with workplace violence. Verbatim transcripts were qualitatively analyzed. Six themes were identified: (1) a need for security officers, (2) security officers' availability and response, (3) security officers' presence or involvement, (4) security officers' ability to handle violent situations, (5) security officers' role with restraints, and (6) security officers' role with access. It is important that early communication between security officers and ED workers takes place before violent events occur. A uniform understanding of the roles and responsibilities of security officers should be clearly communicated to ED workers. Future research needs to be conducted with hospital-based security officers to describe their perceptions about their role in the prevention and management of workplace violence.

  1. 76 FR 22911 - National Advisory Council

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-04-25

    ... discussions on professionalism of emergency management, approaches for National Incident Management System... DEPARTMENT OF HOMELAND SECURITY Federal Emergency Management Agency [Docket ID FEMA-2007-0008] National Advisory Council AGENCY: Federal Emergency Management Agency, DHS. ACTION: Committee Management...

  2. 6 CFR Appendix B to Part 5 - Public Reading Rooms of the Department of Homeland Security

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ...-proliferation and verification research and development program. The life sciences activities related to... book) 11. Former components of the General Services Administration: For the Federal Computer Incident...

  3. 6 CFR Appendix B to Part 5 - Public Reading Rooms of the Department of Homeland Security

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ...-proliferation and verification research and development program. The life sciences activities related to... book) 11. Former components of the General Services Administration: For the Federal Computer Incident...

  4. 6 CFR Appendix B to Part 5 - Public Reading Rooms of the Department of Homeland Security

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ...-proliferation and verification research and development program. The life sciences activities related to... book) 11. Former components of the General Services Administration: For the Federal Computer Incident...

  5. 6 CFR Appendix B to Part 5 - Public Reading Rooms of the Department of Homeland Security

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ...-proliferation and verification research and development program. The life sciences activities related to... book) 11. Former components of the General Services Administration: For the Federal Computer Incident...

  6. 6 CFR Appendix B to Part 5 - Public Reading Rooms of the Department of Homeland Security

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ...-proliferation and verification research and development program. The life sciences activities related to... book) 11. Former components of the General Services Administration: For the Federal Computer Incident...

  7. 33 CFR 106.230 - OCS facility recordkeeping requirements.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... participants, and any best practices or lessons learned which may improve the FSP; (3) Incidents and breaches... days after the end of its effective period; and (8) Annual audit of the Facility Security Plan (FSP...

  8. 33 CFR 106.230 - OCS facility recordkeeping requirements.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... participants, and any best practices or lessons learned which may improve the FSP; (3) Incidents and breaches... days after the end of its effective period; and (8) Annual audit of the Facility Security Plan (FSP...

  9. 33 CFR 106.230 - OCS facility recordkeeping requirements.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... participants, and any best practices or lessons learned which may improve the FSP; (3) Incidents and breaches... days after the end of its effective period; and (8) Annual audit of the Facility Security Plan (FSP...

  10. 33 CFR 106.230 - OCS facility recordkeeping requirements.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... participants, and any best practices or lessons learned which may improve the FSP; (3) Incidents and breaches... days after the end of its effective period; and (8) Annual audit of the Facility Security Plan (FSP...

  11. 33 CFR 106.230 - OCS facility recordkeeping requirements.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... participants, and any best practices or lessons learned which may improve the FSP; (3) Incidents and breaches... days after the end of its effective period; and (8) Annual audit of the Facility Security Plan (FSP...

  12. Passenger reactions to transit safety measures

    DOT National Transportation Integrated Search

    1999-10-01

    Safety and security are important considerations for the transit operator, but few empirical studies exist that measure the effectiveness of measures taken to improve transit safety on either actual crime (or other incident) data or transit passenger...

  13. 78 FR 66603 - Critical Infrastructure Security and Resilience Month, 2013

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-11-05

    ... shore up our defenses against physical and cyber incidents. In tandem with my Executive Order on... hazards including terrorism and natural disasters, as well as cyber attacks. We must ensure that the...

  14. 10 CFR 39.77 - Notification of incidents and lost sources; abandonment procedures for irretrievable sources.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ..., radiation overexposures, excessive levels and concentrations of radiation, and certain other accidents as... RADIATION SAFETY REQUIREMENTS FOR WELL LOGGING Security, Records, Notifications § 39.77 Notification of...

  15. 10 CFR 39.77 - Notification of incidents and lost sources; abandonment procedures for irretrievable sources.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ..., radiation overexposures, excessive levels and concentrations of radiation, and certain other accidents as... RADIATION SAFETY REQUIREMENTS FOR WELL LOGGING Security, Records, Notifications § 39.77 Notification of...

  16. 10 CFR 39.77 - Notification of incidents and lost sources; abandonment procedures for irretrievable sources.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ..., radiation overexposures, excessive levels and concentrations of radiation, and certain other accidents as... RADIATION SAFETY REQUIREMENTS FOR WELL LOGGING Security, Records, Notifications § 39.77 Notification of...

  17. 10 CFR 39.77 - Notification of incidents and lost sources; abandonment procedures for irretrievable sources.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ..., radiation overexposures, excessive levels and concentrations of radiation, and certain other accidents as... RADIATION SAFETY REQUIREMENTS FOR WELL LOGGING Security, Records, Notifications § 39.77 Notification of...

  18. 10 CFR 39.77 - Notification of incidents and lost sources; abandonment procedures for irretrievable sources.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ..., radiation overexposures, excessive levels and concentrations of radiation, and certain other accidents as... RADIATION SAFETY REQUIREMENTS FOR WELL LOGGING Security, Records, Notifications § 39.77 Notification of...

  19. 7 CFR 2.95 - Director, Office of Homeland Security and Emergency Coordination.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ..., technological emergency, or any other all hazards incident. (ii) Manage the Department Emergency Operations... ensuring the safety of USDA employees, the public, and the environment resulting from USDA's use of...

  20. 7 CFR 2.95 - Director, Office of Homeland Security and Emergency Coordination.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ..., technological emergency, or any other all hazards incident. (ii) Manage the Department Emergency Operations... ensuring the safety of USDA employees, the public, and the environment resulting from USDA's use of...

  1. 7 CFR 2.95 - Director, Office of Homeland Security and Emergency Coordination.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ..., technological emergency, or any other all hazards incident. (ii) Manage the Department Emergency Operations... ensuring the safety of USDA employees, the public, and the environment resulting from USDA's use of...

  2. 7 CFR 2.95 - Director, Office of Homeland Security and Emergency Coordination.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ..., technological emergency, or any other all hazards incident. (ii) Manage the Department Emergency Operations... ensuring the safety of USDA employees, the public, and the environment resulting from USDA's use of...

  3. Pragmatism of the North Atlantic Treaty Organization’s and European Union’s Strategic Partnership

    DTIC Science & Technology

    2015-04-13

    area deployment, on 8 April 2009, the SS MAERSK ALABAMA incident occurred. Made famous by the Hollywood film , Captain Phillips, Somali pirates...community for their safe passage , and regional capacity building within means and capabilities.9 Current approval for NATO’s...Defense and Security Strategy, when he states, “The French continue to advocate the adoption of a Livre blanc européen on defense and security, which was

  4. Analysis of CSIRT/SOC Incidents and Continuous Monitoring of Threats

    NASA Technical Reports Server (NTRS)

    Wang, John; Ishisoko, Katsutoshi C.

    2012-01-01

    Security Operations Centers (SOC) contain a wealth of data which, if properly classified and tagged upfront, can yield a wealth of real-time information about your organizations IT Security posture, risks, and threats. These include answers to relevant and actionable questions such as: What are our biggest threats? Who is attacking us and what do they want? What controls are working or not working? How effective was the new technology we just implemented? What is our ROI?

  5. Oversight of Aegis’s Performance on Security Services Contracts in Iraq with the Department of Defense

    DTIC Science & Technology

    2009-01-14

    ORGANIZATION NAME(S) AND ADDRESS(ES) Office of the Special Inspector General for Iraq Reconstruction,400 Army Navy Drive,Arlington,VA,22202-4704 8...Congressional concerns about the adequacy of oversight given to private security contractors (PSCs) in Iraq increased after an incident involving Blackwater ...that resulted in the deaths of 17 Iraqi civilians. Blackwater is under contract with the Department of State. Responding to a congressional mandate

  6. Macrocognition in Day-To-Day Police Incident Response

    PubMed Central

    Baber, Chris; McMaster, Richard

    2016-01-01

    Using examples of incidents that UK Police Forces deal with on a day-to-day basis, we explore the macrocognition of incident response. Central to our analysis is the idea that information relating to an incident is translated from negotiated to structured and actionable meaning, in terms of the Community of Practice of the personnel involved in incident response. Through participant observation of, and interviews with, police personnel, we explore the manner in which these different types of meaning shift over the course of incident. In this way, macrocognition relates to gathering, framing, and sharing information through the collaborative sensemaking practices of those involved. This involves two cycles of macrocognition, which we see as ‘informal’ (driven by information gathering as the Community of Practice negotiates and actions meaning) and ‘formal’ (driven by the need to assign resources to the response and the need to record incident details). The examples illustrate that these cycles are often intertwined, as are the different forms of meaning, in situation-specific ways that provide adaptive response to the demands of the incident. PMID:27014117

  7. Macrocognition in Day-To-Day Police Incident Response.

    PubMed

    Baber, Chris; McMaster, Richard

    2016-01-01

    Using examples of incidents that UK Police Forces deal with on a day-to-day basis, we explore the macrocognition of incident response. Central to our analysis is the idea that information relating to an incident is translated from negotiated to structured and actionable meaning, in terms of the Community of Practice of the personnel involved in incident response. Through participant observation of, and interviews with, police personnel, we explore the manner in which these different types of meaning shift over the course of incident. In this way, macrocognition relates to gathering, framing, and sharing information through the collaborative sensemaking practices of those involved. This involves two cycles of macrocognition, which we see as 'informal' (driven by information gathering as the Community of Practice negotiates and actions meaning) and 'formal' (driven by the need to assign resources to the response and the need to record incident details). The examples illustrate that these cycles are often intertwined, as are the different forms of meaning, in situation-specific ways that provide adaptive response to the demands of the incident.

