Sample records for state security agents

  1. 75 FR 39437 - Optimizing the Security of Biological Select Agents and Toxins in the United States

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-07-08

    ... recommended laboratory critical infrastructure security standards in these areas; and 5. other emerging policy... legitimate activities. (c) Understanding that research and laboratory work on BSAT is essential to both... of the SAR that would establish security standards specific to Tier 1 agents and toxins. (b) The...

  2. 17 CFR 239.43 - Form F-N, appointment of agent for service of process by foreign banks and foreign insurance...

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Form F-N, appointment of agent for service of process by foreign banks and foreign insurance companies and certain of their holding companies and finance subsidiaries making public offerings of securities in the United States. 239.43 Section 239.43 Commodity and Securities...

  3. 17 CFR 239.43 - Form F-N, appointment of agent for service of process by foreign banks and foreign insurance...

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 17 Commodity and Securities Exchanges 2 2011-04-01 2011-04-01 false Form F-N, appointment of agent for service of process by foreign banks and foreign insurance companies and certain of their holding companies and finance subsidiaries making public offerings of securities in the United States. 239.43 Section 239.43 Commodity and Securities...

  4. 12 CFR 615.5500 - Definitions.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... AND OPERATIONS, AND FUNDING OPERATIONS Global Debt Securities § 615.5500 Definitions. In this subpart, unless the context otherwise requires or indicates: (a) Global debt securities means consolidated... United States or simultaneously inside and outside the United States. (b) Global agent means any fiscal...

  5. 12 CFR 615.5500 - Definitions.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... AND OPERATIONS, AND FUNDING OPERATIONS Global Debt Securities § 615.5500 Definitions. In this subpart, unless the context otherwise requires or indicates: (a) Global debt securities means consolidated... United States or simultaneously inside and outside the United States. (b) Global agent means any fiscal...

  6. 12 CFR 615.5500 - Definitions.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... AND OPERATIONS, AND FUNDING OPERATIONS Global Debt Securities § 615.5500 Definitions. In this subpart, unless the context otherwise requires or indicates: (a) Global debt securities means consolidated... United States or simultaneously inside and outside the United States. (b) Global agent means any fiscal...

  7. 12 CFR 615.5500 - Definitions.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... AND OPERATIONS, AND FUNDING OPERATIONS Global Debt Securities § 615.5500 Definitions. In this subpart, unless the context otherwise requires or indicates: (a) Global debt securities means consolidated... United States or simultaneously inside and outside the United States. (b) Global agent means any fiscal...

  8. Evaluating Software Assurance Knowledge and Competency of Acquisition Professionals

    DTIC Science & Technology

    2014-10-01

    of ISO 12207 -2008, both internationally and in the United States [7]. That standard documents a comprehensive set of activities and supporting...grows, organizations must ensure that their procurement agents acquire high quality, secure software. ISO 12207 and the Software Assurance Competency...cyberattacks grows, organizations must ensure that their procurement agents acquire high quality, secure software. ISO 12207 and the Software Assurance

  9. 31 CFR 306.113 - Cases not requiring bonds of indemnity.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... the security was in the custody or control of the United States, or a duly authorized agent thereof... GOVERNING U.S. SECURITIES Relief for Loss, Theft, Destruction, Mutilation, or Defacement of Securities § 306... relief for the loss, theft, destruction, mutilation, or defacement of registered securities in any of the...

  10. Multilayer quantum secret sharing based on GHZ state and generalized Bell basis measurement in multiparty agents

    NASA Astrophysics Data System (ADS)

    Wang, Xiao-Jun; An, Long-Xi; Yu, Xu-Tao; Zhang, Zai-Chen

    2017-10-01

    A multilayer quantum secret sharing protocol based on GHZ state is proposed. Alice has the secret carried by quantum state and wants to distribute this secret to multiple agent nodes in the network. In this protocol, the secret is transmitted and shared layer by layer from root Alice to layered agents. The number of agents in each layer is a geometric sequence with a specific common ratio. By sharing GHZ maximally entangled states and making generalized Bell basis measurement, one qubit state can be distributed to multiparty agents and the secret is shared. Only when all agents at the last layer cooperate together, the secret can be recovered. Compared with other protocols based on the entangled state, this protocol adopts layered construction so that secret can be distributed to more agents with fewer particles GHZ state. This quantum secret sharing protocol can be used in wireless network to ensure the security of information delivery.

  11. Agency Problems and Airport Security: Quantitative and Qualitative Evidence on the Impact of Security Training.

    PubMed

    de Gramatica, Martina; Massacci, Fabio; Shim, Woohyun; Turhan, Uğur; Williams, Julian

    2017-02-01

    We analyze the issue of agency costs in aviation security by combining results from a quantitative economic model with a qualitative study based on semi-structured interviews. Our model extends previous principal-agent models by combining the traditional fixed and varying monetary responses to physical and cognitive effort with nonmonetary welfare and potentially transferable value of employees' own human capital. To provide empirical evidence for the tradeoffs identified in the quantitative model, we have undertaken an extensive interview process with regulators, airport managers, security personnel, and those tasked with training security personnel from an airport operating in a relatively high-risk state, Turkey. Our results indicate that the effectiveness of additional training depends on the mix of "transferable skills" and "emotional" buy-in of the security agents. Principals need to identify on which side of a critical tipping point their agents are to ensure that additional training, with attached expectations of the burden of work, aligns the incentives of employees with the principals' own objectives. © 2016 Society for Risk Analysis.

  12. U.S. Patent Pending, Information Security Analysis Using Game Theory and Simulation, U.S. Patent Application No.: 14/097,840

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Abercrombie, Robert K; Schlicher, Bob G

    Vulnerability in security of an information system is quantitatively predicted. The information system may receive malicious actions against its security and may receive corrective actions for restoring the security. A game oriented agent based model is constructed in a simulator application. The game ABM model represents security activity in the information system. The game ABM model has two opposing participants including an attacker and a defender, probabilistic game rules and allowable game states. A specified number of simulations are run and a probabilistic number of the plurality of allowable game states are reached in each simulation run. The probability ofmore » reaching a specified game state is unknown prior to running each simulation. Data generated during the game states is collected to determine a probability of one or more aspects of security in the information system.« less

  13. When nightclub security agents assault clients more insight through a qualitative approach.

    PubMed

    Romain-Glassey, Nathalie; Gut, Melody; De Puy, Jacqueline; Mangin, Patrice

    2014-08-01

    Between 2007 and 2009, aggressions by security agents of nightclubs on clients increased from 6% to 10% among community violence situations encountered at the Violence Medical Unit (VMU) at the Lausanne University Hospital in Switzerland. Most victims were young men who had been drinking alcohol before the assault. About one quarter (25.7%) presented with one or several fractures, all of them in the head area. (For more details, refer to the previous article "When nightclub security agents assault clients" published in 2012(1).) Following this first study, we performed a second qualitative study in order to bring more information about the context and highlight victims' behaviors and experiences. Four themes emerged: how the assault began; the assault itself; third-party involvement; and the psychological state of victims when they consulted the VMU. The findings of this second study complemented the statistical results of the first study by showing under what circumstances security agents of nightclubs respond with physical violence to situations they consider a threat to security. Furthermore, the study described consequences for the victims that could be quite serious. Our findings support the need for nightclubs to improve selection and training of security staff. Copyright © 2014 Elsevier Ltd and Faculty of Forensic and Legal Medicine. All rights reserved.

  14. Multipartite entanglement verification resistant against dishonest parties.

    PubMed

    Pappa, Anna; Chailloux, André; Wehner, Stephanie; Diamanti, Eleni; Kerenidis, Iordanis

    2012-06-29

    Future quantum information networks will consist of quantum and classical agents, who have the ability to communicate in a variety of ways with trusted and untrusted parties and securely delegate computational tasks to untrusted large-scale quantum computing servers. Multipartite quantum entanglement is a fundamental resource for such a network and, hence, it is imperative to study the possibility of verifying a multipartite entanglement source in a way that is efficient and provides strong guarantees even in the presence of multiple dishonest parties. In this Letter, we show how an agent of a quantum network can perform a distributed verification of a source creating multipartite Greenberger-Horne-Zeilinger (GHZ) states with minimal resources, which is, nevertheless, resistant against any number of dishonest parties. Moreover, we provide a tight tradeoff between the level of security and the distance between the state produced by the source and the ideal GHZ state. Last, by adding the resource of a trusted common random source, we can further provide security guarantees for all honest parties in the quantum network simultaneously.

  15. Security of a kind of quantum secret sharing with entangled states.

    PubMed

    Wang, Tian-Yin; Liu, Ying-Zhao; Wei, Chun-Yan; Cai, Xiao-Qiu; Ma, Jian-Feng

    2017-05-30

    We present a new collusion attack to a kind of quantum secret sharing schemes with entangled states. Using this attack, an unauthorized set of agents can gain access to the shared secret without the others' cooperation. Furthermore, we establish a general model for this kind of quantum secret sharing schemes and then give some necessary conditions to design a secure quantum secret sharing scheme under this model.

  16. A Mechanism to Avoid Collusion Attacks Based on Code Passing in Mobile Agent Systems

    NASA Astrophysics Data System (ADS)

    Jaimez, Marc; Esparza, Oscar; Muñoz, Jose L.; Alins-Delgado, Juan J.; Mata-Díaz, Jorge

    Mobile agents are software entities consisting of code, data, state and itinerary that can migrate autonomously from host to host executing their code. Despite its benefits, security issues strongly restrict the use of code mobility. The protection of mobile agents against the attacks of malicious hosts is considered the most difficult security problem to solve in mobile agent systems. In particular, collusion attacks have been barely studied in the literature. This paper presents a mechanism that avoids collusion attacks based on code passing. Our proposal is based on a Multi-Code agent, which contains a different variant of the code for each host. A Trusted Third Party is responsible for providing the information to extract its own variant to the hosts, and for taking trusted timestamps that will be used to verify time coherence.

  17. Human health risk assessment database, "the NHSRC toxicity value database": supporting the risk assessment process at US EPA's National Homeland Security Research Center.

    PubMed

    Moudgal, Chandrika J; Garrahan, Kevin; Brady-Roberts, Eletha; Gavrelis, Naida; Arbogast, Michelle; Dun, Sarah

    2008-11-15

    The toxicity value database of the United States Environmental Protection Agency's (EPA) National Homeland Security Research Center has been in development since 2004. The toxicity value database includes a compilation of agent property, toxicity, dose-response, and health effects data for 96 agents: 84 chemical and radiological agents and 12 biotoxins. The database is populated with multiple toxicity benchmark values and agent property information from secondary sources, with web links to the secondary sources, where available. A selected set of primary literature citations and associated dose-response data are also included. The toxicity value database offers a powerful means to quickly and efficiently gather pertinent toxicity and dose-response data for a number of agents that are of concern to the nation's security. This database, in conjunction with other tools, will play an important role in understanding human health risks, and will provide a means for risk assessors and managers to make quick and informed decisions on the potential health risks and determine appropriate responses (e.g., cleanup) to agent release. A final, stand alone MS ACESSS working version of the toxicity value database was completed in November, 2007.

  18. System and method for secure group transactions

    DOEpatents

    Goldsmith, Steven Y [Rochester, MN

    2006-04-25

    A method and a secure system, processing on one or more computers, provides a way to control a group transaction. The invention uses group consensus access control and multiple distributed secure agents in a network environment. Each secure agent can organize with the other secure agents to form a secure distributed agent collective.

  19. 42 CFR 455.100 - Purpose.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... the Social Security Act. It sets forth State plan requirements regarding— (a) Disclosure by providers... Federal financial participation for services furnished by providers or fiscal agents who fail to comply...

  20. 287(g): Cross-Delegating State and Local Law Enforcement Officers with Federal Immigration Authority - Homeland Security Remedy or Rue?

    DTIC Science & Technology

    2008-12-01

    ICE Office of Investigations uses its legal authority to investigate issues such as immigration crime , human rights violations, and human smuggling...communities. Crimes committed by foreign nationals — many exploited by terrorists — pose ideological, legal and resource challenges to state and local...umbrella of the Special Agent In Charge (SAC) in Denver , Colorado . Utah ICE OI falls under the supervisory umbrella of the Assistant Special Agent In

  1. Security Measures to Protect Mobile Agents

    NASA Astrophysics Data System (ADS)

    Dadhich, Piyanka; Govil, M. C.; Dutta, Kamlesh

    2010-11-01

    The security issues of mobile agent systems have embarrassed its widespread implementation. Mobile agents that move around the network are not safe because the remote hosts that accommodate the agents initiates all kinds of attacks. These hosts try to analyze the agent's decision logic and their accumulated data. So, mobile agent security is the most challenging unsolved problems. The paper analyzes various security measures deeply. Security especially the attacks performed by hosts to the visiting mobile agent (the malicious hosts problem) is a major obstacle that prevents mobile agent technology from being widely adopted. Being the running environment for mobile agent, the host has full control over them and could easily perform many kinds of attacks against them.

  2. 17 CFR 239.43 - Form F-N, appointment of agent for service of process by foreign banks and foreign insurance...

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... for service of process by foreign banks and foreign insurance companies and certain of their holding companies and finance subsidiaries making public offerings of securities in the United States. 239.43... agent for service of process by foreign banks and foreign insurance companies and certain of their...

  3. 17 CFR 239.43 - Form F-N, appointment of agent for service of process by foreign banks and foreign insurance...

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... for service of process by foreign banks and foreign insurance companies and certain of their holding companies and finance subsidiaries making public offerings of securities in the United States. 239.43... agent for service of process by foreign banks and foreign insurance companies and certain of their...

  4. 17 CFR 239.43 - Form F-N, appointment of agent for service of process by foreign banks and foreign insurance...

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... for service of process by foreign banks and foreign insurance companies and certain of their holding companies and finance subsidiaries making public offerings of securities in the United States. 239.43... agent for service of process by foreign banks and foreign insurance companies and certain of their...

  5. Reflective Thinking and Emotional Intelligence as Predictive Performance Factors in Problem-Based Learning Situations

    ERIC Educational Resources Information Center

    Mitchell-White, Kathleen

    2010-01-01

    Continued improvement of the training and preparation of Federal Bureau of Investigation (FBI) special agents is critical to the organization's ability to protect the national security of the United States. Too little attention has been paid to the factors that improve new agent trainees' (NATs) ability to learn and succeed in their training…

  6. Continuous Security and Configuration Monitoring of HPC Clusters

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Garcia-Lomeli, H. D.; Bertsch, A. D.; Fox, D. M.

    Continuous security and configuration monitoring of information systems has been a time consuming and laborious task for system administrators at the High Performance Computing (HPC) center. Prior to this project, system administrators had to manually check the settings of thousands of nodes, which required a significant number of hours rendering the old process ineffective and inefficient. This paper explains the application of Splunk Enterprise, a software agent, and a reporting tool in the development of a user application interface to track and report on critical system updates and security compliance status of HPC Clusters. In conjunction with other configuration managementmore » systems, the reporting tool is to provide continuous situational awareness to system administrators of the compliance state of information systems. Our approach consisted of the development, testing, and deployment of an agent to collect any arbitrary information across a massively distributed computing center, and organize that information into a human-readable format. Using Splunk Enterprise, this raw data was then gathered into a central repository and indexed for search, analysis, and correlation. Following acquisition and accumulation, the reporting tool generated and presented actionable information by filtering the data according to command line parameters passed at run time. Preliminary data showed results for over six thousand nodes. Further research and expansion of this tool could lead to the development of a series of agents to gather and report critical system parameters. However, in order to make use of the flexibility and resourcefulness of the reporting tool the agent must conform to specifications set forth in this paper. This project has simplified the way system administrators gather, analyze, and report on the configuration and security state of HPC clusters, maintaining ongoing situational awareness. Rather than querying each cluster independently, compliance checking can be managed from one central location.« less

  7. Should the U.S. Department of State Continue to Use Private Security Contractors to Protect U.S. Diplomats

    DTIC Science & Technology

    2008-06-13

    USE PRIVATE SECURITY CONTRACTORS TO PROTECT U.S. DIPLOMATS 5c. PROGRAM ELEMENT NUMBER 5d. PROJECT NUMBER 5e. TASK NUMBER 6. AUTHOR( S ...Special Agent Derek Dela-Cruz 5f. WORK UNIT NUMBER 7. PERFORMING ORGANIZATION NAME( S ) AND ADDRESS(ES) U.S. Army Command and General Staff College...

  8. The general theory of three-party quantum secret sharing protocols over phase-damping channels

    NASA Astrophysics Data System (ADS)

    Song, Ting-Ting; Wen, Qiao-Yan; Qin, Su-Juan; Zhang, Wei-Wei; Sun, Ying

    2013-10-01

    The general theory of three-party QSS protocols with the noisy quantum channels is discussed. When the particles are transmitted through the noisy quantum channels, the initial pure three-qubit tripartite entangled states would be changed into mixed states. We analyze the security of QSS protocols with the different kinds of three-qubit tripartite entangled states under phase-damping channels and figure out, for different kinds of initial states, the successful probabilities that Alice's secret can be recovered by legal agents are different. Comparing with one recent QSS protocol based on GHZ states, our scheme is secure, and has a little smaller key rate than that of the recent protocol.

  9. U.S. ENVIRONMENTAL PROTECTION AGENCY'S EVALUATION OF EARLY WARNING SENSORS AND MONITORS FOR DISTRIBUTION

    EPA Science Inventory

    Since the terrorist attacks on the United States on September 11, 2001, the safety and security of the United States drinking water distribution systems has been reassessed. Several chemical and biological agents have been identified that could constitute a credible threat agains...

  10. Securing General Aviation

    DTIC Science & Technology

    2008-01-24

    operations of large corporate jets and professionally managed fractional-ownership fleets — makes up about one- quarter of all GA operations and... 2018 , it is expected that there will be about 18,000 GA turbojets in service in the United States, compared to an estimate of slightly more than 10,000...spray a chemical blister agent into a packed college football stadium CRS-17 43 White House Homeland Security Council, David Howe, Senior Director for

  11. Security patterns and a weighting scheme for mobile agents

    NASA Astrophysics Data System (ADS)

    Walker, Jessie J.

    The notion of mobility has always been a prime factor in human endeavor and achievement. This need to migrate by humans has been distilled into software entities, which are their representatives on distant environments. Software agents are developed to act on behalf of a user. Mobile agents were born from the understanding that many times it was much more useful to move the code (program) to where the resources are located, instead of connecting remotely. Within the mobile agent research community, security has traditionally been the most defining issue facing the community and preventing the paradigm from gaining wide acceptance. There are still numerous difficult problems being addressed with very few practical solutions, such as the malicious host and agent problems. These problems are some of the most active areas of research within the mobile agent community. The major principles, facets, fundamental concepts, techniques and architectures of the field are well understood within the community. This is evident by the many mobile agent systems developed in the last decade that share common core components such as agent management, communication facilities, and mobility services. In other words new mobile agent systems and frameworks do not provide any new insights into agent system architecture or mobility services, agent coordination, communication that could be useful to the agent research community, although these new mobile agent systems do in many instances validate, refine, demonstrate the reuse of many previously proposed and discussed mobile agent research elements. Since mobile agent research for the last decade has been defined by security and related issues, our research into security patterns are within this narrow arena of mobile agent research. The research presented in this thesis examines the issue of mobile agent security from the standpoint of security pattern documented from the universe of mobile agent systems. In addition, we explore how these documented security patterns can be quantitatively compared based on a unique weighting scheme. The scheme is formalized into a theory that can be used improve the development of secure mobile agents and agent-based systems.

  12. Information security for compliance with select agent regulations.

    PubMed

    Lewis, Nick; Campbell, Mark J; Baskin, Carole R

    2015-01-01

    The past decade has seen a significant rise in research on high-consequence human and animal pathogens, many now known as "select agents." While physical security around these agents is tightly regulated, information security standards are still lagging. The understanding of the threats unique to the academic and research environment is still evolving, in part due to poor communication between the various stakeholders. Perhaps as a result, information security guidelines published by select agent regulators lack the critical details and directives needed to achieve even the lowest security level of the Federal Information Security Management Act (FISMA). While only government agencies are currently required to abide by the provisions of FISMA (unless specified as preconditions for obtaining government grants or contracts--still a relatively rare or narrowly scoped occurrence), the same strategies were recently recommended by executive order for others. We propose that information security guidelines for select agent research be updated to promulgate and detail FISMA standards and processes and that the latter be ultimately incorporated into select agent regulations. We also suggest that information security in academic and research institutions would greatly benefit from active efforts to improve communication among the biosecurity, security, and information technology communities, and from a secure venue for exchange of timely information on emerging threats and solutions in the research environment.

  13. Information Security for Compliance with Select Agent Regulations

    PubMed Central

    Lewis, Nick; Campbell, Mark J.

    2015-01-01

    The past decade has seen a significant rise in research on high-consequence human and animal pathogens, many now known as “select agents.” While physical security around these agents is tightly regulated, information security standards are still lagging. The understanding of the threats unique to the academic and research environment is still evolving, in part due to poor communication between the various stakeholders. Perhaps as a result, information security guidelines published by select agent regulators lack the critical details and directives needed to achieve even the lowest security level of the Federal Information Security Management Act (FISMA). While only government agencies are currently required to abide by the provisions of FISMA (unless specified as preconditions for obtaining government grants or contracts—still a relatively rare or narrowly scoped occurrence), the same strategies were recently recommended by executive order for others. We propose that information security guidelines for select agent research be updated to promulgate and detail FISMA standards and processes and that the latter be ultimately incorporated into select agent regulations. We also suggest that information security in academic and research institutions would greatly benefit from active efforts to improve communication among the biosecurity, security, and information technology communities, and from a secure venue for exchange of timely information on emerging threats and solutions in the research environment. PMID:26042864

  14. Intelligent Interoperable Agent Toolkit (I2AT)

    DTIC Science & Technology

    2005-02-01

    Agents, Agent Infrastructure, Intelligent Agents 16. PRICE CODE 17. SECURITY CLASSIFICATION OF REPORT UNCLASSIFIED 18. SECURITY ...CLASSIFICATION OF THIS PAGE UNCLASSIFIED 19. SECURITY CLASSIFICATION OF ABSTRACT UNCLASSIFIED 20. LIMITATION OF ABSTRACT UL NSN 7540-01...those that occur while the submarine is submerged. Using CoABS Grid/Jini service discovery events backed up with a small amount of internal bookkeeping

  15. Managing security risks for inter-organisational information systems: a multiagent collaborative model

    NASA Astrophysics Data System (ADS)

    Feng, Nan; Wu, Harris; Li, Minqiang; Wu, Desheng; Chen, Fuzan; Tian, Jin

    2016-09-01

    Information sharing across organisations is critical to effectively managing the security risks of inter-organisational information systems. Nevertheless, few previous studies on information systems security have focused on inter-organisational information sharing, and none have studied the sharing of inferred beliefs versus factual observations. In this article, a multiagent collaborative model (MACM) is proposed as a practical solution to assess the risk level of each allied organisation's information system and support proactive security treatment by sharing beliefs on event probabilities as well as factual observations. In MACM, for each allied organisation's information system, we design four types of agents: inspection agent, analysis agent, control agent, and communication agent. By sharing soft findings (beliefs) in addition to hard findings (factual observations) among the organisations, each organisation's analysis agent is capable of dynamically predicting its security risk level using a Bayesian network. A real-world implementation illustrates how our model can be used to manage security risks in distributed information systems and that sharing soft findings leads to lower expected loss from security risks.

  16. Technologies for distributed defense

    NASA Astrophysics Data System (ADS)

    Seiders, Barbara; Rybka, Anthony

    2002-07-01

    For Americans, the nature of warfare changed on September 11, 2001. Our national security henceforth will require distributed defense. One extreme of distributed defense is represented by fully deployed military troops responding to a threat from a hostile nation state. At the other extreme is a country of 'citizen soldiers', with families and communities securing their common defense through heightened awareness, engagement as good neighbors, and local support of and cooperation with local law enforcement, emergency and health care providers. Technologies - for information exploitation, biological agent detection, health care surveillance, and security - will be critical to ensuring success in distributed defense.

  17. Security of Mobile Agents on the Internet.

    ERIC Educational Resources Information Center

    Corradi, Antonio; Montanari, Rebecca; Stefanelli, Cesare

    2001-01-01

    Discussion of the Internet focuses on new programming paradigms based on mobile agents. Considers the security issues associated with mobile agents and proposes a security architecture composed of a wide set of services and components capable of adapting to a variety of applications, particularly electronic commerce. (Author/LRW)

  18. 31 CFR 321.25 - Payment and retention of definitive securities.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... prohibited from accepting an image, or other copy or reproduction of the definitive security, for redemption or processing. To ensure that all transactions processed by agents are properly validated, agents... converted to an electronic image. At a minimum, the agent must retain such securities for a period of thirty...

  19. 31 CFR 321.25 - Payment and retention of definitive securities.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... agent is prohibited from accepting an image, or other copy or reproduction of the definitive security, for redemption or processing. To ensure that all transactions processed by agents are properly... truncated and converted to an electronic image. At a minimum, the agent must retain such securities for a...

  20. 31 CFR 321.25 - Payment and retention of definitive securities.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... prohibited from accepting an image, or other copy or reproduction of the definitive security, for redemption or processing. To ensure that all transactions processed by agents are properly validated, agents... converted to an electronic image. At a minimum, the agent must retain such securities for a period of thirty...

  1. 75 FR 68012 - Notice of Intention To Cancel Registrations of Certain Transfer Agents

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-11-04

    ... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-63211] Notice of Intention To Cancel Registrations of Certain Transfer Agents October 29, 2010. Notice is hereby given that the Securities and... Securities Exchange Act of 1934 (``Act''),\\1\\ cancelling the registrations of the transfer agents whose names...

  2. Report of the Working Group on Strengthening the Biosecurity of the United States

    DTIC Science & Technology

    2009-10-01

    affecting humans and granted the USDA authority comparable to that of the CDC to regulate entities that possess, use, and transfer BSAT that present a... fruitful history in academia, and includes research on pathogens that only recently have been designated “select agents and toxins.” This open...risk, with less emphasis on biosecurity and biodefense, and fail to consider issues that affect U.S. national security (e.g., selection of an agent

  3. Mobile code security

    NASA Astrophysics Data System (ADS)

    Ramalingam, Srikumar

    2001-11-01

    A highly secure mobile agent system is very important for a mobile computing environment. The security issues in mobile agent system comprise protecting mobile hosts from malicious agents, protecting agents from other malicious agents, protecting hosts from other malicious hosts and protecting agents from malicious hosts. Using traditional security mechanisms the first three security problems can be solved. Apart from using trusted hardware, very few approaches exist to protect mobile code from malicious hosts. Some of the approaches to solve this problem are the use of trusted computing, computing with encrypted function, steganography, cryptographic traces, Seal Calculas, etc. This paper focuses on the simulation of some of these existing techniques in the designed mobile language. Some new approaches to solve malicious network problem and agent tampering problem are developed using public key encryption system and steganographic concepts. The approaches are based on encrypting and hiding the partial solutions of the mobile agents. The partial results are stored and the address of the storage is destroyed as the agent moves from one host to another host. This allows only the originator to make use of the partial results. Through these approaches some of the existing problems are solved.

  4. iCrowd: agent-based behavior modeling and crowd simulator

    NASA Astrophysics Data System (ADS)

    Kountouriotis, Vassilios I.; Paterakis, Manolis; Thomopoulos, Stelios C. A.

    2016-05-01

    Initially designed in the context of the TASS (Total Airport Security System) FP-7 project, the Crowd Simulation platform developed by the Integrated Systems Lab of the Institute of Informatics and Telecommunications at N.C.S.R. Demokritos, has evolved into a complete domain-independent agent-based behavior simulator with an emphasis on crowd behavior and building evacuation simulation. Under continuous development, it reflects an effort to implement a modern, multithreaded, data-oriented simulation engine employing latest state-of-the-art programming technologies and paradigms. It is based on an extensible architecture that separates core services from the individual layers of agent behavior, offering a concrete simulation kernel designed for high-performance and stability. Its primary goal is to deliver an abstract platform to facilitate implementation of several Agent-Based Simulation solutions with applicability in several domains of knowledge, such as: (i) Crowd behavior simulation during [in/out] door evacuation. (ii) Non-Player Character AI for Game-oriented applications and Gamification activities. (iii) Vessel traffic modeling and simulation for Maritime Security and Surveillance applications. (iv) Urban and Highway Traffic and Transportation Simulations. (v) Social Behavior Simulation and Modeling.

  5. Principal-agent problems in health care systems: an international perspective.

    PubMed

    Smith, P C; Stepan, A; Valdmanis, V; Verheyen, P

    1997-07-01

    A central feature of all health care systems is the flow of finances from the population, via a variety of agencies, to the providers of health care. Each transfer of funds within the system involves a principal-agent problem, in the sense that a principal is entrusting funds to an agent with the intention that some desired aspect of health care delivery can be secured. This paper examines within the context of a principal-agent model three key elements of the health care system: the raising of finance, the transfer of funds to hospitals, and spending by hospitals. At each of these stages there is a danger that the objectives of society for the health care system are lost. In order to illustrate the issues involved, five mature systems of health care are examined: Austria, Germany, the United Kingdom, the Netherlands and the United States of America. The paper concludes that three aspects of the flow of funds are crucial to securing adequate control: the means of controlling patient entry to hospitals; the mechanism for remunerating hospitals for additional patients; and the control of physicians by hospital management.

  6. 42 CFR 73.11 - Security.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... select agent or toxin against unauthorized access, theft, loss, or release. (b) The security plan must be... activities, loss or theft of select agents or toxins, release of select agents or toxins, or alteration of... of select agents or toxins, (iv) Any release of a select agent or toxin, and (v) Any sign that...

  7. 9 CFR 121.11 - Security.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... the select agent or toxin against unauthorized access, theft, loss, or release. (b) The security plan... activities, loss or theft of select agents or toxins, release of select agents or toxins, or alteration of... of select agents or toxins; (iv) Any release of a select agent or toxin; and (v) Any sign that...

  8. 31 CFR 10.6 - Enrollment as an enrolled agent or enrolled retirement plan agent.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... or enrolled retirement plan agent's name, prior address, new address, social security number or tax... individuals licensed to practice before the Internal Revenue Service who have a social security number or tax... Internal Revenue Service who have a social security number or tax identification number that ends with the...

  9. 7 CFR 331.10 - Restricting access to select agents and toxins; security risk assessments.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ...; security risk assessments. 331.10 Section 331.10 Agriculture Regulations of the Department of Agriculture (Continued) ANIMAL AND PLANT HEALTH INSPECTION SERVICE, DEPARTMENT OF AGRICULTURE POSSESSION, USE, AND TRANSFER OF SELECT AGENTS AND TOXINS § 331.10 Restricting access to select agents and toxins; security risk...

  10. Implementing the global health security agenda: lessons from global health and security programs.

    PubMed

    Paranjape, Suman M; Franz, David R

    2015-01-01

    The Global Health Security Agenda (GHSA) describes a vision for a world that is safe and secure from infectious disease threats; it underscores the importance of developing the international capacity to prevent, detect, and respond to pandemic agents. In February 2014, the United States committed to support the GHSA by expanding and intensifying ongoing efforts across the US government. Implementing these goals will require interagency coordination and harmonization of diverse health security elements. Lessons learned from the Global Health Initiative (GHI), the President's Emergency Program for AIDS Relief (PEPFAR), and the Cooperative Threat Reduction (CTR) program underscore that centralized political, technical, and fiscal authority will be key to developing robust, sustainable, and integrated global health security efforts across the US government. In this article, we review the strengths and challenges of GHI, PEPFAR, and CTR and develop recommendations for implementing a unified US global health security program.

  11. From the Bear’s Mouth: Analyzing Vladimir Putin’s Rhetoric and Its Implications for Russian Grand Strategy

    DTIC Science & Technology

    2016-06-01

    analysts fielded questions about whether the crisis in Ukraine was the start of a new Cold War. The American public’s surprise and confusion...Foreign Policy, CNN, Time Magazine, The Economist, The Wall Street Journal, The New Yorker, The Atlantic, and more. National security analysts fielded...Bezopasnosti (Committee for State Security or KGB) agent who rose from political obscurity, Putin’s past can be difficult to research . However, there are

  12. A Quantum Proxy Weak Blind Signature Scheme Based on Controlled Quantum Teleportation

    NASA Astrophysics Data System (ADS)

    Cao, Hai-Jing; Yu, Yao-Feng; Song, Qin; Gao, Lan-Xiang

    2015-04-01

    Proxy blind signature is applied to the electronic paying system, electronic voting system, mobile agent system, security of internet, etc. A quantum proxy weak blind signature scheme is proposed in this paper. It is based on controlled quantum teleportation. Five-qubit entangled state functions as quantum channel. The scheme uses the physical characteristics of quantum mechanics to implement message blinding, so it could guarantee not only the unconditional security of the scheme but also the anonymity of the messages owner.

  13. 19 CFR 113.22 - Witnesses required.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY... stating on the bond “as to both”. (c) Corporate principal or surety. No witnesses are required where bonds are executed by properly authorized officers or agents of a corporate principal or corporate surety...

  14. 19 CFR 113.22 - Witnesses required.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY... stating on the bond “as to both”. (c) Corporate principal or surety. No witnesses are required where bonds are executed by properly authorized officers or agents of a corporate principal or corporate surety...

  15. 19 CFR 113.22 - Witnesses required.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY... stating on the bond “as to both”. (c) Corporate principal or surety. No witnesses are required where bonds are executed by properly authorized officers or agents of a corporate principal or corporate surety...

  16. 19 CFR 113.22 - Witnesses required.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY... stating on the bond “as to both”. (c) Corporate principal or surety. No witnesses are required where bonds are executed by properly authorized officers or agents of a corporate principal or corporate surety...

  17. 19 CFR 113.22 - Witnesses required.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY... stating on the bond “as to both”. (c) Corporate principal or surety. No witnesses are required where bonds are executed by properly authorized officers or agents of a corporate principal or corporate surety...

  18. 5 CFR 550.103 - Definitions.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... Administrative Personnel OFFICE OF PERSONNEL MANAGEMENT CIVIL SERVICE REGULATIONS PAY ADMINISTRATION (GENERAL... subchapter V of chapter 55 of title 5, United States Code. Basic workweek, for full-time employees, means the... Foreign Service primary skill code of 2501; (4) Who is a special agent in the Diplomatic Security Service...

  19. [Security agents on the front line against Ebola: roles, perceptions and knowledge in Fann Teaching Hospital, Dakar, Senegal].

    PubMed

    Lanièce, C; Sow, K; Desclaux, A

    2016-10-01

    Security agents are on the front line when patients arrive at health facilities, giving them a potential role to play in an Ebola virus disease (EVD) outbreak. The position of security agents within health services is poorly documented. A survey was conducted to clarify their understanding of Ebola pathology, to assess their need for information and to determine their role in patient management. The survey included both qualitative and quantitative aspects. 80 security agents of the Fann teaching hospital (Dakar) completed questionnaires, and 11 were interviewed. Qualitative analysis was performed with Dedoose and the quantitative analysis using Excel. The results show that security agents' activities go beyond their mission of security and control. They are involved in informing, orienting and assisting patients and those accompanying them in the hospital. The security agents have basic knowledge of EVD, but overestimate the risk of transmission. They want to be more informed and to have access to protective material. These results suggest that these professionals should be taken into account when developing response strategies to Ebola outbreaks. Their knowledge of and protection against the disease must be strengthened. Non-health professionals working in health facilities should be trained in order to be able to relay information to the public.

  20. 7 CFR 1219.14 - Importer.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... holds title to Hass avocados produced outside of the United States immediately upon release by Customs, as well as any person who acts on behalf of others, as an agent, broker, or consignee, to secure the release of Hass avocados from Customs and the introduction of the released Hass avocados into the current...

  1. 31 CFR 308.1 - Issue.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 31 Money and Finance: Treasury 2 2010-07-01 2010-07-01 false Issue. 308.1 Section 308.1 Money and... Issue. Federal Reserve Banks, as Fiscal Agents of the United States, and the Treasury Department may issue full-paid interim certificates in lieu of definitive securities, against full-paid allotments of...

  2. 8 CFR 258.3 - Action upon arrival.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... Aliens and Nationality DEPARTMENT OF HOMELAND SECURITY IMMIGRATION REGULATIONS LIMITATIONS ON PERFORMANCE OF LONGSHORE WORK BY ALIEN CREWMEN § 258.3 Action upon arrival. (a) The master or agent of the vessel... the vessel will perform longshore work at any port before departing the United States; and (2) If...