  8. Providing security assurance in line with national DBT assumptions

    NASA Astrophysics Data System (ADS)

    Bajramovic, Edita; Gupta, Deeksha

    2017-01-01

    As worldwide energy requirements are increasing simultaneously with climate change and energy security considerations, States are thinking about building nuclear power to fulfill their electricity requirements and decrease their dependence on carbon fuels. New nuclear power plants (NPPs) must have comprehensive cybersecurity measures integrated into their design, structure, and processes. In the absence of effective cybersecurity measures, the impact of nuclear security incidents can be severe. Some of the current nuclear facilities were not specifically designed and constructed to deal with the new threats, including targeted cyberattacks. Thus, newcomer countries must consider the Design Basis Threat (DBT) as one of the security fundamentals during design of physical and cyber protection systems of nuclear facilities. IAEA NSS 10 describes the DBT as "comprehensive description of the motivation, intentions and capabilities of potential adversaries against which protection systems are designed and evaluated". Nowadays, many threat actors, including hacktivists, insider threat, cyber criminals, state and non-state groups (terrorists) pose security risks to nuclear facilities. Threat assumptions are made on a national level. Consequently, threat assessment closely affects the design structures of nuclear facilities. Some of the recent security incidents e.g. Stuxnet worm (Advanced Persistent Threat) and theft of sensitive information in South Korea Nuclear Power Plant (Insider Threat) have shown that these attacks should be considered as the top threat to nuclear facilities. Therefore, the cybersecurity context is essential for secure and safe use of nuclear power. In addition, States should include multiple DBT scenarios in order to protect various target materials, types of facilities, and adversary objectives. Development of a comprehensive DBT is a precondition for the establishment and further improvement of domestic state nuclear-related regulations in the field of physical and cyber protection. These national regulations have to be met later on by I&C platform suppliers, electrical systems suppliers, system integrators and turn-key providers.

  9. Research on Visual Analysis Methods of Terrorism Events

    NASA Astrophysics Data System (ADS)

    Guo, Wenyue; Liu, Haiyan; Yu, Anzhu; Li, Jing

    2016-06-01

    Under the situation that terrorism events occur more and more frequency throughout the world, improving the response capability of social security incidents has become an important aspect to test governments govern ability. Visual analysis has become an important method of event analysing for its advantage of intuitive and effective. To analyse events' spatio-temporal distribution characteristics, correlations among event items and the development trend, terrorism event's spatio-temporal characteristics are discussed. Suitable event data table structure based on "5W" theory is designed. Then, six types of visual analysis are purposed, and how to use thematic map and statistical charts to realize visual analysis on terrorism events is studied. Finally, experiments have been carried out by using the data provided by Global Terrorism Database, and the results of experiments proves the availability of the methods.

  10. The Common Ground Preparedness Framework: A Comprehensive Description of Public Health Emergency Preparedness

    PubMed Central

    Theadore, Fred; Jellison, James B.

    2012-01-01

    Currently, public health emergency preparedness (PHEP) is not well defined. Discussions about public health preparedness often make little progress, for lack of a shared understanding of the topic. We present a concise yet comprehensive framework describing PHEP activities. The framework, which was refined for 3 years by state and local health departments, uses terms easily recognized by the public health workforce within an information flow consistent with the National Incident Management System. To assess the framework's completeness, strengths, and weaknesses, we compare it to 4 other frameworks: the RAND Corporation's PREPARE Pandemic Influenza Quality Improvement Toolkit, the National Response Framework's Public Health and Medical Services Functional Areas, the National Health Security Strategy Capabilities List, and the Centers for Disease Control and Prevention's PHEP Capabilities. PMID:22397343

  11. Practical Computer Security through Cryptography

    NASA Technical Reports Server (NTRS)

    McNab, David; Twetev, David (Technical Monitor)

    1998-01-01

    The core protocols upon which the Internet was built are insecure. Weak authentication and the lack of low level encryption services introduce vulnerabilities that propagate upwards in the network stack. Using statistics based on CERT/CC Internet security incident reports, the relative likelihood of attacks via these vulnerabilities is analyzed. The primary conclusion is that the standard UNIX BSD-based authentication system is by far the most commonly exploited weakness. Encryption of Sensitive password data and the adoption of cryptographically-based authentication protocols can greatly reduce these vulnerabilities. Basic cryptographic terminology and techniques are presented, with attention focused on the ways in which technology such as encryption and digital signatures can be used to protect against the most commonly exploited vulnerabilities. A survey of contemporary security software demonstrates that tools based on cryptographic techniques, such as Kerberos, ssh, and PGP, are readily available and effectively close many of the most serious security holes. Nine practical recommendations for improving security are described.

  12. 14 CFR 1203.901 - Responsibilities.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION INFORMATION SECURITY PROGRAM NASA Information Security Program Committee § 1203.901 Responsibilities. (a) The Chairperson reports to the Administrator concerning the management and direction of the NASA Information Security Program as provided for...

  13. 14 CFR 1203.901 - Responsibilities.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION INFORMATION SECURITY PROGRAM NASA Information Security Program Committee § 1203.901 Responsibilities. (a) The Chairperson reports to the Administrator concerning the management and direction of the NASA Information Security Program as provided for...

  14. Integrating an incident management system within a continuity of operations programme: case study of the Bank of Canada.

    PubMed

    Loop, Carole

    2013-01-01

    Carrying out critical business functions without interruption requires a resilient and robust business continuity framework. By embedding an industry-standard incident management system within its business continuity structure, the Bank of Canada strengthened its response plan by enabling timely response to incidents while maintaining a strong focus on business continuity. A total programme approach, integrating the two disciplines, provided for enhanced recovery capabilities. While the value of an effective and efficient response organisation is clear, as demonstrated by emergency events around the world, incident response structures based on normal operating hierarchy can experience unique challenges. The internationally-recognised Incident Command System (ICS) model addresses these issues and reflects the five primary incident management functions, each contributing to the overall strength and effectiveness of the response organisation. The paper focuses on the Bank of Canada's successful implementation of the ICS model as its incident management and continuity of operations programmes evolved to reflect current best practices.

  15. Better Incident Response with SCOT

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bruner, Todd

    2015-04-01

    SCOT is an incident response management system and knowledge base designed for incident responders by incident responders. SCOT increases the effectiveness of the team without adding undue burdens. Focused on reducing the friction between analysts and their tools, SCOT enables analysts to document and share their research and response efforts in near real time. Automatically identifying indicators and correlating those indicators, SCOT helps analysts discover and respond to advanced threats.

  16. Difficult incidents and tutor interventions in problem-based learning tutorials.

    PubMed

    Kindler, Pawel; Grant, Christopher; Kulla, Steven; Poole, Gary; Godolphin, William

    2009-09-01

    Tutors report difficult incidents and distressing conflicts that adversely affect learning in their problem-based learning (PBL) groups. Faculty development (training) and peer support should help them to manage this. Yet our understanding of these problems and how to deal with them often seems inadequate to help tutors. The aim of this study was to categorise difficult incidents and the interventions that skilled tutors used in response, and to determine the effectiveness of those responses. Thirty experienced and highly rated tutors in our Year 1 and 2 medical curriculum took part in semi-structured interviews to: identify and describe difficult incidents; describe how they responded, and assess the success of each response. Recorded and transcribed data were analysed thematically to develop typologies of difficult incidents and interventions and compare reported success or failure. The 94 reported difficult incidents belonged to the broad categories 'individual student' or 'group dynamics'. Tutors described 142 interventions in response to these difficult incidents, categorised as: (i) tutor intervenes during tutorial; (ii) tutor gives feedback outside tutorial, or (iii) student or group intervenes. Incidents in the 'individual student' category were addressed relatively unsuccessfully (effective < 50% of the time) by response (i), but with moderate success by response (ii) and successfully (> 75% of the time) by response (iii). None of the interventions worked well when used in response to problems related to 'group dynamics'. Overall, 59% of the difficult incidents were dealt with successfully. Dysfunctional PBL groups can be highly challenging, even for experienced and skilled tutors. Within-tutorial feedback, the treatment that tutors are most frequently advised to apply, was often not effective. Our study suggests that the collective responsibility of the group, rather than of the tutor, to deal with these difficulties should be emphasised.

  17. Social security reforms and poverty among older dual-earner couples.

    PubMed

    Mitchell, O S

    1991-01-01

    The author analyzes factors affecting the retirement decisions of couples in which both spouses work. She "develops a framework for assessing how several past and prospective Social Security reforms might be expected to affect older working couples' retirement ages and retirement incomes. Two questions are addressed in some detail: (1) What are the likely effects of various changes in Social Security rules on the retirement decisions of older working women and their husbands? and (2) How might these changes alter the incidence of poverty among retired dual-earner couples? Empirical evidence from the United States suggests that many benefit reforms currently being discussed in policy circles will enhance Social Security system revenues, but will also worsen the economic status of an important segment of dual-earner couples." excerpt

  18. 45 CFR 2508.9 - What officials are responsible for the security, management and control of Corporation record...

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... responsible for monitoring the security standards set forth in this regulation. (b) A designated official... records at all times and for insuring that such records are secured in appropriate containers whenever not...

  19. 45 CFR 2508.9 - What officials are responsible for the security, management and control of Corporation record...

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... responsible for monitoring the security standards set forth in this regulation. (b) A designated official... records at all times and for insuring that such records are secured in appropriate containers whenever not...

  20. 45 CFR 2508.9 - What officials are responsible for the security, management and control of Corporation record...

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... responsible for monitoring the security standards set forth in this regulation. (b) A designated official... records at all times and for insuring that such records are secured in appropriate containers whenever not...

  1. 45 CFR 2508.9 - What officials are responsible for the security, management and control of Corporation record...

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... responsible for monitoring the security standards set forth in this regulation. (b) A designated official... records at all times and for insuring that such records are secured in appropriate containers whenever not...

  2. 45 CFR 2508.9 - What officials are responsible for the security, management and control of Corporation record...

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... responsible for monitoring the security standards set forth in this regulation. (b) A designated official... records at all times and for insuring that such records are secured in appropriate containers whenever not...

  3. 14 CFR 91.1021 - Internal safety reporting and incident/accident response.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    .../accident response. 91.1021 Section 91.1021 Aeronautics and Space FEDERAL AVIATION ADMINISTRATION... incident/accident response. (a) Each program manager must establish an internal anonymous safety reporting.... (b) Each program manager must establish procedures to respond to an aviation incident/accident. ...

  4. Bahrain: Reform, Security, and U.S. Policy

    DTIC Science & Technology

    2017-09-29

    responsibility for bombings and other attacks primarily against security officials. The Bahrain government’s use of repression against the dissent...activity of violent, underground groups that, among their tactics, detonate bombs and improvised explosive devices (IEDs) against security forces. These...issued its first public statement in April 2013 and has since claimed responsibility for about 20 bombings against security personnel, including one

  5. Coordinating High-Resolution Traffic Cameras : Developing Intelligent, Collaborating Cameras for Transportation Security and Communications

    DOT National Transportation Integrated Search

    2015-08-01

    Cameras are used prolifically to monitor transportation incidents, infrastructure, and congestion. Traditional camera systems often require human monitoring and only offer low-resolution video. Researchers for the Exploratory Advanced Research (EAR) ...

  6. Cyber Attacks and Terrorism: A Twenty-First Century Conundrum.

    PubMed

    Albahar, Marwan

    2017-01-05

    In the recent years, an alarming rise in the incidence of cyber attacks has made cyber security a major concern for nations across the globe. Given the current volatile socio-political environment and the massive increase in the incidence of terrorism, it is imperative that government agencies rapidly realize the possibility of cyber space exploitation by terrorist organizations and state players to disrupt the normal way of life. The threat level of cyber terrorism has never been as high as it is today, and this has created a lot of insecurity and fear. This study has focused on different aspects of cyber attacks and explored the reasons behind their increasing popularity among the terrorist organizations and state players. This study proposes an empirical model that can be used to estimate the risk levels associated with different types of cyber attacks and thereby provide a road map to conceptualize and formulate highly effective counter measures and cyber security policies.

  7. Conception of a course for professional training and education in the field of computer and mobile forensics, part III: network forensics and penetration testing

    NASA Astrophysics Data System (ADS)

    Kröger, Knut; Creutzburg, Reiner

    2014-02-01

    IT security and computer forensics are important components in the information technology. From year to year, incidents and crimes increase that target IT systems or were done with their help. More and more companies and authorities have security problems in their own IT infrastructure. To respond to these incidents professionally, it is important to have well trained staff. The fact that many agencies and companies work with very sensitive data make it necessary to further train the own employees in the field of network forensics and penetration testing. Motivated by these facts, this paper - a continuation of a paper of January 2012 [1], which showed the conception of a course for professional training and education in the field of computer and mobile forensics - addresses the practical implementation important relationships of network forensic and penetration testing.

  8. Timely response to secure messages from primary care patients.

    PubMed

    Rohrer, James E; North, Frederick; Angstman, Kurt B; Oberhelman, Sara S; Meunier, Matthew R

    2013-01-01

    To assess delays in response to patient secure e-mail messages in primary care. Secure electronic messages are initiated by primary care patients. Timely response is necessary for patient safety and quality. A database of secure messages. A random sample of 353 secure electronic messages initiated by primary care patients treated in 4 clinics. Message not opened after 12 hours or messages not responded to after 36 hours. A total of 8.5% of electronic messages were not opened within 12 hours, and 17.6% did not receive a response in 36 hours. Clinic location, being a clinic employee, and patient sex were not related to delays. Patients older than 50 years were more likely to receive a delayed response (25.7% delayed, P = .013). The risk of both kinds of delays was higher on weekends (P < .001 for both). The e-mail message system resulted in high rates of delayed response. Delays were concentrated on weekends (Friday-Sunday). Reducing delayed responses may require automatic rerouting of messages to message centers staffed 24-7 or other mechanisms to manage this after-hours work flow.

  9. Impact of Homeland Security Alert level on calls to a law enforcement peer support hotline.

    PubMed

    Omer, Saad B; Barnett, Daniel J; Castellano, Cherie; Wierzba, Rachel K; Hiremath, Girish S; Balicer, Ran D; Everly, George S

    2007-01-01

    The Homeland Security Advisory System (HSAS) was established by the Department of Homeland Security to communicate the risk of a terrorist event. In order to explore the potential psychological impacts of HSAS we analyzed the effects of terror alerts on the law enforcement community. We used data from the New Jersey Cop 2 Cop crisis intervention hotline. Incidence Rate Ratios--interpreted as average relative increases in the daily number of calls to the Cop 2 Cop hotline during an increased alert period--were computed from Poisson models. The hotline received a total of 4,145 initial calls during the study period. The mean daily number of calls was higher during alert level elevation compared to prior 7 days (7.68 vs. 8.00). In the Poisson regression analysis, the Incidence Rate Ratios of number of calls received during elevated alert levels compared to the reference period of seven days preceding each change in alert were close to 1, with confidence intervals crossing 1 (i.e. not statistically significant) for all lag periods evaluated. This investigation, in the context of New Jersey law enforcement personnel, does not support the concern that elevating the alert status places undue stress upon alert recipients.

  10. Observer Ratings of Interpersonal Behavior as Predictors of Aggression and Self-Harm in a High-Security Sample of Male Forensic Inpatients.

    PubMed

    Vernham, Zarah; Tapp, James; Moore, Estelle

    2016-05-01

    Incidents of aggression and self-harm in forensic mental health inpatient settings present a significant challenge to practitioners in terms of safely managing and reducing the harm they cause. Research has been conducted to explore the possible predictors of these incidents and has identified a range of environmental, situational, and individual risk factors. However, despite the often interpersonal nature of the majority of aggressive incidents, few studies have investigated forensic inpatient interpersonal styles as predictors of aggression and even fewer have explored the potential interpersonal function of self-harming behaviors. The current study investigated the predictive validity of the Chart of Interpersonal Reactions in Closed Living Environments (CIRCLE) for incidents of verbal and physical aggression, and self-harm recorded from 204 high-secure forensic inpatients. Means comparisons, correlations, and receiver operating characteristics (ROC) were conducted on recorded incident data at 12, 24, and 48 months following baseline assessment using the CIRCLE. Dominant and coercive interpersonal styles were significant predictors of aggression, and a coercive interpersonal style was a significant predictor of self-harm, over the recorded time periods. When categorizing the inpatients on the basis of short- and long-term admissions, these findings were only replicated for inpatients with shorter lengths of stay. The findings support previous research which has demonstrated the benefits of assessing interpersonal style for the purposes of risk planning and management of forensic inpatients. The predictive value may be time-limited in terms of stage of admission. © The Author(s) 2015.

  11. Predictive power of the DASA-IV: Variations in rating method and timescales.

    PubMed

    Nqwaku, Mphindisi; Draycott, Simon; Aldridge-Waddon, Luke; Bush, Emma-Louise; Tsirimokou, Alexandra; Jones, Dominic; Puzzo, Ignazio

    2018-05-10

    This project evaluated the predictive validity of the Dynamic Appraisal of Situational Aggression - Inpatient Version (DASA-IV) in a high-secure psychiatric hospital in the UK over 24 hours and over a single nursing shift. DASA-IV scores from three sequential nursing shifts over a 24-hour period were compared with the mean (average of three scores across the 24-hour period) and peak (highest of the three scores across the 24-hour period) scores across these shifts. In addition, scores from a single nursing shift were used to predict aggressive incidents over each of the following three shifts. The DASA-IV was completed by nursing staff during handover meetings, rating 43 male psychiatric inpatients over a period of 6 months. Data were compared to incident reports recorded over the same period. Receiver operating characteristic (ROC) curves and generalized estimating equations assessed the predictive ability of various DASA-IV scores over 24-hour and single-shift timescales. Scores from the DASA-IV based on a single shift had moderate predictive ability for aggressive incidents occurring the next calendar day, whereas scores based on all three shifts had excellent predictive ability. DASA-IV scores from a single shift showed moderate predictive ability for each of the following three shifts. The DASA-IV has excellent predictive ability for aggressive incidents within a secure setting when data are summarized over a 24-hour period, as opposed to when a single rating is taken. In addition, it has moderate value for predicting incidents over even shorter timescales. © 2018 Australian College of Mental Health Nurses Inc.

  12. [Incidence and preventability of adverse events in patients hospitalised in three Colombian hospitals during 2006].

    PubMed

    Gaitán-Duarte, Hernando; Eslava-Schmalbach, Javier; Rodríguez-Malagon, Nelcy; Forero-Supelano, Víctor; Santofimio-Sierra, Dagoberto; Altahona, Hernando

    2008-01-01

    Determining adverse event (AE) incidence, preventability, classification and impact for establishing their importance as a public health problem within the Colombian Social Security System. This was a study of a prospective inpatient cohort from three Colombian general-practice institutions. at least 12 hours' length of hospital stay during 2006. suffering psychiatric disorders and AE which had occurred before hospitalisation indexing. The sample consisted of 6 557 patients. clinical charts. Being a three-phase design, the first phase consisted of translating and standardising screening and causation formats, phase II of actively monitoring screening criteria and phase III of evaluating causation regarding the care being provided, based on specialist committee concept on a 0-6 scale. The variables measured were age, gender, social security affiliation, cumulative AE incidence, temporality, preventability of AE and disability resulting from them. 6,688 patients were evaluated; 505 of them fulfilled positive screening criteria (95 % CI=7,9;7,3-8,6), 310 presented at least one AE during their hospitalisation (95 %CI for accumulated incidence=4,6; 4,1-5,1). AE were considered to have been preventable in 189 cases (95 % CI=61;55-66) and permanent disability occurred in 1,3 % of them. AE-associated mortality was 6,4 % (20/310). Hospitalisation became increased to 1 072 days as a direct consequence of AE. This study revealed an important incidence of AE in three Colombian hospitals, these being mainly preventable. Their ongoing monitoring as a part of risk management systems could reduce costs and AE-associated morbidity and mortality.

  13. An Enhanced Secure Identity-Based Certificateless Public Key Authentication Scheme for Vehicular Sensor Networks

    PubMed Central

    Li, Congcong; Zhang, Xi; Wang, Haiping; Li, Dongfeng

    2018-01-01

    Vehicular sensor networks have been widely applied in intelligent traffic systems in recent years. Because of the specificity of vehicular sensor networks, they require an enhanced, secure and efficient authentication scheme. Existing authentication protocols are vulnerable to some problems, such as a high computational overhead with certificate distribution and revocation, strong reliance on tamper-proof devices, limited scalability when building many secure channels, and an inability to detect hardware tampering attacks. In this paper, an improved authentication scheme using certificateless public key cryptography is proposed to address these problems. A security analysis of our scheme shows that our protocol provides an enhanced secure anonymous authentication, which is resilient against major security threats. Furthermore, the proposed scheme reduces the incidence of node compromise and replication attacks. The scheme also provides a malicious-node detection and warning mechanism, which can quickly identify compromised static nodes and immediately alert the administrative department. With performance evaluations, the scheme can obtain better trade-offs between security and efficiency than the well-known available schemes. PMID:29324719

  14. The UNO Aviation Monograph Series: Aviation Security: An Annotated Bibliography of Responses to the Gore Commission

    NASA Technical Reports Server (NTRS)

    Carrico, John S.; Schaaf, Michaela M.