  3. Patterns of cooperation: fairness and coordination in networks of interacting agents

    NASA Astrophysics Data System (ADS)

    Do, Anne-Ly; Rudolf, Lars; Gross, Thilo

    2010-06-01

    We study the self-assembly of a complex network of collaborations among self-interested agents. The agents can maintain different levels of cooperation with different partners. Further, they continuously, selectively and independently adapt the amount of resources allocated to each of their collaborations in order to maximize the obtained payoff. We show analytically that the system approaches a state in which the agents make identical investments, and links produce identical benefits. Despite this high degree of social coordination, some agents manage to secure privileged topological positions in the network, enabling them to extract high payoffs. Our analytical investigations provide a rationale for the emergence of unidirectional non-reciprocal collaborations and different responses to the withdrawal of a partner from an interaction that have been reported in the psychological literature.

  4. Developing Secure Agent Systems Using Delegation Based Trust Management

    DTIC Science & Technology

    2005-01-01

    delegation rules, so that the information in the SCM may be accessed only by authorized agents. Special intelligent agents called security agents are re... Bluetooth , IEEE 802.11, or Infrared, via any hand-held device, within a Vigil can also be used in wired systems, but the focal point of our re- search is

  5. Pervasive surveillance-agent system based on wireless sensor networks: design and deployment

    NASA Astrophysics Data System (ADS)

    Martínez, José F.; Bravo, Sury; García, Ana B.; Corredor, Iván; Familiar, Miguel S.; López, Lourdes; Hernández, Vicente; Da Silva, Antonio

    2010-12-01

    Nowadays, proliferation of embedded systems is enhancing the possibilities of gathering information by using wireless sensor networks (WSNs). Flexibility and ease of installation make these kinds of pervasive networks suitable for security and surveillance environments. Moreover, the risk for humans to be exposed to these functions is minimized when using these networks. In this paper, a virtual perimeter surveillance agent, which has been designed to detect any person crossing an invisible barrier around a marked perimeter and send an alarm notification to the security staff, is presented. This agent works in a state of 'low power consumption' until there is a crossing on the perimeter. In our approach, the 'intelligence' of the agent has been distributed by using mobile nodes in order to discern the cause of the event of presence. This feature contributes to saving both processing resources and power consumption since the required code that detects presence is the only system installed. The research work described in this paper illustrates our experience in the development of a surveillance system using WNSs for a practical application as well as its evaluation in real-world deployments. This mechanism plays an important role in providing confidence in ensuring safety to our environment.

  6. 17 CFR 240.17Ad-18 - Year 2000 Reports to be made by certain transfer agents.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 17 Commodity and Securities Exchanges 3 2013-04-01 2013-04-01 false Year 2000 Reports to be made by certain transfer agents. 240.17Ad-18 Section 240.17Ad-18 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) GENERAL RULES AND REGULATIONS, SECURITIES EXCHANGE ACT OF 1934...

  7. 17 CFR 240.17Ad-18 - Year 2000 Reports to be made by certain transfer agents.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 17 Commodity and Securities Exchanges 3 2012-04-01 2012-04-01 false Year 2000 Reports to be made by certain transfer agents. 240.17Ad-18 Section 240.17Ad-18 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) GENERAL RULES AND REGULATIONS, SECURITIES EXCHANGE ACT OF 1934...

  8. 17 CFR 240.17Ad-18 - Year 2000 Reports to be made by certain transfer agents.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 17 Commodity and Securities Exchanges 3 2011-04-01 2011-04-01 false Year 2000 Reports to be made by certain transfer agents. 240.17Ad-18 Section 240.17Ad-18 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) GENERAL RULES AND REGULATIONS, SECURITIES EXCHANGE ACT OF 1934...

  9. 17 CFR 240.17Ad-18 - Year 2000 Reports to be made by certain transfer agents.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 17 Commodity and Securities Exchanges 4 2014-04-01 2014-04-01 false Year 2000 Reports to be made by certain transfer agents. 240.17Ad-18 Section 240.17Ad-18 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) GENERAL RULES AND REGULATIONS, SECURITIES EXCHANGE ACT OF 1934...

  10. 17 CFR 240.17Ad-18 - Year 2000 Reports to be made by certain transfer agents.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Year 2000 Reports to be made by certain transfer agents. 240.17Ad-18 Section 240.17Ad-18 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) GENERAL RULES AND REGULATIONS, SECURITIES EXCHANGE ACT OF 1934...

  11. HUELGA, A MILESTONE IN FARM UNIONISM.

    ERIC Educational Resources Information Center

    COHEN, IRVING J.

    EARLY ATTEMPTS DURING THE 20TH CENTURY TO ORGANIZE FARM WORKERS, TO GAIN WAGE INCREASES, AND TO SECURE EMPLOYER RECOGNITION OF A UNION AS THE WORKERS' AGENT FOR COLLECTIVE BARGAINING FAILED. AN ESTIMATED 380 AGRICULTURAL STRIKES INVOLVED OVER 200,000 WORKERS IN 33 STATES BETWEEN 1930 AND 1948. THE NATIONAL LABOR RELATIONS ACT, ENACTED AS A RESULT…

  12. United States Border Security and Reserve Component Forces

    DTIC Science & Technology

    2007-03-15

    and the thirteen mile border between San Diego and Tijuana , Mexico. The Border Patrol increased the number of agents from 3,389 in 1993 to 6,213 in...that assemble goods for exportation, known as the “ maquilas ,” to relocate to Mexico’s interior and southern regions.30 The infrastructure problems

  13. Purchasing. School Business Management Handbook Number 5.

    ERIC Educational Resources Information Center

    New York State Education Dept., Albany.

    Purchasing, one of the most highly specialized activities in school administration, involves securing material or service in the right quantity and quality, at the right time, and for the right price. This handbook, intended as a guide for purchasing agents, details principles essential for operating a school purchasing office in New York State.…

  14. Development of a matrix to evaluate the threat of biological agents used for bioterrorism.

    PubMed

    Tegnell, A; Van Loock, F; Baka, A; Wallyn, S; Hendriks, J; Werner, A; Gouvras, G

    2006-10-01

    Adequate public health preparedness for bioterrorism includes the elaboration of an agreed list of biological and chemical agents that might be used in an attack or as threats of deliberate release. In the absence of counterterrorism intelligence information, public health authorities can also base their preparedness on the agents for which the national health structures would be most vulnerable. This article aims to describe a logical method and the characteristics of the variables to be brought in a weighing process to reach a priority list for preparedness. The European Union, in the aftermath of the anthrax events of October 2001 in the United States, set up a task force of experts from multiple member states to elaborate and implement a health security programme. One of the first tasks of this task force was to come up with a list of priority threats. The model, presented here, allows Web-based updates for newly identified agents and for the changes occurring in preventive measures for agents already listed. The same model also allows the identification of priority protection action areas.

  15. Laboratory security and emergency response guidance for laboratories working with select agents. Centers for Disease Control and Prevention.

    PubMed

    Richmond, Jonathan Y; Nesby-O'Dell, Shanna L

    2002-12-06

    In recent years, concern has increased regarding use of biologic materials as agents of terrorism, but these same agents are often necessary tools in clinical and research microbiology laboratories. Traditional biosafety guidelines for laboratories have emphasized use of optimal work practices, appropriate containment equipment, well-designed facilities, and administrative controls to minimize risk of worker injury and to ensure safeguards against laboratory contamination. The guidelines discussed in this report were first published in 1999 (U.S. Department of Health and Human Services/CDC and National Institutes of Health. Biosafety in microbiological and biomedical laboratories [BMBL]. Richmond JY, McKinney RW, eds. 4th ed. Washington, DC: US Department of Health and Human Services, 1999 [Appendix F]). In that report, physical security concerns were addressed, and efforts were focused on preventing unauthorized entry to laboratory areas and preventing unauthorized removal of dangerous biologic agents from the laboratory. Appendix F of BMBL is now being revised to include additional information regarding personnel risk assessments, and inventory controls. The guidelines contained in this report are intended for laboratories working with select agents under biosafety-level 2, 3, or 4 conditions as described in Sections II and III of BMBL. These recommendations include conducting facility risk assessments and developing comprehensive security plans to minimize the probability of misuse of select agents. Risk assessments should include systematic, site-specific reviews of 1) physical security; 2) security of data and electronic technology systems; 3) employee security; 4) access controls to laboratory and animal areas; 5) procedures for agent inventory and accountability; 6) shipping/transfer and receiving of select agents; 7) unintentional incident and injury policies; 8) emergency response plans; and 9) policies that address breaches in security. The security plan should be an integral part of daily operations. All employees should be well-trained and equipped, and the plan should be reviewed annually, at least.

  16. Best Practices for Management of Biocontaminated Waste ...

    EPA Pesticide Factsheets

    Report The purpose of these best practices is to provide federal, state, territorial, and local waste management entities information on techniques and methodologies that have the potential to improve the handling and management of biocontaminated waste streams after a biological agent incident. These best practices are intended to be general in nature serving as a resource to a variety of biological agents in a variety of situations; however, these best practices also present a specific homeland security scenario – a biological attack with Bacillus anthracis (B. anthracis) – to help illustrate specific waste management considerations.

  17. BSL-3 laboratory practices in the United States: comparison of select agent and non-select agent facilities.

    PubMed

    Richards, Stephanie L; Pompei, Victoria C; Anderson, Alice

    2014-01-01

    New construction of biosafety level 3 (BSL-3) laboratories in the United States has increased in the past decade to facilitate research on potential bioterrorism agents. The Centers for Disease Control and Prevention inspect BSL-3 facilities and review commissioning documentation, but no single agency has oversight over all BSL-3 facilities. This article explores the extent to which standard operating procedures in US BSL-3 facilities vary between laboratories with select agent or non-select agent status. Comparisons are made for the following variables: personnel training, decontamination, personal protective equipment (PPE), medical surveillance, security access, laboratory structure and maintenance, funding, and pest management. Facilities working with select agents had more complex training programs and decontamination procedures than non-select agent facilities. Personnel working in select agent laboratories were likely to use powered air purifying respirators, while non-select agent laboratories primarily used N95 respirators. More rigorous medical surveillance was carried out in select agent workers (although not required by the select agent program) and a higher level of restrictive access to laboratories was found. Most select agent and non-select agent laboratories reported adequate structural integrity in facilities; however, differences were observed in personnel perception of funding for repairs. Pest management was carried out by select agent personnel more frequently than non-select agent personnel. Our findings support the need to promote high quality biosafety training and standard operating procedures in both select agent and non-select agent laboratories to improve occupational health and safety.

  18. BSL-3 Laboratory Practices in the United States: Comparison of Select Agent and Non–Select Agent Facilities

    PubMed Central

    Pompei, Victoria C.; Anderson, Alice

    2014-01-01

    New construction of biosafety level 3 (BSL-3) laboratories in the United States has increased in the past decade to facilitate research on potential bioterrorism agents. The Centers for Disease Control and Prevention inspect BSL-3 facilities and review commissioning documentation, but no single agency has oversight over all BSL-3 facilities. This article explores the extent to which standard operating procedures in US BSL-3 facilities vary between laboratories with select agent or non–select agent status. Comparisons are made for the following variables: personnel training, decontamination, personal protective equipment (PPE), medical surveillance, security access, laboratory structure and maintenance, funding, and pest management. Facilities working with select agents had more complex training programs and decontamination procedures than non–select agent facilities. Personnel working in select agent laboratories were likely to use powered air purifying respirators, while non–select agent laboratories primarily used N95 respirators. More rigorous medical surveillance was carried out in select agent workers (although not required by the select agent program) and a higher level of restrictive access to laboratories was found. Most select agent and non–select agent laboratories reported adequate structural integrity in facilities; however, differences were observed in personnel perception of funding for repairs. Pest management was carried out by select agent personnel more frequently than non–select agent personnel. Our findings support the need to promote high quality biosafety training and standard operating procedures in both select agent and non–select agent laboratories to improve occupational health and safety. PMID:24552359

  19. Towards a Bio-inspired Security Framework for Mission-Critical Wireless Sensor Networks

    NASA Astrophysics Data System (ADS)

    Ren, Wei; Song, Jun; Ma, Zhao; Huang, Shiyong

    Mission-critical wireless sensor networks (WSNs) have been found in numerous promising applications in civil and military fields. However, the functionality of WSNs extensively relies on its security capability for detecting and defending sophisticated adversaries, such as Sybil, worm hole and mobile adversaries. In this paper, we propose a bio-inspired security framework to provide intelligence-enabled security mechanisms. This scheme is composed of a middleware, multiple agents and mobile agents. The agents monitor the network packets, host activities, make decisions and launch corresponding responses. Middleware performs an infrastructure for the communication between various agents and corresponding mobility. Certain cognitive models and intelligent algorithms such as Layered Reference Model of Brain and Self-Organizing Neural Network with Competitive Learning are explored in the context of sensor networks that have resource constraints. The security framework and implementation are also described in details.

  20. Protecting software agents from malicious hosts using quantum computing

    NASA Astrophysics Data System (ADS)

    Reisner, John; Donkor, Eric

    2000-07-01

    We evaluate how quantum computing can be applied to security problems for software agents. Agent-based computing, which merges technological advances in artificial intelligence and mobile computing, is a rapidly growing domain, especially in applications such as electronic commerce, network management, information retrieval, and mission planning. System security is one of the more eminent research areas in agent-based computing, and the specific problem of protecting a mobile agent from a potentially hostile host is one of the most difficult of these challenges. In this work, we describe our agent model, and discuss the capabilities and limitations of classical solutions to the malicious host problem. Quantum computing may be extremely helpful in addressing the limitations of classical solutions to this problem. This paper highlights some of the areas where quantum computing could be applied to agent security.

  1. Thallium-201 for cardiac stress tests: residual radioactivity worries patients and security.

    PubMed

    Geraci, Matthew J; Brown, Norman; Murray, David

    2012-12-01

    A 47-year-old man presented to the Emergency Department (ED) in duress and stated he was "highly radioactive." There were no reports of nuclear disasters, spills, or mishaps in the local area. This report discusses the potential for thallium-201 (Tl-201) patients to activate passive radiation alarms days to weeks after nuclear stress tests, even while shielded inside industrial vehicles away from sensors. Characteristics of Tl-201, as used for medical imaging, are described. This patient was twice detained by Homeland Security Agents and searched after he activated radiation detectors at a seaport security checkpoint. Security agents deemed him not to be a threat, but they expressed concern regarding his health and level of personal radioactivity. The patient was subsequently barred from his job and sent to the hospital. Tl-201 is a widely used radioisotope for medical imaging. The radioactive half-life of Tl-201 is 73.1h, however, reported periods of extended personal radiation have been seen as far out as 61 days post-administration. This case describes an anxious, but otherwise asymptomatic patient presenting to the ED with detection of low-level personal radiation. Documentation should be provided to and carried by individuals receiving radionuclides for a minimum of five to six half-lives of the longest-lasting isotope provided. Patients receiving Tl-201 should understand the potential for security issues; reducing probable tense moments, confusion, and anxiety to themselves, their employers, security officials, and ED staff. Copyright © 2012 Elsevier Inc. All rights reserved.

  2. Multi-agent integrated password management (MIPM) application secured with encryption

    NASA Astrophysics Data System (ADS)

    Awang, Norkhushaini; Zukri, Nurul Hidayah Ahmad; Rashid, Nor Aimuni Md; Zulkifli, Zuhri Arafah; Nazri, Nor Afifah Mohd

    2017-10-01

    Users use weak passwords and reuse them on different websites and applications. Password managers are a solution to store login information for websites and help users log in automatically. This project developed a system that acts as an agent managing passwords. Multi-Agent Integrated Password Management (MIPM) is an application using encryption that provides users with secure storage of their login account information such as their username, emails and passwords. This project was developed on an Android platform with an encryption agent using Java Agent Development Environment (JADE). The purpose of the embedded agents is to act as a third-party software to ease the encryption process, and in the future, the developed encryption agents can form part of the security system. This application can be used by the computer and mobile users. Currently, users log into many applications causing them to use unique passwords to prevent password leaking. The crypto agent handles the encryption process using an Advanced Encryption Standard (AES) 128-bit encryption algorithm. As a whole, MIPM is developed on the Android application to provide a secure platform to store passwords and has high potential to be commercialised for public use.

  3. Starting Strong: Talent-based Branching of Newly Commissioned U.S. Army Officers

    DTIC Science & Technology

    2016-04-01

    i The United States Army War College U.S. ARMY WAR COLLEGE CENTER for STRATEGIC LEADERSHIP The United States Army War College educates and develops...Army War College is to produce graduates who are skilled critical thinkers and complex problem solvers. Concurrently, it is our duty to the U.S. Army...Army War College and is the strategic-level study agent for issues related to national security and military strategy with emphasis on geostrategic

  4. Effective Continuing Education for Licensed Real Estate Professionals

    ERIC Educational Resources Information Center

    Tilton, Wendy A.

    2004-01-01

    Mandatory real estate education has been intensely debated for many years. New Jersey is the only state in the nation that does not require licensed real estate agents to attend an ongoing educational event after securing a license to practice. A bill was proposed to the legislature to mandate real estate education in June of 2001. (It was…

  5. No-hardware-signature cybersecurity-crypto-module: a resilient cyber defense agent

    NASA Astrophysics Data System (ADS)

    Zaghloul, A. R. M.; Zaghloul, Y. A.

    2014-06-01

    We present an optical cybersecurity-crypto-module as a resilient cyber defense agent. It has no hardware signature since it is bitstream reconfigurable, where single hardware architecture functions as any selected device of all possible ones of the same number of inputs. For a two-input digital device, a 4-digit bitstream of 0s and 1s determines which device, of a total of 16 devices, the hardware performs as. Accordingly, the hardware itself is not physically reconfigured, but its performance is. Such a defense agent allows the attack to take place, rendering it harmless. On the other hand, if the system is already infected with malware sending out information, the defense agent allows the information to go out, rendering it meaningless. The hardware architecture is immune to side attacks since such an attack would reveal information on the attack itself and not on the hardware. This cyber defense agent can be used to secure a point-to-point, point-to-multipoint, a whole network, and/or a single entity in the cyberspace. Therefore, ensuring trust between cyber resources. It can provide secure communication in an insecure network. We provide the hardware design and explain how it works. Scalability of the design is briefly discussed. (Protected by United States Patents No.: US 8,004,734; US 8,325,404; and other National Patents worldwide.)

  6. 76 FR 20061 - Self-Regulatory Organizations; The Depository Trust Company; Order Granting Approval of a...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-04-11

    ... Relating to the Requirement To Maintain a Balance Certificate in the Fast Automated Securities Transfer... transfer agents'') hold DTC securities in the form of balance certificates.\\4\\ The balance certificates are... issue for which the FAST transfer agent acts as transfer agent. The Balance Certificate Agreement is...

  7. Comment on "Dynamic quantum secret sharing"

    NASA Astrophysics Data System (ADS)

    Liao, Ci-Hong; Yang, Chun-Wei; Hwang, Tzonelish

    2013-10-01

    Hsu et al. (Quantum Inf Process 12:331-344,2013) proposed a dynamic quantum secret sharing (DQSS) protocol using the entanglement swapping of Bell states for an agent to easily join (or leave) the system. In 2013, Wang and Li (Quantum Inf Process 12(5):1991-1997, 2013) proposed a collusion attack on Hsu et al.'s DQSS protocol. Nevertheless, this study points out a new security issue on Hsu et al.'s DQSS protocol regarding to the honesty of a revoked agent. Without considering this issue, the DQSS protocol could be failed to provide secret sharing function.

  8. 33 CFR 54.03 - Persons authorized to give notices.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... PERSONNEL ALLOTMENTS FROM ACTIVE DUTY PAY FOR CERTAIN SUPPORT OBLIGATIONS § 54.03 Persons authorized to give... delinquent in meeting support obligations may be given by: (a) Any agent or attorney of any State having in effect a plan approved under Part D of Title IV of the Social Security Act (42 U.S.C. 651-664), who has...

  9. 17 CFR 230.263 - Consent to Service of Process.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Consent to Service of Process... Consent to Service of Process. (a) If the issuer is not organized under the laws of any of the states of... [§ 239.42 of this chapter]. (b) Any change to the name or address of the agent for service of the issuer...

  10. 33 CFR 54.03 - Persons authorized to give notices.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... PERSONNEL ALLOTMENTS FROM ACTIVE DUTY PAY FOR CERTAIN SUPPORT OBLIGATIONS § 54.03 Persons authorized to give... delinquent in meeting support obligations may be given by: (a) Any agent or attorney of any State having in effect a plan approved under Part D of Title IV of the Social Security Act (42 U.S.C. 651-664), who has...

  11. 31 CFR 321.8 - Redemption-exchange of Series E and EE savings bonds and savings notes.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 31 Money and Finance: Treasury 2 2014-07-01 2014-07-01 false Redemption-exchange of Series E and... UNITED STATES SAVINGS NOTES (FREEDOM SHARES) Scope of Authority § 321.8 Redemption-exchange of Series E... agent may make payment of eligible securities presented for redemption in exchange for Series HH bonds...

  12. Exchanging large data object in multi-agent systems

    NASA Astrophysics Data System (ADS)

    Al-Yaseen, Wathiq Laftah; Othman, Zulaiha Ali; Nazri, Mohd Zakree Ahmad

    2016-08-01

    One of the Business Intelligent solutions that is currently in use is the Multi-Agent System (MAS). Communication is one of the most important elements in MAS, especially for exchanging large low level data between distributed agents (physically). The Agent Communication Language in JADE has been offered as a secure method for sending data, whereby the data is defined as an object. However, the object cannot be used to send data to another agent in a different location. Therefore, the aim of this paper was to propose a method for the exchange of large low level data as an object by creating a proxy agent known as a Delivery Agent, which temporarily imitates the Receiver Agent. The results showed that the proposed method is able to send large-sized data. The experiments were conducted using 16 datasets ranging from 100,000 to 7 million instances. However, for the proposed method, the RAM and the CPU machine had to be slightly increased for the Receiver Agent, but the latency time was not significantly different compared to the use of the Java Socket method (non-agent and less secure). With such results, it was concluded that the proposed method can be used to securely send large data between agents.

  13. 76 FR 78215 - Possession, Use, and Transfer of Select Agents and Toxins; Biennial Review; Proposed Rule

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-12-16

    ... agents and toxins list; whether minimum standards for personnel reliability, physical and cyber security... toxins list; (3) whether minimum standards for personnel reliability, physical and cyber security should...

  14. 17 CFR 239.42 - Form F-X, for appointment of agent for service of process and undertaking for issuers registering...

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ..., rights offering or business combination. 239.42 Section 239.42 Commodity and Securities Exchanges... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Form F-X, for appointment of agent for service of process and undertaking for issuers registering securities on Form F-8, F-9, F-10...

  15. An enhanced performance through agent-based secure approach for mobile ad hoc networks

    NASA Astrophysics Data System (ADS)

    Bisen, Dhananjay; Sharma, Sanjeev

    2018-01-01

    This paper proposes an agent-based secure enhanced performance approach (AB-SEP) for mobile ad hoc network. In this approach, agent nodes are selected through optimal node reliability as a factor. This factor is calculated on the basis of node performance features such as degree difference, normalised distance value, energy level, mobility and optimal hello interval of node. After selection of agent nodes, a procedure of malicious behaviour detection is performed using fuzzy-based secure architecture (FBSA). To evaluate the performance of the proposed approach, comparative analysis is done with conventional schemes using performance parameters such as packet delivery ratio, throughput, total packet forwarding, network overhead, end-to-end delay and percentage of malicious detection.

  16. Water System Security and Resilience in Homeland Security Research

    EPA Pesticide Factsheets

    EPA's water security research provides tools needed to improve infrastructure security and to recover from an attack or contamination incident involving chemical, biological, or radiological (CBR) agents or weapons.

  17. 17 CFR 269.5 - Form F-X, for appointment of agent for service of process by issuers registering securities on...

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 17 Commodity and Securities Exchanges 3 2011-04-01 2011-04-01 false Form F-X, for appointment of... INDENTURE ACT OF 1939 § 269.5 Form F-X, for appointment of agent for service of process by issuers..., F-10 or F-80. Form F-X shall be filed with the Commission: (a) By any issuer registering securities...

  18. 17 CFR 269.5 - Form F-X, for appointment of agent for service of process by issuers registering securities on...

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Form F-X, for appointment of... INDENTURE ACT OF 1939 § 269.5 Form F-X, for appointment of agent for service of process by issuers..., F-10 or F-80. Form F-X shall be filed with the Commission: (a) By any issuer registering securities...

  19. 17 CFR 240.17Ad-14 - Tender agents.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... Exchange Act of 1934 Supervised Investment Bank Holding Company Rules § 240.17Ad-14 Tender agents. (a) Establishing book-entry depository accounts. When securities of a subject company have been declared eligible... receiving from depository participants securities being tendered to the bidder by book-entry delivery...

  20. 'Lowering the threshold of effective deterrence'-Testing the effect of private security agents in public spaces on crime: A randomized controlled trial in a mass transit system.

    PubMed

    Ariel, Barak; Bland, Matthew; Sutherland, Alex

    2017-01-01

    Supplementing local police forces is a burgeoning multibillion-dollar private security industry. Millions of formal surveillance agents in public settings are tasked to act as preventative guardians, as their high visibility presence is hypothesized to create a deterrent threat to potential offenders. Yet, rigorous evidence is lacking. We randomly assigned all train stations in the South West of England that experienced crime into treatment and controls conditions over a six-month period. Treatment consisted of directed patrol by uniformed, unarmed security agents. Hand-held trackers on every agent yielded precise measurements of all patrol time in the stations. Count-based regression models, estimated marginal means and odds-ratios are used to assess the effect of these patrols on crimes reported to the police by victims, as well as new crimes detected by police officers. Outcomes are measured at both specified target locations to which security guards were instructed to attend, as well as at the entire station complexes. Analyses show that 41% more patrol visits and 29% more minutes spent by security agents at treatment compared to control stations led to a significant 16% reduction in victim-generated crimes at the entirety of the stations' complexes, with a 49% increase in police-generated detections at the target locations. The findings illustrate the efficacy of private policing for crime prevention theory.

  1. Agent-Based Crowd Simulation Considering Emotion Contagion for Emergency Evacuation Problem

    NASA Astrophysics Data System (ADS)

    Faroqi, H.; Mesgari, M.-S.

    2015-12-01

    During emergencies, emotions greatly affect human behaviour. For more realistic multi-agent systems in simulations of emergency evacuations, it is important to incorporate emotions and their effects on the agents. In few words, emotional contagion is a process in which a person or group influences the emotions or behavior of another person or group through the conscious or unconscious induction of emotion states and behavioral attitudes. In this study, we simulate an emergency situation in an open square area with three exits considering Adults and Children agents with different behavior. Also, Security agents are considered in order to guide Adults and Children for finding the exits and be calm. Six levels of emotion levels are considered for each agent in different scenarios and situations. The agent-based simulated model initialize with the random scattering of agent populations and then when an alarm occurs, each agent react to the situation based on its and neighbors current circumstances. The main goal of each agent is firstly to find the exit, and then help other agents to find their ways. Numbers of exited agents along with their emotion levels and damaged agents are compared in different scenarios with different initialization in order to evaluate the achieved results of the simulated model. NetLogo 5.2 is used as the multi-agent simulation framework with R language as the developing language.

  2. PROCESS OF SECURING PLUTONIUM IN NITRIC ACID SOLUTIONS IN ITS TRIVALENT OXIDATION STATE

    DOEpatents

    Thomas, J.R.

    1958-08-26

    >Various processes for the recovery of plutonium require that the plutonium be obtalned and maintained in the reduced or trivalent state in solution. Ferrous ions are commonly used as the reducing agent for this purpose, but it is difficult to maintain the plutonium in a reduced state in nitric acid solutions due to the oxidizing effects of the acid. It has been found that the addition of a stabilizing or holding reductant to such solution prevents reoxidation of the plutonium. Sulfamate ions have been found to be ideally suitable as such a stabilizer even in the presence of nitric acid.

  3. 78 FR 40479 - Declaration That Circumstances Exist Justifying Authorization of Emergency Use of All Oral...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-07-05

    .... ACTION: Notice. SUMMARY: The Secretary of Homeland Security determined on September 23, 2008, that there... specified biological, chemical, radiological, or nuclear agent or agents--in this case, Bacillus anthracis...). SUPPLEMENTARY INFORMATION: I. Background On September 23, 2008, former Secretary of Homeland Security, [[Page...

  4. 77 FR 40060 - Renewal of Declaration Regarding Emergency Use of All Oral Formulations of Doxycycline...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-07-06

    .... ACTION: Notice. SUMMARY: The Secretary of Homeland Security determined on September 23, 2008 that there... specified biological, chemical, radiological, or nuclear agent or agents--in this case, Bacillus anthracis... free number). SUPPLEMENTARY INFORMATION: On September 23, 2008, former Secretary of Homeland Security...

  5. 77 FR 39708 - Renewal of Declaration Regarding Emergency Use of All Oral Formulations of Doxycycline...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-07-05

    .... ACTION: Notice. SUMMARY: The Secretary of Homeland Security determined on September 23, 2008 that there... specified biological, chemical, radiological, or nuclear agent or agents--in this case, Bacillus anthracis... free number). SUPPLEMENTARY INFORMATION: On September 23, 2008, former Secretary of Homeland Security...

  6. When nightclub security agents assault clients.

    PubMed

    Romain-Glassey, Nathalie; Gut, Melody; Feiner, Adam-Scott; Cathieni, Federico; Hofner, Marie-Claude; Mangin, Patrice

    2012-08-01

    In 2006, a medico-legal consultation service devoted to adult victims of interpersonal violence was set up at the Lausanne University Hospital Centre, Switzerland: the Violence Medical Unit. Most patients are referred to the consultation by the Emergency Department. They are received by forensic nurses for support, forensic examination (in order to establish medical report) and community orientation. Between 2007 and 2009, among community violence, aggressions by security agents of nightclubs on clients have increased from 6% to 10%. Most of the victims are young men who had drunk alcohol before the assault. 25.7% presented one or several fractures, all of them in the head area. These findings raise questions about the ability of security agents of nightclubs to deal adequately with obviously risky situations and ensure client security. Copyright © 2012 Elsevier Ltd and Faculty of Forensic and Legal Medicine. All rights reserved.

  7. 17 CFR 249.250 - Form F-X, for appointment of agent for service of process by issuers registering securities on...

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Form F-X, for appointment of... F-X, for appointment of agent for service of process by issuers registering securities on Form F-8... registered on Form F-7 (§ 249.37 of this chapter), F-8, F-9, F-10 or F-80. Form F-X shall be filed with the...

  8. 17 CFR 249.250 - Form F-X, for appointment of agent for service of process by issuers registering securities on...

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 17 Commodity and Securities Exchanges 3 2011-04-01 2011-04-01 false Form F-X, for appointment of... F-X, for appointment of agent for service of process by issuers registering securities on Form F-8... registered on Form F-7 (§ 249.37 of this chapter), F-8, F-9, F-10 or F-80. Form F-X shall be filed with the...

  9. Judge says leading viatical firm violated securities laws.

    PubMed

    1995-09-22

    A Federal judge has agreed with the Securities and Exchange Commission (SEC) in its suit against Life Partners, a leading viatical settlement company. According to the SEC, Life Partners buys insurance policies from persons living with AIDS in its own name and then sells interests in these policies to investors. The SEC alleges that these interests fall under the Federal securities laws. Life Partners contends that it acts solely as an agent on behalf of investors, and therefore securities laws do not apply. The judge's injunction requires Life Partners to transfer its insurance policies to an independent agent until the case is resolved.

  10. 77 FR 49048 - Self-Regulatory Organizations; The Depository Trust Company; Notice of Filing and Immediate...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-08-15

    ... to certain issues of securities in DTC's Fast Automated Securities Transfer program (``FAST''). For securities that are part of the FAST program, the transfer agents hold the securities registered in the name...

  11. 31 CFR 321.22 - Forwarding securities not payable by an agent.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... must follow. These instructions are available from a TRS Site or online at www.treasurydirect.gov. [77... TRS Site. The requests for payment on the securities should be properly certified. Any documentary... TRS Site in accordance with the rules in this part. The Bureau of the Fiscal Service provides agents...

  12. 31 CFR 321.22 - Forwarding securities not payable by an agent.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    .... These instructions are available from a TRS Site or online at www.treasurydirect.gov. [77 FR 16167, Mar... TRS Site. The requests for payment on the securities should be properly certified. Any documentary... TRS Site in accordance with the rules in this part. The Bureau of the Public Debt provides agents with...

  13. 31 CFR 321.22 - Forwarding securities not payable by an agent.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    .... These instructions are available from a TRS Site or online at www.treasurydirect.gov. [77 FR 16167, Mar... TRS Site. The requests for payment on the securities should be properly certified. Any documentary... TRS Site in accordance with the rules in this part. The Bureau of the Public Debt provides agents with...

  14. REPORT ON THE HOMELAND SECURITY WORKSHOP ON TRANSPORT AND DISPOSAL OF WASTES FROM FACILITIES CONTAMINATED WITH CHEMICAL AND BIOLOGICAL AGENTS

    EPA Science Inventory

    This report summarizes discussions from the "Homeland Security Workshop on Transport and Disposal of Wastes From Facilities Contaminated With Chemical or Biological Agents." The workshop was held on May 28-30, 2003, in Cincinnati, Ohio, and its objectives were to:

    .Documen...

  15. Agent of opportunity risk mitigation: people, engineering, and security efficacy.

    PubMed

    Graham, Margaret E; Tunik, Michael G; Farmer, Brenna M; Bendzans, Carly; McCrillis, Aileen M; Nelson, Lewis S; Portelli, Ian; Smith, Silas; Goldberg, Judith D; Zhang, Meng; Rosenberg, Sheldon D; Goldfrank, Lewis R

    2010-12-01

    Agents of opportunity (AO) are potentially harmful biological, chemical, radiological, and pharmaceutical substances commonly used for health care delivery and research. AOs are present in all academic medical centers (AMC), creating vulnerability in the health care sector; AO attributes and dissemination methods likely predict risk; and AMCs are inadequately secured against a purposeful AO dissemination, with limited budgets and competing priorities. We explored health care workers' perceptions of AMC security and the impact of those perceptions on AO risk. Qualitative methods (survey, interviews, and workshops) were used to collect opinions from staff working in a medical school and 4 AMC-affiliated hospitals concerning AOs and the risk to hospital infrastructure associated with their uncontrolled presence. Secondary to this goal, staff perception concerning security, or opinions about security behaviors of others, were extracted, analyzed, and grouped into themes. We provide a framework for depicting the interaction of staff behavior and access control engineering, including the tendency of staff to "defeat" inconvenient access controls. In addition, 8 security themes emerged: staff security behavior is a significant source of AO risk; the wide range of opinions about "open" front-door policies among AMC staff illustrates a disparity of perceptions about the need for security; interviewees expressed profound skepticism concerning the effectiveness of front-door access controls; an AO risk assessment requires reconsideration of the security levels historically assigned to areas such as the loading dock and central distribution sites, where many AOs are delivered and may remain unattended for substantial periods of time; researchers' view of AMC security is influenced by the ongoing debate within the scientific community about the wisdom of engaging in bioterrorism research; there was no agreement about which areas of the AMC should be subject to stronger access controls; security personnel play dual roles of security and customer service, creating the negative perception that neither role is done well; and budget was described as an important factor in explaining the state of security controls. We determined that AMCs seeking to reduce AO risk should assess their institutionally unique AO risks, understand staff security perceptions, and install access controls that are responsive to the staff's tendency to defeat them. The development of AO attribute fact sheets is desirable for AO risk assessment; new funding and administrative or legislative tools to improve AMC security are required; and security practices and methods that are convenient and effective should be engineered.

  16. Characterization of Departures from Regulatory Requirements Identified During Inspections Conducted by the US Federal Select Agent Program, 2014-15.