    1998-01-01

    This monograph is a companion to UNOAI Monograph 96-2, "The Image of Airport Security: An Annotated Bibliography," compiled in June 1996. The White House Commission on Aviation Safety and Security, headed by Vice President Al Gore, was formed as a result of the TWA Flight 800 crash in August 1996. The Commission's final report included 31 recommendations addressed toward aviation security. The recommendations were cause for security issues to be revisited in the media and by the aviation industry. These developments necessitated the need for an updated bibliography to review the resulting literature. Many of the articles were written in response to the recommendations made by the Gore Commission. "Aviation Security: An Annotated Bibliography of Responses to the Gore Commission" is the result of this need.

  15. A U.S. Biodefense Strategy Primer

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Poulin, D

    2009-05-11

    The anthrax mailings that followed the attacks of September 11, 2001 highlighted the need for a comprehensive national strategy to prevent, prepare for, respond to, and mitigate the effects of biological attacks. The goal of U.S. biodefense strategy is to reduce the likelihood of a future biological event, improve overall U.S. public health security, and minimize the economic and social disruption of a biological incident. Presidential communications, federal legislation, and executive agency planning documents provide the foundation for this strategy. Central to current U.S. biodefense strategy is the 2004 Homeland Security Presidential Directive (HSPD) 10, Biodefense for the 21st Century,more » which states that ''the United States will use all means necessary to prevent, protect against, and mitigate biological weapons attacks perpetrated against our homeland and our global interests.'' HSPD-10 also sets forth four pillars of U.S. biodefense: {sm_bullet} Threat awareness includes timely, accurate, and relevant intelligence, threat assessment, and the anticipation of future threats. {sm_bullet} Prevention and protection involve continuing and expanding efforts to limit access to agents, technologies, and knowledge to certain groups and countries as well as protecting critical infrastructure from the effects of biological attacks. {sm_bullet} Surveillance and detection provide early warning or recognition of biological attacks to permit a timely response and mitigation of consequences as well as attribution. {sm_bullet} Response and recovery include pre-attack planning and preparedness, capabilities to treat casualties, risk communications, physical control measures, medical countermeasures, and decontamination capabilities.« less

  16. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Wills, Cathy

    This report was prepared to meet the information needs of the public and the requirements and guidelines of the U.S. Department of Energy (DOE) for annual site environmental reports. It was prepared by National Security Technologies, LLC (NSTec), for the U.S. Department of Energy, National Nuclear Security Administration Nevada Field Office (NNSA/NFO) (formerly designated as the Nevada Site Office [NNSA/NSO]). The new field office designation occurred in March 2013. Published reports cited in this 2012 report, therefore, may bear the name or authorship of NNSA/NSO. This and previous years’ reports, called Annual Site Environmental Reports (ASERs), Nevada Test Site Environmentalmore » Reports (NTSERs), and, beginning in 2010, Nevada National Security Site Environmental Reports (NNSSERs), are posted on the NNSA/NFO website at http://www.nv.energy.gov/library/publications/aser.aspx. This NNSSER was prepared to satisfy DOE Order DOE O 231.1B, “Environment, Safety and Health Reporting.” Its purpose is to (1) report compliance status with environmental standards and requirements, (2) present results of environmental monitoring of radiological and nonradiological effluents, (3) report estimated radiological doses to the public from releases of radioactive material, (4) summarize environmental incidents of noncompliance and actions taken in response to them, (5) describe the NNSA/NFO Environmental Management System and characterize its performance, and (6) highlight significant environmental programs and efforts. This NNSSER summarizes data and compliance status for calendar year 2012 at the Nevada National Security Site (NNSS) (formerly the Nevada Test Site) and its two support facilities, the North Las Vegas Facility (NLVF) and the Remote Sensing Laboratory–Nellis (RSL-Nellis). It also addresses environmental restoration (ER) projects conducted at the Tonopah Test Range (TTR) and the Nevada Test and Training Range (NTTR). Through a Memorandum of Agreement, NNSA/NFO is responsible for the oversight of these ER projects, and the Sandia Site Office of NNSA (NNSA/SSO) has oversight of all other TTR and NTTR activities. NNSA/SSO produces the TTR annual environmental report available at http://www.sandia.gov/news/publications/environmental/index.html.« less

  17. New Encryption Scheme of One-Time Pad Based on KDC

    NASA Astrophysics Data System (ADS)

    Xie, Xin; Chen, Honglei; Wu, Ying; Zhang, Heng; Wu, Peng

    As more and more leakage incidents come up, traditional encryption system has not adapted to the complex and volatile network environment, so, there should be a new encryption system that can protect information security very well, this is the starting point of this paper. Based on DES and RSA encryption system, this paper proposes a new scheme of one time pad, which really achieves "One-time pad" and provides information security a new and more reliable encryption method.

  18. Posttraumatic distress in security guards and the various effects of social support.

    PubMed

    Declercq, Frédéric; Vanheule, Stijn; Markey, Samuel; Willemsen, Jochem

    2007-12-01

    This study investigates the effects of six types of social support on distress and posttraumatic stress disorders in security guards who did and did not encounter a critical incident. Three types of social support were significantly related to distress and posttraumatic stress disorder: emotional support in problem situations, instrumental support, and social companionship. Emotional support in problem situations paradoxically appeared to have an aggravating effect on distress and posttraumatic stress, whereas instrumental support and social companionship had a mitigating outcome.

  19. Re-designing the PhEDEx Security Model

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Huang, C.-H.; Wildish, T.; Zhang, X.

    2014-01-01

    PhEDEx, the data-placement tool used by the CMS experiment at the LHC, was conceived in a more trusting time. The security model provided a safe environment for site agents and operators, but offerred little more protection than that. Data was not sufficiently protected against loss caused by operator error or software bugs or by deliberate manipulation of the database. Operators were given high levels of access to the database, beyond what was actually needed to accomplish their tasks. This exposed them to the risk of suspicion should an incident occur. Multiple implementations of the security model led to difficulties maintainingmore » code, which can lead to degredation of security over time. In order to meet the simultaneous goals of protecting CMS data, protecting the operators from undue exposure to risk, increasing monitoring capabilities and improving maintainability of the security model, the PhEDEx security model was redesigned and re-implemented. Security was moved from the application layer into the database itself, fine-grained access roles were established, and tools and procedures created to control the evolution of the security model over time. In this paper we describe this work, we describe the deployment of the new security model, and we show how these enhancements improve security on several fronts simultaneously.« less

  20. Re-designing the PhEDEx Security Model

    NASA Astrophysics Data System (ADS)

    C-H, Huang; Wildish, T.; X, Zhang

    2014-06-01

    PhEDEx, the data-placement tool used by the CMS experiment at the LHC, was conceived in a more trusting time. The security model provided a safe environment for site agents and operators, but offerred little more protection than that. Data was not sufficiently protected against loss caused by operator error or software bugs or by deliberate manipulation of the database. Operators were given high levels of access to the database, beyond what was actually needed to accomplish their tasks. This exposed them to the risk of suspicion should an incident occur. Multiple implementations of the security model led to difficulties maintaining code, which can lead to degredation of security over time. In order to meet the simultaneous goals of protecting CMS data, protecting the operators from undue exposure to risk, increasing monitoring capabilities and improving maintainability of the security model, the PhEDEx security model was redesigned and re-implemented. Security was moved from the application layer into the database itself, fine-grained access roles were established, and tools and procedures created to control the evolution of the security model over time. In this paper we describe this work, we describe the deployment of the new security model, and we show how these enhancements improve security on several fronts simultaneously.

  1. Determining the right level for your IT security investment.

    PubMed

    Claunch, Don; McMillan, Mac

    2013-05-01

    Investing sufficiently in IT security not only is essential for a healthcare organization's protection, but also is a responsibility to patients, and its success depends on its being addressed at all levels of management. Hospital data security breaches have the potential to cost as much as $7 million, including fines, litigation, and damaged reputation. Response and cleanup alone can cost hundreds of thousands of dollars. Developing and following an annual action plan for IT security can lower hospitals' IT security costs in the long run.

  2. Homeland Security Strategic Research Action Plan 2016-2019

    EPA Pesticide Factsheets

    This is a four-year research strategy designed to meet the following objectives:Improve water utilities’ abilities to prepare for and respond to incidents that threaten public health; andAdvance EPA’s capabilities to respond to wide-area contamination

  3. 45 CFR 95.621 - ADP reviews.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... use; (C) Software and data security; (D) Telecommunications security; (E) Personnel security; (F... Federal review. (f) ADP System Security Requirements and Review Process—(1) ADP System Security Requirement. State agencies are responsible for the security of all ADP projects under development, and...

  4. 5 CFR 1312.2 - Responsibilities.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ..., DECLASSIFICATION AND SAFEGUARDING OF NATIONAL SECURITY INFORMATION Classification and Declassification of National Security Information § 1312.2 Responsibilities. The effectiveness of the classification and... originate classified information are responsible for proper assignment of a classification to that material...

  5. Incident Specific Preparedness Review (ISPR) of the Response to the Oil Spill Resulting from the Grounding of the Tank Barge North Cape in Block Island Sound Off Point Judith, Rhode Island on 19 January 1996

    DOT National Transportation Integrated Search

    1996-07-02

    An Incident Specific Preparedness Review (ISPR) was conducted on the : subject oil spill incident response. The ISPR team was tasked with comparing the response in this case against current federal, state, and local oil spill response contingency pla...

  6. Literature review on medical incident command.

    PubMed

    Rimstad, Rune; Braut, Geir Sverre

    2015-04-01

    It is not known what constitutes the optimal emergency management system, nor is there a consensus on how effectiveness and efficiency in emergency response should be measured or evaluated. Literature on the role and tasks of commanders in the prehospital emergency services in the setting of mass-casualty incidents has not been summarized and published. This comprehensive literature review addresses some of the needs for future research in emergency management through three research questions: (1) What are the basic assumptions underlying incident command systems (ICSs)? (2) What are the tasks of ambulance and medical commanders in the field? And (3) How can field commanders' performances be measured and assessed? A systematic literature search in MEDLINE, PubMed, PsycINFO, Embase, Cochrane Central Register of Controlled Trials, Cochrane Library, ISI Web of Science, Scopus, International Security & Counter Terrorism Reference Center, Current Controlled Trials, and PROSPERO covering January 1, 1990 through March 1, 2014 was conducted. Reference lists of included literature were hand searched. Included papers were analyzed using Framework synthesis. The literature search identified 6,049 unique records, of which, 76 articles and books where included in qualitative synthesis. Most ICSs are described commonly as hierarchical, bureaucratic, and based on military principles. These assumptions are contested strongly, as is the applicability of such systems. Linking of the chains of command in cooperating agencies is a basic difficulty. Incident command systems are flexible in the sense that the organization may be expanded as needed. Commanders may command by direction, by planning, or by influence. Commanders' tasks may be summarized as: conducting scene assessment, developing an action plan, distributing resources, monitoring operations, and making decisions. There is considerable variation between authors in nomenclature and what tasks are included or highlighted. There are no widely acknowledged measurement tools of commanders' performances, though several performance indicators have been suggested. The competence and experience of the commanders, upon which an efficient ICS has to rely, cannot be compensated significantly by plans and procedures, or even by guidance from superior organizational elements such as coordination centers. This study finds that neither a certain system or structure, or a specific set of plans, are better than others, nor can it conclude what system prerequisites are necessary or sufficient for efficient incident management. Commanders need to be sure about their authority, responsibility, and the functional demands posed upon them.