    PubMed

    Bjork, Adam; Sosin, Daniel M

    We studied departures from regulatory requirements identified on US Federal Select Agent Program (FSAP) inspections to increase transparency regarding biosafety and security risk at FSAP-regulated entities and identify areas for programmatic improvement. Regulatory departures from inspections led by Centers for Disease Control and Prevention inspectors during 2014-15 were grouped into "biosafety," "security," and "other" observation categories and assigned a risk level and score reflecting perceived severity. The resulting 2,267 biosafety (n = 1,153) and security (n = 1,114) observations from 296 inspections were analyzed by frequency and risk across entity and inspection characteristics. The greatest proportion of biosafety observations involved equipment and facilities (28%), and the greatest proportion of security observations involved access restrictions (33%). The greatest proportion of higher-risk observations for biosafety were containment issues and for security were inventory discrepancies. Commercial entities had the highest median cumulative risk score per inspection (17), followed by private (13), academic (10), federal government (10), and nonfederal government (8). Maximum containment (BSL-4) inspections had higher median biosafety risk per inspection (13) than other inspections (5) and lower security risk (0 vs 4). Unannounced inspections had proportionally more upper risk level observations than announced (biosafety, 21% vs 12%; security, 18% vs 7%). Possessors of select agents had higher median biosafety risk per inspection (6) than nonpossessors (4) and more upper risk level security observations (10% vs 0%). Programmatic changes to balance resources according to entity risk may strengthen FSAP oversight. Varying inspection methods by select agent possession and entity type, and conducting more unannounced inspections, may be beneficial.

  17. ‘Lowering the threshold of effective deterrence’—Testing the effect of private security agents in public spaces on crime: A randomized controlled trial in a mass transit system

    PubMed Central

    Bland, Matthew; Sutherland, Alex

    2017-01-01

    Supplementing local police forces is a burgeoning multibillion-dollar private security industry. Millions of formal surveillance agents in public settings are tasked to act as preventative guardians, as their high visibility presence is hypothesized to create a deterrent threat to potential offenders. Yet, rigorous evidence is lacking. We randomly assigned all train stations in the South West of England that experienced crime into treatment and controls conditions over a six-month period. Treatment consisted of directed patrol by uniformed, unarmed security agents. Hand-held trackers on every agent yielded precise measurements of all patrol time in the stations. Count-based regression models, estimated marginal means and odds-ratios are used to assess the effect of these patrols on crimes reported to the police by victims, as well as new crimes detected by police officers. Outcomes are measured at both specified target locations to which security guards were instructed to attend, as well as at the entire station complexes. Analyses show that 41% more patrol visits and 29% more minutes spent by security agents at treatment compared to control stations led to a significant 16% reduction in victim-generated crimes at the entirety of the stations’ complexes, with a 49% increase in police-generated detections at the target locations. The findings illustrate the efficacy of private policing for crime prevention theory. PMID:29211735

  18. Information Security Analysis Using Game Theory and Simulation

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Schlicher, Bob G; Abercrombie, Robert K

    Information security analysis can be performed using game theory implemented in dynamic simulations of Agent Based Models (ABMs). Such simulations can be verified with the results from game theory analysis and further used to explore larger scale, real world scenarios involving multiple attackers, defenders, and information assets. Our approach addresses imperfect information and scalability that allows us to also address previous limitations of current stochastic game models. Such models only consider perfect information assuming that the defender is always able to detect attacks; assuming that the state transition probabilities are fixed before the game assuming that the players actions aremore » always synchronous; and that most models are not scalable with the size and complexity of systems under consideration. Our use of ABMs yields results of selected experiments that demonstrate our proposed approach and provides a quantitative measure for realistic information systems and their related security scenarios.« less

  19. ID201202961, DOE S-124,539, Information Security Analysis Using Game Theory and Simulation

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Abercrombie, Robert K; Schlicher, Bob G

    Information security analysis can be performed using game theory implemented in dynamic simulations of Agent Based Models (ABMs). Such simulations can be verified with the results from game theory analysis and further used to explore larger scale, real world scenarios involving multiple attackers, defenders, and information assets. Our approach addresses imperfect information and scalability that allows us to also address previous limitations of current stochastic game models. Such models only consider perfect information assuming that the defender is always able to detect attacks; assuming that the state transition probabilities are fixed before the game assuming that the players actions aremore » always synchronous; and that most models are not scalable with the size and complexity of systems under consideration. Our use of ABMs yields results of selected experiments that demonstrate our proposed approach and provides a quantitative measure for realistic information systems and their related security scenarios.« less

  20. 9 CFR 121.11 - Security.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 9 Animals and Animal Products 1 2011-01-01 2011-01-01 false Security. 121.11 Section 121.11... AGENTS AND TOXINS § 121.11 Security. (a) An individual or entity required to register under this part must develop and implement a written security plan. The security plan must be sufficient to safeguard...

  1. 9 CFR 121.11 - Security.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 9 Animals and Animal Products 1 2012-01-01 2012-01-01 false Security. 121.11 Section 121.11... AGENTS AND TOXINS § 121.11 Security. (a) An individual or entity required to register under this part must develop and implement a written security plan. The security plan must be sufficient to safeguard...

  2. 7 CFR 331.11 - Security.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 7 Agriculture 5 2013-01-01 2013-01-01 false Security. 331.11 Section 331.11 Agriculture..., DEPARTMENT OF AGRICULTURE POSSESSION, USE, AND TRANSFER OF SELECT AGENTS AND TOXINS § 331.11 Security. Link... register under this part must develop and implement a written security plan. The security plan must be...

  3. 9 CFR 121.11 - Security.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 9 Animals and Animal Products 1 2014-01-01 2014-01-01 false Security. 121.11 Section 121.11... AGENTS AND TOXINS § 121.11 Security. (a) An individual or entity required to register under this part must develop and implement a written security plan. The security plan must be sufficient to safeguard...

  4. 9 CFR 121.11 - Security.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 9 Animals and Animal Products 1 2013-01-01 2013-01-01 false Security. 121.11 Section 121.11... AGENTS AND TOXINS § 121.11 Security. (a) An individual or entity required to register under this part must develop and implement a written security plan. The security plan must be sufficient to safeguard...

  5. Incomplete water securitization in coupled hydro-human production sytems

    NASA Astrophysics Data System (ADS)

    van den Boom, B.; Pande, S.

    2012-04-01

    Due to the dynamics, the externalities and the contingencies involved in managing local water resource for production, the water allocation at basin-level is a subtle balance between laws of nature (gravity; flux) and laws of economics (price; productivity). We study this balance by looking at inter-temporal basin-level water resource allocations in which subbasins enjoy a certain degree of autonomy. Each subbasin is represented as an economic agent i, following a gravity ordering with i=1 representing the most upstream area and i=I the downstream boundary. The water allocation is modeled as a decentralized equilibrium in a coupled conceptual hydro-human production system. Agents i=1,2,...,I in the basin produce a composite good according to a technology that requires water as a main input and that is specific to the subbasin. Agent i manages her use Xi and her storage Si, conceptualizing surface and subsurface water, of water with the purpose of maximizing the utility derived from consumption Ci of the composite good, where Ci is a scalar and Xi and Si are vectors which are composed of one element for each time period and for each contingency. A natural way to consume the good would be to absorb the own production. Yet, the agent may have two more option, namely, she might get a social transfer from other agents or she could use an income from trading water securities with her contiguous neighbors. To study these options, we compare water allocations (Ci, Xi, Si) all i=1,2,...,I for three different settings. We look at allocations without water securitization (water autarky equilibrium EA) first. Next, we describe the imaginary case of full securitization (contingent water markets equilibrium ECM) and, in between, we study limited securitization (incomplete water security equilibrium EWS). We show that allocations under contingent water markets ECM are efficient in the sense that, for the prevailing production technologies, no other allocation exists that is at least good as for all the agents and that makes at least one agent better off . On the other hand, allocations under autarky EA will tend to be inefficient, meaning that other allocations may exist that would be preferred by some agents without compromising the interest of the others. By the same token, the in-between case with water securities will generally also fail to achieve full efficiency. Nonetheless, some securitization will always be at least as good as none while it will be better under conditions of water scarcity that are common in dryland area river basins. Hence water allocations under EWS will generally lead to an improvement over those under EA. It should be noted that the fully efficient equilibrium is only imaginary because it requires a separate water security for every agent, for every period and for every contingency that nature might hold. Clearly, because of dimensionality, this amount of securities will be beyond reach. Therefore, water securitization with a limited number of securities remains as the only practical option to deal with the inefficiency of water allocations under autarky. The economic theory of incomplete markets provides a useful framework to study limited water securitization. We apply the theory in the context of our water allocation framework using an institutional setting where downstream agent i may secure water from upstream agent (i-1) through an agreement that pays for (i-1)'s water savings. In this manner we identify (I-1) water securities, one for each pair of contiguous agents. Each security addresses, at the local level, the interaction of flows over time and over contingencies that might occur. Under scarcity conditions prevalent in many river basins, agents will show an interest to supply and demand such securities. In particular, downstream area can often make more productive use of water. Accordingly, in the water autarky equilibrium EA, they would be willing to pay for more water, while, at the same time, upstream users would be prepared to make water savings to the extent that the payment for the security will exceed the value of foregone production losses. Thus, although inevitably incomplete, water securitization could play a significant role in increasing the efficiency of the allocation of water resources at the basin-level. Evidence from river basins in various parts of the world suggests that gains could be sizeable. This paper dwells upon the advantages and challenges of a transdisciplinary approach that blends the laws of nature with those of economics. It aims to identify efficiency gains from water securitization while addressing the institutional difficulties of implementation due to inherent incompleteness in markets that allow trade in such securities.

  6. An Artificially Intelligent Physical Model-Checking Approach to Detect Switching-Related Attacks on Power Systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    El Hariri, Mohamad; Faddel, Samy; Mohammed, Osama

    Decentralized and hierarchical microgrid control strategies have lain the groundwork for shaping the future smart grid. Such control approaches require the cooperation between microgrid operators in control centers, intelligent microcontrollers, and remote terminal units via secure and reliable communication networks. In order to enhance the security and complement the work of network intrusion detection systems, this paper presents an artificially intelligent physical model-checking that detects tampered-with circuit breaker switching control commands whether, due to a cyber-attack or human error. In this technique, distributed agents, which are monitoring sectionalized areas of a given microgrid, will be trained and continuously adapted tomore » verify that incoming control commands do not violate the physical system operational standards and do not put the microgrid in an insecure state. The potential of this approach has been tested by deploying agents that monitor circuit breakers status commands on a 14-bus IEEE benchmark system. The results showed the accuracy of the proposed framework in characterizing the power system and successfully detecting malicious and/or erroneous control commands.« less

  7. Agroterrorism: the risks to the United States food supply and national security.

    PubMed

    Gill, Kevin M

    2015-01-01

    Agroterrorism is a collective term that describes an intentional criminal attack against crops or mankind using viral, bacterial, fungal, or insect-borne agents. Agroterrorism also includes attacks against animals using infectious pathogens such as Burkholderia mallei (glanders), Bacillus anthracis (anthrax), viral avian influenza, foot and mouth disease, and several equine encephalitis viruses. Agents that could be used against crops include the causative agents of wheat blast, rice blast, rice brown spot disease, and wheat stem rust. The primary goal of terrorists using agroterrorism is to spread fear and cause massive economic loss. Subsequent goals include causing disease and death to humans and animals. The use of bioterrorism agents is a much more practical approach than using explosives, for example, to achieve those results since many of these biological agents are commonly found naturally in the environment and are difficult to detect with modern technology. The effective use of biological warfare dates back centuries and can still can be employed by terrorist groups, lone wolves, and political and religious groups to cause death and mayhem on a grand scale.

  8. 31 CFR 10.6 - Enrollment as an enrolled agent or enrolled retirement plan agent.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... address, new address, social security number or tax identification number and the date. (d) Renewal of... Service who have a social security number or tax identification number that ends with the numbers 0, 1, 2..., 2004. (2) All individuals licensed to practice before the Internal Revenue Service who have a social...

  9. 49 CFR 1548.7 - Approval, amendment, annual renewal, and withdrawal of approval of the security program.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... requested by TSA concerning Security Threat Assessments. (ix) A statement acknowledging and ensuring that each employee and agent will successfully complete a Security Threat Assessment under § 1548.15 before... training and Security Threat Assessments by relevant personnel. (4) Duration of security program. The...

  10. Chemical and Biological National Security Program (CBNP) Annual Report FY2002 Overview Local Integration of NARAC With Cities (LINC)

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Ermak, D L; Nasstrom, J S; Tull, J E

    The objective of the Local Integration of NARAC With Cities (LINC) project is to demonstrate the capability for providing local government agencies with advanced, CBNP-developed operational atmospheric plume prediction capabilities that can be seamlessly integrated with appropriate federal agency support for homeland security. LINC's approach is to integrate Lawrence Livermore National Laboratory's (LLNL) National Atmospheric Release Advisory Center (NARAC) tools and services with local emergency management and response centers. In the event of an airborne chemical or biological agent release in an urban area, large portions of the city and even the surrounding suburbs may be affected by the airbornemore » plume, depending on the type of agent, size of release, dissemination mechanism and ambient meteorological conditions. The goal of LINC is to provide real-time predictions that would be used by emergency managers and responders (fire, police, hazmat, etc.) to map the extent and effects of hazardous airborne material. Prompt predictions are provided to guide first responders in determining protective actions to be taken (use of personal protective equipment, evacuation, sheltering in place, etc.), safe locations for incident command posts, and critical facilities that may be at risk (hospitals, schools, etc.). LINC also provides response teams from multiple jurisdictions (local, state, and federal) with tools to effectively share information regarding the areas and populations at risk. The ultimate goal of LINC is a seamless and coordinated nationwide system that integrates NARAC prediction and situation awareness resources with the appropriate local, state and federal agencies for homeland security applications ranging from planning to emergency response to consequence assessment and attribution.« less

  11. Health-based Provisional Advisory Levels (PALs) for homeland security.

    PubMed

    Adeshina, Femi; Sonich-Mullin, Cynthia; Ross, Robert H; Wood, Carol S

    2009-12-01

    The Homeland Security Presidential Directive #8 (HSPD-8) for National Emergency Preparedness was issued to " establish policies to strengthen the preparedness of the United States to prevent and respond to threatened or actual domestic terrorist attacks, major disasters, and other emergencies by requiring a national domestic all- hazards preparedness goal. "In response to HSPD-8 and HSPD-22 (classified) on Domestic Chemical Defense, the US Environmental Protection Agency (US EPA) National Homeland Security Research Center (NHSRC) is developing health-based Provisional Advisory Levels (PALs) for priority chemicals (including chemical warfare agents, pesticides, and toxic industrial chemicals) in air and drinking water. PALs are temporary values that will neither be promulgated, nor be formally issued as regulatory guidance. They are intended to be used at the discretion of risk managers in emergency situations. The PAL Program provides advisory exposure levels for chemical agents to assist in emergency planning and response decision-making, and to aid in making informed risk management decisions for evacuation, temporary re-entry into affected areas, and resumed-use of infrastructure, such as water resources. These risk management decisions may be made at the federal, state, and local levels. Three exposure levels (PAL 1, PAL 2, and PAL 3), distinguished by severity of toxic effects, are developed for 24-hour, 30-day, 90-day, and 2-year durations for potential exposure to drinking water and ambient air by the general public. Developed PALs are evaluated both by a US EPA working group, and an external multidisciplinary panel to ensure scientific credibility and wide acceptance. In this Special Issue publication, we present background information on the PAL program, the methodology used in deriving PALs, and the technical support documents for the derivation of PALs for acrylonitrile, hydrogen sulfide, and phosgene.

  12. Enabling private and public sector organizations as agents of homeland security

    NASA Astrophysics Data System (ADS)

    Glassco, David H. J.; Glassco, Jordan C.

    2006-05-01

    Homeland security and defense applications seek to reduce the risk of undesirable eventualities across physical space in real-time. With that functional requirement in mind, our work focused on the development of IP based agent telecommunication solutions for heterogeneous sensor / robotic intelligent "Things" that could be deployed across the internet. This paper explains how multi-organization information and device sharing alliances may be formed to enable organizations to act as agents of homeland security (in addition to other uses). Topics include: (i) using location-aware, agent based, real-time information sharing systems to integrate business systems, mobile devices, sensor and actuator based devices and embedded devices used in physical infrastructure assets, equipment and other man-made "Things"; (ii) organization-centric real-time information sharing spaces using on-demand XML schema formatted networks; (iii) object-oriented XML serialization as a methodology for heterogeneous device glue code; (iv) how complex requirements for inter / intra organization information and device ownership and sharing, security and access control, mobility and remote communication service, tailored solution life cycle management, service QoS, service and geographic scalability and the projection of remote physical presence (through sensing and robotics) and remote informational presence (knowledge of what is going elsewhere) can be more easily supported through feature inheritance with a rapid agent system development methodology; (v) how remote object identification and tracking can be supported across large areas; (vi) how agent synergy may be leveraged with analytics to complement heterogeneous device networks.

  13. Behavioral biometrics for verification and recognition of malicious software agents

    NASA Astrophysics Data System (ADS)

    Yampolskiy, Roman V.; Govindaraju, Venu

    2008-04-01

    Homeland security requires technologies capable of positive and reliable identification of humans for law enforcement, government, and commercial applications. As artificially intelligent agents improve in their abilities and become a part of our everyday life, the possibility of using such programs for undermining homeland security increases. Virtual assistants, shopping bots, and game playing programs are used daily by millions of people. We propose applying statistical behavior modeling techniques developed by us for recognition of humans to the identification and verification of intelligent and potentially malicious software agents. Our experimental results demonstrate feasibility of such methods for both artificial agent verification and even for recognition purposes.

  14. Emergence of trend trading and its effects in minority game

    NASA Astrophysics Data System (ADS)

    Liu, Xing-Hua; Liang, Xiao-Bei; Wang, Nai-Jing

    2006-09-01

    In this paper, we extended Minority Game (MG) by equipping agents with both value and trend strategies. In the new model, agents (we call them strong-adaptation agents) can autonomically select to act as trend trader or value trader when they game and learn in system. So the new model not only can reproduce stylized factors but also has the potential to investigate into the process of some problems of securities market. We investigated the dynamics of trend trading and its impacts on securities market based on the new model. Our research found that trend trading is inevitable when strong-adaptation agents make decisions by inductive reasoning. Trend trading (of strong-adaptation agents) is not irrational behavior but shows agent's strong-adaptation intelligence, because strong-adaptation agents can take advantage of the pure value agents when they game together in hybrid system. We also found that strong-adaptation agents do better in real environment. The results of our research are different with those of behavior finance researches.

  15. Reply to Comment on ‘Authenticated quantum secret sharing with quantum dialogue based on Bell states'

    NASA Astrophysics Data System (ADS)

    Abulkasim, Hussein; Hamad, Safwat; Elhadad, Ahmed

    2018-02-01

    In the Comment made by Gao (2018 Phys. Scr. 93 027002), it has been shown that the multiparty case in our proposed scheme in Abulkasim et al (2016 Phys. Scr. 91 085101) is not secure, where Bob and Charlie can deduce Alice’s unitary operations without being detected. This reply shows a simple modification of the multiparty case to prevent the dishonest agents from performing this kind of attack.

  16. Organization of the secure distributed computing based on multi-agent system

    NASA Astrophysics Data System (ADS)

    Khovanskov, Sergey; Rumyantsev, Konstantin; Khovanskova, Vera

    2018-04-01

    Nowadays developing methods for distributed computing is received much attention. One of the methods of distributed computing is using of multi-agent systems. The organization of distributed computing based on the conventional network computers can experience security threats performed by computational processes. Authors have developed the unified agent algorithm of control system of computing network nodes operation. Network PCs is used as computing nodes. The proposed multi-agent control system for the implementation of distributed computing allows in a short time to organize using of the processing power of computers any existing network to solve large-task by creating a distributed computing. Agents based on a computer network can: configure a distributed computing system; to distribute the computational load among computers operated agents; perform optimization distributed computing system according to the computing power of computers on the network. The number of computers connected to the network can be increased by connecting computers to the new computer system, which leads to an increase in overall processing power. Adding multi-agent system in the central agent increases the security of distributed computing. This organization of the distributed computing system reduces the problem solving time and increase fault tolerance (vitality) of computing processes in a changing computing environment (dynamic change of the number of computers on the network). Developed a multi-agent system detects cases of falsification of the results of a distributed system, which may lead to wrong decisions. In addition, the system checks and corrects wrong results.

  17. A secure 3-way routing protocols for intermittently connected mobile ad hoc networks.

    PubMed

    Sekaran, Ramesh; Parasuraman, Ganesh Kumar

    2014-01-01

    The mobile ad hoc network may be partially connected or it may be disconnected in nature and these forms of networks are termed intermittently connected mobile ad hoc network (ICMANET). The routing in such disconnected network is commonly an arduous task. Many routing protocols have been proposed for routing in ICMANET since decades. The routing techniques in existence for ICMANET are, namely, flooding, epidemic, probabilistic, copy case, spray and wait, and so forth. These techniques achieve an effective routing with minimum latency, higher delivery ratio, lesser overhead, and so forth. Though these techniques generate effective results, in this paper, we propose novel routing algorithms grounded on agent and cryptographic techniques, namely, location dissemination service (LoDiS) routing with agent AES, A-LoDiS with agent AES routing, and B-LoDiS with agent AES routing, ensuring optimal results with respect to various network routing parameters. The algorithm along with efficient routing ensures higher degree of security. The security level is cited testing with respect to possibility of malicious nodes into the network. This paper also aids, with the comparative results of proposed algorithms, for secure routing in ICMANET.

  18. A Secure 3-Way Routing Protocols for Intermittently Connected Mobile Ad Hoc Networks

    PubMed Central

    Parasuraman, Ganesh Kumar

    2014-01-01

    The mobile ad hoc network may be partially connected or it may be disconnected in nature and these forms of networks are termed intermittently connected mobile ad hoc network (ICMANET). The routing in such disconnected network is commonly an arduous task. Many routing protocols have been proposed for routing in ICMANET since decades. The routing techniques in existence for ICMANET are, namely, flooding, epidemic, probabilistic, copy case, spray and wait, and so forth. These techniques achieve an effective routing with minimum latency, higher delivery ratio, lesser overhead, and so forth. Though these techniques generate effective results, in this paper, we propose novel routing algorithms grounded on agent and cryptographic techniques, namely, location dissemination service (LoDiS) routing with agent AES, A-LoDiS with agent AES routing, and B-LoDiS with agent AES routing, ensuring optimal results with respect to various network routing parameters. The algorithm along with efficient routing ensures higher degree of security. The security level is cited testing with respect to possibility of malicious nodes into the network. This paper also aids, with the comparative results of proposed algorithms, for secure routing in ICMANET. PMID:25136697

  19. 42 CFR 408.43 - Deduction from social security benefits.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 42 Public Health 2 2011-10-01 2011-10-01 false Deduction from social security benefits. 408.43... § 408.43 Deduction from social security benefits. SSA, acting as CMS's agent, deducts the premiums from the monthly social security benefits if the enrollee is not entitled to railroad retirement benefits...

  20. 7 CFR 331.11 - Security.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 7 Agriculture 5 2012-01-01 2012-01-01 false Security. 331.11 Section 331.11 Agriculture..., DEPARTMENT OF AGRICULTURE POSSESSION, USE, AND TRANSFER OF SELECT AGENTS AND TOXINS § 331.11 Security. (a) An individual or entity required to register under this part must develop and implement a written security plan...

  1. 7 CFR 331.11 - Security.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 7 Agriculture 5 2011-01-01 2011-01-01 false Security. 331.11 Section 331.11 Agriculture..., DEPARTMENT OF AGRICULTURE POSSESSION, USE, AND TRANSFER OF SELECT AGENTS AND TOXINS § 331.11 Security. (a) An individual or entity required to register under this part must develop and implement a written security plan...

  2. 7 CFR 331.11 - Security.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 7 Agriculture 5 2010-01-01 2010-01-01 false Security. 331.11 Section 331.11 Agriculture..., DEPARTMENT OF AGRICULTURE POSSESSION, USE, AND TRANSFER OF SELECT AGENTS AND TOXINS § 331.11 Security. (a) An individual or entity required to register under this part must develop and implement a written security plan...

  3. 42 CFR 408.43 - Deduction from social security benefits.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 42 Public Health 2 2014-10-01 2014-10-01 false Deduction from social security benefits. 408.43... § 408.43 Deduction from social security benefits. SSA, acting as CMS's agent, deducts the premiums from the monthly social security benefits if the enrollee is not entitled to railroad retirement benefits...

  4. 42 CFR 408.43 - Deduction from social security benefits.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 42 Public Health 2 2012-10-01 2012-10-01 false Deduction from social security benefits. 408.43... § 408.43 Deduction from social security benefits. SSA, acting as CMS's agent, deducts the premiums from the monthly social security benefits if the enrollee is not entitled to railroad retirement benefits...

  5. 42 CFR 408.43 - Deduction from social security benefits.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 42 Public Health 2 2013-10-01 2013-10-01 false Deduction from social security benefits. 408.43... § 408.43 Deduction from social security benefits. SSA, acting as CMS's agent, deducts the premiums from the monthly social security benefits if the enrollee is not entitled to railroad retirement benefits...

  6. 42 CFR 408.43 - Deduction from social security benefits.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 42 Public Health 2 2010-10-01 2010-10-01 false Deduction from social security benefits. 408.43... § 408.43 Deduction from social security benefits. SSA, acting as CMS's agent, deducts the premiums from the monthly social security benefits if the enrollee is not entitled to railroad retirement benefits...

  7. 7 CFR 331.11 - Security.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 7 Agriculture 5 2014-01-01 2014-01-01 false Security. 331.11 Section 331.11 Agriculture..., DEPARTMENT OF AGRICULTURE POSSESSION, USE, AND TRANSFER OF SELECT AGENTS AND TOXINS § 331.11 Security. (a) An individual or entity required to register under this part must develop and implement a written security plan...

  8. 7 CFR 331.7 - Registration and related security risk assessments.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 7 Agriculture 5 2010-01-01 2010-01-01 false Registration and related security risk assessments... AGENTS AND TOXINS § 331.7 Registration and related security risk assessments. (a) Unless exempted under... be approved by the Administrator or the HHS Secretary based on a security risk assessment by the...

  9. From School Militarization to School Securitization: National Security Finds Its Place in Schools

    ERIC Educational Resources Information Center

    Nguyen, Nicole

    2017-01-01

    This ethnography explores daily life at Milton High School, a US public school with its own specialized Homeland Security program. From "military grunts" serving in distant theaters of war to Transportation Security Administration (TSA) agents defending the US borderlands to National Security Administration (NSA) technicians monitoring…

  10. A New Approach To Secure Federated Information Bases Using Agent Technology.

    ERIC Educational Resources Information Center

    Weippi, Edgar; Klug, Ludwig; Essmayr, Wolfgang

    2003-01-01

    Discusses database agents which can be used to establish federated information bases by integrating heterogeneous databases. Highlights include characteristics of federated information bases, including incompatible database management systems, schemata, and frequently changing context; software agent technology; Java agents; system architecture;…

  11. VALIDATION OF STANDARD ANALYTICAL PROTOCOL FOR ...

    EPA Pesticide Factsheets

    There is a growing concern with the potential for terrorist use of chemical weapons to cause civilian harm. In the event of an actual or suspected outdoor release of chemically hazardous material in a large area, the extent of contamination must be determined. This requires a system with the ability to prepare and quickly analyze a large number of contaminated samples for the traditional chemical agents, as well as numerous toxic industrial chemicals. Liquid samples (both aqueous and organic), solid samples (e.g., soil), vapor samples (e.g., air) and mixed state samples, all ranging from household items to deceased animals, may require some level of analyses. To meet this challenge, the U.S. Environmental Protection Agency (U.S. EPA) National Homeland Security Research Center, in collaboration with experts from across U.S. EPA and other Federal Agencies, initiated an effort to identify analytical methods for the chemical and biological agents that could be used to respond to a terrorist attack or a homeland security incident. U.S. EPA began development of standard analytical protocols (SAPs) for laboratory identification and measurement of target agents in case of a contamination threat. These methods will be used to help assist in the identification of existing contamination, the effectiveness of decontamination, as well as clearance for the affected population to reoccupy previously contaminated areas. One of the first SAPs developed was for the determin

  12. A study on agent-based secure scheme for electronic medical record system.

    PubMed

    Chen, Tzer-Long; Chung, Yu-Fang; Lin, Frank Y S

    2012-06-01

    Patient records, including doctors' diagnoses of diseases, trace of treatments and patients' conditions, nursing actions, and examination results from allied health profession departments, are the most important medical records of patients in medical systems. With patient records, medical staff can instantly understand the entire medical information of a patient so that, according to the patient's conditions, more accurate diagnoses and more appropriate in-depth treatments can be provided. Nevertheless, in such a modern society with booming information technologies, traditional paper-based patient records have faced a lot of problems, such as lack of uniform formats, low data mobility, slow data transfer, illegible handwritings, enormous and insufficient storage space, difficulty of conservation, being easily damaged, and low transferability. To improve such drawbacks, reduce medical costs, and advance medical quality, paper-based patient records are modified into electronic medical records and reformed into electronic patient records. However, since electronic patient records used in various hospitals are diverse and different, in consideration of cost, it is rather difficult to establish a compatible and complete integrated electronic patient records system to unify patient records from heterogeneous systems in hospitals. Moreover, as the booming of the Internet, it is no longer necessary to build an integrated system. Instead, doctors can instantly look up patients' complete information through the Internet access to electronic patient records as well as avoid the above difficulties. Nonetheless, the major problem of accessing to electronic patient records cross-hospital systems exists in the security of transmitting and accessing to the records in case of unauthorized medical personnels intercepting or stealing the information. This study applies the Mobile Agent scheme to cope with the problem. Since a Mobile Agent is a program, which can move among hosts and automatically disperse arithmetic processes, and moves from one host to another in heterogeneous network systems with the characteristics of autonomy and mobility, decreasing network traffic, reducing transfer lag, encapsulating protocol, availability on heterogeneous platforms, fault-tolerance, high flexibility, and personalization. However, since a Mobile Agent contacts and exchanges information with other hosts or agents on the Internet for rapid exchange and access to medical information, the security is threatened. In order to solve the problem, this study proposes a key management scheme based on Lagrange interpolation formulas and hierarchical management structure to make Mobile Agents a more secure and efficient access control scheme for electronic patient record systems when applied to the access of patients' personal electronic patient records cross hospitals. Meanwhile, with the comparison of security and efficacy analyses being the feasibility of validation scheme and the basis of better efficiency, the security of Mobile Agents in the process of operation can be guaranteed, key management efficacy can be advanced, and the security of the Mobile Agent system can be protected.

  13. Criminal undercover agents or "bad people" doing "good things".

    PubMed

    Amir, Menachem

    2003-08-01

    Information and intelligence have always been, and will remain, the most essential components of policing and indeed all law enforcement and security work, including the variety of drug control efforts. Sources of information are varied, ranging from everyday interactions of officers of the law with the public, anonymous reports, the use of paid and unpaid informants from the criminal underworld to law enforcement's and security services' use of agents. This presentation, based on interviews with "handlers" of informants who are offenders, who supply information and evidence against other criminals, and who may have been former comrades of the criminals, explores the dilemmas that informers and their handlers face at each stage of the operation from recruitment to operation in the field, until they "finger" their targets and become state witnesses. During each stage of the operation, agents' motivations, fears, sense of betrayal (being betrayed and betraying others), being snitches, the need to protect their identities, as well as their dependency upon their handlers, are the primary issues to be considered and resolved. Handlers may have to tolerate agents' commission of crimes during operations and often may also have to "treat" the informant's spouse. Borrowed identity, which is the main meaning and dynamic of the informants' actions and of any undercover work, will also be analyzed. This presentation, designed to allow for a presentation of relevant parameters so as to permit the comparative study and classification of undercover work by criminals, will also note critical unresolved issues in this area as well as suggest future needed research.

  14. Security Strategy of the Bureau of Diplomatic Security.

    DTIC Science & Technology

    2011-06-10

    Williams, M.A. , Member John A. Dyson, MBA , Member Gregory Scott Hospodor, Ph.D Accepted this 10th day of June 2011 by...ACRONYMS AAR After Action Review ASOS Advance Security Overseas Seminar ATA Antiterrorism Assistance Program BRSO Regional Security Officer Course ...BSAC Basic Special Agent Course DS Bureau of Diplomatic Security FACT Foreign Affairs Counter Threat FAH Foreign Affairs Handbook FAM Foreign

  15. Improving the multiparty quantum secret sharing over two collective-noise channels against insider attack

    NASA Astrophysics Data System (ADS)

    Sun, Ying; Wen, Qiao-yan; Zhu, Fu-chen

    2010-01-01

    The security of the multiparty quantum secret sharing protocol presented by Zhang [Z.J. Zhang, Physica A, 361 (2006) 233] is analyzed. It is shown that this protocol is vulnerable to the insider attack since eavesdropping detection is performed only when all states arrive at the last agent. We propose an attack strategy and give an improved version of the original protocol. The improved protocol is robust and has the same traits with the original one.

  16. Black Flags of Their Fathers: The Islamic States Returning Foreign Fighter Youths and the Implications for U.S. Domestic Security

    DTIC Science & Technology

    2017-12-01

    headquarters Services , Directorate for Information Operations and Reports, 1215 Jefferson Davis Highway, Suite 1204, Arlington, VA 22202-4302, and to the...indoctrination and training that give them the tools to plan, organize, and execute terrorist attacks. These children also have the motive, means, and...Tani Jr. Assistant to the Special Agent in Charge, U.S. Secret Service B.A., University of Mary Washington, 1998 Submitted in partial fulfillment of

  17. Coordination between Generation and Transmission Maintenance Scheduling by Means of Multi-agent Technique

    NASA Astrophysics Data System (ADS)

    Nagata, Takeshi; Tao, Yasuhiro; Utatani, Masahiro; Sasaki, Hiroshi; Fujita, Hideki

    This paper proposes a multi-agent approach to maintenance scheduling in restructured power systems. The restructuring of electric power industry has resulted in market-based approaches for unbundling a multitude of service provided by self-interested entities such as power generating companies (GENCOs), transmission providers (TRANSCOs) and distribution companies (DISCOs). The Independent System Operator (ISO) is responsible for the security of the system operation. The schedule submitted to ISO by GENCOs and TRANSCOs should satisfy security and reliability constraints. The proposed method consists of several GENCO Agents (GAGs), TARNSCO Agents (TAGs) and a ISO Agent(IAG). The IAG’s role in maintenance scheduling is limited to ensuring that the submitted schedules do not cause transmission congestion or endanger the system reliability. From the simulation results, it can be seen the proposed multi-agent approach could coordinate between generation and transmission maintenance schedules.

  18. 10 CFR 25.5 - Definitions.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... establish an industrial security program for the purpose of safeguarding classified information under the... Agent for the National Industrial Security Program. Commission means the Nuclear Regulatory Commission... designated by the Executive Director for Operations, is eligible for a security clearance for access to...

  19. 49 CFR 40.351 - What confidentiality requirements apply to service agents?

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... confidentiality and security measures to ensure that confidential employee records are not available to unauthorized persons. This includes protecting the physical security of records, access controls, and computer security measures to safeguard confidential data in electronic data bases. ...

  20. 49 CFR 40.351 - What confidentiality requirements apply to service agents?

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... confidentiality and security measures to ensure that confidential employee records are not available to unauthorized persons. This includes protecting the physical security of records, access controls, and computer security measures to safeguard confidential data in electronic data bases. ...

  1. 49 CFR 40.351 - What confidentiality requirements apply to service agents?

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... confidentiality and security measures to ensure that confidential employee records are not available to unauthorized persons. This includes protecting the physical security of records, access controls, and computer security measures to safeguard confidential data in electronic data bases. ...

  2. 49 CFR 40.351 - What confidentiality requirements apply to service agents?

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... confidentiality and security measures to ensure that confidential employee records are not available to unauthorized persons. This includes protecting the physical security of records, access controls, and computer security measures to safeguard confidential data in electronic data bases. ...

  3. 9 CFR 121.7 - Registration and related security risk assessments.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 9 Animals and Animal Products 1 2010-01-01 2010-01-01 false Registration and related security risk..., USE, AND TRANSFER OF SELECT AGENTS AND TOXINS § 121.7 Registration and related security risk... Administrator or the HHS Secretary based on a security risk assessment by the Attorney General: (i) The...

  4. Agents Based e-Commerce and Securing Exchanged Information

    NASA Astrophysics Data System (ADS)

    Al-Jaljouli, Raja; Abawajy, Jemal

    Mobile agents have been implemented in e-Commerce to search and filter information of interest from electronic markets. When the information is very sensitive and critical, it is important to develop a novel security protocol that can efficiently protect the information from malicious tampering as well as unauthorized disclosure or at least detect any malicious act of intruders. In this chapter, we describe robust security techniques that ensure a sound security of information gathered throughout agent’s itinerary against various security attacks, as well as truncation attacks. A sound security protocol is described, which implements the various security techniques that would jointly prevent or at least detect any malicious act of intruders. We reason about the soundness of the protocol usingSymbolic Trace Analyzer (STA), a formal verification tool that is based on symbolic techniques. We analyze the protocol in key configurations and show that it is free of flaws. We also show that the protocol fulfils the various security requirements of exchanged information in MAS, including data-integrity, data-confidentiality, data-authenticity, origin confidentiality and data non-repudiability.