  7. 32 CFR 154.61 - Security education.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 1 2011-07-01 2011-07-01 false Security education. 154.61 Section 154.61... PERSONNEL SECURITY PROGRAM REGULATION Continuing Security Responsibilities § 154.61 Security education. (a.... Through security briefings and education, the Department of Defense continues to provide for the...

  8. 32 CFR 154.61 - Security education.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 1 2012-07-01 2012-07-01 false Security education. 154.61 Section 154.61... PERSONNEL SECURITY PROGRAM REGULATION Continuing Security Responsibilities § 154.61 Security education. (a.... Through security briefings and education, the Department of Defense continues to provide for the...

  9. 32 CFR 154.61 - Security education.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 1 2013-07-01 2013-07-01 false Security education. 154.61 Section 154.61... PERSONNEL SECURITY PROGRAM REGULATION Continuing Security Responsibilities § 154.61 Security education. (a.... Through security briefings and education, the Department of Defense continues to provide for the...

  10. 32 CFR 154.61 - Security education.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 1 2014-07-01 2014-07-01 false Security education. 154.61 Section 154.61... PERSONNEL SECURITY PROGRAM REGULATION Continuing Security Responsibilities § 154.61 Security education. (a.... Through security briefings and education, the Department of Defense continues to provide for the...

  11. 32 CFR 154.61 - Security education.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 1 2010-07-01 2010-07-01 false Security education. 154.61 Section 154.61... PERSONNEL SECURITY PROGRAM REGULATION Continuing Security Responsibilities § 154.61 Security education. (a.... Through security briefings and education, the Department of Defense continues to provide for the...

  12. Next-Generation Botnet Detection and Response

    DTIC Science & Technology

    2008-06-24

    REPORT Final Report of "Next-Generation Botnet Detection and Response" 14. ABSTRACT 16. SECURITY CLASSIFICATION OF: In this project, we developed...and Wenke Lee. ?In Proceedings of The 13th Annual Network and Distributed System Security Symposium (NDSS 2006), San Diego, CA, February 2006. 2...In Proceedings of The 16th USENIX Security Symposium ( Security 󈧋), Boston, MA, August 2007. 3. A Taxonomy of Botnet Structures. ?David Dagon, Guofei

  13. 26 CFR 301.7611-1 - Questions and answers relating to church tax inquiries and examinations.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... regarding, among other things, withholding responsibilities for income tax or FICA (social security) tax... the church; (2) compliance with income tax or FICA (social security) tax withholding responsibilities... exemption or for unrelated business income (for instance, assessments of social security or other employment...

  14. 20 CFR 410.686d - Payment of fees.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... from benefits payable under the Act to any beneficiary. (c) Responsibility of the Social Security Administration. The Social Security Administration assumes no responsibility for the payment of a fee based on a... Employees' Benefits SOCIAL SECURITY ADMINISTRATION FEDERAL COAL MINE HEALTH AND SAFETY ACT OF 1969, TITLE IV...

  15. 76 FR 80241 - Revisions to Rules of Conduct and Standards of Responsibility for Representatives

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-12-23

    ... SOCIAL SECURITY ADMINISTRATION 20 CFR Parts 404 and 416 [Docket No. SSA-2011-0016] RIN 0960-AH32 Revisions to Rules of Conduct and Standards of Responsibility for Representatives AGENCY: Social Security.... FOR FURTHER INFORMATION CONTACT: Andrew Maunz, Office of the General Counsel, Social Security...

  16. Design and Characterization of Optical Metamaterials Using Tunable Polarimetric Scatterometry

    DTIC Science & Technology

    2012-12-01

    metamaterial absorber (MMA) [33]. The MMA was found to have an incident angle depend resonance, which was captured with Mm polarimetry measurements...TERMS Dual Rotating Retarder, Polarimetry Scatterometry, Metamaterials, Near-Zero Permittivity 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF

  17. 44 CFR 206.394 - Cost eligibility.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... incident fires involving co-mingled Federal/State and privately owned forest or grassland. (10) In those... Interstate Forest Fire Protection Compacts, eligible costs are reimbursed in accordance with eligibility... HOMELAND SECURITY DISASTER ASSISTANCE FEDERAL DISASTER ASSISTANCE Fire Suppression Assistance § 206.394...

  18. 32 CFR 236.2 - Definitions.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... DEPARTMENT OF DEFENSE (DOD)-DEFENSE INDUSTRIAL BASE (DIB) VOLUNTARY CYBER SECURITY AND INFORMATION ASSURANCE... defense information. (e) Cyber incident means actions taken through the use of computer networks that... residing therein. (f) Cyber intrusion damage assessment means a managed, coordinated process to determine...

  19. 32 CFR 236.2 - Definitions.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... DEPARTMENT OF DEFENSE (DOD)-DEFENSE INDUSTRIAL BASE (DIB) VOLUNTARY CYBER SECURITY AND INFORMATION ASSURANCE... defense information. (e) Cyber incident means actions taken through the use of computer networks that... residing therein. (f) Cyber intrusion damage assessment means a managed, coordinated process to determine...

  20. 3 CFR 9047 - Proclamation 9047 of October 31, 2013. Critical Infrastructure Security and Resilience Month, 2013

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... defenses against physical and cyber incidents. In tandem with my Executive Order on cybersecurity, this... natural disasters, as well as cyber attacks. We must ensure that the Federal Government works with all...

  1. 77 FR 72673 - Critical Infrastructure Protection and Resilience Month, 2012

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-12-05

    .... Cyber incidents can have devastating consequences on both physical and virtual infrastructure, which is... work within existing authorities to fortify our country against cyber risks, comprehensive legislation remains essential to improving infrastructure security, enhancing cyber information sharing between...

  2. The prevalence of painful incidents among young recreational gymnasts

    PubMed Central

    Coates, Chrystal; McMurtry, C Meghan; Lingley-Pottie, Patricia; McGrath, Patrick J

    2010-01-01

    BACKGROUND: Although children experience pain during their daily life, research has generally focused on medical pain. Sport-related pain has not been widely studied in children and research has not examined the occurrence of painful incidents in gymnastics. The prevalence of painful incidents among children in recreational gymnastics classes and accompanying coach responses were recorded. METHODS: Sixty-one children between five and 10 years of age were observed at a gymnastics club. A checklist was used to record painful incidents as well as coach and child responses. RESULTS: The rate of painful incidents was 0.17 per child per hour observed. The floor apparatus was the most common site of incidents, while bumping into equipment was the most common incident. Based on observer ratings, most incidents were mild to moderate in severity and, on average, the child’s reaction to these mild to moderate incidents lasted for 8.5 s. Forty per cent of the children had a mild to moderate painful experience. Coaches reacted to more than 60% of the painful incidents, usually asking how the child was and what had happened. A significant difference was found between the mean severity ratings of painful incidents that were followed by coach response and incidents followed by no response. CONCLUSION: Most children who attend recreational gymnastics classes will likely experience at least one mild to moderate painful experience for every 6 h of class. Coaches are more inclined to react to a painful incident than not. Moreover, a difference was found that suggests coaches responded to more painful incidents. PMID:20577661

  3. Changing the paradigm of emergency response: The need for first-care providers.

    PubMed

    Bobko, Joshua P; Kamin, Richard

    2015-01-01

    There is a major gap in the security of the critical infrastructure - civilian medical response to atypical emergencies. Clear evidence demonstrates that, despite ongoing improvements to the first-responder system, there exists an inherent delay in the immediate medical care at the scene of an emergency. This delay can only be reduced through a societal shift in reliance on police and fire response and by extending the medical system into all communities. Additionally, through analysis of military data, it is known that immediately addressing the common injury patterns following a traumatic event will save lives. The predictable nature of these injuries, coupled with an unavoidable delay in the arrival of first responders, necessitates the need for immediate care on scene. Initial care is often rendered by bystanders, typically armed only with basic first-aid training based on medical emergencies and does not adequately address the traumatic injury patterns seen in disasters. Implementing an approach similar to the American Cardiac Arrest Act can improve outcomes to traumatic events. This paper analyses the latest data on active shooter incidents and proposes that the creation of a network of trauma-trained medic extenders would improve all communities' resilience to catastrophic disaster.

  4. Wheeled mobility device transportation safety in fixed route and demand-responsive public transit vehicles within the United States.

    PubMed

    Frost, Karen L; van Roosmalen, Linda; Bertocci, Gina; Cross, Douglas J

    2012-01-01

    An overview of the current status of wheelchair transportation safety in fixed route and demand-responsive, non-rail, public transportation vehicles within the US is presented. A description of each mode of transportation is provided, followed by a discussion of the primary issues affecting safety, accessibility, and usability. Technologies such as lifts, ramps, securement systems, and occupant restraint systems, along with regulations and voluntary industry standards have been implemented with the intent of improving safety and accessibility for individuals who travel while seated in their wheeled mobility device (e.g., wheelchair or scooter). However, across both fixed route and demand-responsive transit systems a myriad of factors such as nonuse and misuse of safety systems, oversized wheeled mobility devices, vehicle space constraints, and inadequate vehicle operator training may place wheeled mobility device (WhMD) users at risk of injury even under non-impact driving conditions. Since WhMD-related incidents also often occur during the boarding and alighting process, the frequency of these events, along with factors associated with these events are described for each transit mode. Recommendations for improving WhMD transportation are discussed given the current state of

  5. Random-phase metasurfaces at optical wavelengths

    NASA Astrophysics Data System (ADS)

    Pors, Anders; Ding, Fei; Chen, Yiting; Radko, Ilya P.; Bozhevolnyi, Sergey I.