  5. 7 CFR 400.405 - Agent and loss adjuster responsibilities.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 7 Agriculture 6 2010-01-01 2010-01-01 false Agent and loss adjuster responsibilities. 400.405... Regulations; Collection and Storage of Social Security Account Numbers and Employer Identification Numbers § 400.405 Agent and loss adjuster responsibilities. (a) The agent or loss adjuster shall provide his or...

  6. 75 FR 23223 - Multi-Agency Informational Meeting Concerning Compliance With the Federal Select Agent Program...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-05-03

    ...] Multi-Agency Informational Meeting Concerning Compliance With the Federal Select Agent Program; Public... Select Agent Program established under the Public Health Security and Bioterrorism Preparedness and... Roberson, Veterinary Permit Examiner, APHIS Select Agent Program, VS, ASAP, APHIS, 4700 River Road Unit 2...

  7. 77 FR 56845 - Multi-Agency Informational Meeting Concerning Compliance With the Federal Select Agent Program...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-09-14

    ... Informational Meeting Concerning Compliance With the Federal Select Agent Program; Public Webcast AGENCY... with the Federal Select Agent Program. The purpose of this notice is to notify all interested parties... changes to the select agent regulations; occupational health, information and physical security; personnel...

  8. 78 FR 56234 - Multi-Agency Informational Meeting Concerning Compliance with the Select Agent Regulations...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-09-12

    ... Informational Meeting Concerning Compliance with the Select Agent Regulations; Public Webcast AGENCY: Centers... purpose of the webcast is to provide guidance related to the select agent regulations established under... Justice Information Services. Changes to Section 11(Security) of the select agent regulations including...

  9. Detector-device-independent quantum secret sharing with source flaws.

    PubMed

    Yang, Xiuqing; Wei, Kejin; Ma, Haiqiang; Liu, Hongwei; Yin, Zhenqiang; Cao, Zhu; Wu, Lingan

    2018-04-10

    Measurement-device-independent entanglement witness (MDI-EW) plays an important role for detecting entanglement with untrusted measurement device. We present a double blinding-attack on a quantum secret sharing (QSS) protocol based on GHZ state. Using the MDI-EW method, we propose a QSS protocol against all detector side-channels. We allow source flaws in practical QSS system, so that Charlie can securely distribute a key between the two agents Alice and Bob over long distances. Our protocol provides condition on the extracted key rate for the secret against both external eavesdropper and arbitrary dishonest participants. A tight bound for collective attacks can provide good bounds on the practical QSS with source flaws. Then we show through numerical simulations that using single-photon source a secure QSS over 136 km can be achieved.

  10. Clustering recommendations to compute agent reputation

    NASA Astrophysics Data System (ADS)

    Bedi, Punam; Kaur, Harmeet

    2005-03-01

    Traditional centralized approaches to security are difficult to apply to multi-agent systems which are used nowadays in e-commerce applications. Developing a notion of trust that is based on the reputation of an agent can provide a softer notion of security that is sufficient for many multi-agent applications. Our paper proposes a mechanism for computing reputation of the trustee agent for use by the trustier agent. The trustier agent computes the reputation based on its own experience as well as the experience the peer agents have with the trustee agents. The trustier agents intentionally interact with the peer agents to get their experience information in the form of recommendations. We have also considered the case of unintentional encounters between the referee agents and the trustee agent, which can be directly between them or indirectly through a set of interacting agents. The clustering is done to filter off the noise in the recommendations in the form of outliers. The trustier agent clusters the recommendations received from referee agents on the basis of the distances between recommendations using the hierarchical agglomerative method. The dendogram hence obtained is cut at the required similarity level which restricts the maximum distance between any two recommendations within a cluster. The cluster with maximum number of elements denotes the views of the majority of recommenders. The center of this cluster represents the reputation of the trustee agent which can be computed using c-means algorithm.

  11. When Information Improves Information Security

    NASA Astrophysics Data System (ADS)

    Grossklags, Jens; Johnson, Benjamin; Christin, Nicolas

    This paper presents a formal, quantitative evaluation of the impact of bounded-rational security decision-making subject to limited information and externalities. We investigate a mixed economy of an individual rational expert and several naïve near-sighted agents. We further model three canonical types of negative externalities (weakest-link, best shot and total effort), and study the impact of two information regimes on the threat level agents are facing.

  12. Characterization of chemical warfare G-agent hydrolysis products by surface-enhanced Raman spectroscopy

    NASA Astrophysics Data System (ADS)

    Inscore, Frank E.; Gift, Alan D.; Maksymiuk, Paul; Farquharson, Stuart

    2004-12-01

    The United States and its allies have been increasingly challenged by terrorism, and since the September 11, 2001 attacks and the war in Afghanistan and Iraq, homeland security has become a national priority. The simplicity in manufacturing chemical warfare agents, the relatively low cost, and previous deployment raises public concern that they may also be used by terrorists or rogue nations. We have been investigating the ability of surface-enhanced Raman spectroscopy (SERS) to detect extremely low concentrations (e.g. part-per-billion) of chemical agents, as might be found in poisoned water. Since trace quantities of nerve agents can be hydrolyzed in the presence of water, we have expanded our studies to include such degradation products. Our SERS-active medium consists of silver or gold nanoparticles incorporated into a sol-gel matrix, which is immobilized in a glass capillary. The choice of sol-gel precursor allows controlling hydrophobicity, while the porous silica network offers a unique environment for stabilizing the SERS-active metals. Here we present the use of these metal-doped sol-gels to selectively enhance the Raman signal of the hydrolyzed products of the G-series nerve agents.

  13. State-of-the-art in biosafety and biosecurity in European countries.

    PubMed

    Bielecka, Anna; Mohammadi, Ali Akbar

    2014-06-01

    The terms biosafety and biosecurity are widely used in different concepts and refer not only to protection of human beings and their surrounding environment against hazardous biological agent, but also to global disarmament of weapons of mass destruction. As a result, the biosafety and biosecurity issues should be considered interdisciplinary based on multilateral agreements against proliferation of biological weapons, public health and environmental protection. This publication presents information on both, international and national biosafety and biosecurity legislation. Status of national implementation of the Biological and Toxin Weapons Convention, penalization issues and measures to account for and secure production, use, storage of particularly dangerous pathogens or activities involving humans, plants and animals where infection may pose a risk have been analyzed. Safety and security measures in laboratories have been studied. Moreover, dual-use technology and measures of secure transport of biohazard materials have been also taken into account. In addition, genetic engineering regulations, biosecurity activities in laboratories and code of conducts have been investigated, as well.

  14. Integrating public health and medical intelligence gathering into homeland security fusion centres.

    PubMed

    Lenart, Brienne; Albanese, Joseph; Halstead, William; Schlegelmilch, Jeffrey; Paturas, James

    Homeland security fusion centres serve to gather, analyse and share threat-related information among all levels of governments and law enforcement agencies. In order to function effectively, fusion centres must employ people with the necessary competencies to understand the nature of the threat facing a community, discriminate between important information and irrelevant or merely interesting facts and apply domain knowledge to interpret the results to obviate or reduce the existing danger. Public health and medical sector personnel routinely gather, analyse and relay health-related inform-ation, including health security risks, associated with the detection of suspicious biological or chemical agents within a community to law enforcement agencies. This paper provides a rationale for the integration of public health and medical personnel in fusion centres and describes their role in assisting law enforcement agencies, public health organisations and the medical sector to respond to natural or intentional threats against local communities, states or the nation as a whole.

  15. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Gali, Emmanuel; Eidenbenz, Stephan; Mniszewski, Sue

    The United States' Department of Homeland Security aims to model, simulate, and analyze critical infrastructure and their interdependencies across multiple sectors such as electric power, telecommunications, water distribution, transportation, etc. We introduce ActivitySim, an activity simulator for a population of millions of individual agents each characterized by a set of demographic attributes that is based on US census data. ActivitySim generates daily schedules for each agent that consists of a sequence of activities, such as sleeping, shopping, working etc., each being scheduled at a geographic location, such as businesses or private residences that is appropriate for the activity type andmore » for the personal situation of the agent. ActivitySim has been developed as part of a larger effort to understand the interdependencies among national infrastructure networks and their demand profiles that emerge from the different activities of individuals in baseline scenarios as well as emergency scenarios, such as hurricane evacuations. We present the scalable software engineering principles underlying ActivitySim, the socia-technical modeling paradigms that drive the activity generation, and proof-of-principle results for a scenario in the Twin Cities, MN area of 2.6 M agents.« less

  16. 9 CFR 121.10 - Restricting access to select agents and toxins; security risk assessments.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... education, training, and/or experience to handle or use such agents or toxins. (d) To apply for access... other organization that engages in intentional crimes of violence; or being an agent of a foreign power...

  17. 75 FR 13674 - Wassenaar Arrangement 2008 Plenary Agreements Implementation: Categories 1, 2, 3, 4, 5 Parts I...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-03-23

    ...'', biological agents ``adapted for use in war'', chemical warfare agents, 'simulants' or ``riot control agents... AGENCY: Bureau of Industry and Security, Commerce. ACTION: Final rule; correcting amendment. SUMMARY: The.... 'Simulant': A substance or material that is used in place of toxic agent (chemical or biological) in...

  18. 13 CFR 107.1620 - Functions of agents, including Central Registration Agent, Selling Agent and Fiscal Agent.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... Participating Securities and/or TCs. (iv) Arranging for the production of the Offering Circular, certificates... markets to determine those factors that will minimize or reduce the cost of funding Debentures or... instructions from SBA; (vii) Remain custodian of such other documentation as SBA shall direct by written...

  19. 76 FR 16707 - Rule 17Ad-17; Transfer Agents', Brokers', and Dealers' Obligation To Search for Lost...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-03-25

    ... 3235-AL11 Rule 17Ad-17; Transfer Agents', Brokers', and Dealers' Obligation To Search for Lost Securityholders; Paying Agents' Obligation To Search for Missing Securityholders AGENCY: Securities and Exchange... Rule 17Ad-17, ``Transfer Agents' Obligation to Search for Lost Securityholders'' to: extend to brokers...

  20. Challenges and Practices in Building and Implementing Biosafety and Biosecurity Programs to Enable Basic and Translational Research with Select Agents.

    PubMed

    Jonsson, Colleen B; Cole, Kelly Stefano; Roy, Chad J; Perlin, David S; Byrne, Gerald

    2013-04-29

    Select agent research in the United States must meet federally-mandated biological surety guidelines and rules which are comprised of two main components: biosecurity and biosafety. Biosecurity is the process employed for ensuring biological agents are properly safeguarded against theft, loss, diversion, unauthorized access or use/release. Biosafety is those processes that ensure that operations with such agents are conducted in a safe, secure and reliable manner. As such, a biological surety program is generally concerned with biological agents that present high risk for adverse medical and/or agricultural consequences upon release outside of proper containment. The U.S. Regional and National Biocontainment Laboratories (RBL, NBL) represent expertise in this type of research, and are actively engaged in the development of programs to address these critical needs and federal requirements. While this comprises an ongoing activity for the RBLs, NBLs and other facilities that handle select agents as new guidelines and regulations are implemented, the present article is written with the goal of presenting a simplified yet comprehensive review of these requirements. Herein, we discuss the requirements and the various activities that the RBL/NBL programs have implemented to achieve these metrics set forth by various agencies within the U.S. Federal government.

  1. Challenges and Practices in Building and Implementing Biosafety and Biosecurity Programs to Enable Basic and Translational Research with Select Agents

    PubMed Central

    Jonsson, Colleen B.; Cole, Kelly Stefano; Roy, Chad J.; Perlin, David S.; Byrne, Gerald

    2014-01-01

    Select agent research in the United States must meet federally-mandated biological surety guidelines and rules which are comprised of two main components: biosecurity and biosafety. Biosecurity is the process employed for ensuring biological agents are properly safeguarded against theft, loss, diversion, unauthorized access or use/release. Biosafety is those processes that ensure that operations with such agents are conducted in a safe, secure and reliable manner. As such, a biological surety program is generally concerned with biological agents that present high risk for adverse medical and/or agricultural consequences upon release outside of proper containment. The U.S. Regional and National Biocontainment Laboratories (RBL, NBL) represent expertise in this type of research, and are actively engaged in the development of programs to address these critical needs and federal requirements. While this comprises an ongoing activity for the RBLs, NBLs and other facilities that handle select agents as new guidelines and regulations are implemented, the present article is written with the goal of presenting a simplified yet comprehensive review of these requirements. Herein, we discuss the requirements and the various activities that the RBL/NBL programs have implemented to achieve these metrics set forth by various agencies within the U.S. Federal government. PMID:24900945

  2. Experimental bit commitment based on quantum communication and special relativity.

    PubMed

    Lunghi, T; Kaniewski, J; Bussières, F; Houlmann, R; Tomamichel, M; Kent, A; Gisin, N; Wehner, S; Zbinden, H

    2013-11-01

    Bit commitment is a fundamental cryptographic primitive in which Bob wishes to commit a secret bit to Alice. Perfectly secure bit commitment between two mistrustful parties is impossible through asynchronous exchange of quantum information. Perfect security is however possible when Alice and Bob split into several agents exchanging classical and quantum information at times and locations suitably chosen to satisfy specific relativistic constraints. Here we report on an implementation of a bit commitment protocol using quantum communication and special relativity. Our protocol is based on [A. Kent, Phys. Rev. Lett. 109, 130501 (2012)] and has the advantage that it is practically feasible with arbitrary large separations between the agents in order to maximize the commitment time. By positioning agents in Geneva and Singapore, we obtain a commitment time of 15 ms. A security analysis considering experimental imperfections and finite statistics is presented.

  3. Food and water security issues in Russia II: water security in general population of Russian Arctic, Siberia and Far East, 2000-2011.

    PubMed

    Dudarev, Alexey A; Dushkina, Eugenia V; Sladkova, Yuliya N; Alloyarov, Pavel R; Chupakhin, Valery S; Dorofeyev, Vitaliy M; Kolesnikova, Tatjana A; Fridman, Kirill B; Evengard, Birgitta; Nilsson, Lena M

    2013-01-01

    Poor state of water supply systems, shortage of water purification facilities and disinfection systems, low quality of drinking water generally in Russia and particularly in the regions of the Russian Arctic, Siberia and Far East have been defined in the literature. However, no standard protocol of water security assessment has been used in the majority of studies. Uniform water security indicators collected from Russian official statistical sources for the period 2000-2011 were used for comparison for 18 selected regions in the Russian Arctic, Siberia and Far East. The following indicators of water security were analyzed: water consumption, chemical and biological contamination of water reservoirs of Categories I and II of water sources (centralized--underground and surface, and non-centralized) and of drinking water. Water consumption in selected regions fluctuated from 125 to 340 L/person/day. Centralized water sources (both underground and surface sources) are highly contaminated by chemicals (up to 40-80%) and biological agents (up to 55% in some regions), mainly due to surface water sources. Underground water sources show relatively low levels of biological contamination, while chemical contamination is high due to additional water contamination during water treatment and transportation in pipelines. Non-centralized water sources are highly contaminated (both chemically and biologically) in 32-90% of samples analyzed. Very high levels of chemical contamination of drinking water (up to 51%) were detected in many regions, mainly in the north-western part of the Russian Arctic. Biological contamination of drinking water was generally much lower (2.5-12%) everywhere except Evenki AO (27%), and general and thermotolerant coliform bacteria predominated in drinking water samples from all regions (up to 17.5 and 12.5%, correspondingly). The presence of other agents was much lower: Coliphages--0.2-2.7%, Clostridia spores, Giardia cysts, pathogenic bacteria, Rotavirus--up to 0.8%. Of a total of 56 chemical pollutants analyzed in water samples from centralized water supply systems, 32 pollutants were found to be in excess of hygienic limits, with the predominant pollutants being Fe (up to 55%), Cl (up to 57%), Al (up to 43%) and Mn (up to 45%). In 18 selected regions of the Russian Arctic, Siberia and Far East Category I and II water reservoirs, water sources (centralized--underground, surface; non-centralized) and drinking water are highly contaminated by chemical and biological agents. Full-scale reform of the Russian water industry and water security system is urgently needed, especially in selected regions.

  4. Nano/micromotors for security/defense applications. A review.

    PubMed

    Singh, Virendra V; Wang, Joseph

    2015-12-14

    The new capabilities of man-made micro/nanomotors open up considerable opportunities for diverse security and defense applications. This review highlights new micromotor-based strategies for enhanced security monitoring and detoxification of chemical and biological warfare agents (CBWA). The movement of receptor-functionalized nanomotors offers great potential for sensing and isolating target bio-threats from complex samples. New mobile reactive materials based on zeolite or activated carbon offer considerable promise for the accelerated removal of chemical warfare agents. A wide range of proof-of-concept motor-based approaches, including the detection and destruction of anthrax spores, 'on-off' nerve-agent detection or effective neutralization of chemical warfare agents have thus been demonstrated. The propulsion of micromotors and their corresponding bubble tails impart significant mixing that greatly accelerates such detoxification processes. These nanomotors will thus empower sensing and destruction where stirring large quantities of decontaminating reagents and controlled mechanical agitation are impossible or undesired. New technological breakthroughs and greater sophistication of micro/nanoscale machines will lead to rapid translation of the micromotor research activity into practical defense applications, addressing the escalating threat of CBWA.

  5. Nano/micromotors for security/defense applications. A review

    NASA Astrophysics Data System (ADS)

    Singh, Virendra V.; Wang, Joseph

    2015-11-01

    The new capabilities of man-made micro/nanomotors open up considerable opportunities for diverse security and defense applications. This review highlights new micromotor-based strategies for enhanced security monitoring and detoxification of chemical and biological warfare agents (CBWA). The movement of receptor-functionalized nanomotors offers great potential for sensing and isolating target bio-threats from complex samples. New mobile reactive materials based on zeolite or activated carbon offer considerable promise for the accelerated removal of chemical warfare agents. A wide range of proof-of-concept motor-based approaches, including the detection and destruction of anthrax spores, `on-off' nerve-agent detection or effective neutralization of chemical warfare agents have thus been demonstrated. The propulsion of micromotors and their corresponding bubble tails impart significant mixing that greatly accelerates such detoxification processes. These nanomotors will thus empower sensing and destruction where stirring large quantities of decontaminating reagents and controlled mechanical agitation are impossible or undesired. New technological breakthroughs and greater sophistication of micro/nanoscale machines will lead to rapid translation of the micromotor research activity into practical defense applications, addressing the escalating threat of CBWA.

  6. 12 CFR 704.5 - Investments.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... corporate credit union may invest in: (1) Securities, deposits, and obligations set forth in Sections 107(7... securities are legal investments for that corporate credit union; (3) The corporate credit union, directly or... reported daily and the tri-party agent ensures compliance. (e) Securities lending. A corporate credit union...

  7. 12 CFR 704.5 - Investments.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... corporate credit union may invest in: (1) Securities, deposits, and obligations set forth in Sections 107(7... securities are legal investments for that corporate credit union; (3) The corporate credit union, directly or... reported daily and the tri-party agent ensures compliance; and (e) Securities Lending. A corporate credit...

  8. 12 CFR 704.5 - Investments.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... corporate credit union may invest in: (1) Securities, deposits, and obligations set forth in Sections 107(7... securities are legal investments for that corporate credit union; (3) The corporate credit union, directly or... reported daily and the tri-party agent ensures compliance; and (e) Securities Lending. A corporate credit...

  9. 12 CFR 704.5 - Investments.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... corporate credit union may invest in: (1) Securities, deposits, and obligations set forth in Sections 107(7... securities are legal investments for that corporate credit union; (3) The corporate credit union, directly or... reported daily and the tri-party agent ensures compliance; and (e) Securities Lending. A corporate credit...

  10. 17 CFR 279.4 - Form ADV-NR, appointment of agent for service of process by non-resident general partner and non...

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Form ADV-NR, appointment of agent for service of process by non-resident general partner and non-resident managing agent of an... agent for service of process by non-resident general partner and non-resident managing agent of an...

  11. The UK Government's global partnership programme - Its achievements over the past five years and challenges ahead

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Heyes, Alan

    2007-07-01

    Through the Global Partnership the UK continues to make a significant contribution to improve national and global security. Over the past year the UK has continued to implement a wide range of projects across the breadth of its Global Partnership Programme. As well as ensuring the Programme is robust and capable of dealing with new challenges, the UK has cooperated with other donor countries to help them progress projects associated with submarine dismantling, scientist redirection, enhancing nuclear security and Chemical Weapons Destruction. The Global Partnership, although only five years old, has already achieved a great deal. Some 23 states, plusmore » the European Union, are now working closer together under the Global Partnership, and collectively have enhanced global regional and national security by reducing the availability of Weapons of Mass Destruction (WMD) materials and expertise to both states of concern and terrorists. Considerable progress has already been made in, for example: - Improving the security of fissile materials, dangerous biological agents and chemical weapons stocks; - Reducing the number of sites containing radioactive materials; - Working towards closure of reactors still producing weapon-grade plutonium; - Improving nuclear safety to reduce the risks of further, Chernobyl style accidents; - Constructing facilities for destroying Chemical Weapons stocks, and starting actual destruction; - Providing sustainable employment for former WMD scientists to reduce the risk that their expertise will be misused by states or terrorists. By contributing to many of these activities, the UK has helped to make the world safer. This paper reports on the UK's practical and sustainable contribution to the Global Partnership and identifies a number of challenges that remain if it is to have a wider impact on reducing the threats from WMD material. (authors)« less

  12. 46 CFR 131.815 - Carbon dioxide and clean agent alarms.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 46 Shipping 4 2014-10-01 2014-10-01 false Carbon dioxide and clean agent alarms. 131.815 Section 131.815 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) OFFSHORE SUPPLY VESSELS OPERATIONS Markings for Fire Equipment and Emergency Equipment § 131.815 Carbon dioxide and clean agent alarms. Each carbon dioxide or clean agent fire...

  13. 46 CFR 131.815 - Carbon dioxide and clean agent alarms.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 46 Shipping 4 2012-10-01 2012-10-01 false Carbon dioxide and clean agent alarms. 131.815 Section 131.815 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) OFFSHORE SUPPLY VESSELS OPERATIONS Markings for Fire Equipment and Emergency Equipment § 131.815 Carbon dioxide and clean agent alarms. Each carbon dioxide or clean agent fire...

  14. 46 CFR 131.815 - Carbon dioxide and clean agent alarms.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 46 Shipping 4 2013-10-01 2013-10-01 false Carbon dioxide and clean agent alarms. 131.815 Section 131.815 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) OFFSHORE SUPPLY VESSELS OPERATIONS Markings for Fire Equipment and Emergency Equipment § 131.815 Carbon dioxide and clean agent alarms. Each carbon dioxide or clean agent fire...

  15. Suitability of Agent Technology for Military Command and Control in the Future Combat System Environment

    DTIC Science & Technology

    2003-06-01

    and Multi-Agent Systems 1 no. 1 (1998): 7-38. [23] K. Sycara, A. Pannu , M. Williamson, and D. Zeng, “Distributed Intelligent Agents,” IEEE Expert 11...services that include support for mobility, security, management, persistence, and naming of agents. [i] K. Sycara, A. Pannu , M. Williamson, and D

  16. 17 CFR 240.17Ac2-2 - Annual reporting requirement for registered transfer agents.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... inaccurate, incomplete, or misleading. A transfer agent may file an amendment at any time; however, in order... for registered transfer agents. 240.17Ac2-2 Section 240.17Ac2-2 Commodity and Securities Exchanges... Organizations § 240.17Ac2-2 Annual reporting requirement for registered transfer agents. (a) Every transfer...

  17. In Vivo Testing of Chemopreventive Agents Using the Dog Model of Spontaneous Prostate Carcinogenesis

    DTIC Science & Technology

    2001-03-01

    SECURITY CLASSIFICATION 18. SECURITY CLASSIFICATION 19. SECURITY CLASSIFICATION 20. LIMITATION OF ABSTRACT OF REPORT OF THIS PAGE OF ABSTRACT...retarded tate Cancer Research Program (PC-970492, awarded to population. J Gerontol 1969;24:395-411. 19. Hayflick LH. How and why we age. Exp Gerontol

  18. A Computational Model and Multi-Agent Simulation for Information Assurance

    DTIC Science & Technology

    2002-06-01

    Podell , Information Security: an Integrated Collection of Essays, IEEE Computer Society Press, Los Alamitos, CA, 1994. Brinkley, D. L. and Schell, R...R., “What is There to Worry About? An Introduction to the Computer Security Problem,” ed. Abrams and Jajodia and Podell , Information Security: an

  19. Managing Campus Security: Issues for Police Officers at Public Institutions.

    ERIC Educational Resources Information Center

    Dwyer, William O.; And Others

    1994-01-01

    To maximize the effectiveness of their campus security systems while minimizing the institution's exposure to liability, campus administrators must understand the legal context in which their police or security personnel are operating as agents of authority. Some of these policy and behavior issues are explained. (MSE)

  20. 19 CFR 113.37 - Corporate sureties.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY... on the bond. (d) Social security number of agent or attorney on the bond. In the appropriate place on... place his/her social security number, as it appears on the corporate surety power of attorney. (e...

  1. 19 CFR 113.37 - Corporate sureties.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY... on the bond. (d) Social security number of agent or attorney on the bond. In the appropriate place on... place his/her social security number, as it appears on the corporate surety power of attorney. (e...

  2. 19 CFR 113.37 - Corporate sureties.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY... on the bond. (d) Social security number of agent or attorney on the bond. In the appropriate place on... place his/her social security number, as it appears on the corporate surety power of attorney. (e...

  3. 19 CFR 113.37 - Corporate sureties.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY... on the bond. (d) Social security number of agent or attorney on the bond. In the appropriate place on... place his/her social security number, as it appears on the corporate surety power of attorney. (e...

  4. 19 CFR 113.37 - Corporate sureties.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY... on the bond. (d) Social security number of agent or attorney on the bond. In the appropriate place on... place his/her social security number, as it appears on the corporate surety power of attorney. (e...

  5. Joint chemical agent detector (JCAD): the future of chemical agent detection

    NASA Astrophysics Data System (ADS)

    Laljer, Charles E.

    2003-08-01

    The Joint Chemical Agent Detector (JCAD) has continued development through 2002. The JCAD has completed Contractor Validation Testing (CVT) that included chemical warfare agent testing, environmental testing, electromagnetic interferent testing, and platform integration validation. The JCAD provides state of the art chemical warfare agent detection capability to military and homeland security operators. Intelligence sources estimate that over twenty countries have active chemical weapons programs. The spread of weapons of mass destruction (and the industrial capability for manufacture of these weapons) to third world nations and terrorist organizations has greatly increased the chemical agent threat to U.S. interests. Coupled with the potential for U.S. involvement in localized conflicts in an operational or support capacity, increases the probability that the military Joint Services may encounter chemical agents anywhere in the world. The JCAD is a small (45 in3), lightweight (2 lb.) chemical agent detector for vehicle interiors, aircraft, individual personnel, shipboard, and fixed site locations. The system provides a common detection component across multi-service platforms. This common detector system will allow the Joint Services to use the same operational and support concept for more efficient utilization of resources. The JCAD detects, identifies, quantifies, and warns of the presence of chemical agents prior to onset of miosis. Upon detection of chemical agents, the detector provides local and remote audible and visual alarms to the operators. Advance warning will provide the vehicle crew and other personnel in the local area with the time necessary to protect themselves from the lethal effects of chemical agents. The JCAD is capable of being upgraded to protect against future chemical agent threats. The JCAD provides the operator with the warning necessary to survive and fight in a chemical warfare agent threat environment.

  6. Weapons proliferation and organized crime: The Russian military and security force dimension

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Turbiville, G.H.

    One dimension of international security of the post-Cold War era that has not received enough attention is how organized crime facilitates weapons proliferation worldwide. The former Soviet Union (FSU) has emerged as the world`s greatest counterproliferation challenge. It contains the best developed links among organized crime, military and security organizations, and weapons proliferation. Furthermore, Russian military and security forces are the principle source of arms becoming available to organized crime groups, participants in regional conflict, and corrupt state officials engaged in the black, gray, and legal arms markets in their various dimensions. The flourishing illegal trade in conventional weapons ismore » the clearest and most tangible manifestation of the close links between Russian power ministries and criminal organizations. The magnitude of the WMD proliferation problem from the FSU is less clear and less tangible. There have been many open reports of small-scale fissile material smuggling out of the FSU. The situation with regard to the proliferation of chemical weapon usually receives less attention but may be more serious. With an acknowledged stockpile of 40,000 metric tons of chemical agents, the potential for proliferation is enormous.« less

  7. Implementation of the International Health Regulations (2005) Through Cooperative Bioengagement

    PubMed Central

    Standley, Claire J.; Sorrell, Erin M.; Kornblet, Sarah; Fischer, Julie E.; Katz, Rebecca

    2015-01-01

    Cooperative bioengagement efforts, as practiced by U.S. government-funded entities, such as the Defense Threat Reduction Agency’s Cooperative Biological Engagement Program, the State Department’s Biosecurity Engagement Program, and parallel programs in other countries, exist at the nexus between public health and security. These programs have an explicit emphasis on developing projects that address the priorities of the partner country as well as the donor. While the objectives of cooperative bioengagement programs focus on reducing the potential for accidental or intentional misuse and/or release of dangerous biological agents, many partner countries are interested in bioengagement as a means to improve basic public health capacities. This article examines the extent to which cooperative bioengagement projects address public health capacity building under the revised International Health Regulations and alignment with the Global Health Security Agenda action packages. PMID:26528463

  8. 76 FR 16843 - Order Cancelling Registrations of Certain Transfer Agents

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-03-25

    ... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-64102] Order Cancelling Registrations of Certain Transfer Agents March 21, 2011. On November 4, 2010, notice was published in the Federal Register... transfer agents.\\2\\ For the reasons discussed below, the Commission is cancelling the registration of the...

  9. Patient Protection and Affordable Care Act; program integrity: Exchange, SHOP, and eligibility appeals. Final rule.

    PubMed

    2013-08-30

    This final rule implements provisions of the Patient Protection and Affordable Care Act and the Health Care and Education Reconciliation Act of 2010 (collectively referred to as the Affordable Care Act). Specifically, this final rule outlines Exchange standards with respect to eligibility appeals, agents and brokers, privacy and security, issuer direct enrollment, and the handling of consumer cases. It also sets forth standards with respect to a State's operation of the Exchange and Small Business Health Options Program (SHOP). It generally is finalizing previously proposed policies without change.

  10. Agricultural Research Service: biodefense research.

    PubMed

    Gay, C G

    2013-01-01

    The National Animal Health Program at the Agricultural Research Service (ARS), United States Department of Agriculture (USDA), includes research programs dedicated to the defense of animal agriculture against the treat of biological agents with the potential of significant economic harm and/or public health consequences. This article provides a summary of the program and identifies its relevance to national initiatives to protect livestock and poultry as well as global food security. An introduction to setting research priorities and a selection of research accomplishments that define the scope of the biodefense research program is provided.

  11. 7 CFR 1901.506 - Book-entry procedure for FmHA or its successor agency under Public Law 103-354 securities...

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... under Public Law 103-354 securities-issuance and redemption of certificate by Reserve bank. 1901.506... applied to such FmHA or its successor agency under Public Law 103-354 securities, the Reserve bank is... successor agency under Public Law 103-354 securities. (3) A Reserve bank as fiscal agent of the United...

  12. VOLTTRON™: An Agent Platform for Integrating Electric Vehicles and Smart Grid

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Haack, Jereme N.; Akyol, Bora A.; Tenney, Nathan D.

    2013-12-06

    The VOLTTRON™ platform provides a secure environment for the deployment of intelligent applications in the smart grid. VOLTTRON design is based on the needs of control applications running on small form factor devices, namely security and resource guarantees. Services such as resource discovery, secure agent mobility, and interacting with smart and legacy devices are provided by the platform to ease the development of control applications and accelerate their deployment. VOLTTRON platform has been demonstrated in several different domains that influenced and enhanced its capabilities. This paper will discuss the features of VOLTTRON and highlight its usage to coordinate electric vehiclemore » charging with home energy usage« less

  13. 46 CFR 97.37-9 - Carbon dioxide and clean agent alarms.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 46 Shipping 4 2014-10-01 2014-10-01 false Carbon dioxide and clean agent alarms. 97.37-9 Section 97.37-9 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) CARGO AND MISCELLANEOUS VESSELS OPERATIONS Markings for Fire and Emergency Equipment, Etc. § 97.37-9 Carbon dioxide and clean agent alarms. Each carbon dioxide or clean agent...

  14. 46 CFR 78.47-9 - Carbon dioxide and clean agent alarms.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 46 Shipping 3 2013-10-01 2013-10-01 false Carbon dioxide and clean agent alarms. 78.47-9 Section 78.47-9 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) PASSENGER VESSELS OPERATIONS Markings for Fire and Emergency Equipment, Etc. § 78.47-9 Carbon dioxide and clean agent alarms. Each carbon dioxide or clean agent fire...

  15. 46 CFR 78.47-9 - Carbon dioxide and clean agent alarms.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 46 Shipping 3 2012-10-01 2012-10-01 false Carbon dioxide and clean agent alarms. 78.47-9 Section 78.47-9 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) PASSENGER VESSELS OPERATIONS Markings for Fire and Emergency Equipment, Etc. § 78.47-9 Carbon dioxide and clean agent alarms. Each carbon dioxide or clean agent fire...

  16. 46 CFR 97.37-9 - Carbon dioxide and clean agent alarms.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 46 Shipping 4 2013-10-01 2013-10-01 false Carbon dioxide and clean agent alarms. 97.37-9 Section 97.37-9 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) CARGO AND MISCELLANEOUS VESSELS OPERATIONS Markings for Fire and Emergency Equipment, Etc. § 97.37-9 Carbon dioxide and clean agent alarms. Each carbon dioxide or clean agent...

  17. 46 CFR 97.37-9 - Carbon dioxide and clean agent alarms.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 46 Shipping 4 2012-10-01 2012-10-01 false Carbon dioxide and clean agent alarms. 97.37-9 Section 97.37-9 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) CARGO AND MISCELLANEOUS VESSELS OPERATIONS Markings for Fire and Emergency Equipment, Etc. § 97.37-9 Carbon dioxide and clean agent alarms. Each carbon dioxide or clean agent...

  18. 46 CFR 78.47-9 - Carbon dioxide and clean agent alarms.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 46 Shipping 3 2014-10-01 2014-10-01 false Carbon dioxide and clean agent alarms. 78.47-9 Section 78.47-9 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) PASSENGER VESSELS OPERATIONS Markings for Fire and Emergency Equipment, Etc. § 78.47-9 Carbon dioxide and clean agent alarms. Each carbon dioxide or clean agent fire...

  19. 31 CFR 321.10 - Responsibilities of paying agents.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 31 Money and Finance: Treasury 2 2014-07-01 2014-07-01 false Responsibilities of paying agents. 321.10 Section 321.10 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued... paying agent is required to redeem eligible securities during its regular business hours for any...

  20. 31 CFR 321.10 - Responsibilities of paying agents.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 31 Money and Finance:Treasury 2 2012-07-01 2012-07-01 false Responsibilities of paying agents. 321.10 Section 321.10 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued... paying agent is required to redeem eligible securities during its regular business hours for any...

  1. 31 CFR 321.10 - Responsibilities of paying agents.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 31 Money and Finance:Treasury 2 2013-07-01 2013-07-01 false Responsibilities of paying agents. 321.10 Section 321.10 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued... paying agent is required to redeem eligible securities during its regular business hours for any...

  2. 78 FR 75398 - Self-Regulatory Organizations; Municipal Securities Rulemaking Board; Order Granting Approval of...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-12-11

    ... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-70990; File No. SR-MSRB-2013-08] Self...\\ Securities Exchange Act Release No. 70607 (October 3, 2013), 78 FR 62736 (``Notice''). II. Description of the... dealer, acting as an underwriter or remarketing agent with no prior or future long-term economic interest...