    2016-06-01

    Random-phase metasurfaces, in which the constituents scatter light with random phases, have the property that an incident plane wave will diffusely scatter, hereby leading to a complex far-field response that is most suitably described by statistical means. In this work, we present and exemplify the statistical description of the far-field response, particularly highlighting how the response for polarised and unpolarised light might be alike or different depending on the correlation of scattering phases for two orthogonal polarisations. By utilizing gap plasmon-based metasurfaces, consisting of an optically thick gold film overlaid by a subwavelength thin glass spacer and an array of gold nanobricks, we design and realize random-phase metasurfaces at a wavelength of 800 nm. Optical characterisation of the fabricated samples convincingly demonstrates the diffuse scattering of reflected light, with statistics obeying the theoretical predictions. We foresee the use of random-phase metasurfaces for camouflage applications and as high-quality reference structures in dark-field microscopy, while the control of the statistics for polarised and unpolarised light might find usage in security applications. Finally, by incorporating a certain correlation between scattering by neighbouring metasurface constituents new types of functionalities can be realised, such as a Lambertian reflector.

  6. TCIA Secure Cyber Critical Infrastructure Modernization.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Keliiaa, Curtis M.

    The Sandia National Laboratories (Sandia Labs) tribal cyber infrastructure assurance initiative was developed in response to growing national cybersecurity concerns in the the sixteen Department of Homeland Security (DHS) defined critical infrastructure sectors1. Technical assistance is provided for the secure modernization of critical infrastructure and key resources from a cyber-ecosystem perspective with an emphasis on enhanced security, resilience, and protection. Our purpose is to address national critical infrastructure challenges as a shared responsibility.

  7. Status Update on the NCRP Scientific Committee SC 5-1 Report: Decision Making for Late-Phase Recovery from Nuclear or Radiological Incidents - 13450

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Chen, S.Y.

    2013-07-01

    In August 2008, the U.S. Department of Homeland Security (DHS) issued its final Protective Action Guide (PAG) for radiological dispersal device (RDD) and improvised nuclear device (IND) incidents. This document specifies protective actions for public health during the early and intermediate phases and cleanup guidance for the late phase of RDD or IND incidents, and it discusses approaches to implementing the necessary actions. However, while the PAG provides specific guidance for the early and intermediate phases, it prescribes no equivalent guidance for the late-phase cleanup actions. Instead, the PAG offers a general description of a complex process using a site-specificmore » optimization approach. This approach does not predetermine cleanup levels but approaches the problem from the factors that would bear on the final agreed-on cleanup levels. Based on this approach, the decision-making process involves multifaceted considerations including public health, the environment, and the economy, as well as socio-political factors. In an effort to fully define the process and approach to be used in optimizing late-phase recovery and site restoration following an RDD or IND incident, DHS has tasked the NCRP with preparing a comprehensive report addressing all aspects of the optimization process. Preparation of the NCRP report is a three-year (2010-2013) project assigned to a scientific committee, the Scientific Committee (SC) 5-1; the report was initially titled, Approach to Optimizing Decision Making for Late- Phase Recovery from Nuclear or Radiological Terrorism Incidents. Members of SC 5-1 represent a broad range of expertise, including homeland security, health physics, risk and decision analysis, economics, environmental remediation and radioactive waste management, and communication. In the wake of the Fukushima nuclear accident of 2011, and guided by a recent process led by the White House through a Principal Level Exercise (PLE), the optimization approach has since been expanded to include off-site contamination from major nuclear power plant accidents as well as other nuclear or radiological incidents. The expanded application under the current guidance has thus led to a broadened scope of the report, which is reflected in its new title, Decision Making for Late-Phase Recovery from Nuclear or Radiological Incidents. The NCRP report, which is due for publication in 2013, will substantiate the current DHS guidance by clarifying and elaborating on the processes required for the development and implementation of procedures for optimizing decision making for late-phase recovery, enabling the establishment of cleanup goals on a site-specific basis. The report will contain a series of topics addressing important issues related to the long-term recovery from nuclear or radiological incidents. Special topics relevant to supporting the optimization of the decision-making process will include cost-benefit analysis, radioactive waste management, risk communication, stakeholder interaction, risk assessment, and decontamination approaches and techniques. The committee also evaluated past nuclear and radiological incidents for their relevance to the report, including the emerging issues associated with the Fukushima nuclear accident. Thus, due to the commonality of the late-phase issues (such as the potential widespread contamination following an event), the majority of the information pertaining to the response in the late-phase decision-making period, including site-specific optimization framework and approach, could be used or adapted for use in case of similar situations that are not due to terrorism, such as those that would be caused by major nuclear facility accidents or radiological incidents. To ensure that the report and the NCRP recommendations are current and relevant to the effective implementation of federal guidance, SC 5-1 has actively coordinated with the agencies of interest and other relevant stakeholders throughout the duration of the project. The resulting report will be an important resource to guide those involved in late-phase recovery efforts following a nuclear or radiological incident. (authors)« less

  8. Efficacy of critical incident monitoring for evaluating disaster medical readiness and response during the Sydney 2000 Olympic Games.

    PubMed

    Flabouris, Arthas; Nocera, Antony; Garner, Alan

    2004-01-01

    Multiple casualty incidents (MCI) are infrequent events for medical systems. This renders audit and quality improvement of the medical responses difficult. Quality tools and use of such tools for improvement is necessary to ensure that the design of medical systems facilitates the best possible response to MCI. To describe the utility of incident reporting as a quality monitoring and improvement tool during the deployment of medical teams for mass gatherings and multiple casualty incidents. Voluntary and confidential reporting of incidents was provided by members of the disaster medical response teams during the period of disaster medical team deployment for the 2000 Sydney Olympic Games. Qualitative evaluations were conducted of reported incidents. The main outcome measures included the nature of incident and associated contributing factors, minimization factors, harm potential, and comparison with the post-deployment, cold debriefings. A total of 53 incidents were reported. Management-based decisions, poor or non-existent protocols, and equipment and communication-related issues were the principal contributing factors. Eighty nine percent of the incidents were considered preventable. A potential for harm to patients and/or team members was documented in 58% of reports, of which 76% were likely to cause at least significant harm. Of equipment incidents, personal protective equipment (33%), medical equipment (27%), provision of equipment (22%), and communication equipment (17%) predominated. Personal protective equipment (50%) was reported as the most frequent occupational health and safety incident followed by fatigue (25%). Pre-deployment planning was the most important factor for future incident impact minimization. Incident monitoring was efficacious as a quality tool in identifying incident contributing factors. Incident monitoring allowed for greater systems evaluation. Further evaluation of this quality tool within different disaster settings is required.

  9. Addressing the Need for Independence in the CSE Model

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Abercrombie, Robert K; Ferragut, Erik M; Sheldon, Frederick T

    2011-01-01

    Abstract Information system security risk, defined as the product of the monetary losses associated with security incidents and the probability that they occur, is a suitable decision criterion when considering different information system architectures. Risk assessment is the widely accepted process used to understand, quantify, and document the effects of undesirable events on organizational objectives so that risk management, continuity of operations planning, and contingency planning can be performed. One technique, the Cyberspace Security Econometrics System (CSES), is a methodology for estimating security costs to stakeholders as a function of possible risk postures. In earlier works, we presented a computationalmore » infrastructure that allows an analyst to estimate the security of a system in terms of the loss that each stakeholder stands to sustain, as a result of security breakdowns. Additional work has applied CSES to specific business cases. The current state-of-the-art of CSES addresses independent events. In typical usage, analysts create matrices that capture their expert opinion, and then use those matrices to quantify costs to stakeholders. This expansion generalizes CSES to the common real-world case where events may be dependent.« less

  10. Supporting secure programming in web applications through interactive static analysis.

    PubMed

    Zhu, Jun; Xie, Jing; Lipford, Heather Richter; Chu, Bill

    2014-07-01

    Many security incidents are caused by software developers' failure to adhere to secure programming practices. Static analysis tools have been used to detect software vulnerabilities. However, their wide usage by developers is limited by the special training required to write rules customized to application-specific logic. Our approach is interactive static analysis, to integrate static analysis into Integrated Development Environment (IDE) and provide in-situ secure programming support to help developers prevent vulnerabilities during code construction. No additional training is required nor are there any assumptions on ways programs are built. Our work is motivated in part by the observation that many vulnerabilities are introduced due to failure to practice secure programming by knowledgeable developers. We implemented a prototype interactive static analysis tool as a plug-in for Java in Eclipse. Our technical evaluation of our prototype detected multiple zero-day vulnerabilities in a large open source project. Our evaluations also suggest that false positives may be limited to a very small class of use cases.

  11. Supporting secure programming in web applications through interactive static analysis

    PubMed Central

    Zhu, Jun; Xie, Jing; Lipford, Heather Richter; Chu, Bill

    2013-01-01

    Many security incidents are caused by software developers’ failure to adhere to secure programming practices. Static analysis tools have been used to detect software vulnerabilities. However, their wide usage by developers is limited by the special training required to write rules customized to application-specific logic. Our approach is interactive static analysis, to integrate static analysis into Integrated Development Environment (IDE) and provide in-situ secure programming support to help developers prevent vulnerabilities during code construction. No additional training is required nor are there any assumptions on ways programs are built. Our work is motivated in part by the observation that many vulnerabilities are introduced due to failure to practice secure programming by knowledgeable developers. We implemented a prototype interactive static analysis tool as a plug-in for Java in Eclipse. Our technical evaluation of our prototype detected multiple zero-day vulnerabilities in a large open source project. Our evaluations also suggest that false positives may be limited to a very small class of use cases. PMID:25685513

  12. Spousal Coping Strategies in the Shadow of Terrorism.

    PubMed

    Shechory-Bitton, Mally; Cohen-Louck, Keren

    2017-11-01

    The present study focuses on spousal differences in reaction to ongoing exposure to terror and security threats. Sixty-eight married couples with children living in a region exposed to ongoing security threats were evaluated. All participants completed questionnaires on objective exposure (number of incidents) and subjective exposure (sense of fear) to terrorism and security threats, posttraumatic stress disorder (PTSD) symptoms, and their coping strategies with this ongoing exposure. Mothers reported higher levels of fear and PTSD symptoms, although their objective levels of exposure did not differ from those of their husbands. Similarities were found in coping strategies adopted by mothers and fathers to cope with life in the shadow of terrorism. Both mothers and fathers integrated emotion- and problem-focused coping strategies, with greater use of the latter. These similarities partially contradict research findings suggesting gender differences in coping with exposure to security threats. The results support the need for further research into investigating the role of dyadic coping in the context of prolonged exposure to security threats.