  3. The Price of Uncertainty in Security Games

    NASA Astrophysics Data System (ADS)

    Grossklags, Jens; Johnson, Benjamin; Christin, Nicolas

    In the realm of information security, lack of information about other users' incentives in a network can lead to inefficient security choices and reductions in individuals' payoffs. We propose, contrast and compare three metrics for measuring the price of uncertainty due to the departure from the payoff-optimal security outcomes under complete information. Per the analogy with other efficiency metrics, such as the price of anarchy, we define the price of uncertainty as the maximum discrepancy in expected payoff in a complete information environment versus the payoff in an incomplete information environment. We consider difference, payoffratio, and cost-ratio metrics as canonical nontrivial measurements of the price of uncertainty. We conduct an algebraic, numerical, and graphical analysis of these metrics applied to different well-studied security scenarios proposed in prior work (i.e., best shot, weakest-link, and total effort). In these scenarios, we study how a fully rational expert agent could utilize the metrics to decide whether to gather information about the economic incentives of multiple nearsighted and naïve agents. We find substantial differences between the various metrics and evaluate the appropriateness for security choices in networked systems.

  4. Pathogen security-help or hindrance?

    PubMed

    Morse, Stephen A

    2014-01-01

    Events over the past 15 years have resulted in the promulgation of regulations in the United States to enhance biosecurity by restricting the access to pathogens and toxins (i.e., biological select agents and toxins [BSATs]), which pose a severe threat to human being, animal, or plant health or to animal or plant products, to qualified institutions, laboratories, and scientists. These regulations also reduce biosafety concerns by imposing specific requirements on laboratories working with BSATs. Furthermore, they provide a legal framework for prosecuting someone who possesses a BSAT illegally. With the implementation of these regulations has come discussion in the scientific community about the potential of these regulations to affect the cost of doing BSAT research, hamper research and international collaborations, or whether it would stop someone with a microbiological background from isolating many of the select agents from nature.

  5. Pathogen Security-Help or Hindrance?

    PubMed Central

    Morse, Stephen A.

    2015-01-01

    Events over the past 15 years have resulted in the promulgation of regulations in the United States to enhance biosecurity by restricting the access to pathogens and toxins (i.e., biological select agents and toxins [BSATs]), which pose a severe threat to human being, animal, or plant health or to animal or plant products, to qualified institutions, laboratories, and scientists. These regulations also reduce biosafety concerns by imposing specific requirements on laboratories working with BSATs. Furthermore, they provide a legal framework for prosecuting someone who possesses a BSAT illegally. With the implementation of these regulations has come discussion in the scientific community about the potential of these regulations to affect the cost of doing BSAT research, hamper research and international collaborations, or whether it would stop someone with a microbiological background from isolating many of the select agents from nature. PMID:25610829

  6. Using Swarming Agents for Scalable Security in Large Network Environments

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Crouse, Michael; White, Jacob L.; Fulp, Errin W.

    2011-09-23

    The difficulty of securing computer infrastructures increases as they grow in size and complexity. Network-based security solutions such as IDS and firewalls cannot scale because of exponentially increasing computational costs inherent in detecting the rapidly growing number of threat signatures. Hostbased solutions like virus scanners and IDS suffer similar issues, and these are compounded when enterprises try to monitor these in a centralized manner. Swarm-based autonomous agent systems like digital ants and artificial immune systems can provide a scalable security solution for large network environments. The digital ants approach offers a biologically inspired design where each ant in the virtualmore » colony can detect atoms of evidence that may help identify a possible threat. By assembling the atomic evidences from different ant types the colony may detect the threat. This decentralized approach can require, on average, fewer computational resources than traditional centralized solutions; however there are limits to its scalability. This paper describes how dividing a large infrastructure into smaller managed enclaves allows the digital ant framework to effectively operate in larger environments. Experimental results will show that using smaller enclaves allows for more consistent distribution of agents and results in faster response times.« less

  7. Proliferation: Threat and Response

    DTIC Science & Technology

    1997-11-01

    primary agent, the Defense Technology capabilities also contribute to ongoing efforts to Security Administration ( DTSA ). These efforts are focus and...Special Weapons Agency Organization DTSA Defense Technology Security BW Biological Weapons Administration BWC Biological and Toxin Weapons EPCI Enhanced

  8. 46 CFR 35.40-7 - Carbon dioxide and clean agent alarms-T/ALL.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 46 Shipping 1 2012-10-01 2012-10-01 false Carbon dioxide and clean agent alarms-T/ALL. 35.40-7 Section 35.40-7 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY TANK VESSELS OPERATIONS Posting and Marking Requirements-TB/ALL § 35.40-7 Carbon dioxide and clean agent alarms—T/ALL. Each carbon dioxide or clean agent fire extinguishing alarm...

  9. 12 CFR 220.103 - Borrowing of securities.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... individual, as contrasted with a member of a national securities exchange or a broker or dealer. (b) Section..., either as agent or as principal; he may borrow under the provision in order to relend to someone else for...

  10. 12 CFR 811.7 - Servicing book-entry Federal Financing Bank securities; payment of interest; payment at maturity...

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 12 Banks and Banking 7 2014-01-01 2014-01-01 false Servicing book-entry Federal Financing Bank... FEDERAL FINANCING BANK BOOK-ENTRY PROCEDURE FOR FEDERAL FINANCING BANK SECURITIES § 811.7 Servicing book... becoming due on book-entry Federal Financing Bank securities shall be charged against the special agent...

  11. A security architecture for interconnecting health information systems.

    PubMed

    Gritzalis, Dimitris; Lambrinoudakis, Costas

    2004-03-31

    Several hereditary and other chronic diseases necessitate continuous and complicated health care procedures, typically offered in different, often distant, health care units. Inevitably, the medical records of patients suffering from such diseases become complex, grow in size very fast and are scattered all over the units involved in the care process, hindering communication of information between health care professionals. Web-based electronic medical records have been recently proposed as the solution to the above problem, facilitating the interconnection of the health care units in the sense that health care professionals can now access the complete medical record of the patient, even if it is distributed in several remote units. However, by allowing users to access information from virtually anywhere, the universe of ineligible people who may attempt to harm the system is dramatically expanded, thus severely complicating the design and implementation of a secure environment. This paper presents a security architecture that has been mainly designed for providing authentication and authorization services in web-based distributed systems. The architecture has been based on a role-based access scheme and on the implementation of an intelligent security agent per site (i.e. health care unit). This intelligent security agent: (a). authenticates the users, local or remote, that can access the local resources; (b). assigns, through temporary certificates, access privileges to the authenticated users in accordance to their role; and (c). communicates to other sites (through the respective security agents) information about the local users that may need to access information stored in other sites, as well as about local resources that can be accessed remotely.

  12. Security Games Applied to Real-World: Research Contributions and Challenges

    DTIC Science & Technology

    2012-01-01

    Marecki, J.: GUARDS and PROTECT: Next Generation Applications of Security Games . SIGECOM 10 (March 2011) 31–34 4. Shieh, E ., An, B., Yang, R., Tambe...Steigerwald, E .: GUARDS - Game Theoretic Security Allocation on a National Scale. In: Proc. of The 10th International Conference on Autonomous Agents...Shieh, E ., Kiekintveld, C.: Refinement of Strong Stackelberg Equilibria in Security Games . In: Proc. of the 25th Conference on Artificial Intelligence

  13. 19 CFR 149.5 - Eligibility to file an Importer Security Filing, authorized agents.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... data interchange system. If the Importer Security Filing and entry or entry summary are provided via a... must retain powers of attorney in English until revoked. Revoked powers of attorney and letters of...

  14. Method for vacuum pressing electrochemical cell components

    NASA Technical Reports Server (NTRS)

    Andrews, Craig C. (Inventor); Murphy, Oliver J. (Inventor)

    2004-01-01

    Assembling electrochemical cell components using a bonding agent comprising aligning components of the electrochemical cell, applying a bonding agent between the components to bond the components together, placing the components within a container that is essentially a pliable bag, and drawing a vacuum within the bag, wherein the bag conforms to the shape of the components from the pressure outside the bag, thereby holding the components securely in place. The vacuum is passively maintained until the adhesive has cured and the components are securely bonded. The bonding agent used to bond the components of the electrochemical cell may be distributed to the bonding surface from distribution channels in the components. To prevent contamination with bonding agent, some areas may be treated to produce regions of preferred adhesive distribution and protected regions. Treatments may include polishing, etching, coating and providing protective grooves between the bonding surfaces and the protected regions.

  15. Food and water security issues in Russia II: Water security in general population of Russian Arctic, Siberia and Far East, 2000–2011

    PubMed Central

    Dudarev, Alexey A.; Dushkina, Eugenia V.; Sladkova, Yuliya N.; Alloyarov, Pavel R.; Chupakhin, Valery S.; Dorofeyev, Vitaliy M.; Kolesnikova, Tatjana A.; Fridman, Kirill B.; Evengard, Birgitta; Nilsson, Lena M.

    2013-01-01

    Background Poor state of water supply systems, shortage of water purification facilities and disinfection systems, low quality of drinking water generally in Russia and particularly in the regions of the Russian Arctic, Siberia and Far East have been defined in the literature. However, no standard protocol of water security assessment has been used in the majority of studies. Study design and methods Uniform water security indicators collected from Russian official statistical sources for the period 2000–2011 were used for comparison for 18 selected regions in the Russian Arctic, Siberia and Far East. The following indicators of water security were analyzed: water consumption, chemical and biological contamination of water reservoirs of Categories I and II of water sources (centralized – underground and surface, and non-centralized) and of drinking water. Results Water consumption in selected regions fluctuated from 125 to 340 L/person/day. Centralized water sources (both underground and surface sources) are highly contaminated by chemicals (up to 40–80%) and biological agents (up to 55% in some regions), mainly due to surface water sources. Underground water sources show relatively low levels of biological contamination, while chemical contamination is high due to additional water contamination during water treatment and transportation in pipelines. Non-centralized water sources are highly contaminated (both chemically and biologically) in 32–90% of samples analyzed. Very high levels of chemical contamination of drinking water (up to 51%) were detected in many regions, mainly in the north-western part of the Russian Arctic. Biological contamination of drinking water was generally much lower (2.5–12%) everywhere except Evenki AO (27%), and general and thermotolerant coliform bacteria predominated in drinking water samples from all regions (up to 17.5 and 12.5%, correspondingly). The presence of other agents was much lower: Coliphages – 0.2–2.7%, Clostridia spores, Giardia cysts, pathogenic bacteria, Rotavirus – up to 0.8%. Of a total of 56 chemical pollutants analyzed in water samples from centralized water supply systems, 32 pollutants were found to be in excess of hygienic limits, with the predominant pollutants being Fe (up to 55%), Cl (up to 57%), Al (up to 43%) and Mn (up to 45%). Conclusion In 18 selected regions of the Russian Arctic, Siberia and Far East Category I and II water reservoirs, water sources (centralized – underground, surface; non-centralized) and drinking water are highly contaminated by chemical and biological agents. Full-scale reform of the Russian water industry and water security system is urgently needed, especially in selected regions. PMID:24350065

  16. 46 CFR 108.627 - Carbon dioxide and clean agent alarms.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 46 Shipping 4 2014-10-01 2014-10-01 false Carbon dioxide and clean agent alarms. 108.627 Section 108.627 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) A-MOBILE OFFSHORE DRILLING UNITS DESIGN AND EQUIPMENT Equipment Markings and Instructions § 108.627 Carbon dioxide and clean agent alarms. Each carbon dioxide alarm must be...

  17. 46 CFR 196.37-9 - Carbon dioxide and clean agent alarms.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 46 Shipping 7 2013-10-01 2013-10-01 false Carbon dioxide and clean agent alarms. 196.37-9 Section 196.37-9 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) OCEANOGRAPHIC RESEARCH VESSELS OPERATIONS Markings for Fire and Emergency Equipment, etc. § 196.37-9 Carbon dioxide and clean agent alarms. Each extinguishing system using...

  18. 46 CFR 196.37-9 - Carbon dioxide and clean agent alarms.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 46 Shipping 7 2012-10-01 2012-10-01 false Carbon dioxide and clean agent alarms. 196.37-9 Section 196.37-9 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) OCEANOGRAPHIC RESEARCH VESSELS OPERATIONS Markings for Fire and Emergency Equipment, etc. § 196.37-9 Carbon dioxide and clean agent alarms. Each extinguishing system using...

  19. 46 CFR 169.732 - Carbon dioxide and clean agent alarms.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 46 Shipping 7 2012-10-01 2012-10-01 false Carbon dioxide and clean agent alarms. 169.732 Section 169.732 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) NAUTICAL SCHOOLS SAILING SCHOOL VESSELS Vessel Control, Miscellaneous Systems, and Equipment Markings § 169.732 Carbon dioxide and clean agent alarms. (a) Each carbon dioxide o...

  20. 46 CFR 169.732 - Carbon dioxide and clean agent alarms.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 46 Shipping 7 2013-10-01 2013-10-01 false Carbon dioxide and clean agent alarms. 169.732 Section 169.732 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) NAUTICAL SCHOOLS SAILING SCHOOL VESSELS Vessel Control, Miscellaneous Systems, and Equipment Markings § 169.732 Carbon dioxide and clean agent alarms. (a) Each carbon dioxide o...

  1. 46 CFR 108.627 - Carbon dioxide and clean agent alarms.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 46 Shipping 4 2012-10-01 2012-10-01 false Carbon dioxide and clean agent alarms. 108.627 Section 108.627 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) A-MOBILE OFFSHORE DRILLING UNITS DESIGN AND EQUIPMENT Equipment Markings and Instructions § 108.627 Carbon dioxide and clean agent alarms. Each carbon dioxide alarm must be...

  2. 46 CFR 169.732 - Carbon dioxide and clean agent alarms.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 46 Shipping 7 2014-10-01 2014-10-01 false Carbon dioxide and clean agent alarms. 169.732 Section 169.732 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) NAUTICAL SCHOOLS SAILING SCHOOL VESSELS Vessel Control, Miscellaneous Systems, and Equipment Markings § 169.732 Carbon dioxide and clean agent alarms. (a) Each carbon dioxide o...

  3. 46 CFR 196.37-9 - Carbon dioxide and clean agent alarms.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 46 Shipping 7 2014-10-01 2014-10-01 false Carbon dioxide and clean agent alarms. 196.37-9 Section 196.37-9 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) OCEANOGRAPHIC RESEARCH VESSELS OPERATIONS Markings for Fire and Emergency Equipment, etc. § 196.37-9 Carbon dioxide and clean agent alarms. Each extinguishing system using...

  4. 46 CFR 108.627 - Carbon dioxide and clean agent alarms.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 46 Shipping 4 2013-10-01 2013-10-01 false Carbon dioxide and clean agent alarms. 108.627 Section 108.627 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) A-MOBILE OFFSHORE DRILLING UNITS DESIGN AND EQUIPMENT Equipment Markings and Instructions § 108.627 Carbon dioxide and clean agent alarms. Each carbon dioxide alarm must be...

  5. 75 FR 42363 - Public Health Security and Bioterrorism Preparedness and Response Act of 2002; Biennial Review...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-07-21

    ... Bioterrorism Preparedness and Response Act of 2002; Biennial Review and Republication of the Select Agent and... Act) requires the biennial review and republication of the HHS list of select agents and toxins. Accordingly, we are soliciting public comment on the current HHS list of select agents and toxins, including...

  6. 75 FR 50730 - Public Health Security and Bioterrorism Preparedness and Response Act of 2002: Biennial Review...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-08-17

    ... Bioterrorism Preparedness and Response Act of 2002: Biennial Review and Republication of the Select Agent and... public comment on the current HHS list of select agents and toxins. This document is extending the... changes to the list of select agents and toxins'' and mailed to: Centers for Disease Control and...

  7. The East Mediterranean Triangle at Crossroads

    DTIC Science & Technology

    2016-03-01

    concerning the role of ground forces in achieving national security objectives. The Strategic Studies Institute publishes national security and...international audience, and honor Soldiers—past and present. STRATEGIC STUDIES INSTITUTE The Strategic Studies Institute (SSI) is part of the U.S...Army War College and is the strategic-level study agent for issues related to national security and military strategy with emphasis on geostrategic

  8. Biosecurity in the age of Big Data: a conversation with the FBI

    PubMed Central

    Kozminski, Keith G.

    2015-01-01

    New scientific frontiers and emerging technologies within the life sciences pose many global challenges to society. Big Data is a premier example, especially with respect to individual, national, and international security. Here a Special Agent of the Federal Bureau of Investigation discusses the security implications of Big Data and the need for security in the life sciences. PMID:26543195

  9. Architecture of security management unit for safe hosting of multiple agents

    NASA Astrophysics Data System (ADS)

    Gilmont, Tanguy; Legat, Jean-Didier; Quisquater, Jean-Jacques

    1999-04-01

    In such growing areas as remote applications in large public networks, electronic commerce, digital signature, intellectual property and copyright protection, and even operating system extensibility, the hardware security level offered by existing processors is insufficient. They lack protection mechanisms that prevent the user from tampering critical data owned by those applications. Some devices make exception, but have not enough processing power nor enough memory to stand up to such applications (e.g. smart cards). This paper proposes an architecture of secure processor, in which the classical memory management unit is extended into a new security management unit. It allows ciphered code execution and ciphered data processing. An internal permanent memory can store cipher keys and critical data for several client agents simultaneously. The ordinary supervisor privilege scheme is replaced by a privilege inheritance mechanism that is more suited to operating system extensibility. The result is a secure processor that has hardware support for extensible multitask operating systems, and can be used for both general applications and critical applications needing strong protection. The security management unit and the internal permanent memory can be added to an existing CPU core without loss of performance, and do not require it to be modified.

  10. AST: Activity-Security-Trust driven modeling of time varying networks.

    PubMed

    Wang, Jian; Xu, Jiake; Liu, Yanheng; Deng, Weiwen

    2016-02-18

    Network modeling is a flexible mathematical structure that enables to identify statistical regularities and structural principles hidden in complex systems. The majority of recent driving forces in modeling complex networks are originated from activity, in which an activity potential of a time invariant function is introduced to identify agents' interactions and to construct an activity-driven model. However, the new-emerging network evolutions are already deeply coupled with not only the explicit factors (e.g. activity) but also the implicit considerations (e.g. security and trust), so more intrinsic driving forces behind should be integrated into the modeling of time varying networks. The agents undoubtedly seek to build a time-dependent trade-off among activity, security, and trust in generating a new connection to another. Thus, we reasonably propose the Activity-Security-Trust (AST) driven model through synthetically considering the explicit and implicit driving forces (e.g. activity, security, and trust) underlying the decision process. AST-driven model facilitates to more accurately capture highly dynamical network behaviors and figure out the complex evolution process, allowing a profound understanding of the effects of security and trust in driving network evolution, and improving the biases induced by only involving activity representations in analyzing the dynamical processes.

  11. EVALUATION REPORT SCIENCE APPLICATIONS INTERNATIONAL CORPORATION S-CAD CHEMICAL AGENT DETECTION SYSTEM

    EPA Science Inventory

    The USEPA's National Homeland Security Research Center (NHSRC)Technology Testing and Evaluation Program (TTEP) is carrying out performance tests on homeland security technologies. Under TTEP, Battelle recently evaluated the performance of the Science Applications International Co...

  12. Intelligence, Information Technology, and Information Warfare.

    ERIC Educational Resources Information Center

    Davies, Philip H. J.

    2002-01-01

    Addresses the use of information technology for intelligence and information warfare in the context of national security and reviews the status of clandestine collection. Discusses hacking, human agent collection, signal interception, covert action, counterintelligence and security, and communications between intelligence producers and consumers…

  13. 42 CFR 73.10 - Restricting access to select agents and toxins; security risk assessments.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... AND HUMAN SERVICES QUARANTINE, INSPECTION, LICENSING SELECT AGENTS AND TOXINS § 73.10 Restricting... or intelligence agency of committing a crime specified in 18 U.S.C. 2332b(g)(5), knowing involvement...

  14. Two new Controlled not Gate Based Quantum Secret Sharing Protocols without Entanglement Attenuation

    NASA Astrophysics Data System (ADS)

    Zhu, Zhen-Chao; Hu, Ai-Qun; Fu, An-Min

    2016-05-01

    In this paper, we propose two new controlled not gate based quantum secret sharing protocols. In these two protocols, each photon only travels once, which guarantees the agents located in long distance can be able to derive the dealer's secret without suffering entanglement attenuation problem. The protocols are secure against trojan horse attack, intercept-resend attack, entangle-measure attack and entanglement-swapping attack. The theoretical efficiency for qubits of these two protocols can approach 100 %, except those used for eavesdropping checking, all entangled states can be used for final secret sharing.

  15. Distributed reinforcement learning for adaptive and robust network intrusion response

    NASA Astrophysics Data System (ADS)

    Malialis, Kleanthis; Devlin, Sam; Kudenko, Daniel

    2015-07-01

    Distributed denial of service (DDoS) attacks constitute a rapidly evolving threat in the current Internet. Multiagent Router Throttling is a novel approach to defend against DDoS attacks where multiple reinforcement learning agents are installed on a set of routers and learn to rate-limit or throttle traffic towards a victim server. The focus of this paper is on online learning and scalability. We propose an approach that incorporates task decomposition, team rewards and a form of reward shaping called difference rewards. One of the novel characteristics of the proposed system is that it provides a decentralised coordinated response to the DDoS problem, thus being resilient to DDoS attacks themselves. The proposed system learns remarkably fast, thus being suitable for online learning. Furthermore, its scalability is successfully demonstrated in experiments involving 1000 learning agents. We compare our approach against a baseline and a popular state-of-the-art throttling technique from the network security literature and show that the proposed approach is more effective, adaptive to sophisticated attack rate dynamics and robust to agent failures.

  16. Bridging the health security divide: department of defense support for the global health security agenda.

    PubMed

    Moudy, Robin M; Ingerson-Mahar, Michael; Kanter, Jordan; Grant, Ashley M; Fisher, Dara R; Jones, Franca R

    2014-01-01

    In 2011, President Obama addressed the United Nations General Assembly and urged the global community to come together to prevent, detect, and fight every kind of biological danger, whether a pandemic, terrorist threat, or treatable disease. Over the past decade, the United States and key international partners have addressed these dangers through a variety of programs and strategies aimed at developing and enhancing countries' capacity to rapidly detect, assess, report, and respond to acute biological threats. Despite our collective efforts, however, an increasingly interconnected world presents heightened opportunities for human, animal, and zoonotic diseases to emerge and spread globally. Further, the technical capabilities required to develop biological agents into a weapon are relatively low. The launch of the Global Health Security Agenda (GHSA) provides an opportunity for the international community to enhance the linkages between the health and security sectors, accelerating global efforts to prevent avoidable epidemics and bioterrorism, detect threats early, and respond rapidly and effectively to biological threats. The US Department of Defense (DoD) plays a key role in achieving GHSA objectives through its force health protection, threat reduction, and biodefense efforts at home and abroad. This article focuses on GHSA activities conducted in the DoD Office of the Assistant Secretary of Defense for Nuclear, Chemical, and Biological Defense.

  17. Enabling Others to Win in a Complex World: Maximizing Security Force Assistance Potential in the Regionally Aligned Brigade Combat Team

    DTIC Science & Technology

    2015-12-01

    concerning the role of ground forces in achieving national security objectives. The Strategic Studies Institute publishes national security and...international audience, and honor soldiers—past and present. STRATEGIC STUDIES INSTITUTE The Strategic Studies Institute (SSI) is part of the U.S...Army War College and is the strategic-level study agent for issues related to national security and military strategy with emphasis on geostrategic

  18. Dispatching power system for preventive and corrective voltage collapse problem in a deregulated power system

    NASA Astrophysics Data System (ADS)

    Alemadi, Nasser Ahmed

    Deregulation has brought opportunities for increasing efficiency of production and delivery and reduced costs to customers. Deregulation has also bought great challenges to provide the reliability and security customers have come to expect and demand from the electrical delivery system. One of the challenges in the deregulated power system is voltage instability. Voltage instability has become the principal constraint on power system operation for many utilities. Voltage instability is a unique problem because it can produce an uncontrollable, cascading instability that results in blackout for a large region or an entire country. In this work we define a system of advanced analytical methods and tools for secure and efficient operation of the power system in the deregulated environment. The work consists of two modules; (a) contingency selection module and (b) a Security Constrained Optimization module. The contingency selection module to be used for voltage instability is the Voltage Stability Security Assessment and Diagnosis (VSSAD). VSSAD shows that each voltage control area and its reactive reserve basin describe a subsystem or agent that has a unique voltage instability problem. VSSAD identifies each such agent. VS SAD is to assess proximity to voltage instability for each agent and rank voltage instability agents for each contingency simulated. Contingency selection and ranking for each agent is also performed. Diagnosis of where, why, when, and what can be done to cure voltage instability for each equipment outage and transaction change combination that has no load flow solution is also performed. A security constrained optimization module developed solves a minimum control solvability problem. A minimum control solvability problem obtains the reactive reserves through action of voltage control devices that VSSAD determines are needed in each agent to obtain solution of the load flow. VSSAD makes a physically impossible recommendation of adding reactive generation capability to specific generators to allow a load flow solution to be obtained. The minimum control solvability problem can also obtain solution of the load flow without curtailing transactions that shed load and generation as recommended by VSSAD. A minimum control solvability problem will be implemented as a corrective control, that will achieve the above objectives by using minimum control changes. The control includes; (1) voltage setpoint on generator bus voltage terminals; (2) under load tap changer tap positions and switchable shunt capacitors; and (3) active generation at generator buses. The minimum control solvability problem uses the VSSAD recommendation to obtain the feasible stable starting point but completely eliminates the impossible or onerous recommendation made by VSSAD. This thesis reviews the capabilities of Voltage Stability Security Assessment and Diagnosis and how it can be used to implement a contingency selection module for the Open Access System Dispatch (OASYDIS). The OASYDIS will also use the corrective control computed by Security Constrained Dispatch. The corrective control would be computed off line and stored for each contingency that produces voltage instability. The control is triggered and implemented to correct the voltage instability in the agent experiencing voltage instability only after the equipment outage or operating changes predicted to produce voltage instability have occurred. The advantages and the requirements to implement the corrective control are also discussed.

  19. State Security Breach Response Laws: State-by-State Summary Table. Using Data to Improve Education: A Legal Reference Guide to Protecting Student Privacy and Data Security

    ERIC Educational Resources Information Center

    Data Quality Campaign, 2011

    2011-01-01

    Under security breach response laws, businesses--and sometimes state and governmental agencies--are required to inform individuals when the security, confidentiality or integrity of their personal information has been compromised. This resource provides a state-by-state analysis of security breach response laws. [The Data Quality Campaign has…

  20. Sugar-Coated PPE's, Novel Nanomaterial's and Sensing Modules for Disease and Bioterrorism Related Threats

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bunz, Uwe

    2003-11-21

    The detection and sensing of biological warfare agents (ricin, anthrax toxin), of disease agents (cholera, botulinum, and tetnus toxins, influenza virus, etc.) and of biologically active species important for national security and disease control.

  1. 77 FR 42034 - Self-Regulatory Organizations; NYSE Arca, Inc.; Notice of Filing and Immediate Effectiveness of...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-07-17

    ... agent and fund accounting agent for the Fund. \\4\\ See Securities Exchange Act Release No. 63737 (January... exchange-traded notes (``ETNs'', and, collectively with ETFs and ETPs, ``Underlying ETPs'').\\7\\ In contrast...

  2. 24-Hour Relativistic Bit Commitment.

    PubMed

    Verbanis, Ephanielle; Martin, Anthony; Houlmann, Raphaël; Boso, Gianluca; Bussières, Félix; Zbinden, Hugo

    2016-09-30

    Bit commitment is a fundamental cryptographic primitive in which a party wishes to commit a secret bit to another party. Perfect security between mistrustful parties is unfortunately impossible to achieve through the asynchronous exchange of classical and quantum messages. Perfect security can nonetheless be achieved if each party splits into two agents exchanging classical information at times and locations satisfying strict relativistic constraints. A relativistic multiround protocol to achieve this was previously proposed and used to implement a 2-millisecond commitment time. Much longer durations were initially thought to be insecure, but recent theoretical progress showed that this is not so. In this Letter, we report on the implementation of a 24-hour bit commitment solely based on timed high-speed optical communication and fast data processing, with all agents located within the city of Geneva. This duration is more than 6 orders of magnitude longer than before, and we argue that it could be extended to one year and allow much more flexibility on the locations of the agents. Our implementation offers a practical and viable solution for use in applications such as digital signatures, secure voting and honesty-preserving auctions.

  3. Persuasive Embodied Agents: Using Embodied Agents to Change People's Behavior, Beliefs, and Assessments

    ERIC Educational Resources Information Center

    Pickard, Matthew David

    2012-01-01

    Embodied Conversational Agents (i.e., avatars; ECAs) are appearing in increasingly many everyday contexts, such as e-commerce, occupational training, and airport security. Also common to a typical person's daily life is persuasion. Whether being persuaded or persuading, the ability to change another person's attitude or behavior is a…

  4. 31 CFR 10.6 - Term and renewal of status as an enrolled agent, enrolled retirement plan agent, or registered...

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... certificate. The Internal Revenue Service will issue an enrollment or registration card or certificate to each... by forms, instructions, or other appropriate guidance. (ii) Enrolled agents who have a Social... who have a social security number or tax identification number that ends with the numbers 4, 5, or 6...

  5. 31 CFR 10.6 - Term and renewal of status as an enrolled agent, enrolled retirement plan agent, or registered...

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... certificate. The Internal Revenue Service will issue an enrollment or registration card or certificate to each... by forms, instructions, or other appropriate guidance. (ii) Enrolled agents who have a Social... who have a social security number or tax identification number that ends with the numbers 4, 5, or 6...

  6. 31 CFR 10.6 - Term and renewal of status as an enrolled agent, enrolled retirement plan agent, or registered...

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... certificate. The Internal Revenue Service will issue an enrollment or registration card or certificate to each... by forms, instructions, or other appropriate guidance. (ii) Enrolled agents who have a Social... who have a social security number or tax identification number that ends with the numbers 4, 5, or 6...

  7. 17 CFR 240.10b-18 - Purchases of certain equity securities by the issuer and others.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... authorize Rule 10b-18 purchases by or on behalf of the issuer. (4) Agent independent of the issuer has the... trading volume for that security or, in the event that trading volume data are unavailable, is at least 20... of the security, exclusive of any shares owned by any affiliate; Provided, however, That a block...

  8. Mastering the Gray Zone: Understanding a Changing Era of Conflict

    DTIC Science & Technology

    2015-12-01

    debate concerning the role of ground forces in achieving national security objectives. The Strategic Studies Institute publishes national security and...an international audience, and honor soldiers—past and present. STRATEGIC STUDIES INSTITUTE The Strategic Studies Institute (SSI) is part of the...U.S. Army War College and is the strategic-level study agent for issues related to national security and military strategy with emphasis on

  9. Computing Game-Theoretic Solutions for Security in the Medium Term

    DTIC Science & Technology

    This project concerns the design of algorithms for computing game- theoretic solutions . (Game theory concerns how to act in a strategically optimal...way in environments with other agents who also seek to act optimally but have different , and possibly opposite, interests .) Such algorithms have...recently found application in a number of real-world security applications, including among others airport security, scheduling Federal Air Marshals, and

  10. Preparing for War Moscow Facing an Arc of Crisis

    DTIC Science & Technology

    2016-12-01

    concerning the role of ground forces in achieving national security objectives. The Strategic Studies Institute publishes national security and...international audience, and honor Soldiers—past and present. STRATEGIC STUDIES INSTITUTE The Strategic Studies Institute (SSI) is part of the U.S...Army War College and is the strategic-level study agent for issues related to national security and military strategy with emphasis on geostrategic

  11. An agent-based hydroeconomic model to evaluate water policies in Jordan

    NASA Astrophysics Data System (ADS)

    Yoon, J.; Gorelick, S.

    2014-12-01

    Modern water systems can be characterized by a complex network of institutional and private actors that represent competing sectors and interests. Identifying solutions to enhance water security in such systems calls for analysis that can adequately account for this level of complexity and interaction. Our work focuses on the development of a hierarchical, multi-agent, hydroeconomic model that attempts to realistically represent complex interactions between hydrologic and multi-faceted human systems. The model is applied to Jordan, one of the most water-poor countries in the world. In recent years, the water crisis in Jordan has escalated due to an ongoing drought and influx of refugees from regional conflicts. We adopt a modular approach in which biophysical modules simulate natural and engineering phenomena, and human modules represent behavior at multiple scales of decision making. The human modules employ agent-based modeling, in which agents act as autonomous decision makers at the transboundary, state, organizational, and user levels. A systematic nomenclature and conceptual framework is used to characterize model agents and modules. Concepts from the Unified Modeling Language (UML) are adopted to promote clear conceptualization of model classes and process sequencing, establishing a foundation for full deployment of the integrated model in a scalable object-oriented programming environment. Although the framework is applied to the Jordanian water context, it is generalizable to other regional human-natural freshwater supply systems.

  12. Trust Management Considerations For the Cooperative Infrastructure Defense Framework: Trust Relationships, Evidence, and Decisions

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Maiden, Wendy M.

    Cooperative Infrastructure Defense (CID) is a hierarchical, agent-based, adaptive, cyber-security framework designed to collaboratively protect multiple enclaves or organizations participating in a complex infrastructure. CID employs a swarm of lightweight, mobile agents called Sensors designed to roam hosts throughout a security enclave to find indications of anomalies and report them to host-based Sentinels. The Sensors’ findings become pieces of a larger puzzle, which the Sentinel puts together to determine the problem and respond per policy as given by the enclave-level Sergeant agent. Horizontally across multiple enclaves and vertically within each enclave, authentication and access control technologies are necessary but insufficientmore » authorization mechanisms to ensure that CID agents continue to fulfill their roles in a trustworthy manner. Trust management fills the gap, providing mechanisms to detect malicious agents and offering more robust mechanisms for authorization. This paper identifies the trust relationships throughout the CID hierarchy, the types of trust evidence that could be gathered, and the actions that the CID system could take if an entity is determined to be untrustworthy.« less

  13. 31 CFR 202.6 - Collateral security.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 31 Money and Finance: Treasury 2 2010-07-01 2010-07-01 false Collateral security. 202.6 Section 202.6 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) FISCAL SERVICE, DEPARTMENT OF THE TREASURY FINANCIAL MANAGEMENT SERVICE DEPOSITARIES AND FINANCIAL AGENTS OF THE FEDERAL...

  14. Trust Management and Accountability for Internet Security

    ERIC Educational Resources Information Center

    Liu, Wayne W.

    2011-01-01

    Adversarial yet interacting interdependent relationships in information sharing and service provisioning have been a pressing issue of the Internet. Such relationships exist among autonomous software agents, in networking system peers, as well as between "service users and providers." Traditional "ad hoc" security approaches effective in…

  15. 19 CFR 191.9 - Agency.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    .... CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY (CONTINUED... merchandise while it is in the agent's custody; and (vi) The period that the contract is in effect. (2... of manufacturing or production operations performed by the agent; (iv) Total quantity and description...

  16. 42 CFR 73.10 - Restricting access to select agents and toxins; security risk assessments.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... with an organization that engages in domestic or international terrorism (as defined in 18 U.S.C. 2331) or with any other organization that engages in intentional crimes of violence, or being an agent of a...

  17. 3 CFR 13546 - Executive Order 13546 of July 2, 2010. Optimizing the Security of Biological Select Agents and...

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... discourage research or other legitimate activities. (c) Understanding that research and laboratory work on... consultation, as needed, on topics of relevance to the SAP. Sec. 8. Sharing of Select Agent Program Information...

  18. 75 FR 13146 - Proposed Collection; Comment Request

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-03-18

    ... Office of Management and Budget for extension and approval. Rule 17Ad-10 requires registered transfer... for which it performs transfer agent functions, including the purchase, transfer and redemptions of securities. In addition, the rule also requires transfer agents that maintain securityholder records to...

  19. Analyzing the homeland security of the U.S.-Mexico border.

    PubMed

    Wein, Lawrence M; Liu, Yifan; Motskin, Arik

    2009-05-01

    We develop a mathematical optimization model at the intersection of homeland security and immigration, that chooses various immigration enforcement decision variables to minimize the probability that a terrorist can successfully enter the United States across the U.S.-Mexico border. Included are a discrete choice model for the probability that a potential alien crosser will attempt to cross the U.S.-Mexico border in terms of the likelihood of success and the U.S. wage for illegal workers, a spatial model that calculates the apprehension probability as a function of the number of crossers, the number of border patrol agents, and the amount of surveillance technology on the border, a queueing model that determines the probability that an apprehended alien will be detained and removed as a function of the number of detention beds, and an equilibrium model for the illegal wage that balances the supply and demand for work and incorporates the impact of worksite enforcement. Our main result is that detention beds are the current system bottleneck (even after the large reduction in detention residence times recently achieved by expedited removal), and increases in border patrol staffing or surveillance technology would not provide any improvements without a large increase in detention capacity. Our model also predicts that surveillance technology is more cost effective than border patrol agents, which in turn are more cost effective than worksite inspectors, but these results are not robust due to the difficulty of predicting human behavior from existing data. Overall, the probability that a terrorist can successfully enter the United States is very high, and it would be extremely costly and difficult to significantly reduce it. We also investigate the alternative objective function of minimizing the flow of illegal aliens across the U.S.-Mexico border, and obtain qualitatively similar results.

  20. Diplomatic Security: State Department Should Better Manage Risks to Residences and Other Soft Targets Overseas

    DTIC Science & Technology

    2015-07-09

    Page ii GAO-15-700 Diplomatic Security Figure 2: Time Frames for Updates to Overseas Security Policy Board Residential Security...Standards since 2005 14 Abbreviations ARB Accountability Review Board DS Bureau of Diplomatic Security DS/C DS Directorate...Overseas Buildings Operations OSPB Overseas Security Policy Board RSO Regional Security Officer State Department of State This is a work of

  1. 32 CFR 2001.90 - Agency annual reporting requirements.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 6 2014-07-01 2014-07-01 false Agency annual reporting requirements. 2001.90 Section 2001.90 National Defense Other Regulations Relating to National Defense INFORMATION SECURITY... Defense, acting as the executive agent for the National Industrial Security Program under E.O.12829, as...

  2. 32 CFR 2001.90 - Agency annual reporting requirements.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 6 2013-07-01 2013-07-01 false Agency annual reporting requirements. 2001.90 Section 2001.90 National Defense Other Regulations Relating to National Defense INFORMATION SECURITY... Defense, acting as the executive agent for the National Industrial Security Program under E.O.12829, as...

  3. 32 CFR 2001.90 - Agency annual reporting requirements.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 6 2012-07-01 2012-07-01 false Agency annual reporting requirements. 2001.90 Section 2001.90 National Defense Other Regulations Relating to National Defense INFORMATION SECURITY... Defense, acting as the executive agent for the National Industrial Security Program under E.O.12829, as...

  4. 32 CFR 2001.90 - Agency annual reporting requirements.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Agency annual reporting requirements. 2001.90 Section 2001.90 National Defense Other Regulations Relating to National Defense INFORMATION SECURITY... Defense, acting as the executive agent for the National Industrial Security Program under E.O.12829, as...

  5. 32 CFR 2001.90 - Agency annual reporting requirements.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 6 2011-07-01 2011-07-01 false Agency annual reporting requirements. 2001.90 Section 2001.90 National Defense Other Regulations Relating to National Defense INFORMATION SECURITY... Defense, acting as the executive agent for the National Industrial Security Program under E.O.12829, as...

  6. 12 CFR 1511.6 - Authority of Federal Reserve Banks.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... Corporation; to effect transfer of Book-entry Funding Corporation Securities between Participants' Securities... Section 1511.6 Banks and Banking DEPARTMENT OF THE TREASURY RESOLUTION FUNDING CORPORATION BOOK-ENTRY... fiscal agent of the Funding Corporation to perform functions with respect to the issuance of Book-entry...

  7. 12 CFR 1511.6 - Authority of Federal Reserve Banks.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... Corporation; to effect transfer of Book-entry Funding Corporation Securities between Participants' Securities... Section 1511.6 Banks and Banking DEPARTMENT OF THE TREASURY RESOLUTION FUNDING CORPORATION BOOK-ENTRY... fiscal agent of the Funding Corporation to perform functions with respect to the issuance of Book-entry...

  8. 12 CFR 1511.6 - Authority of Federal Reserve Banks.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... Corporation; to effect transfer of Book-entry Funding Corporation Securities between Participants' Securities... Section 1511.6 Banks and Banking DEPARTMENT OF THE TREASURY RESOLUTION FUNDING CORPORATION BOOK-ENTRY... fiscal agent of the Funding Corporation to perform functions with respect to the issuance of Book-entry...

  9. 12 CFR 1511.6 - Authority of Federal Reserve Banks.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... Corporation; to effect transfer of Book-entry Funding Corporation Securities between Participants' Securities... Section 1511.6 Banks and Banking DEPARTMENT OF THE TREASURY RESOLUTION FUNDING CORPORATION BOOK-ENTRY... fiscal agent of the Funding Corporation to perform functions with respect to the issuance of Book-entry...

  10. 12 CFR 1511.6 - Authority of Federal Reserve Banks.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... Corporation; to effect transfer of Book-entry Funding Corporation Securities between Participants' Securities... Section 1511.6 Banks and Banking DEPARTMENT OF THE TREASURY RESOLUTION FUNDING CORPORATION BOOK-ENTRY... fiscal agent of the Funding Corporation to perform functions with respect to the issuance of Book-entry...

  11. Cyber Security Research Frameworks For Coevolutionary Network Defense

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Rush, George D.; Tauritz, Daniel Remy

    Several architectures have been created for developing and testing systems used in network security, but most are meant to provide a platform for running cyber security experiments as opposed to automating experiment processes. In the first paper, we propose a framework termed Distributed Cyber Security Automation Framework for Experiments (DCAFE) that enables experiment automation and control in a distributed environment. Predictive analysis of adversaries is another thorny issue in cyber security. Game theory can be used to mathematically analyze adversary models, but its scalability limitations restrict its use. Computational game theory allows us to scale classical game theory to larger,more » more complex systems. In the second paper, we propose a framework termed Coevolutionary Agent-based Network Defense Lightweight Event System (CANDLES) that can coevolve attacker and defender agent strategies and capabilities and evaluate potential solutions with a custom network defense simulation. The third paper is a continuation of the CANDLES project in which we rewrote key parts of the framework. Attackers and defenders have been redesigned to evolve pure strategy, and a new network security simulation is devised which specifies network architecture and adds a temporal aspect. We also add a hill climber algorithm to evaluate the search space and justify the use of a coevolutionary algorithm.« less

  12. Flexible, secure agent development framework

    DOEpatents

    Goldsmith,; Steven, Y [Rochester, MN

    2009-04-07

    While an agent generator is generating an intelligent agent, it can also evaluate the data processing platform on which it is executing, in order to assess a risk factor associated with operation of the agent generator on the data processing platform. The agent generator can retrieve from a location external to the data processing platform an open site that is configurable by the user, and load the open site into an agent substrate, thereby creating a development agent with code development capabilities. While an intelligent agent is executing a functional program on a data processing platform, it can also evaluate the data processing platform to assess a risk factor associated with performing the data processing function on the data processing platform.

  13. Satellite Surveillance: Domestic Issues

    DTIC Science & Technology

    2008-03-21

    permit the gathering of accurate information on capabilities of potential enemies without entailing the risks of manned overflights or of covert agents ...local, and tribal law enforcement agencies serving as the executive agent of what it termed a new Domestic Applications Office (DAO). This recommendation...maintaining geospatial information to support homeland security. In May 2007, the DNI designated DHS as the executive agent and CRS-8 18 Department

  14. Satellite Surveillance: Domestic Issues

    DTIC Science & Technology

    2010-02-01

    overflights or of covert agents . Satellite imagery undergirded U.S. strategic planning for a quarter century and a series of arms control agreements...as the executive agent of what it termed a new Domestic Applications Office (DAO). This recommendation was based on the premise that “DHS was...departments for creating and maintaining geospatial information to support homeland security. In May 2007, the DNI designated DHS as the executive agent and

  15. Self Organized Multi Agent Swarms (SOMAS) for Network Security Control

    DTIC Science & Technology

    2009-03-01

    Normal hierarchy vs entangled hierarchy 2.5.7 Quantifying Entangledness . While self organization means that the swarm develops a consistent structure of...flexibility due to centralization of control and com- munication. Thus, self organized, entangled hierarchy multi-agent swarms are evolved in this study to...technique. The resulting design exhibits a self organized multi-agent swarm (SOMAS) with entangled hierarchical control and communication through the

  16. Culture-independent diagnostics for health security

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Doggett, Norman A.; Mukundan, Harshini; Lefkowitz, Elliot J.

    The past decade has seen considerable development in the diagnostic application of nonculture methods, including nucleic acid amplification-based methods and mass spectrometry, for the diagnosis of infectious diseases. The implications of these new culture-independent diagnostic tests (CIDTs) include bypassing the need to culture organisms, thus potentially affecting public health surveillance systems, which continue to use isolates as the basis of their surveillance programs and to assess phenotypic resistance to antimicrobial agents. CIDTs may also affect the way public health practitioners detect and respond to a bioterrorism event. In response to a request from the Department of Homeland Security, Los Alamosmore » National Laboratory and the Centers for Disease Control and Prevention cosponsored a workshop to review the impact of CIDTs on the rapid detection and identification of biothreat agents. Four panel discussions were held that covered nucleic acid amplification–based diagnostics, mass spectrometry, antibody-based diagnostics, and next-generation sequencing. Exploiting the extensive expertise available at this workshop, we identified the key features, benefits, and limitations of the various CIDT methods for providing rapid pathogen identification that are critical to the response and mitigation of a bioterrorism event. After the workshop we conducted a thorough review of the literature, investigating the current state of these 4 culture-independent diagnostic methods. Furthermore, this article combines information from the literature review and the insights obtained at the workshop.« less

  17. Culture-independent diagnostics for health security

    DOE PAGES

    Doggett, Norman A.; Mukundan, Harshini; Lefkowitz, Elliot J.; ...

    2016-06-17

    The past decade has seen considerable development in the diagnostic application of nonculture methods, including nucleic acid amplification-based methods and mass spectrometry, for the diagnosis of infectious diseases. The implications of these new culture-independent diagnostic tests (CIDTs) include bypassing the need to culture organisms, thus potentially affecting public health surveillance systems, which continue to use isolates as the basis of their surveillance programs and to assess phenotypic resistance to antimicrobial agents. CIDTs may also affect the way public health practitioners detect and respond to a bioterrorism event. In response to a request from the Department of Homeland Security, Los Alamosmore » National Laboratory and the Centers for Disease Control and Prevention cosponsored a workshop to review the impact of CIDTs on the rapid detection and identification of biothreat agents. Four panel discussions were held that covered nucleic acid amplification–based diagnostics, mass spectrometry, antibody-based diagnostics, and next-generation sequencing. Exploiting the extensive expertise available at this workshop, we identified the key features, benefits, and limitations of the various CIDT methods for providing rapid pathogen identification that are critical to the response and mitigation of a bioterrorism event. After the workshop we conducted a thorough review of the literature, investigating the current state of these 4 culture-independent diagnostic methods. Furthermore, this article combines information from the literature review and the insights obtained at the workshop.« less

  18. Culture-Independent Diagnostics for Health Security.

    PubMed

    Doggett, Norman A; Mukundan, Harshini; Lefkowitz, Elliot J; Slezak, Tom R; Chain, Patrick S; Morse, Stephen; Anderson, Kevin; Hodge, David R; Pillai, Segaran

    2016-01-01

    The past decade has seen considerable development in the diagnostic application of nonculture methods, including nucleic acid amplification-based methods and mass spectrometry, for the diagnosis of infectious diseases. The implications of these new culture-independent diagnostic tests (CIDTs) include bypassing the need to culture organisms, thus potentially affecting public health surveillance systems, which continue to use isolates as the basis of their surveillance programs and to assess phenotypic resistance to antimicrobial agents. CIDTs may also affect the way public health practitioners detect and respond to a bioterrorism event. In response to a request from the Department of Homeland Security, Los Alamos National Laboratory and the Centers for Disease Control and Prevention cosponsored a workshop to review the impact of CIDTs on the rapid detection and identification of biothreat agents. Four panel discussions were held that covered nucleic acid amplification-based diagnostics, mass spectrometry, antibody-based diagnostics, and next-generation sequencing. Exploiting the extensive expertise available at this workshop, we identified the key features, benefits, and limitations of the various CIDT methods for providing rapid pathogen identification that are critical to the response and mitigation of a bioterrorism event. After the workshop we conducted a thorough review of the literature, investigating the current state of these 4 culture-independent diagnostic methods. This article combines information from the literature review and the insights obtained at the workshop.

  19. 14 CFR 380.34 - Security and depository agreements.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 14 Aeronautics and Space 4 2011-01-01 2011-01-01 false Security and depository agreements. 380.34 Section 380.34 Aeronautics and Space OFFICE OF THE SECRETARY, DEPARTMENT OF TRANSPORTATION (AVIATION... travel agents shall be deposited with and maintained by the bank subject to the following conditions: (i...

  20. 14 CFR 380.34 - Security and depository agreements.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 14 Aeronautics and Space 4 2012-01-01 2012-01-01 false Security and depository agreements. 380.34 Section 380.34 Aeronautics and Space OFFICE OF THE SECRETARY, DEPARTMENT OF TRANSPORTATION (AVIATION... travel agents shall be deposited with and maintained by the bank subject to the following conditions: (i...

  1. 14 CFR 380.34 - Security and depository agreements.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 14 Aeronautics and Space 4 2014-01-01 2014-01-01 false Security and depository agreements. 380.34 Section 380.34 Aeronautics and Space OFFICE OF THE SECRETARY, DEPARTMENT OF TRANSPORTATION (AVIATION... travel agents shall be deposited with and maintained by the bank subject to the following conditions: (i...

  2. 14 CFR 380.34 - Security and depository agreements.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 14 Aeronautics and Space 4 2013-01-01 2013-01-01 false Security and depository agreements. 380.34 Section 380.34 Aeronautics and Space OFFICE OF THE SECRETARY, DEPARTMENT OF TRANSPORTATION (AVIATION... travel agents shall be deposited with and maintained by the bank subject to the following conditions: (i...

  3. EVALUATION OF WATER MONITORING INSTRUMENTATION AT EPA'S WATER AWARENESS TECHNOLOGY EVALUATION RESEARCH SECURITY CENTER

    EPA Science Inventory

    The safety and security of distribution systems has come under reassessment in the past year. Several chemical and biological agents have been identified that might constitute a credible threat against water supply systems. There have also been a few reported threats against wate...

  4. 17 CFR 240.17Ad-15 - Signature guarantees.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... Securities Exchange Act of 1934 Supervised Investment Bank Holding Company Rules § 240.17Ad-15 Signature... Securities Exchange Act of 1934; (2) Eligible Guarantor Institution means: (i) Banks (as that term is defined... the transfer agent maintains a list of people authorized to act on behalf of that guarantor...

  5. Learning Perfectly Secure Cryptography to Protect Communications with Adversarial Neural Cryptography

    PubMed Central

    2018-01-01

    Researches in Artificial Intelligence (AI) have achieved many important breakthroughs, especially in recent years. In some cases, AI learns alone from scratch and performs human tasks faster and better than humans. With the recent advances in AI, it is natural to wonder whether Artificial Neural Networks will be used to successfully create or break cryptographic algorithms. Bibliographic review shows the main approach to this problem have been addressed throughout complex Neural Networks, but without understanding or proving the security of the generated model. This paper presents an analysis of the security of cryptographic algorithms generated by a new technique called Adversarial Neural Cryptography (ANC). Using the proposed network, we show limitations and directions to improve the current approach of ANC. Training the proposed Artificial Neural Network with the improved model of ANC, we show that artificially intelligent agents can learn the unbreakable One-Time Pad (OTP) algorithm, without human knowledge, to communicate securely through an insecure communication channel. This paper shows in which conditions an AI agent can learn a secure encryption scheme. However, it also shows that, without a stronger adversary, it is more likely to obtain an insecure one. PMID:29695066

  6. Learning Perfectly Secure Cryptography to Protect Communications with Adversarial Neural Cryptography.

    PubMed

    Coutinho, Murilo; de Oliveira Albuquerque, Robson; Borges, Fábio; García Villalba, Luis Javier; Kim, Tai-Hoon

    2018-04-24

    Researches in Artificial Intelligence (AI) have achieved many important breakthroughs, especially in recent years. In some cases, AI learns alone from scratch and performs human tasks faster and better than humans. With the recent advances in AI, it is natural to wonder whether Artificial Neural Networks will be used to successfully create or break cryptographic algorithms. Bibliographic review shows the main approach to this problem have been addressed throughout complex Neural Networks, but without understanding or proving the security of the generated model. This paper presents an analysis of the security of cryptographic algorithms generated by a new technique called Adversarial Neural Cryptography (ANC). Using the proposed network, we show limitations and directions to improve the current approach of ANC. Training the proposed Artificial Neural Network with the improved model of ANC, we show that artificially intelligent agents can learn the unbreakable One-Time Pad (OTP) algorithm, without human knowledge, to communicate securely through an insecure communication channel. This paper shows in which conditions an AI agent can learn a secure encryption scheme. However, it also shows that, without a stronger adversary, it is more likely to obtain an insecure one.

  7. 31 CFR Appendix B to Part 357 - TRADES Commentary

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... accounts. In TRADES, Treasury, through its fiscal agents, the Federal Reserve Banks, recognizes the identity only of Participants (persons with a direct account relationship with a Federal Reserve Bank... agents, will act only on instructions of the Participant in whose Securities Account the Treasury book...

  8. 77 FR 75679 - Submission for OMB Review; Comment Request

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-12-21

    ... et seq.). Rule 17Ad-13 requires an annual study and evaluation of internal accounting controls under... transfer agents to obtain an annual report on the adequacy of their internal accounting controls from an... service only their own companies' securities. Approximately 150 independent, professional transfer agents...

  9. PERMANENCE OF BIOLOGICAL AND CHEMICAL WARFARE AGENTS IN MUNICIPAL SOLID WASTE LANDFILL LEACHATES

    EPA Science Inventory

    The objective of this work is to permit EPA/ORD's National Homeland Security Research Center (NHSRC) and Edgewood Chemical Biological Center to collaborate together to test the permanence of biological and chemical warfare agents in municipal solid waste landfills. Research into ...

  10. 20 CFR 404.1069 - Real estate agents and direct sellers.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 20 Employees' Benefits 2 2014-04-01 2014-04-01 false Real estate agents and direct sellers. 404.1069 Section 404.1069 Employees' Benefits SOCIAL SECURITY ADMINISTRATION FEDERAL OLD-AGE, SURVIVORS AND DISABILITY INSURANCE (1950- ) Employment, Wages, Self-Employment, and Self-Employment Income Self-Employment...

  11. 20 CFR 404.1069 - Real estate agents and direct sellers.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 20 Employees' Benefits 2 2013-04-01 2013-04-01 false Real estate agents and direct sellers. 404.1069 Section 404.1069 Employees' Benefits SOCIAL SECURITY ADMINISTRATION FEDERAL OLD-AGE, SURVIVORS AND DISABILITY INSURANCE (1950- ) Employment, Wages, Self-Employment, and Self-Employment Income Self-Employment...

  12. 20 CFR 404.1069 - Real estate agents and direct sellers.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 20 Employees' Benefits 2 2012-04-01 2012-04-01 false Real estate agents and direct sellers. 404.1069 Section 404.1069 Employees' Benefits SOCIAL SECURITY ADMINISTRATION FEDERAL OLD-AGE, SURVIVORS AND DISABILITY INSURANCE (1950- ) Employment, Wages, Self-Employment, and Self-Employment Income Self-Employment...

  13. Profiles of Food Security for US Farmworker Households and Factors Related to Dynamic of Change.

    PubMed

    Ip, Edward H; Saldana, Santiago; Arcury, Thomas A; Grzywacz, Joseph G; Trejo, Grisel; Quandt, Sara A

    2015-10-01

    We recruited 248 farmworker families with preschool-aged children in North Carolina and examined food security indicators over 24 months to identify food security patterns and examine the dynamic of change over time. Participants in the Niños Sanos study, conducted 2011 to 2014, completed quarterly food security assessments. Based on responses to items in the US Household Food Security Survey Module, we identified different states of food security by using hidden Markov model analysis, and examined factors associated with different states. We delineated factors associated with changes in state by using mixed-effect ordinal logistic regression. About half of the households (51%) consistently stayed in the most food-secure state. The least food-secure state was transient, with only 29% probability of this state for 2 consecutive quarters. Seasonal (vs migrant) work status, having immigration documents (vs not documented), and season predicted higher levels of food security. Heterogeneity in food security among farmworker households calls for tailoring intervention strategies. The transiency and unpredictability of low food security suggest that access to safety-net programs could reduce low food security risk in this population.

  14. Profiles of Food Security for US Farmworker Households and Factors Related to Dynamic of Change

    PubMed Central

    Saldana, Santiago; Arcury, Thomas A.; Grzywacz, Joseph G.; Trejo, Grisel; Quandt, Sara A.

    2015-01-01

    Objectives. We recruited 248 farmworker families with preschool-aged children in North Carolina and examined food security indicators over 24 months to identify food security patterns and examine the dynamic of change over time. Methods. Participants in the Niños Sanos study, conducted 2011 to 2014, completed quarterly food security assessments. Based on responses to items in the US Household Food Security Survey Module, we identified different states of food security by using hidden Markov model analysis, and examined factors associated with different states. We delineated factors associated with changes in state by using mixed-effect ordinal logistic regression. Results. About half of the households (51%) consistently stayed in the most food-secure state. The least food-secure state was transient, with only 29% probability of this state for 2 consecutive quarters. Seasonal (vs migrant) work status, having immigration documents (vs not documented), and season predicted higher levels of food security. Conclusions. Heterogeneity in food security among farmworker households calls for tailoring intervention strategies. The transiency and unpredictability of low food security suggest that access to safety-net programs could reduce low food security risk in this population. PMID:26270304

  15. India’s Evolving Nuclear Force and Its Implications for U.S. Strategy in the Asia-Pacific

    DTIC Science & Technology

    2016-06-01

    concerning the role of ground forces in achieving national security objectives. The Strategic Studies Institute publishes national security and...international audience, and honor Soldiers—past and present. STRATEGIC STUDIES INSTITUTE The Strategic Studies Institute (SSI) is part of the U.S...Army War College and is the strategic-level study agent for issues related to national security and military strategy with emphasis on geostrategic

  16. Operating in the Gray Zone: An Alternative Paradigm for U.S. Military Strategy

    DTIC Science & Technology

    2016-04-01

    labeling, or re-labeling, may have been to draw the attention of busy policymakers to rapidly emerging security issues , it has evolved into something... issues affecting the national security community. The Peacekeeping and Stability Operations Institute provides subject matter expertise, technical...SSI) is part of the U.S. Army War College and is the strategic-level study agent for issues related to national security and military strategy with

  17. 46 CFR 35.40-10 - Steam, foam, carbon dioxide, or clean agent fire smothering apparatus-TB/ALL.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 46 Shipping 1 2012-10-01 2012-10-01 false Steam, foam, carbon dioxide, or clean agent fire smothering apparatus-TB/ALL. 35.40-10 Section 35.40-10 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY TANK VESSELS OPERATIONS Posting and Marking Requirements-TB/ALL § 35.40-10 Steam, foam, carbon dioxide, or clean agent fire smothering apparatus—TB...

  18. [Staff accreditation in parenteral nutrition production in hospital pharmacy].

    PubMed

    Vrignaud, S; Le Pêcheur, V; Jouan, G; Valy, S; Clerc, M-A

    2016-09-01

    This work aims to provide staff accreditation methodology to harmonize and secure practices for parenteral nutrition bags preparation. The methodology used in the present study is inspired from project management and quality approach. Existing training supports were used to produce accreditation procedure and evaluation supports. We first defined abilities levels, from level 1, corresponding to accredited learning agent to level 3, corresponding to expert accredited agent. Elements assessed for accreditation are: clothing assessment either by practices audit or by microbiologic test, test bags preparation and handling assessment, bag production to assess aseptic filling for both manual or automatized method, practices audit, number of days of production, and non-conformity following. At Angers Hospital, in 2014, production staff is composed of 12 agents. Staff accreditation reveals that 2 agents achieve level 3, 8 agents achieve level 2 and 2 agents are level 1. We noted that non-conformity decreased as accreditation took place from 81 in 2009 to 0 in 2014. To date, there is no incident due to parenteral bag produced by Angers hospital for neonatal resuscitation children. Such a consistent study is essential to insure a secured nutrition parenteral production. This also provides a satisfying quality care for patients. Copyright © 2016 Académie Nationale de Pharmacie. Published by Elsevier Masson SAS. All rights reserved.

  19. 31 CFR 321.10 - Responsibilities of paying agents.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 31 Money and Finance: Treasury 2 2010-07-01 2010-07-01 false Responsibilities of paying agents. 321.10 Section 321.10 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued... required to redeem eligible securities during its regular business hours for any presenter, whether or not...

  20. 31 CFR 321.10 - Responsibilities of paying agents.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 31 Money and Finance:Treasury 2 2011-07-01 2011-07-01 false Responsibilities of paying agents. 321.10 Section 321.10 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued... required to redeem eligible securities during its regular business hours for any presenter, whether or not...

  1. 78 FR 66973 - Self-Regulatory Organizations; NYSE Arca, Inc.; Notice of Filing of Proposed Rule Change To List...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-11-07

    ... the administrator, accountant, custodian and transfer agent for the Fund (``Administrator,'' ``Accountant,'' ``Custodian'' and ``Transfer Agent,'' respectively). \\4\\ A Managed Fund Share is a security... expenses, dividends, distributions, taxes, risks, and reports to be distributed to beneficial owners of the...

  2. 76 FR 47197 - Authorization of Emergency Use of Oral Formulations of Doxycycline; Availability

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-04

    ...). The Authorization contains, among other things, conditions on the emergency use of the authorized... Homeland Security (DHS) that there is a significant potential for a domestic emergency involving a heightened risk of attack with a specified biological, chemical, radiological, or nuclear agent or agents--in...

  3. 46 CFR 34.20-10 - Controls-T/ALL.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... GUARD, DEPARTMENT OF HOMELAND SECURITY TANK VESSELS FIREFIGHTING EQUIPMENT Deck Foam System, Details § 34.20-10 Controls—T/ALL. (a) The foam agent, its container, measuring devices, and other items peculiar to this system shall be of an approved type. (b) The foam agent container and the main controls...

  4. 46 CFR 34.20-10 - Controls-T/ALL.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... GUARD, DEPARTMENT OF HOMELAND SECURITY TANK VESSELS FIREFIGHTING EQUIPMENT Deck Foam System, Details § 34.20-10 Controls—T/ALL. (a) The foam agent, its container, measuring devices, and other items peculiar to this system shall be of an approved type. (b) The foam agent container and the main controls...

  5. 75 FR 10539 - Self-Regulatory Organizations; The Depository Trust Company; Notice of Filing and Immediate...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-03-08

    ... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-61620; File No. SR-DTC-2010-04] Self-Regulatory... Change To Modify Its Registered Transfer Agent Notification Methods for Assumption or Termination of... transfer agent notification methods for assumption or termination of services. II. Self-Regulatory...

  6. 47 CFR 64.1120 - Verification of orders for telecommunications service.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... data (e.g., the subscriber's date of birth or social security number). The independent third party must not be owned, managed, controlled, or directed by the carrier or the carrier's marketing agent; must... carrier's marketing agent; and must operate in a location physically separate from the carrier or the...

  7. 20 CFR 429.203 - When is a claim allowable?

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... of you, your agent, the members of your family, or your private employee (the standard to be applied... 429.203 Employees' Benefits SOCIAL SECURITY ADMINISTRATION ADMINISTRATIVE CLAIMS UNDER THE FEDERAL... travel under orders, including property in your custody or in the custody of a carrier, an agent or...

  8. Developing Inhibitors of Translesion DNA Synthesis as Therapeutic Agents Against Lung Cancer

    DTIC Science & Technology

    2014-10-01

    pol eta when replicating damaged DNA. 1S. SUBJECT TERMS: Mutagenesis, DNA polymerases, nucleoside analogs, chemotherapeutic agents 16. SECURITY ...such as polymerase eta, iota , and kappa that are involved in replicating damaged DNA. Our kinetic data obtained under Task 1B indicates that pol eta

  9. Fatal occupational injuries in the Malaysian construction sector–causes and accidental agents

    NASA Astrophysics Data System (ADS)

    Ayob, A.; Shaari, A. A.; Zaki, M. F. M.; Munaaim, M. A. C.

    2018-04-01

    The construction sector is associated with various accidents and fatal injuries. These occupational accidents are caused by numerous factors, such as lack of supervision; lack of adherence to safe work technique; failure to wear personal protective equipment; and failure to comply with the safe use of tools, vehicles, and machines. Using 2013–2016 secondary data from the Department of Occupational Safety and Health and Social Security Organization, this study conducted a descriptive exploration survey to identify common fatal occupational injuries associated with the Malaysian construction sector, as well as their causes and accidental agents. Results indicated that construction, followed by manufacturing, agriculture, forestry, logging, and fishery, are the riskiest job sectors in Malaysia. The highest incidences of occupational casualties were reported in Sarawak, Johor, and Selangor. These states accounted for approximately 13.33% to 18.18% of all cases of fatal occupational accidents. In these states, the lack of safety and health regulations and poor execution of risk management increased the risk of occupational accidents. Falls from heights accounted for 46.28% of fatal occupational injuries. Furthermore, being crushed by objects, materials, or vehicles accounted for 9.09% to 17.36% of fatal occupational injuries. Substandard work environment and transportation and lifting equipment, such as scaffolds, are primary accidental agents. Results of this study could enhance the knowledge and awareness of construction workers and management of job-related injuries to decrease the incidence of fatal occupational accidents.

  10. Hierarchical Controlled Remote State Preparation by Using a Four-Qubit Cluster State

    NASA Astrophysics Data System (ADS)

    Ma, Peng-Cheng; Chen, Gui-Bin; Li, Xiao-Wei; Zhan, You-Bang

    2018-06-01

    We propose a scheme for hierarchical controlled remote preparation of an arbitrary single-qubit state via a four-qubit cluster state as the quantum channel. In this scheme, a sender wishes to help three agents to remotely prepare a quantum state, respectively. The three agents are divided into two grades, that is, an agent is in the upper grade and other two agents are in the lower grade. In this process of remote state preparation, the agent of the upper grade only needs the assistance of any one of the other two agents for recovering the sender's original state, while an agent of the lower grade needs the collaboration of all the other two agents. In other words, the agents of two grades have different authorities to reconstruct sender's original state.

  11. A review of radiation countermeasures focusing on injury-specific medicinals and regulatory approval status: part II. Countermeasures for limited indications, internalized radionuclides, emesis, late effects, and agents demonstrating efficacy in large animals with or without FDA IND status.

    PubMed

    Singh, Vijay K; Garcia, Melissa; Seed, Thomas M

    2017-09-01

    The threat of a radiological/nuclear event is a critical concern for all government agencies involved in national security and public health preparedness. Countermeasures that are safe, easily administered, and effective at diminishing or eliminating adverse health effects to individuals and the overall public health impact of radiation exposure are urgently needed. Radiation countermeasures included in this three-part series have been classified under various subheadings based specifically on their developmental stages for United States Food and Drug Administration (FDA) approval. We have included FDA-approved agents for acute radiation syndrome (ARS) in part I. This is part II in which we have reviewed FDA-approved agents for limited indications, internalized radionuclides, emesis, late effects, radiomitigators available in the strategic national stockpile (SNS), agents with FDA investigational new drug (IND) status, and those with NHP efficacy data without FDA IND. Agents discussed in part III are those agents that have been peer reviewed, published, and have demonstrated significant survival benefits in animal models of ARS. Agents investigated in in vitro models only or studied in animal models without peer-reviewed publications have not been included. The dearth of FDA-approved radiation countermeasures has prompted intensified research for a new generation of radiation countermeasures. A number of promising radiation countermeasures are currently moving forward with continued support and effort by both governmental agencies and by publicly and privately held pharmaceutical companies. There is a limited number of countermeasures which are progressing well following the Animal Rule and may get approved in the near future, thus serving to close the gap of this critically important, unmet radiobiomedical need.

  12. 77 FR 17530 - Proposed Collection; Comment Request

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-03-26

    ... purchase price is accompanied or preceded by a written confirmation of the purchase; (ii) the asset coverage per unit of the security to be purchased is disclosed to the seller or his agent; and (iii) if the security is a stock, the fund has, within the preceding six months, informed stockholders of its intention...

  13. 47 CFR 64.1190 - Preferred carrier freezes.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... or social security number) and the information required in §§ 64.1190(d)(3)(ii)(A) through (D... subscriber's date of birth or social security number) and the information required in § 64.1190(d)(3)(ii)(A... or the carrier's marketing agent; must not have any financial incentive to confirm preferred carrier...

  14. 29 CFR 2580.412-21 - Corporate sureties holding grants of authority from the Secretary of the Treasury.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 29 Labor 9 2014-07-01 2014-07-01 false Corporate sureties holding grants of authority from the...) EMPLOYEE BENEFITS SECURITY ADMINISTRATION, DEPARTMENT OF LABOR TEMPORARY BONDING RULES UNDER THE EMPLOYEE RETIREMENT INCOME SECURITY ACT OF 1974 TEMPORARY BONDING RULES Qualified Agents, Brokers and Surety Companies...

  15. 29 CFR 2580.412-21 - Corporate sureties holding grants of authority from the Secretary of the Treasury.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 29 Labor 9 2010-07-01 2010-07-01 false Corporate sureties holding grants of authority from the...) EMPLOYEE BENEFITS SECURITY ADMINISTRATION, DEPARTMENT OF LABOR TEMPORARY BONDING RULES UNDER THE EMPLOYEE RETIREMENT INCOME SECURITY ACT OF 1974 TEMPORARY BONDING RULES Qualified Agents, Brokers and Surety Companies...

  16. 29 CFR 2580.412-21 - Corporate sureties holding grants of authority from the Secretary of the Treasury.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 29 Labor 9 2011-07-01 2011-07-01 false Corporate sureties holding grants of authority from the...) EMPLOYEE BENEFITS SECURITY ADMINISTRATION, DEPARTMENT OF LABOR TEMPORARY BONDING RULES UNDER THE EMPLOYEE RETIREMENT INCOME SECURITY ACT OF 1974 TEMPORARY BONDING RULES Qualified Agents, Brokers and Surety Companies...

  17. Biologically-Inspired Concepts for Autonomic Self-Protection in Multiagent Systems

    NASA Technical Reports Server (NTRS)

    Sterritt, Roy; Hinchey, Mike

    2006-01-01

    Biologically-inspired autonomous and autonomic systems (AAS) are essentially concerned with creating self-directed and self-managing systems based on metaphors &om nature and the human body, such as the autonomic nervous system. Agent technologies have been identified as a key enabler for engineering autonomy and autonomicity in systems, both in terms of retrofitting into legacy systems and in designing new systems. Handing over responsibility to systems themselves raises concerns for humans with regard to safety and security. This paper reports on the continued investigation into a strand of research on how to engineer self-protection mechanisms into systems to assist in encouraging confidence regarding security when utilizing autonomy and autonomicity. This includes utilizing the apoptosis and quiescence metaphors to potentially provide a self-destruct or self-sleep signal between autonomic agents when needed, and an ALice signal to facilitate self-identification and self-certification between anonymous autonomous agents and systems.

  18. A Colony Architecture for an Artificial Creature

    DTIC Science & Technology

    1989-08-01

    Laboratory DSTflJJITtlarl STATEMENT A Approved for public releamo; DistribuUon UnlimIted BEST AVAILABLE COPY 091 09 0 23 SECURiTy CLASSICICATION O r...Arlington, VA 22209 ._133 i4. MONITORING AGENCY NAME 4 AOORESS(II differm Orem Confreilln OIIlce) IS. SECURITY CLASS. (of Ohl. erpef) Office of Naval...home. A multi-agent system such as this has many advantages DD 1473 EDITION OF INOV 0 os isOSOLETE UNCLASSIFIED (cont.) 3/ C0014. O OP I SECURITY

  19. A Gas Chromotographic-Mass Spectrometric Approach to Examining Stereoselective Interaction of Human Plasma Proteins with Soman

    DTIC Science & Technology

    2008-02-01

    ABSTRACT See reprint. 15. SUBJECT TERMS Human plasma proteins, soman, nerve agent , bioscavenger, gas chromatography, mass spectrometry 16. SECURITY...usually referred to as nerve agents ) are tabun (ethyl dimethylamidocyanophosphate, or GA ), sarin (iso- propyl methylfluorophosphonate, or GB), soman...Pharmacology and toxicology of chemical warfare agents Ann. Acad. Med. Singapore 2&: 104-107 (1997). 11. C Macilwain. Study proves Iraq used nerve gas . Nature 3

  20. Monitoring of Breast Tumor Response to Local Chemotherapeutic Agent Delivered by Biodegradable Fibers

    DTIC Science & Technology

    2005-05-01

    AD_ Award Number: DAMD17-03-1-0353 TITLE: Monitoring of Breast Tumor Response to Local Chemotherapeutic Agent Delivered by Biodegradable Fibers...30 Apr 2005 4. TITLE AND SUBTITLE Sa. CONTRACT NUMBER Monitoring of Breast Tumor Response to Local Chemotherapeutic Agent Delivered by Biodegradable ... biodegradable fiber 16. SECURITY CLASSIFICATION OF: 17. LIMITATION 18. NUMBER 19a. NAME OF RESPONSIBLE PERSON OF ABSTRACT OF PAGES a. REPORT b. ABSTRACT c

  1. Advanced nanoelectronic architectures for THz-based biological agent detection

    NASA Astrophysics Data System (ADS)

    Woolard, Dwight L.; Jensen, James O.