  13. Privacy with emergency medical information used in first response.

    PubMed

    Croll, Peter R; Ambrosoli, Kimberly M

    2012-01-01

    In an emergency there are many stages of Medical response. This paper focuses on the first response stage of an emergency medical incident, for example, a sporting accident. Today's Information Technology together with mobile devices now permits vital medical information regarding an individual to be available at the scene. Those first in attendance are often not medically trained. The literature shows the importance of appropriate first response in minimising harm and the significant investments being made to educate the public in this regard. It also highlights the privacy concerns that arise from the provision of sensitive health information in electronic form. The method utilised is a Privacy Impact Assessment to ascertain the suitability and compliance of the proposed technology. This approach follows the privacy guidelines specified by the Australian government to include information flow mapping, evaluation, compliance analysis, risk analysis and recommendations to management. The resultant output is a list of specific questions and a set of commendations and recommendations that are matched against the National Privacy Principles. The paper concludes that: the approach is both technical and pragmatically viable; it can meet all the reasonableness tests for privacy concerns; it can adopt standard security measures, and; it discusses its potential to be integrated into Personally Controlled Electronic Health Records.

  14. Department of the Navy For Policy

    Science.gov Websites

    Policy DEPARTMENT OF THE NAVY For Policy Search this site... Search Policy Security Skip navigation links Security Expand Security Deputy Under Secretary of the Navy (Policy) Roles and Responsibilities: - Policy Page Content Deputy Under Secretary of the Navy (Policy) Roles and Responsibilities: Enterprise OPM

  15. 31 CFR 375.15 - Who is responsible for delivering securities?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 31 Money and Finance: Treasury 2 2010-07-01 2010-07-01 false Who is responsible for delivering securities? 375.15 Section 375.15 Money and Finance: Treasury Regulations Relating to Money and Finance....23.) All securities you deliver must be free and clear of all liens, charges, claims, and any other...

  16. 31 CFR 375.15 - Who is responsible for delivering securities?

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 31 Money and Finance:Treasury 2 2013-07-01 2013-07-01 false Who is responsible for delivering securities? 375.15 Section 375.15 Money and Finance: Treasury Regulations Relating to Money and Finance....23.) All securities you deliver must be free and clear of all liens, charges, claims, and any other...

  17. 31 CFR 375.15 - Who is responsible for delivering securities?

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 31 Money and Finance: Treasury 2 2014-07-01 2014-07-01 false Who is responsible for delivering securities? 375.15 Section 375.15 Money and Finance: Treasury Regulations Relating to Money and Finance....23.) All securities you deliver must be free and clear of all liens, charges, claims, and any other...

  18. 31 CFR 375.15 - Who is responsible for delivering securities?

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 31 Money and Finance:Treasury 2 2012-07-01 2012-07-01 false Who is responsible for delivering securities? 375.15 Section 375.15 Money and Finance: Treasury Regulations Relating to Money and Finance....23.) All securities you deliver must be free and clear of all liens, charges, claims, and any other...

  19. 31 CFR 375.15 - Who is responsible for delivering securities?

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 31 Money and Finance:Treasury 2 2011-07-01 2011-07-01 false Who is responsible for delivering securities? 375.15 Section 375.15 Money and Finance: Treasury Regulations Relating to Money and Finance....23.) All securities you deliver must be free and clear of all liens, charges, claims, and any other...

  20. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Gordon, S.

    During the period from fiscal year (FY) 2009 to FY 2011, there were a total of 21 incidents involving radioactively contaminated shipment trailers and 9 contaminated waste packages received at the Nevada National Security Site (NNSS) Area 5 Radioactive Waste Management Site (RWMS). During this time period, the EnergySolutions (ES) Clive, Utah, disposal facility had a total of 18 similar incidents involving trailer and package contamination issues. As a result of the increased occurrence of such incidents, DOE Environmental Management Headquarters (EM/HQ) Waste Management organization (EM-30) requested that the Energy Facility Contractors’ Group (EFCOG) Waste Management Working Group (WMWG) conductmore » a detailed review of these incidents and report back to EM-30 regarding the results of this review, including providing any recommendations formulated as a result of the evaluation of current site practices involving handling and management of radioactive material and waste shipments.« less

  1. Public health incident management: Logistical and operational aspects of the 2009 initial outbreak of H1N1 influenza in Mexico.

    PubMed

    Cruz, Miguel A; Hawk, Nicole M; Poulet, Christopher; Rovira, Jose; Rouse, Edward N

    2015-01-01

    Hosting an international outbreak response team can pose a challenge to jurisdictions not familiar with incident management frameworks. Basic principles of team forming, organizing, and executing mission critical activities require simple and flexible communication that can be easily understood by the host country's public health leadership and international support agencies. Familiarity with incident command system principles before a public health emergency could save time and effort during the initial phases of the response and aid in operationalizing and sustaining complex field activities throughout the response. The 2009 initial outbreak of H1N1 in Mexico highlighted the importance of adequately organizing and managing limited resources and expertise using incident management principles. This case study describes logistical and operational aspects of the response and highlights challenges faced during this response that may be relevant to the organization of public health responses and incidents requiring international assistance and cooperation.

  2. Public health incident management: logistical and operational aspects of the 2009 initial outbreak of H1N1 influenza in Mexico.

    PubMed

    Cruz, Miguel A; Hawk, Nicole M; Poulet, Christopher; Rovira, Jose; Rouse, Edward N

    2015-01-01

    Hosting an international outbreak response team can pose a challenge to jurisdictions not familiar with incident management frameworks. Basic principles of team forming, organizing, and executing mission critical activities require simple and flexible communication that can be easily understood by the host country's public health leadership and international support agencies. Familiarity with incident command system principles before a public health emergency could save time and effort during the initial phases of the response and aid in operationalizing and sustaining complex field activities throughout the response. The 2009 initial outbreak of H1N1 in Mexico highlighted the importance of adequately organizing and managing limited resources and expertise using incident management principles. This case study describes logistical and operational aspects of the response and highlights challenges faced during this response that may be relevant to the organization of public health responses and incidents requiring international assistance and cooperation.

  3. Understanding and managing the movements of hazardous material shipments through Texas population centers.

    DOT National Transportation Integrated Search

    2009-08-01

    Every day almost a million shipments of hazardous materials move safely and securely along our nations transportation system, via any combination of modes. Only a small fraction of total shipments interrupt their planned journey due to an incident...

  4. Aviation security : long-standing problems impair airport screeners' performance

    DOT National Transportation Integrated Search

    2000-06-01

    The threat of attacks on aircraft by terrorists or others remains a persistent and growing concern for the United States. According to the Federal Bureau of Investigation, the trend in terrorism against U.S. targets is toward large-scale incidents de...

  5. 32 CFR 236.2 - Definitions.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... DEPARTMENT OF DEFENSE (DoD)-DEFENSE INDUSTRIAL BASE (DIB) VOLUNTARY CYBER SECURITY AND INFORMATION ASSURANCE... information. (e) Cyber incident means actions taken through the use of computer networks that result in an...) Cyber intrusion damage assessment means a managed, coordinated process to determine the effect on...

  6. State of security at US colleges and universities: a national stakeholder assessment and recommendations.

    PubMed

    Greenberg, Sheldon F

    2007-09-01

    In 2004 the US Department of Justice, Office of Community Oriented Policing Services, sponsored a National Summit on Campus Public Safety. The summit brought together various stakeholders including campus police and security officials, local police chiefs, college and university faculty and administrators, federal officials, students and parents, and community leaders to address the issues and complexities of campus safety. Delegates to the summit identified key issues in campus safety and security, which included establishing a national center on campus safety, balancing traditional open environments with the need to secure vulnerable sites, improving coordination with state and local police, reducing internal fragmentation, elevating professionalism, and increasing eligibility of campus police and security agencies to compete for federal law enforcement funds. Focus on "active shooters" on campus, resulting from the Virginia Tech incident, should not diminish attention placed on the broader, more prevalent safety and security issues facing the nation's educational campuses. Recommendations resulting from the summit called for establishing a national agenda on campus safety, formation of a national center on campus public safety, and increased opportunity for campus police and security agencies to compete for federal and state funds.

  7. Secure ADS-B authentication system and method

    NASA Technical Reports Server (NTRS)

    Viggiano, Marc J (Inventor); Valovage, Edward M (Inventor); Samuelson, Kenneth B (Inventor); Hall, Dana L (Inventor)

    2010-01-01

    A secure system for authenticating the identity of ADS-B systems, including: an authenticator, including a unique id generator and a transmitter transmitting the unique id to one or more ADS-B transmitters; one or more ADS-B transmitters, including a receiver receiving the unique id, one or more secure processing stages merging the unique id with the ADS-B transmitter's identification, data and secret key and generating a secure code identification and a transmitter transmitting a response containing the secure code and ADSB transmitter's data to the authenticator; the authenticator including means for independently determining each ADS-B transmitter's secret key, a receiver receiving each ADS-B transmitter's response, one or more secure processing stages merging the unique id, ADS-B transmitter's identification and data and generating a secure code, and comparison processing comparing the authenticator-generated secure code and the ADS-B transmitter-generated secure code and providing an authentication signal based on the comparison result.

  8. What is Security? A perspective on achieving security

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Atencio, Julian J.

    This presentation provides a perspective on achieving security in an organization. It touches upon security as a mindset, ability to adhere to rules, cultivating awareness of the reason for a security mindset, the quality of a security program, willingness to admit fault or acknowledge failure, peer review in security, science as a model that can be applied to the security profession, the security vision, security partnering, staleness in the security program, security responsibilities, and achievement of success over time despite the impossibility of perfection.

  9. Utilization of Local Law Enforcement Aerial Resources in Consequence Management (CM) Response

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Wasiolek, Piotr T.; Malchow, Russell L.

    2013-03-12

    During the past decade the U.S. Department of Homeland Security (DHS) was instrumental in enhancing the nation’s ability to detect and prevent a radiological or nuclear attack in the highest risk cities. Under the DHS Securing the Cities initiative, nearly 13,000 personnel in the New York City region have been trained in preventive radiological and nuclear detection operations, and nearly 8,500 pieces of radiological detection equipment have been funded. As part of the preventive radiological/nuclear detection (PRND) mission, several cities have received funding to purchase commercial aerial radiation detection systems. In 2008, the U.S. Department of Energy, National Nuclear Securitymore » Administration Aerial Measuring System (AMS) program started providing Mobile Aerial Radiological Surveillance (MARS) training to such assets, resulting in over 150 HAZMAT teams’ officers and pilots from 10 law enforcement organizations and fire departments being trained in the aerial radiation detection. From the beginning, the MARS training course covered both the PRND and consequence management (CM) missions. Even if the law enforcement main focus is PRND, their aerial assets can be utilized in the collection of initial radiation data for post-event radiological CM response. Based on over 50 years of AMS operational experience and information collected during MARS training, this presentation will focus on the concepts of CM response using aerial assets as well as utilizing law enforcement/fire department aerial assets in CM. Also discussed will be the need for establishing closer relationships between local jurisdictions’ aerial radiation detection capabilities and state and local radiation control program directors, radiological health department managers, etc. During radiological events these individuals may become primary experts/advisers to Incident Commanders for radiological emergency response, especially in the early stages of a response. The knowledge of the existence, specific capabilities, and use of local aerial radiation detection systems would be critical in planning the response, even before federal assets arrive on the scene. The relationship between local and federal aerial assets and the potential role for the further use of the MARS training and expanded AMS Reachback capabilities in facilitating such interactions will be discussed.« less

  10. Fiber optic security seal including plural Bragg gratings

    DOEpatents

    Forman, Peter R.