    2009-02-01

    The U.S. Army Research Office (ARO) and the U.S. Army Edgewood Chemical Biological Center (ECBC) jointly lead and support novel research programs that are advancing the state-of-the-art in nanoelectronic engineering in application areas that have relevance to national defense and security. One fundamental research area that is presently being emphasized by ARO and ECBC is the exploratory investigation of new bio-molecular architectural concepts that can be used to achieve rapid, reagent-less detection and discrimination of biological warfare (BW) agents, through the control of multi-photon and multi-wavelength processes at the nanoscale. This paper will overview an ARO/ECBC led multidisciplinary research program presently under the support of the U.S. Defense Threat Reduction Agency (DTRA) that seeks to develop new devices and nanoelectronic architectures that are effective for extracting THz signatures from target bio-molecules. Here, emphasis will be placed on the new nanosensor concepts and THz/Optical measurement methodologies for spectral-based sequencing/identification of genetic molecules.

  2. Security of six-state quantum key distribution protocol with threshold detectors

    PubMed Central

    Kato, Go; Tamaki, Kiyoshi

    2016-01-01

    The security of quantum key distribution (QKD) is established by a security proof, and the security proof puts some assumptions on the devices consisting of a QKD system. Among such assumptions, security proofs of the six-state protocol assume the use of photon number resolving (PNR) detector, and as a result the bit error rate threshold for secure key generation for the six-state protocol is higher than that for the BB84 protocol. Unfortunately, however, this type of detector is demanding in terms of technological level compared to the standard threshold detector, and removing the necessity of such a detector enhances the feasibility of the implementation of the six-state protocol. Here, we develop the security proof for the six-state protocol and show that we can use the threshold detector for the six-state protocol. Importantly, the bit error rate threshold for the key generation for the six-state protocol (12.611%) remains almost the same as the one (12.619%) that is derived from the existing security proofs assuming the use of PNR detectors. This clearly demonstrates feasibility of the six-state protocol with practical devices. PMID:27443610

  3. Substantiation of International Nanomaterials Security Group Creation

    NASA Astrophysics Data System (ADS)

    Sosnov, A.; Sadovnikov, S.; Panfilov, S.; Magarshak, Yu.

    Nanotechnology has achieved the status as one of the critical R&D area. Scientists use the unique properties of atomic and molecular assemblages built at the nanometer scale. The ability to manipulate the physical, chemical, and biological properties of molecules and particles affords to design agents with set up properties. But the technology allows creating not only useful agents. Possible accidental or deliberate creation of new nanoparticles (NPs) with dangerous properties is highly probable minor product of progress in the new area. The article briefly describes some pathways in development and implementation of NPs for medicinal and the similar purposes. Some of NPs can effective facilitate and mask transport of various agents in various environments. Possible creation of new dangerous NPs (e.g. conjugates based on combination of extensively use NPs and chemical, biological and radioactive agents) as well as creation of brand new NPs and nanodevices with unique properties needs creation of international multidiscipline community for security evaluation of nanomaterials and technologies. The community will forecast possible dangerous unexpectedness in the field of nanoscale materials and devices and suggests rational pathways for prevention of the threats.

  4. The Impact of Pro-Government Militias on State and Human Security: A Comparative Analysis of the Afghan Local Police and the Janjaweed

    DTIC Science & Technology

    2018-03-01

    GOVERNMENT MILITIAS ON STATE AND HUMAN SECURITY: A COMPARATIVE ANALYSIS OF THE AFGHAN LOCAL POLICE AND THE JANJAWEED by Mark D. Phelps March...MILITIAS ON STATE AND HUMAN SECURITY: A COMPARATIVE ANALYSIS OF THE AFGHAN LOCAL POLICE AND THE JANJAWEED 5. FUNDING NUMBERS 6. AUTHOR(S) Mark D...human security. This thesis examines the relationship and impact of pro-government militias on state and human security by conducting a comparative

  5. What Practices in Airport Security Should the United States Implement at Commercial Airports in Light of the Events of September 11, 2001?

    DTIC Science & Technology

    2002-06-01

    NAVAL POSTGRADUATE SCHOOL Monterey, California THESIS WHAT PRACTICES IN AIRPORT SECURITY SHOULD THE UNITED STATES IMPLEMENT AT...COVERED Master’s Thesis 4. TITLE AND SUBTITLE What Practices in Airport Security Should the United States Implement at Commercial...complacency and conflicts of interest. 14. SUBJECT TERMS Airport Security , Aviation Security Systems, Terrorism, Hijacking

  6. Hierarchically controlled remote preparation of an arbitrary single-qubit state by using a four-qubit |χ > entangled state

    NASA Astrophysics Data System (ADS)

    Ma, Peng-Cheng; Chen, Gui-Bin; Li, Xiao-Wei; Zhan, You-Bang

    2018-05-01

    In this paper, we present a scheme for Hierarchically controlled remote preparation of an arbitrary single-qubit state via a four-qubit |χ > state as the quantum channel. In this scheme, a sender wishes to help three agents to remotely prepare a quantum state, respectively. The three agents are divided into two grades, that is, an agent is in the upper grade and other two agents are in the lower grade. It is shown that the agent of the upper grade only needs the assistance of any one of the other two agents for recovering the sender's original state, while an agent of the lower grade needs the collaboration of all the other two agents. In other words, the agents of two grades have different authorities to recover sender's original state.

  7. Biosafety practices associated with potential agents of biocrime and biowarfare.

    PubMed

    Burnett, LouAnn C

    2006-12-01

    Conducting research in a manner that guards against theft and intentional misuse of biological materials requires a process of hazard identification and risk assessment to most effectively identify and implement a risk management plan. Procedures describing physical security, personnel reliability, and material control and accountability define a security plan for this type of research.

  8. Agent-Based Negotiation in Uncertain Environments

    NASA Astrophysics Data System (ADS)

    Debenham, John; Sierra, Carles

    An agent aims to secure his projected needs by attempting to build a set of (business) relationships with other agents. A relationship is built by exchanging private information, and is characterised by its intimacy — degree of closeness — and balance — degree of fairness. Each argumentative interaction between two agents then has two goals: to satisfy some immediate need, and to do so in a way that develops the relationship in a desired direction. An agent's desire to develop each relationship in a particular way then places constraints on the argumentative utterances. The form of negotiation described is argumentative interaction constrained by a desire to develop such relationships.

  9. Propagation of the state change induced by external forces in local interactions

    NASA Astrophysics Data System (ADS)

    Lu, Jianjun; Tokinaga, Shozo

    2016-10-01

    This paper analyses the propagation of the state changes of agents that are induced by external forces applied to a plane. In addition, we propose two models for the behavior of the agents placed on a lattice plane, both of which are affected by local interactions. We first assume that agents are allowed to move to another site to maximise their satisfaction. Second, we utilise a model in which the agents choose activities on each site. The results show that the migration (activity) patterns of agents in both models achieve stability without any external forces. However, when we apply an impulsive external force to the state of the agents, we then observe the propagation of the changes in the agents' states. Using simulation studies, we show the conditions for the propagation of the state changes of the agents. We also show the propagation of the state changes of the agents allocated in scale-free networks and discuss the estimation of the agents' decisions in real state changes. Finally, we discuss the estimation of the agents' decisions in real state temporal changes using economic and social data from Japan and the United States.

  10. Dynamic Network Security Control Using Software Defined Networking

    DTIC Science & Technology

    2016-03-24

    Most importantly I thank my family for understanding, loving , and thriving in the hectic world of military spouse and children. Michael C. Todd v...RBAC poses access to objects as a user to member-of group relationship . This construct results in a set of rules to govern access to objects based...API. Agent Agent.py Event.py Message.py ModSysStatus.py Event Message ModSysStatus Event - Message - ModSysStatus Relationship Figure 12. Agent Design

  11. Comparison of Extracellular Striatal Acetylcholine and Brain Seizure Activity Following Acute Exposure to the Nerve Agents Cyclosarin and Tabun in Freely Moving Guinea Pigs

    DTIC Science & Technology

    2010-01-01

    Literature 3. DATES COVERED (From - To) 4. TITLE AND SUBTITLE Comparison of extracellular striatal acetylcholine and brain seizure activity following...lethality; nerve agents; organophosphorus compounds; seizure activity ; tabun 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT 18. NUMBER...acetylcholine and brain seizure activity following acute exposure to the nerve agents cyclosarin and tabun in freely moving guinea pigs John C

  12. Supporting multi-state collaboration on privacy and security to foster health IT and health information exchange.

    PubMed

    Banger, Alison K; Alakoye, Amoke O; Rizk, Stephanie C

    2008-11-06

    As part of the HHS funded contract, Health Information Security and Privacy Collaboration, 41 states and territories have proposed collaborative projects to address cross-state privacy and security challenges related to health IT and health information exchange. Multi-state collaboration on privacy and security issues remains complicated, and resources to support collaboration around these topics are essential to the success of such collaboration. The resources outlined here offer an example of how to support multi-stakeholder, multi-state projects.

  13. Evaluation of water security in Jordan using a multi-agent, hydroeconomic model: Initial model results from the Jordan Water Project

    NASA Astrophysics Data System (ADS)

    Yoon, J.; Klassert, C. J. A.; Lachaut, T.; Selby, P. D.; Knox, S.; Gorelick, S.; Rajsekhar, D.; Tilmant, A.; Avisse, N.; Harou, J. J.; Medellin-Azuara, J.; Gawel, E.; Klauer, B.; Mustafa, D.; Talozi, S.; Sigel, K.; Zhang, H.

    2016-12-01

    Our work focuses on development of a multi-agent, hydroeconomic model for water policy evaluation in Jordan. Jordan ranks among the most water-scarce countries in the world, a situation exacerbated due to a recent influx of refugees escaping the ongoing civil war in neighboring Syria. The modular, multi-agent model is used to evaluate interventions for enhancing Jordan's water security, integrating biophysical modules that simulate natural and engineered phenomena with human modules that represent behavior at multiple levels of decision making. The hydrologic modules are developed using spatially-distributed groundwater and surface water models, which are translated into compact simulators for efficient integration into the multi-agent model. For the multi-agent model, we explicitly account for human agency at multiple levels of decision making, with agents representing riparian, management, supplier, and water user groups. Human agents are implemented as autonomous entities in the model that make decisions in relation to one another and in response to hydrologic and socioeconomic conditions. The integrated model is programmed in Python using Pynsim, a generalizable, open-source object-oriented software framework for modeling network-based water resource systems. The modeling time periods include historical (2006-2014) and future (present-2050) time spans. For the historical runs, the model performance is validated against historical data for several observations that reflect the interacting dynamics of both the hydrologic and human components of the system. A historical counterfactual scenario is also constructed to isolate and identify the impacts of the recent Syrian civil war and refugee crisis on Jordan's water system. For the future period, model runs are conducted to evaluate potential supply, demand, and institutional interventions over a wide range of plausible climate and socioeconomic scenarios. In addition, model sensitivity analysis is conducted revealing the hydrologic and human aspects of the system that most strongly influence water security outcomes, providing insight into coupled human-water system dynamics as well as priority areas of focus for continued model improvement.

  14. 17 CFR 249b.101 - Form TA-W, notice of withdrawal from registration as transfer agent.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Form TA-W, notice of... TA-W, notice of withdrawal from registration as transfer agent. This form shall be used for...))) [42 FR 44984, Sept. 8, 1977] Editorial Note: For Federal Register citations affecting Form TA-W, see...

  15. 76 FR 21768 - Privacy Act of 1974; Department of Homeland Security/Office of Health Affairs-001 Contractor...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-04-18

    ... expands a coordinated network of S&T Laboratories and other FFRDC to help deliver critical homeland... typically in place at institutions conducting biological research involving potentially high- risk agents to... biological threats and select agents and toxins. During such research, there is always a possibility that DHS...

  16. 12 CFR 995.1 - Definitions.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... such as telephone and photocopy charges, printing, legal, and professional fees, postage, courier... and accounting expenses, trustee, fiscal, and paying agent charges, securities processing charges...

  17. 12 CFR 995.1 - Definitions.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... such as telephone and photocopy charges, printing, legal, and professional fees, postage, courier... and accounting expenses, trustee, fiscal, and paying agent charges, securities processing charges...

  18. 12 CFR 995.1 - Definitions.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... such as telephone and photocopy charges, printing, legal, and professional fees, postage, courier... and accounting expenses, trustee, fiscal, and paying agent charges, securities processing charges...

  19. CONCEPTUALIZING BIOPOLITICS: CITIZEN-STATE INTERACTIONS IN THE SECURING OF WATER SERVICES IN SOUTH AFRICA

    PubMed Central

    Bulled, Nicola

    2015-01-01

    Despite constitutional obligations to provide clean water to all citizens in South Africa, access to water and related services remains highly contested. The discord between constitutional promises and lived realities of water access, particularly through national infrastructure, provides a platform upon which to examine Foucauldian notions of biopolitics, the control of populations through technologies of governing. Drawing on the situations of residents in the rural Vhembe district in the north eastern corner of the country, I examine how individuals conceptualize the relationship that exists between citizen and state and the responsibilities of each in post-apartheid South Africa as it relates to water access. In addition, I describe strategies employed throughout South Africa to voice rights to water and how these approaches are perceived. Finally, I consider how the three primary forms of ‘water citizenship’ – citizen, agent, and subject – influence the current and future health of vulnerable residents. PMID:26087245

  20. Conceptualizing Biopolitics: Citizen-State Interactions in the Securing of Water Services in South Africa.

    PubMed

    Bulled, Nicola

    2015-01-01

    Despite constitutional obligations to provide clean water to all citizens in South Africa, access to water and related services remains highly contested. The discord between constitutional promises and lived realities of water access, particularly through national infrastructure, provides a platform on which to examine Foucauldian notions of biopolitics, the control of populations through technologies of governing. Drawing on the situations of residents in the rural Vhembe district in the north eastern corner of the country, I examine how individuals conceptualize the relationship that exists between citizen and state and the responsibilities of each in post-Apartheid South Africa as it relates to water access. In addition, I describe strategies employed throughout South Africa to voice rights to water and how these approaches are perceived. Finally, I consider how the three primary forms of 'water citizenship'-citizen, agent, and subject-influence the current and future health of vulnerable residents.

  1. 75 FR 55392 - State of the Municipal Securities Market Field Hearings

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-09-10

    ... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-62853; File No. 4-610] State of the Municipal Securities Market Field Hearings AGENCY: Securities and Exchange Commission. ACTION: Notice of field hearings. SUMMARY: On May 7, 2010, the Chairman of the Securities and Exchange Commission Mary L. Schapiro...

  2. 76 FR 26738 - Privacy Act of 1974; Department of Homeland Security/United States Citizenship and Immigration...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-05-09

    ... 1974; Department of Homeland Security/United States Citizenship and Immigration Services--DHS/USCIS-011... ``Department of Homeland Security/United States Citizenship and Immigration Services--011 E- Verify Program System of Records.'' The United States Citizenship and Immigration Services E-Verify Program allows...

  3. 10 CFR 37.29 - Relief from fingerprinting, identification, and criminal history records checks and other...

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... under 27 CFR part 555; (4) Health and Human Services security risk assessments for possession and use of...; (6) State Radiation Control Program Directors and State Homeland Security Advisors or their designated State employee representatives; (7) Agreement State employees conducting security inspections on...

  4. SURVIVABILITY THROUGH OPTIMIZING RESILIENT MECHANISMS (STORM)

    DTIC Science & Technology

    2017-04-01

    STATEMENT Approved for Public Release; Distribution Unlimited. PA# 88ABW-2017-0894 Date Cleared: 07 Mar 2017 13. SUPPLEMENTARY NOTES 14. ABSTRACT Game ...quantitatively about cyber-attacks. Game theory is the branch of applied mathematics that formalizes strategic interaction among intelligent rational agents...mechanism based on game theory. This work has applied game theory to numerous cyber security problems: cloud security, cyber threat information sharing

  5. The US/Global Achilles heel : economic terrorism.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Backus, George A.

    2005-04-01

    While loss of life is the operating concern of Department of Homeland Security (DHS), the security of the economy ultimately decides the success of the war on terrorism. This project focuses on mitigation, containment, response, and impact of terrorist events on the economy. Conventional economic methods are inadequate, but agent-based methods (Discrete Simulation) appears to uniquely capture the dynamics and emergent (human) behaviors.

  6. Securities law: the spreading fire of investor claims

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Mouer, R.

    All states now have a Blue Skylaw, a statute regulating the sale of securities to persons within that state. These laws define oil and gas interests to be securities and improve regulations upon their sale. The securities laws require that whenever oil and gas interests are sold, the person selling must register the interests and must himself be registered as a securities dealer. There are exemptions from registration under the federal and state laws. These exemptions were discussed. (DP)

  7. 12 CFR 1271.30 - Definitions.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... charges, printing, legal, and professional fees, postage, courier services, and office supplies; and (2... accounting expenses, trustee, fiscal, and paying agent charges, securities processing charges, joint...

  8. Security Analysis of Selected AMI Failure Scenarios Using Agent Based Game Theoretic Simulation

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Abercrombie, Robert K; Schlicher, Bob G; Sheldon, Frederick T

    Information security analysis can be performed using game theory implemented in dynamic Agent Based Game Theoretic (ABGT) simulations. Such simulations can be verified with the results from game theory analysis and further used to explore larger scale, real world scenarios involving multiple attackers, defenders, and information assets. We concentrated our analysis on the Advanced Metering Infrastructure (AMI) functional domain which the National Electric Sector Cyber security Organization Resource (NESCOR) working group has currently documented 29 failure scenarios. The strategy for the game was developed by analyzing five electric sector representative failure scenarios contained in the AMI functional domain. From thesemore » five selected scenarios, we characterize them into three specific threat categories affecting confidentiality, integrity and availability (CIA). The analysis using our ABGT simulation demonstrates how to model the AMI functional domain using a set of rationalized game theoretic rules decomposed from the failure scenarios in terms of how those scenarios might impact the AMI network with respect to CIA.« less

  9. Information Security: Serious Weakness Put State Department and FAA Operations at Risk

    DOT National Transportation Integrated Search

    1998-05-19

    Testimony focuses on the results of recent reviews of computer security at the Department of State and the Federal Aviation Administration (FAA). Makes specific recommendations for improving State and FAA's information security posture. Highlights be...

  10. 31 CFR 601.4 - Use of paper; interest-bearing securities of the United States.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... PAPER FOR UNITED STATES CURRENCY AND OTHER SECURITIES § 601.4 Use of paper; interest-bearing securities of the United States. The existing distinctive papers shall be used for the printing of interest...

  11. Security model for VM in cloud

    NASA Astrophysics Data System (ADS)

    Kanaparti, Venkataramana; Naveen K., R.; Rajani, S.; Padmvathamma, M.; Anitha, C.

    2013-03-01

    Cloud computing is a new approach emerged to meet ever-increasing demand for computing resources and to reduce operational costs and Capital Expenditure for IT services. As this new way of computation allows data and applications to be stored away from own corporate server, it brings more issues in security such as virtualization security, distributed computing, application security, identity management, access control and authentication. Even though Virtualization forms the basis for cloud computing it poses many threats in securing cloud. As most of Security threats lies at Virtualization layer in cloud we proposed this new Security Model for Virtual Machine in Cloud (SMVC) in which every process is authenticated by Trusted-Agent (TA) in Hypervisor as well as in VM. Our proposed model is designed to with-stand attacks by unauthorized process that pose threat to applications related to Data Mining, OLAP systems, Image processing which requires huge resources in cloud deployed on one or more VM's.

  12. Social Security Number Protection Laws: State-by-State Summary Table

    ERIC Educational Resources Information Center

    Data Quality Campaign, 2011

    2011-01-01

    As state policymakers implement statewide longitudinal data systems that collect, store, link and share student-level data, it is critical that they understand applicable privacy and data security standards and laws designed to ensure the privacy, security, and confidentiality of that data. To help state policymakers navigate this complex legal…

  13. 9 CFR 205.208 - Distribution of portions of master list-registration-information to non-registrants on request.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ..., and selling agents,” “regular” distribution of “portions” of the master list, furnishing of “oral... receive portions of the master list only for oranges, and thus take cattle free and clear of security... buyers, commission merchants, and selling agents are not intended to be liable for errors or other...

  14. 17 CFR 274.402 - Form ID, uniform application for access codes to file on EDGAR.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... for access codes to file on EDGAR. 274.402 Section 274.402 Commodity and Securities Exchanges... Forms for Electronic Filing § 274.402 Form ID, uniform application for access codes to file on EDGAR..., filing agent or training agent to log on to the EDGAR system, submit filings, and change its CCC. (d...

  15. 17 CFR 274.402 - Form ID, uniform application for access codes to file on EDGAR.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... for access codes to file on EDGAR. 274.402 Section 274.402 Commodity and Securities Exchanges... Forms for Electronic Filing § 274.402 Form ID, uniform application for access codes to file on EDGAR..., filing agent or training agent to log on to the EDGAR system, submit filings, and change its CCC. (d...

  16. Cationic host defense peptides; novel antimicrobial therapeutics against Category A pathogens and emerging infections

    PubMed Central

    Findlay, Fern; Proudfoot, Lorna; Stevens, Craig

    2016-01-01

    Cationic Host Defense Peptides (HDP, also known as antimicrobial peptides) are crucial components of the innate immune system and possess broad-spectrum antibacterial, antiviral, and immunomodulatory activities. They can contribute to the rapid clearance of biological agents through direct killing of the organisms, inhibition of pro-inflammatory mediators such as lipopolysaccharide, and by modulating the inflammatory response to infection. Category A biological agents and materials, as classified by the United States National Institutes for Health, the US Centers for Disease Control and Prevention, and the US Department of Homeland Security, carry the most severe threat in terms of human health, transmissibility, and preparedness. As such, there is a pressing need for novel frontline approaches for prevention and treatment of diseases caused by these organisms, and exploiting the broad antimicrobial activity exhibited by cationic host defense peptides represents an exciting priority area for clinical research. This review will summarize what is known about the antimicrobial and antiviral effects of the two main families of cationic host defense peptides, cathelicidins, and defensins in the context of Category A biological agents which include, but are not limited to; anthrax (Bacillus anthracis), plague (Yersinia pestis), smallpox (Variola major), tularemia (Francisella tularensis). In addition, we highlight priority areas, particularly emerging viral infections, where more extensive research is urgently required. PMID:27315342

  17. Cationic host defense peptides; novel antimicrobial therapeutics against Category A pathogens and emerging infections.

    PubMed

    Findlay, Fern; Proudfoot, Lorna; Stevens, Craig; Barlow, Peter G

    2016-01-01

    Cationic Host Defense Peptides (HDP, also known as antimicrobial peptides) are crucial components of the innate immune system and possess broad-spectrum antibacterial, antiviral, and immunomodulatory activities. They can contribute to the rapid clearance of biological agents through direct killing of the organisms, inhibition of pro-inflammatory mediators such as lipopolysaccharide, and by modulating the inflammatory response to infection. Category A biological agents and materials, as classified by the United States National Institutes for Health, the US Centers for Disease Control and Prevention, and the US Department of Homeland Security, carry the most severe threat in terms of human health, transmissibility, and preparedness. As such, there is a pressing need for novel frontline approaches for prevention and treatment of diseases caused by these organisms, and exploiting the broad antimicrobial activity exhibited by cationic host defense peptides represents an exciting priority area for clinical research. This review will summarize what is known about the antimicrobial and antiviral effects of the two main families of cationic host defense peptides, cathelicidins, and defensins in the context of Category A biological agents which include, but are not limited to; anthrax (Bacillus anthracis), plague (Yersinia pestis), smallpox (Variola major), tularemia (Francisella tularensis). In addition, we highlight priority areas, particularly emerging viral infections, where more extensive research is urgently required.

  18. Resource allocation and supervisory control architecture for intelligent behavior generation

    NASA Astrophysics Data System (ADS)

    Shah, Hitesh K.; Bahl, Vikas; Moore, Kevin L.; Flann, Nicholas S.; Martin, Jason

    2003-09-01

    In earlier research the Center for Self-Organizing and Intelligent Systems (CSOIS) at Utah State University (USU) was funded by the US Army Tank-Automotive and Armaments Command's (TACOM) Intelligent Mobility Program to develop and demonstrate enhanced mobility concepts for unmanned ground vehicles (UGVs). As part of our research, we presented the use of a grammar-based approach to enabling intelligent behaviors in autonomous robotic vehicles. With the growth of the number of available resources on the robot, the variety of the generated behaviors and the need for parallel execution of multiple behaviors to achieve reaction also grew. As continuation of our past efforts, in this paper, we discuss the parallel execution of behaviors and the management of utilized resources. In our approach, available resources are wrapped with a layer (termed services) that synchronizes and serializes access to the underlying resources. The controlling agents (called behavior generating agents) generate behaviors to be executed via these services. The agents are prioritized and then, based on their priority and the availability of requested services, the Control Supervisor decides on a winner for the grant of access to services. Though the architecture is applicable to a variety of autonomous vehicles, we discuss its application on T4, a mid-sized autonomous vehicle developed for security applications.

  19. Security Verification Techniques Applied to PatchLink COTS Software

    NASA Technical Reports Server (NTRS)

    Gilliam, David P.; Powell, John D.; Bishop, Matt; Andrew, Chris; Jog, Sameer

    2006-01-01

    Verification of the security of software artifacts is a challenging task. An integrated approach that combines verification techniques can increase the confidence in the security of software artifacts. Such an approach has been developed by the Jet Propulsion Laboratory (JPL) and the University of California at Davis (UC Davis). Two security verification instruments were developed and then piloted on PatchLink's UNIX Agent, a Commercial-Off-The-Shelf (COTS) software product, to assess the value of the instruments and the approach. The two instruments are the Flexible Modeling Framework (FMF) -- a model-based verification instrument (JPL), and a Property-Based Tester (UC Davis). Security properties were formally specified for the COTS artifact and then verified using these instruments. The results were then reviewed to determine the effectiveness of the approach and the security of the COTS product.

  20. Developing a consensus framework and risk profile for agents of opportunity in academic medical centers: implications for public health preparedness.

    PubMed

    Farmer, Brenna M; Nelson, Lewis S; Graham, Margaret E; Bendzans, Carly; McCrillis, Aileen M; Portelli, Ian; Zhang, Meng; Goldberg, Judith; Rosenberg, Sheldon D; Goldfrank, Lewis R; Tunik, Michael

    2010-12-01

    Agents of opportunity (AO) in academic medical centers (AMC) are defined as unregulated or lightly regulated substances used for medical research or patient care that can be used as "dual purpose" substances by terrorists to inflict damage upon populations. Most of these agents are used routinely throughout AMC either during research or for general clinical practice. To date, the lack of careful regulations for AOs creates uncertain security conditions and increased malicious potential. Using a consensus-based approach, we collected information and opinions from staff working in an AMC and 4 AMC-affiliated hospitals concerning identification of AO, AO attributes, and AMC risk and preparedness, focusing on AO security and dissemination mechanisms and likely hospital response. The goal was to develop a risk profile and framework for AO in the institution. Agents of opportunity in 4 classes were identified and an AO profile was developed, comprising 16 attributes denoting information critical to preparedness for AO misuse. Agents of opportunity found in AMC present a unique and vital gap in public health preparedness. Findings of this project may provide a foundation for a discussion and consensus efforts to determine a nationally accepted risk profile framework for AO. This foundation may further lead to the implementation of appropriate regulatory policies to improve public health preparedness. Agents of opportunity modeling of dissemination properties should be developed to better predict AO risk.

  1. 78 FR 51266 - International Security Advisory Board (ISAB) Meeting Notice

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-08-20

    ... DEPARTMENT OF STATE [Public Notice 8419] International Security Advisory Board (ISAB) Meeting.... App Sec. 10(a)(2), the Department of State announces a meeting of the International Security Advisory... all aspects of arms control, disarmament, political-military affairs, international security and...

  2. 49 CFR 1546.213 - Access to cargo: Security threat assessments for cargo personnel in the United States.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Access to cargo: Security threat assessments for...: Security threat assessments for cargo personnel in the United States. This section applies in the United...— (1) Each individual must successfully complete a security threat assessment or comparable security...

  3. Psychotropic medication patterns among youth in juvenile justice.

    PubMed

    Lyons, Camilla L; Wasserman, Gail A; Olfson, Mark; McReynolds, Larkin S; Musabegovic, Hana; Keating, Joseph M

    2013-03-01

    This paper aims to determine the prevalence, patterns, and demographic and diagnostic correlates of psychotropic medication use in a sample of youth in one state's post-adjudicatory secure facilities. The health records database of the facilities was the source of linked demographic, diagnostic and pharmacy information for the 1-year period ending June 30, 2008. Age, gender, race, offense, prior petitions and diagnoses were examined across groups, and concomitant psychotropic pharmacotherapy patterns were identified. Period prevalence was 10.2% for youth ranging in age from 12 through 22 years who had any psychotropic drug prescribed during the first 30 days after intake to the facility. Among medicated youths, almost half received concomitant therapy. Medicated youth were significantly less likely to be Hispanic and more likely to endorse one or more diagnoses. Antidepressants, antipsychotics and antihistamines were the most commonly dispensed agents. Our findings revealed that the rate of psychotropic medication use was low, concomitant medication use was common, and ethnic/race differences in psychopharmacologic treatment were present in this sample of youths in post-adjudicatory secure facilities.

  4. Securitizing the Arctic indigenous peoples: A community security perspective with special reference to the Sámi of the European high north

    NASA Astrophysics Data System (ADS)

    Hossain, Kamrul

    2016-09-01

    The theory of securitization-the so-called Copenhagen school-centers the concept of security on various identified threats. Security based on the collective identity by which a society preserves its essential characteristics has been defined as community security, or societal security. The underlying principle of the Copenhagen school is that state-based, sovereignty-oriented security is ineffective unless the other components of security threats are addressed. The concept of human security, developed nearly simultaneously to that of securitization, identifies threat components at the sub-state level which are not traditionally understood as security concerns. Both schools of security thought are similar as they offer nontraditional approaches to understanding the concept of security. In this article, I explore securitization theory and the concept of human security to elaborate community perspectives in the understanding of security. In a case study, I investigate the security concerns of the indigenous peoples of the Arctic. The transformation of the Arctic by climate change and its impacts has resulted in new challenges and opportunities, so I explore how indigenous peoples in general and the Sámi in particular understand security which promotes their societal security. Although I show that this group of people deserves recognition and the ability to exercise greater authority, I conclude that diverse concepts of security do not by any means undermine the core traditional concept of security. These aspects of security remain subject to scrutiny by states and exist in a vertical structure. The Sámi, therefore, rely on affirmative actions by states to enjoy greater rights to maintain their community security.

  5. Climate, Energy, Water, Land and the Spill-Over Effect (Invited)

    NASA Astrophysics Data System (ADS)

    Tidwell, V. C.; Backus, G.; Bier, A.; Brune, N.; Brown, T. J.

    2013-12-01

    Developing nations incur a greater risk to climate stress than the developed world due to poorly managed natural resources, unreliable infrastructure and brittle governing/economic institutions. When fragile states are stressed these vulnerabilities are often manifest in a 'domino effect' of reduced natural resource production-leading to economic hardship-followed by desperate emigration, social unrest, and humanitarian crises. The impact is not limited to a single nation or region but 'spills over' to adjoining areas with even broader impact on global markets and security. Toward this problem we are developing a model of climate aggravated spill-over that couples social, economic, infrastructure and resource dynamics and constraints. The model integrates system dynamics and agent based simulation to identify regions vulnerable to the spill-over effect and to explore potential mitigating and/or adaptive measures. At the heart of the analysis is human migration which is modeled by combining aspects of the Protection Motivation Theory and Theory of Planned Behavior within the mechanistic framework of Fick's first law of diffusion. Agents in the current model are distinguished at the country level by country of residence, country of origin, gender, education/skill, age, and rural/urban roots. The model of the environment in which the agents operate endogenously simulates economy, labor, population, disease, violence, energy, water, and food sectors. Various climate scenarios distinguished by differences in temperature, precipitation and extreme events, are simulated over a 50 year time horizon. Results allow exploration of the nexus between climate change, resource provisioning, especially energy, water and land, and the resultant adaptive response of the impacted population. Current modeling efforts are focused on the developing nations of West Africa. Sandia National Laboratories is a multi-program laboratory managed and operated by Sandia Corporation, a wholly owned subsidiary of Lockheed Martin Corporation, for the U.S. Department of Energy's National Nuclear Security Administration under contract DE-AC04-94AL85000. Schematic of spill-over effects model.

  6. 78 FR 29147 - 30-Day Notice and Request for Comments

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-05-17

    ... DEPARTMENT OF HOMELAND SECURITY United States Secret Service 30-Day Notice and Request for... Management and Budget, Attn: Desk Officer for United States Secret Service, Department of Homeland Security... directed to: United States Secret Service, Security Clearance Division, Attn: ASAIC Michael Smith...

  7. Strategies for Improving Polio Surveillance Performance in the Security-Challenged Nigerian States of Adamawa, Borno, and Yobe During 2009-2014.

    PubMed

    Hamisu, Abdullahi Walla; Johnson, Ticha Muluh; Craig, Kehinde; Mkanda, Pascal; Banda, Richard; Tegegne, Sisay G; Oyetunji, Ajiboye; Ningi, Nuhu; Mohammed, Said M; Adamu, Mohammed Isa; Abdulrahim, Khalid; Nsubuga, Peter; Vaz, Rui G; Muhammed, Ado J G

    2016-05-01

    The security-challenged states of Adamawa, Borno, and Yobe bear most of the brunt of the Boko Haram insurgency in Nigeria. The security challenge has led to the killing of health workers, destruction of health facilities, and displacement of huge populations. To identify areas of polio transmission and promptly detect possible cases of importation in these states, polio surveillance must be very sensitive. We conducted a retrospective review of acute flaccid paralysis surveillance in the security-compromised states between 2009 and 2014, using the acute flaccid paralysis database at the World Health Organization Nigeria Country Office. We also reviewed the reports of surveillance activities conducted in these security-challenged states, to identify strategies that were implemented to improve polio surveillance. Environmental surveillance was implemented in Borno in 2013 and in Yobe in 2014. All disease surveillance and notification officers in the 3 security-challenged states now receive annual training, and the number of community informants in these states has dramatically increased. Media-based messaging (via radio and television) is now used to sensitize the public to the importance of surveillance, and contact samples have been regularly collected in both states since 2014. The strategies implemented in the security-challenged states improved the quality of polio surveillance during the review period. © 2016 World Health Organization; licensee Oxford Journals.

  8. Strategies for Improving Polio Surveillance Performance in the Security-Challenged Nigerian States of Adamawa, Borno, and Yobe During 2009–2014

    PubMed Central

    Hamisu, Abdullahi Walla; Johnson, Ticha Muluh; Craig, Kehinde; Mkanda, Pascal; Banda, Richard; Tegegne, Sisay G.; Oyetunji, Ajiboye; Ningi, Nuhu; Mohammed, Said M.; Adamu, Mohammed Isa; Abdulrahim, Khalid; Nsubuga, Peter; Vaz, Rui G.; Muhammed, Ado J. G.