    1994-01-01

    An optical security system enables the integrity of a container seal to be remotely interrogated. A plurality of Bragg gratings is written holographically into the core of at least one optical fiber placed about the container seal, where each Bragg grating has a predetermined location and a known frequency for reflecting incident light. A time domain reflectometer is provided with a variable frequency light output that corresponds to the reflecting frequencies of the Bragg gratings to output a signal that is functionally related to the location and reflecting frequency of each of the Bragg gratings.

  11. CERT(Restricted) Resilience Management Model (CERT(Restricted)-RMM) V1.1: NIST Special Publication 800-66 Crosswalk

    DTIC Science & Technology

    2013-10-01

    Technology Assets • EXD:SG2 Manage Risks Due to External Dependencies (SP1-SP2) • EXD:SG3.SP4 Formalize Relationships 5 . Data Backup Plan and...Information Access Management (C.E.R. § 164.308(a)(4)) 11 4.5. Security Awareness and Training (C.E.R. § 164.308(a)( 5 )) 13 4.6. Security Incident Procedures...for managing operational resilience. It has two primary objectives: • Establish the convergence of operational risk and resilience management

  12. Dealing with problem number one--budget cuts: can you do more with less?

    PubMed

    2001-09-01

    To cope with current budget restraints and cutbacks, hospital security departments are increasingly integrating their manpower with technology in the form of access control, CCTV cameras, and alarm systems to supplement their services as well as becoming more dependent on computerized information technology systems and IT departments to track hospital activities and incidents. Security directors contacted for this report also emphasize that they are doing more with less by providing value-added services both to expand activities and to demonstrate the importance of their departments to top management.

  13. The Barrow-in-Furness legionnaires' outbreak: qualitative study of the hospital response and the role of the major incident plan.

    PubMed

    Smith, A F; Wild, C; Law, J

    2005-04-01

    To document the organisational response of Furness General Hospital to the large outbreak of legionnaire's disease in April 2002 and assess the contribution made by the hospital's major incident plan. Qualitative analysis of interview transcripts and written comments from some staff involved in the management of the incident. Documentary analysis of major incident plan and other written materials. The incident posed considerable managerial and clinical problems and this paper describes how they were overcome. In particular, strategies for dealing with supply (of staff, beds, and resources) and managing demand (by liaising with primary care and the public) seem to have been successful. Many functions necessary for managing the incident were poorly dealt with in the plan, especially procedures for handling the news media and liaison with agencies outside the hospital. Lack of explicit guidance appeared not to hinder the organisational response. There may have been an unspoken high level decision to allow staff to draw on their skills and experience in improvising a response to the initial challenge and learning adaptively as the incident unfolded. There was also evidence that staff disregarded existing job and role boundaries and focused instead on tasks, working flexibly to ensure that these tasks were completed. Protracted major incidents pose particular management challenges and may benefit from an approach different from that set out in typical major incident plans. Staff must be able to act flexibly and responsively. Some form of checklist or toolkit may be preferable to a detailed plan for some types of incident.

  14. The Barrow-in-Furness legionnaires' outbreak: qualitative study of the hospital response and the role of the major incident plan

    PubMed Central

    Smith, A; Wild, C; Law, J

    2005-01-01

    Objective: To document the organisational response of Furness General Hospital to the large outbreak of legionnaire's disease in April 2002 and assess the contribution made by the hospital's major incident plan. Method: Qualitative analysis of interview transcripts and written comments from some staff involved in the management of the incident. Documentary analysis of major incident plan and other written materials. Results: The incident posed considerable managerial and clinical problems and this paper describes how they were overcome. In particular, strategies for dealing with supply (of staff, beds, and resources) and managing demand (by liaising with primary care and the public) seem to have been successful. Many functions necessary for managing the incident were poorly dealt with in the plan, especially procedures for handling the news media and liaison with agencies outside the hospital. Lack of explicit guidance appeared not to hinder the organisational response. There may have been an unspoken high level decision to allow staff to draw on their skills and experience in improvising a response to the initial challenge and learning adaptively as the incident unfolded. There was also evidence that staff disregarded existing job and role boundaries and focused instead on tasks, working flexibly to ensure that these tasks were completed. Conclusions: Protracted major incidents pose particular management challenges and may benefit from an approach different from that set out in typical major incident plans. Staff must be able to act flexibly and responsively. Some form of checklist or toolkit may be preferable to a detailed plan for some types of incident. PMID:15788822

  15. Disasters and mass casualties: I. General principles of response and management.

    PubMed

    Born, Christopher T; Briggs, Susan M; Ciraulo, David L; Frykberg, Eric R; Hammond, Jeffrey S; Hirshberg, Asher; Lhowe, David W; O'Neill, Patricia A

    2007-07-01

    Disaster planning and response to a mass casualty incident pose unique demands on the medical community. Because they would be required to confront many casualties with bodily injury and surgical problems, surgeons in particular must become better educated in disaster management. Compared with routine practice, triage principles in disasters require an entirely different approach to evaluation and care and often run counter to training and ethical values. An effective response to disaster and mass casualty events should focus on an "all hazards" approach, defined as the ability to adapt and apply fundamental disaster management principles universally to any mass casualty incident, whether caused by people or nature. Organizational tools such as the Incident Command System and the Hospital Incident Command System help to effect a rapid and coordinated response to specific situations. The United States federal government, through the National Response Plan, has the responsibility to respond quickly and efficiently to catastrophic incidents and to ensure critical life-saving assistance. International medical surgical response teams are capable of providing medical, surgical, and intensive care services in austere environments anywhere in the world.

  16. OEM Emergency Response Information

    EPA Pesticide Factsheets

    The Office of Emergency Management retains records of all incident responses in which it participates. This data asset includes three major sources of information: (1) records maintained by the Regional Office On-Scene Coordinators, principally at the EPAOSC.org web site, (2) all records of incidents managed at the EPA National Response Center (NRC) at EPA Headquarters in Washington, DC and (3) records of responses to oil spills under the Clean Water Act, for which EPA is the oil spill response lead for inland waters. Regional response information is available through EPAOSC.org, but may also be stored elsewhere if the incident is of national significance. EPAOSC.org is a resource for On-Scene Coordinators to access, track and share information with OSCs throughout the country, but it also contains information open to the public.Incident-related environmental sampling data is maintained by the regional offices in the SCRIBE system.NRC records have been maintained in the Emergency Response Notification System (ERNS). This information is available to the public through the Right to Know Network (RTKnet.ombwatch.org). Incidents reported to NRC range from minor to serious, from an oil-sheen on water to a release of thousands of gallons. NRC reports are extensive, but also known to be incomplete, as many incidents are never reported, and those that are reported generally are not subject to verification.

  17. Social security work disability and its predictors in patients with fibromyalgia.

    PubMed

    Wolfe, Frederick; Walitt, Brian T; Katz, Robert S; Häuser, Winfried

    2014-09-01

    To determine prevalence and incidence of US Social Security Disability and Supplemental Security Income (SSD) in patients with fibromyalgia and to investigate prediction of SSD. Over a mean of 4 years (range 1-13 years), we studied 2,321 patients with physician-diagnosed fibromyalgia (prevalent cases) and applied modified American College of Rheumatology (ACR) 2010 research criteria to identify criteria-positive patients. During the study, 34.8% (95% confidence interval [95% CI] 32.9-36.8%) of fibromyalgia patients received SSD. The annual incidence of SSD among patients not receiving SSD at study enrollment was 3.4% (95% CI 3.0-3.9%), and 25% were estimated to be work disabled at 9.0 years of followup. By comparison, the prevalence of SSD in rheumatoid arthritis (RA) patients with concomitant fibromyalgia was 55.6% (95% CI 54.3-57.0%) and was 42.4% in osteoarthritis (OA). By study conclusion, 31.4% of SSD awardees were no longer receiving SSD. In univariate models, incident SSD in patients with fibromyalgia was predicted by sociodemographic measures and by symptom burden; but the strongest predictor was functional status (Health Assessment Questionnaire disability index [HAQ DI]). In multivariable models, the HAQ DI and the Short Form 36-item health survey physical and mental component summary scores, but no other variables, predicted SSD. Fibromyalgia criteria-positive patients had more SSD, but the continuous scale, polysymptomatic distress index derived from the ACR criteria was a substantially better predictor of SSD than a criteria-positive diagnosis. The prevalence of SSD is high in fibromyalgia, but not higher than in RA and OA patients who satisfy fibromyalgia criteria. The best predictors of work disability are functional status variables. Copyright © 2014 by the American College of Rheumatology.

  18. Enhancing the Safety, Security and Resilience of ICT and Scada Systems Using Action Research

    NASA Astrophysics Data System (ADS)

    Johnsen, Stig; Skramstad, Torbjorn; Hagen, Janne

    This paper discusses the results of a questionnaire-based survey used to assess the safety, security and resilience of information and communications technology (ICT) and supervisory control and data acquisition (SCADA) systems used in the Norwegian oil and gas industry. The survey identifies several challenges, including the involvement of professionals with different backgrounds and expertise, lack of common risk perceptions, inadequate testing and integration of ICT and SCADA systems, poor information sharing related to undesirable incidents and lack of resilience in the design of technical systems. Action research is proposed as a process for addressing these challenges in a systematic manner and helping enhance the safety, security and resilience of ICT and SCADA systems used in oil and gas operations.

  19. 6 CFR 5.46 - Procedure when response to demand is required prior to receiving instructions.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Procedure when response to demand is required prior to receiving instructions. 5.46 Section 5.46 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY DISCLOSURE OF RECORDS AND INFORMATION Disclosure of Information in Litigation § 5...

  20. 29 CFR 2550.407a-2 - Limitation with respect to the acquisition of qualifying employer securities and qualifying...

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... FIDUCIARY RESPONSIBILITY UNDER THE EMPLOYEE RETIREMENT INCOME SECURITY ACT OF 1974 RULES AND REGULATIONS FOR FIDUCIARY RESPONSIBILITY § 2550.407a-2 Limitation with respect to the acquisition of qualifying employer... employer securities and qualifying employer real property. 2550.407a-2 Section 2550.407a-2 Labor...

Top