    2016-01-01

    Background. The security-challenged states of Adamawa, Borno, and Yobe bear most of the brunt of the Boko Haram insurgency in Nigeria. The security challenge has led to the killing of health workers, destruction of health facilities, and displacement of huge populations. To identify areas of polio transmission and promptly detect possible cases of importation in these states, polio surveillance must be very sensitive. Methods. We conducted a retrospective review of acute flaccid paralysis surveillance in the security-compromised states between 2009 and 2014, using the acute flaccid paralysis database at the World Health Organization Nigeria Country Office. We also reviewed the reports of surveillance activities conducted in these security-challenged states, to identify strategies that were implemented to improve polio surveillance. Results. Environmental surveillance was implemented in Borno in 2013 and in Yobe in 2014. All disease surveillance and notification officers in the 3 security-challenged states now receive annual training, and the number of community informants in these states has dramatically increased. Media-based messaging (via radio and television) is now used to sensitize the public to the importance of surveillance, and contact samples have been regularly collected in both states since 2014. Conclusions. The strategies implemented in the security-challenged states improved the quality of polio surveillance during the review period. PMID:26655842

  9. Security improvement by using a modified coherent state for quantum cryptography

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Lu, Y.J.; Zhu, Luobei; Ou, Z.Y.

    2005-03-01

    Weak coherent states as a photon source for quantum cryptography have a limit in secure data rate and transmission distance because of the presence of multiphoton events and loss in transmission line. Two-photon events in a coherent state can be taken out by a two-photon interference scheme. We investigate the security issue of utilizing this modified coherent state in quantum cryptography. A 4-dB improvement in the secure data rate or a nearly twofold increase in transmission distance over the coherent state are found. With a recently proposed and improved encoding strategy, further improvement is possible.

  10. Maritime security report. May 2000 [Organization of American States Tactical Advisory Group on Port Security

    DOT National Transportation Integrated Search

    2000-05-01

    The member countries of the Organization of American States (OAS) have recognized that a coordinated multilateral approach to improving port security in the Western Hemisphere is needed and has established a Technical Advisory Group on Port Security ...

  11. Breaking the cyber-security dilemma: aligning security needs and removing vulnerabilities.

    PubMed

    Dunn Cavelty, Myriam

    2014-09-01

    Current approaches to cyber-security are not working. Rather than producing more security, we seem to be facing less and less. The reason for this is a multi-dimensional and multi-faceted security dilemma that extends beyond the state and its interaction with other states. It will be shown how the focus on the state and "its" security crowds out consideration for the security of the individual citizen, with detrimental effects on the security of the whole system. The threat arising from cyberspace to (national) security is presented as possible disruption to a specific way of life, one building on information technologies and critical functions of infrastructures, with relatively little consideration for humans directly. This non-focus on people makes it easier for state actors to militarize cyber-security and (re-)assert their power in cyberspace, thereby overriding the different security needs of human beings in that space. Paradoxically, the use of cyberspace as a tool for national security, both in the dimension of war fighting and the dimension of mass-surveillance, has detrimental effects on the level of cyber-security globally. A solution out of this dilemma is a cyber-security policy that is decidedly anti-vulnerability and at the same time based on strong considerations for privacy and data protection. Such a security would have to be informed by an ethics of the infosphere that is based on the dignity of information related to human beings.

  12. A Goal Oriented Approach for Modeling and Analyzing Security Trade-Offs

    NASA Astrophysics Data System (ADS)

    Elahi, Golnaz; Yu, Eric

    In designing software systems, security is typically only one design objective among many. It may compete with other objectives such as functionality, usability, and performance. Too often, security mechanisms such as firewalls, access control, or encryption are adopted without explicit recognition of competing design objectives and their origins in stakeholder interests. Recently, there is increasing acknowledgement that security is ultimately about trade-offs. One can only aim for "good enough" security, given the competing demands from many parties. In this paper, we examine how conceptual modeling can provide explicit and systematic support for analyzing security trade-offs. After considering the desirable criteria for conceptual modeling methods, we examine several existing approaches for dealing with security trade-offs. From analyzing the limitations of existing methods, we propose an extension to the i* framework for security trade-off analysis, taking advantage of its multi-agent and goal orientation. The method was applied to several case studies used to exemplify existing approaches.

  13. Public Health Crisis in War and Conflict - Health Security in Aggregate.

    PubMed

    Quinn, John; Zelený, Tomáš; Subramaniam, Rammika; Bencko, Vladimír

    2017-03-01

    Public health status of populations is multifactorial and besides other factors it is linked to war and conflict. Public health crisis can erupt when states go to war or are invaded; health security may be reduced for affected populations. This study reviews in aggregate multiple indices of human security, human development and legitimacy of the state in order to describe a predictable global health portrait. Paradigm shift of large global powers to that non-state actors and proxies impact regional influence through scaled conflict and present major global health challenges for policy makers. Small scale conflict with large scale violence threatens health security for at-risk populations. The paper concludes that health security is directly proportional to state security. Copyright© by the National Institute of Public Health, Prague 2017

  14. PennDOT transportation security strategy : volume 2 : effective practices of state departments of transportation security planning

    DOT National Transportation Integrated Search

    2004-08-01

    Since September 11, 2001, state departments of transportation (DOTs) have been assuming a more proactive role in security and emergency management. The purpose of this Effective Practices Report is to document key lessons learned by state DOTs as the...

  15. 49 CFR 1554.101 - Security Measures.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... certificated repair stations located— (1) On airport. On an air operations area or security identification display area of an airport covered by an airport security program under 49 CFR part 1542 in the United States, or on the security restricted area of any commensurate airport outside the United States...

  16. The Foreign Intelligence Surveillance Act: An Overview of the Statutory Framework and U.S. Foreign Intelligence Surveillance Court and U.S. Foreign Intelligence Surveillance Court of Review Decisions

    DTIC Science & Technology

    2007-02-15

    an application for electronic surveillance of an agent of a foreign power and for an FISC order renewing that surveillance, both subject to...Review) of an FISC order authorizing electronic surveillance of an agent of a foreign power, subject to restrictions flowing from the May 17th...their agents .”13 However, the guidance which the Court provided in Keith with respect to national security surveillance in a domestic context to some

  17. Computation of the target state and feedback controls for time optimal consensus in multi-agent systems

    NASA Astrophysics Data System (ADS)

    Mulla, Ameer K.; Patil, Deepak U.; Chakraborty, Debraj

    2018-02-01

    N identical agents with bounded inputs aim to reach a common target state (consensus) in the minimum possible time. Algorithms for computing this time-optimal consensus point, the control law to be used by each agent and the time taken for the consensus to occur, are proposed. Two types of multi-agent systems are considered, namely (1) coupled single-integrator agents on a plane and, (2) double-integrator agents on a line. At the initial time instant, each agent is assumed to have access to the state information of all the other agents. An algorithm, using convexity of attainable sets and Helly's theorem, is proposed, to compute the final consensus target state and the minimum time to achieve this consensus. Further, parts of the computation are parallelised amongst the agents such that each agent has to perform computations of O(N2) run time complexity. Finally, local feedback time-optimal control laws are synthesised to drive each agent to the target point in minimum time. During this part of the operation, the controller for each agent uses measurements of only its own states and does not need to communicate with any neighbouring agents.

  18. Programming secure mobile agents in healthcare environments using role-based permissions.

    PubMed

    Georgiadis, C K; Baltatzis, J; Pangalos, G I

    2003-01-01

    The healthcare environment consists of vast amounts of dynamic and unstructured information, distributed over a large number of information systems. Mobile agent technology is having an ever-growing impact on the delivery of medical information. It supports acquiring and manipulating information distributed in a large number of information systems. Moreover is suitable for the computer untrained medical stuff. But the introduction of mobile agents generates advanced threads to the sensitive healthcare information, unless the proper countermeasures are taken. By applying the role-based approach to the authorization problem, we ease the sharing of information between hospital information systems and we reduce the administering part. The different initiative of the agent's migration method, results in different methods of assigning roles to the agent.

  19. 75 FR 62676 - Disability Determinations by State Agency Disability Examiners

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-10-13

    ... SOCIAL SECURITY ADMINISTRATION 20 CFR Parts 404 and 416 [Docket No. SSA-2008-0041] RIN 0960-AG87 Disability Determinations by State Agency Disability Examiners AGENCY: Social Security Administration. ACTION... and XVI of the Social Security Act (Act) without the approval of a State agency medical or...

  20. Retirement and health benefits for Mexican migrant workers returning from the United States

    PubMed Central

    Aguila, Emma; Zissimopoulos, Julie

    2013-01-01

    In the absence of a bilateral agreement for the portability and totalization of social security contributions between the United States and Mexico, this article examines the access to pension and health insurance benefits and employment status of older Mexican return migrants. We find that return migrants who have spent less than a year in the United States have a similar level of access to social security benefits as non-migrants. Return migrants who have spent at least a year in the United States are less likely to have public health insurance or social security benefits, and could be more vulnerable to poverty in old age. These results inform the debate on a bilateral social security agreement between the United States and Mexico to improve return migrants’ social security. PMID:23750049

  1. 17 CFR 249.1330 - Form MA-NR, for appointment of agent for service of process by non-resident municipal advisor...

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 17 Commodity and Securities Exchanges 4 2014-04-01 2014-04-01 false Form MA-NR, for appointment of... Information Regarding Certain Natural Persons § 249.1330 Form MA-NR, for appointment of agent for service of... Register citations affecting Form MA-NR, see the List of CFR Sections Affected, which appears in the...

  2. Development of a PET Prostate-Specific Membrane Antigen Imaging Agent: Preclinical Translation for Future Clinical Application

    DTIC Science & Technology

    2016-10-01

    small-molecule peptidomimetic imaging agents labeled with positron emitting fluorine- 18 . These data will enable the filing of an exploratory IND...outcome. 15. SUBJECT TERMS Prostate Cancer, Prostate Specific Membrane Antigen (PSMA), Fluorine- 18 , Molecular Imaging, Radiotracer, Automated...Synthesis, Phosphoramidate, Inhibitor, Peptide Mimic, Peptidomimetic 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT 18 . NUMBER OF PAGES 19a

  3. 7 CFR 273.6 - Social security numbers.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 7 Agriculture 4 2011-01-01 2011-01-01 false Social security numbers. 273.6 Section 273.6... Employment § 273.6 Social security numbers. (a) Requirements for participation. The State agency shall... State agency with the social security number (SSN) of each household member or apply for one before...

  4. 48 CFR 52.225-26 - Contractors Performing Private Security Functions Outside the United States.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ..., helicopters, and other military vehicles operated by Contractors performing private security functions; and... Private Security Functions Outside the United States. 52.225-26 Section 52.225-26 Federal Acquisition... CONTRACT CLAUSES Text of Provisions and Clauses 52.225-26 Contractors Performing Private Security Functions...

  5. 48 CFR 52.225-26 - Contractors Performing Private Security Functions Outside the United States.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ..., helicopters, and other military vehicles operated by Contractors performing private security functions; and... Private Security Functions Outside the United States. 52.225-26 Section 52.225-26 Federal Acquisition... CONTRACT CLAUSES Text of Provisions and Clauses 52.225-26 Contractors Performing Private Security Functions...

  6. 76 FR 78085 - Permissible Investments for Federal and State Savings Associations: Corporate Debt Securities

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-12-15

    ... Part 362 Permissible Investments for Federal and State Savings Associations: Corporate Debt Securities... association from acquiring and retaining a corporate debt security unless it determines, prior to acquiring... whether a corporate debt security is eligible for investment under this proposed rule. DATES: Comments...

  7. 75 FR 65550 - Overseas Security Advisory Council (OSAC) Meeting Notice

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-10-25

    ... meeting will focus on an examination of corporate security policies and procedures and will involve... DEPARTMENT OF STATE [Public Notice: 7166] Overseas Security Advisory Council (OSAC) Meeting Notice... Security Advisory Council on November 16, 17, and 18 at the U.S. Department of State, Washington DC...

  8. 20 CFR 404.1901 - Introduction.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... social security system of the United States and the social security system of a foreign country. An... be based on a combination of a person's periods of coverage under the social security system of the United States and the social security system of the foreign country. An agreement also provides for the...

  9. 7 CFR 273.6 - Social security numbers.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 7 Agriculture 4 2012-01-01 2012-01-01 false Social security numbers. 273.6 Section 273.6... Employment § 273.6 Social security numbers. (a) Requirements for participation. The State agency shall... State agency with the social security number (SSN) of each household member or apply for one before...

  10. 7 CFR 273.6 - Social security numbers.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 7 Agriculture 4 2013-01-01 2013-01-01 false Social security numbers. 273.6 Section 273.6... Employment § 273.6 Social security numbers. (a) Requirements for participation. The State agency shall... State agency with the social security number (SSN) of each household member or apply for one before...

  11. 7 CFR 273.6 - Social security numbers.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 7 Agriculture 4 2014-01-01 2014-01-01 false Social security numbers. 273.6 Section 273.6... Employment § 273.6 Social security numbers. (a) Requirements for participation. The State agency shall... State agency with the social security number (SSN) of each household member or apply for one before...

  12. 22 CFR 1101.5 - Security, confidentiality and protection of records.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... Bureau of Standard's booklet “Computer Security Guidelines for Implementing the Privacy Act of 1974” (May... 22 Foreign Relations 2 2011-04-01 2009-04-01 true Security, confidentiality and protection of... STATES AND MEXICO, UNITED STATES SECTION PRIVACY ACT OF 1974 § 1101.5 Security, confidentiality and...

  13. 22 CFR 1101.5 - Security, confidentiality and protection of records.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... Bureau of Standard's booklet “Computer Security Guidelines for Implementing the Privacy Act of 1974” (May... 22 Foreign Relations 2 2014-04-01 2014-04-01 false Security, confidentiality and protection of... STATES AND MEXICO, UNITED STATES SECTION PRIVACY ACT OF 1974 § 1101.5 Security, confidentiality and...

  14. 22 CFR 1101.5 - Security, confidentiality and protection of records.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... Bureau of Standard's booklet “Computer Security Guidelines for Implementing the Privacy Act of 1974” (May... 22 Foreign Relations 2 2013-04-01 2009-04-01 true Security, confidentiality and protection of... STATES AND MEXICO, UNITED STATES SECTION PRIVACY ACT OF 1974 § 1101.5 Security, confidentiality and...

  15. 22 CFR 1101.5 - Security, confidentiality and protection of records.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... Bureau of Standard's booklet “Computer Security Guidelines for Implementing the Privacy Act of 1974” (May... 22 Foreign Relations 2 2012-04-01 2009-04-01 true Security, confidentiality and protection of... STATES AND MEXICO, UNITED STATES SECTION PRIVACY ACT OF 1974 § 1101.5 Security, confidentiality and...

  16. 22 CFR 1101.5 - Security, confidentiality and protection of records.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... Bureau of Standard's booklet “Computer Security Guidelines for Implementing the Privacy Act of 1974” (May... 22 Foreign Relations 2 2010-04-01 2010-04-01 true Security, confidentiality and protection of... STATES AND MEXICO, UNITED STATES SECTION PRIVACY ACT OF 1974 § 1101.5 Security, confidentiality and...

  17. The Importance of the Study of Cognitive Performance Enhancement for U.S. National Security.

    PubMed

    Malish, Richard G

    2017-08-01

    The American military is embarking on the 'Third Offset'-a strategy designed to produce seismic shifts in the future of warfare. Central to the approach is the conjoining of humans, technology, and machines to deliver a decisive advantage on the battlefield. Because technology will spread rapidly and globally, tactical overmatch will occur when American operators possess a competitive edge in cognition. Investigation of cognitive enhancing therapeutics is not widely articulated as an adjunct to the Third Offset, yet failure to study promising agents could represent a strategic vulnerability. Because of its legacy of research into therapeutic agents to enhance human-machine interplay, the aerospace medical community represents a front-running candidate to perform this work. Notably, there are strong signals emanating from gambling, academic, and video-gaming enterprises that already-developed stimulants and other agents provide cognitive benefits. These agents should be studied not only for reasons of national security, but also because cognitive enhancement may be a necessary step in the evolution of humankind. To illustrate these points, this article will assert that: 1) the need to preserve and enhance physical and cognitive health will become more and more important over the next century; 2) aeromedical specialists are in a position to take the lead in the endeavor to enhance cognition; 3) signals of enhancement of the type useful to both military and medical efforts exist aplenty in today's society; and 4) the aeromedical community should approach human enhancement research deliberately but carefully.Malish RG. The importance of the study of cognitive performance enhancement for U.S. national security. Aerosp Med Hum Perform. 2017; 88(8):773-778.

  18. 17 CFR 249.619 - Form TA-Y2K, information required of transfer agents pursuant to section 17 of the Securities...

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Form TA-Y2K, information... Certain Exchange Members, Brokers, and Dealers § 249.619 Form TA-Y2K, information required of transfer... affecting Form TA-Y2K, see the List of CFR Sections Affected, which appears in the Finding Aids section of...

  19. Automated monitoring of medical protocols: a secure and distributed architecture.

    PubMed

    Alsinet, T; Ansótegui, C; Béjar, R; Fernández, C; Manyà, F

    2003-03-01

    The control of the right application of medical protocols is a key issue in hospital environments. For the automated monitoring of medical protocols, we need a domain-independent language for their representation and a fully, or semi, autonomous system that understands the protocols and supervises their application. In this paper we describe a specification language and a multi-agent system architecture for monitoring medical protocols. We model medical services in hospital environments as specialized domain agents and interpret a medical protocol as a negotiation process between agents. A medical service can be involved in multiple medical protocols, and so specialized domain agents are independent of negotiation processes and autonomous system agents perform monitoring tasks. We present the detailed architecture of the system agents and of an important domain agent, the database broker agent, that is responsible of obtaining relevant information about the clinical history of patients. We also describe how we tackle the problems of privacy, integrity and authentication during the process of exchanging information between agents.

  20. Security proof of a three-state quantum-key-distribution protocol without rotational symmetry

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Fung, C.-H.F.; Lo, H.-K.

    2006-10-15

    Standard security proofs of quantum-key-distribution (QKD) protocols often rely on symmetry arguments. In this paper, we prove the security of a three-state protocol that does not possess rotational symmetry. The three-state QKD protocol we consider involves three qubit states, where the first two states |0{sub z}> and |1{sub z}> can contribute to key generation, and the third state |+>=(|0{sub z}>+|1{sub z}>)/{radical}(2) is for channel estimation. This protocol has been proposed and implemented experimentally in some frequency-based QKD systems where the three states can be prepared easily. Thus, by founding on the security of this three-state protocol, we prove that thesemore » QKD schemes are, in fact, unconditionally secure against any attacks allowed by quantum mechanics. The main task in our proof is to upper bound the phase error rate of the qubits given the bit error rates observed. Unconditional security can then be proved not only for the ideal case of a single-photon source and perfect detectors, but also for the realistic case of a phase-randomized weak coherent light source and imperfect threshold detectors. Our result in the phase error rate upper bound is independent of the loss in the channel. Also, we compare the three-state protocol with the Bennett-Brassard 1984 (BB84) protocol. For the single-photon source case, our result proves that the BB84 protocol strictly tolerates a higher quantum bit error rate than the three-state protocol, while for the coherent-source case, the BB84 protocol achieves a higher key generation rate and secure distance than the three-state protocol when a decoy-state method is used.« less

  1. Escape and evade control policies for ensuring the physical security of nonholonomic, ground-based, unattended mobile sensor nodes

    NASA Astrophysics Data System (ADS)

    Mascarenas, David; Stull, Christopher; Farrar, Charles

    2011-06-01

    In order to realize the wide-scale deployment of high-endurance, unattended mobile sensing technologies, it is vital to ensure the self-preservation of the sensing assets. Deployed mobile sensor nodes face a variety of physical security threats including theft, vandalism and physical damage. Unattended mobile sensor nodes must be able to respond to these threats with control policies that facilitate escape and evasion to a low-risk state. In this work the Precision Immobilization Technique (PIT) problem has been considered. The PIT maneuver is a technique that a pursuing, car-like vehicle can use to force a fleeing vehicle to abruptly turn ninety degrees to the direction of travel. The abrupt change in direction generally causes the fleeing driver to lose control and stop. The PIT maneuver was originally developed by law enforcement to end vehicular pursuits in a manner that minimizes damage to the persons and property involved. It is easy to imagine that unattended autonomous convoys could be targets of this type of action by adversarial agents. This effort focused on developing control policies unattended mobile sensor nodes could employ to escape, evade and recover from PIT-maneuver-like attacks. The development of these control policies involved both simulation as well as small-scale experimental testing. The goal of this work is to be a step toward ensuring the physical security of unattended sensor node assets.

  2. 6 CFR 27.405 - Review and preemption of State laws and regulations.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 6 Domestic Security 1 2013-01-01 2013-01-01 false Review and preemption of State laws and regulations. 27.405 Section 27.405 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Other § 27.405 Review and preemption of State laws and...

  3. 6 CFR 27.405 - Review and preemption of State laws and regulations.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 6 Domestic Security 1 2012-01-01 2012-01-01 false Review and preemption of State laws and regulations. 27.405 Section 27.405 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Other § 27.405 Review and preemption of State laws and...

  4. 6 CFR 27.405 - Review and preemption of State laws and regulations.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 6 Domestic Security 1 2011-01-01 2011-01-01 false Review and preemption of State laws and regulations. 27.405 Section 27.405 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Other § 27.405 Review and preemption of State laws and...

  5. 6 CFR 27.405 - Review and preemption of State laws and regulations.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 6 Domestic Security 1 2014-01-01 2014-01-01 false Review and preemption of State laws and regulations. 27.405 Section 27.405 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Other § 27.405 Review and preemption of State laws and...

  6. 76 FR 9034 - Privacy Act of 1974; Department of Homeland Security United States Citizenship and Immigration...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-02-16

    ... 1974; Department of Homeland Security United States Citizenship and Immigration Services--DHS/USCIS... of Homeland Security/ United States Citizenship and Immigration Services--SORN DHS/USCIS--013 E-Verify Self Check System of Records.'' The U.S. Citizenship and Immigration Services E-Verify Self Check...

  7. 6 CFR 13.45 - Deposit in Treasury of United States.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Deposit in Treasury of United States. 13.45 Section 13.45 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY PROGRAM FRAUD CIVIL REMEDIES § 13.45 Deposit in Treasury of United States. All amounts collected pursuant to this part...

  8. 76 FR 28795 - Privacy Act of 1974; Department of Homeland Security United States Coast Guard-024 Auxiliary...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-05-18

    ... 1974; Department of Homeland Security United States Coast Guard-024 Auxiliary Database System of... Security/United States Coast Guard-024 Auxiliary Database (AUXDATA) System of Records.'' This system of... titled, ``DHS/USCG-024 Auxiliary Database (AUXDATA) System of Records.'' The AUXDATA system is the USCG's...

  9. 12 CFR 550.490 - When must I deposit securities with State authorities?

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 12 Banks and Banking 5 2011-01-01 2011-01-01 false When must I deposit securities with State authorities? 550.490 Section 550.490 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF THE TREASURY FIDUCIARY POWERS OF SAVINGS ASSOCIATIONS Depositing Securities With State Authorities § 550.490...

  10. Shared Identity and Reconciliation: Can a Future Security Framework in Northeast Asia Draw from Experiences of the North Atlantic Security Cooperation?

    DTIC Science & Technology

    2013-06-01

    the former Allies of the Second World War, several European countries, the United States of America , and Canada came together to provide for their...European countries, the United States of America , and Canada came together to provide for their security and in 1949 formed a unique security alliance, the ...European countries, the United States of America (U.S.), and Canada came together to provide for their

  11. 42 CFR 441.720 - Independent assessment.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... other information technology medium, if the following conditions are met: (A) The agent performing the... authorized under section 1115 or section 1915 of the Social Security Act. (b) Reassessments. The independent...

  12. 75 FR 28673 - Overseas Security Advisory Council (OSAC) Meeting Notice; Closed Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-05-21

    ... closed to the public. The meeting will focus on an examination of corporate security policies and... DEPARTMENT OF STATE [Public Notice 6974] Overseas Security Advisory Council (OSAC) Meeting Notice... Security Advisory Council on June 16 and 17 at the U.S. Department of State and the Boeing Company...

  13. 75 FR 6250 - Overseas Security Advisory Council (OSAC) Meeting Notice; Closed Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-02-08

    ... closed to the public. The meeting will focus on an examination of corporate security policies and... DEPARTMENT OF STATE [Public Notice 6868] Overseas Security Advisory Council (OSAC) Meeting Notice... Security Advisory Council on February 24 and 25 at the U.S. Department of State and the Boeing Company...

  14. 75 FR 23274 - Privacy Act of 1974; Department of Homeland Security United States Immigration Customs and...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-05-03

    ... is a risk of harm to economic or property interests, identity theft or fraud, or harm to the security... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS-2010-0031] Privacy Act of 1974; Department of Homeland Security United States Immigration Customs and Enforcement--011...

  15. Security printing of covert quick response codes using upconverting nanoparticle inks

    NASA Astrophysics Data System (ADS)

    Meruga, Jeevan M.; Cross, William M.; May, P. Stanley; Luu, QuocAnh; Crawford, Grant A.; Kellar, Jon J.

    2012-10-01

    Counterfeiting costs governments and private industries billions of dollars annually due to loss of value in currency and other printed items. This research involves using lanthanide doped β-NaYF4 nanoparticles for security printing applications. Inks comprised of Yb3+/Er3+ and Yb3+/Tm3+ doped β-NaYF4 nanoparticles with oleic acid as the capping agent in toluene and methyl benzoate with poly(methyl methacrylate) (PMMA) as the binding agent were used to print quick response (QR) codes. The QR codes were made using an AutoCAD file and printed with Optomec direct-write aerosol jetting®. The printed QR codes are invisible under ambient lighting conditions, but are readable using a near-IR laser, and were successfully scanned using a smart phone. This research demonstrates that QR codes, which have been used primarily for information sharing applications, can also be used for security purposes. Higher levels of security were achieved by printing both green and blue upconverting inks, based on combinations of Er3+/Yb3+ and Tm3+/Yb3+, respectively, in a single QR code. The near-infrared (NIR)-to-visible upconversion luminescence properties of the two-ink QR codes were analyzed, including the influence of NIR excitation power density on perceived color, in term of the CIE 1931 chromaticity index. It was also shown that this security ink can be optimized for line width, thickness and stability on different substrates.

  16. Security printing of covert quick response codes using upconverting nanoparticle inks.

    PubMed

    Meruga, Jeevan M; Cross, William M; Stanley May, P; Luu, QuocAnh; Crawford, Grant A; Kellar, Jon J

    2012-10-05

    Counterfeiting costs governments and private industries billions of dollars annually due to loss of value in currency and other printed items. This research involves using lanthanide doped β-NaYF(4) nanoparticles for security printing applications. Inks comprised of Yb(3+)/Er(3+) and Yb(3+)/Tm(3+) doped β-NaYF(4) nanoparticles with oleic acid as the capping agent in toluene and methyl benzoate with poly(methyl methacrylate) (PMMA) as the binding agent were used to print quick response (QR) codes. The QR codes were made using an AutoCAD file and printed with Optomec direct-write aerosol jetting(®). The printed QR codes are invisible under ambient lighting conditions, but are readable using a near-IR laser, and were successfully scanned using a smart phone. This research demonstrates that QR codes, which have been used primarily for information sharing applications, can also be used for security purposes. Higher levels of security were achieved by printing both green and blue upconverting inks, based on combinations of Er(3+)/Yb(3+) and Tm(3+)/Yb(3+), respectively, in a single QR code. The near-infrared (NIR)-to-visible upconversion luminescence properties of the two-ink QR codes were analyzed, including the influence of NIR excitation power density on perceived color, in term of the CIE 1931 chromaticity index. It was also shown that this security ink can be optimized for line width, thickness and stability on different substrates.

  17. To discuss illicit nuclear trafficking

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Balatsky, Galya I; Severe, William R; Wallace, Richard K

    2010-01-01

    The Illicit nuclear trafficking panel was conducted at the 4th Annual INMM workshop on Reducing the Risk from Radioactive and Nuclear Materials on February 2-3, 2010 in Washington DC. While the workshop occurred prior to the Nuclear Security Summit, April 12-13 2010 in Washington DC, some of the summit issues were raised during the workshop. The Communique of the Washington Nuclear Security Summit stated that 'Nuclear terrorism is one of the most challenging threats to international security, and strong nuclear security measures are the most effective means to prevent terrorists, criminals, or other unauthorized actors from acquiring nuclear materials.' Themore » Illicit Trafficking panel is one means to strengthen nuclear security and cooperation at bilateral, regional and multilateral levels. Such a panel promotes nuclear security culture through technology development, human resources development, education and training. It is a tool which stresses the importance of international cooperation and coordination of assistance to improve efforts to prevent and respond to incidents of illicit nuclear trafficking. Illicit trafficking panel included representatives from US government, an international organization (IAEA), private industry and a non-governmental organization to discuss illicit nuclear trafficking issues. The focus of discussions was on best practices and challenges for addressing illicit nuclear trafficking. Terrorism connection. Workshop discussions pointed out the identification of terrorist connections with several trafficking incidents. Several trafficking cases involved real buyers (as opposed to undercover law enforcement agents) and there have been reports identifying individuals associated with terrorist organizations as prospective plutonium buyers. Some specific groups have been identified that consistently search for materials to buy on the black market, but no criminal groups were identified that specialize in nuclear materials or isotope smuggling. In most cases, sellers do not find legitimate buyers; however, there have been specific cases where sellers did find actual terrorist group representatives. There appears to be a connection between terrorist groups engaged in trafficking conventional arms and explosives components that are also looking for both nuclear materials and radioisotopes. Sale opportunities may create additional demand for such materials. As we can observe from Figure 1, many cases in the mid-90s involved kilogram quantities of material. There were smaller amounts of material moved in 2001, 2003 and 2006. While we have seen less trafficking cases involving PujHEU in recent years, the fact that it continues at all is troubling. The trafficking cases can be presented through their life cycle: Diversion of materials leads to Trafficker and then to Terrorist/Proliferator. Most of the information we have in trafficking cases is on the Trafficker. In 16 cases reported by the IAEA, there are 10 prosecutions of the involved trafficker. However, there are no confirmed diversions of material recorded in any of the 18 seizures. Most seizures were sting operations performed by law enforcement or security agents with no actual illicit end-user involved.« less

  18. [Hand injuries in workers on the eastern shore of Marcaibo Lake in the state of Zulia, Venezuela, 1986-1993].

    PubMed

    Sirit-Urbina, Yadira; Fernández-D'Pool, Janice; Lubo-Palma, Adonías

    2002-06-01

    In order to analyze the frequency, injury rate and cause of on site accidents to the hands of workers on the east coast of lake of Maracaibo in Zulia State, data was obtained from the accident reports registered with the Venezuelan Institute of Social Security. An occupational hand injury was defined as a traumatic injury to the hands, fingers or wrists that occurred while the employee was at work; that resulted from a single exposure to a hazardous agent. The following variables were analyzed: age, severity, economic activity, material agent, mechanic cause, type of injury, type of accident and unsafe action. The frequency rate was used to analyze the annual accident rate. During the period under study 2.456 injuries to the hand were registered, representing 36% of the total injuries reported; 95% were light injuries, 5% incapacitating and two cases resulted in the death of the worker. 72% of the injuries were located in the fingers, 22% in the hands and 6% in the wrists. The greatest frequency of injuries were found in the economic activity in mines and quarries with a rate of 123.1 per thousand. The age group most affected was of 20-29 years (42%), Wounds or contusions and crushings were the injuries most commonly reported, in 39% and 36% of the cases respectively. The main type of injuries were caused by run over, running into or blow from objects. The principal agents causing injuries were materials, substances and radiations in 45% of the cases. It is concluded that the hand injury rate is very high in the exploitation of mines and quarries and represents the main cause of worker's disability.

  19. Nuclear Security Education Program at the Pennsylvania State University

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Uenlue, Kenan; The Pennsylvania State University, Department of Mechanical and Nuclear Engineering, University Park, PA 16802-2304; Jovanovic, Igor

    The availability of trained and qualified nuclear and radiation security experts worldwide has decreased as those with hands-on experience have retired while the demand for these experts and skills have increased. The U.S. Department of Energy's National Nuclear Security Administration's (NNSA) Global Threat Reduction Initiative (GTRI) has responded to the continued loss of technical and policy expertise amongst personnel and students in the security field by initiating the establishment of a Nuclear Security Education Initiative, in partnership with Pennsylvania State University (PSU), Texas A and M (TAMU), and Massachusetts Institute of Technology (MIT). This collaborative, multi-year initiative forms the basismore » of specific education programs designed to educate the next generation of personnel who plan on careers in the nonproliferation and security fields with both domestic and international focus. The three universities worked collaboratively to develop five core courses consistent with the GTRI mission, policies, and practices. These courses are the following: Global Nuclear Security Policies, Detectors and Source Technologies, Applications of Detectors/Sensors/Sources for Radiation Detection and Measurements Nuclear Security Laboratory, Threat Analysis and Assessment, and Design and Analysis of Security Systems for Nuclear and Radiological Facilities. The Pennsylvania State University (PSU) Nuclear Engineering Program is a leader in undergraduate and graduate-level nuclear engineering education in the USA. The PSU offers undergraduate and graduate programs in nuclear engineering. The PSU undergraduate program in nuclear engineering is the largest nuclear engineering programs in the USA. The PSU Radiation Science and Engineering Center (RSEC) facilities are being used for most of the nuclear security education program activities. Laboratory space and equipment was made available for this purpose. The RSEC facilities include the Penn State Breazeale Reactor (PSBR), gamma irradiation facilities (in-pool irradiator, dry irradiator, and hot cells), neutron beam laboratory, radiochemistry laboratories, and various radiation detection and measurement laboratories. A new nuclear security education laboratory was created with DOE NNSA- GTRI funds at RSEC. The nuclear security graduate level curriculum enables the PSU to educate and train future nuclear security experts, both within the United States as well as worldwide. The nuclear security education program at Penn State will grant a Master's degree in nuclear security starting fall 2015. The PSU developed two courses: Nuclear Security- Detector And Source Technologies and Nuclear Security- Applications of Detectors/Sensors/Sources for Radiation Detection and Measurements (Laboratory). Course descriptions and course topics of these courses are described briefly: - Nuclear Security - Detector and Source Technologies; - Nuclear Security - Applications of Detectors/Sensors/Sources for Radiation Detection and Measurements Laboratory.« less

  20. Chemical Stockpile Disposal Program. Transportation of Chemical Agents and Munitions. A Concept Plan.

    DTIC Science & Technology

    1987-06-30

    one of the disposal alternatives now under study by the U.S. Army for...departure, established Army procedures and Army-sponsored studies on safety and security practices and on the handling and transportation of chemical agents...Statement published by the Army in July 1986. As part of the public commentary on this document, requests were made of the Army to consider also the

  1. Libya: A Contemporary Conflict in a Failing State

    DTIC Science & Technology

    2015-03-01

    Lack of Political Dialogue ......................................................78 b. Lack of Security Sector Reform...SPLAJ Socialist People’s Libyan Arab Jamahiriya SSC Supreme Security Committee SSR Security Sector Reform STDS Special Tribunal for the Defense of... banks , and social 16 Natasha Ezrow and Erica Frantz, “Revisiting the Concept of the Failed State: Bringing the State Back In,” Third World Quarterly

  2. 12 CFR 9.14 - Deposit of securities with state authorities.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... than assets (e.g., a requirement to deposit a fixed amount or an amount equal to a percentage of... 12 Banks and Banking 1 2010-01-01 2010-01-01 false Deposit of securities with state authorities. 9... ACTIVITIES OF NATIONAL BANKS Regulations § 9.14 Deposit of securities with state authorities. (a) In general...

  3. A framework for modelling the complexities of food and water security under globalisation

    NASA Astrophysics Data System (ADS)

    Dermody, Brian J.; Sivapalan, Murugesu; Stehfest, Elke; van Vuuren, Detlef P.; Wassen, Martin J.; Bierkens, Marc F. P.; Dekker, Stefan C.

    2018-01-01

    We present a new framework for modelling the complexities of food and water security under globalisation. The framework sets out a method to capture regional and sectoral interdependencies and cross-scale feedbacks within the global food system that contribute to emergent water use patterns. The framework integrates aspects of existing models and approaches in the fields of hydrology and integrated assessment modelling. The core of the framework is a multi-agent network of city agents connected by infrastructural trade networks. Agents receive socio-economic and environmental constraint information from integrated assessment models and hydrological models respectively and simulate complex, socio-environmental dynamics that operate within those constraints. The emergent changes in food and water resources are aggregated and fed back to the original models with minimal modification of the structure of those models. It is our conviction that the framework presented can form the basis for a new wave of decision tools that capture complex socio-environmental change within our globalised world. In doing so they will contribute to illuminating pathways towards a sustainable future for humans, ecosystems and the water they share.

  4. Robust relativistic bit commitment

    NASA Astrophysics Data System (ADS)

    Chakraborty, Kaushik; Chailloux, André; Leverrier, Anthony

    2016-12-01

    Relativistic cryptography exploits the fact that no information can travel faster than the speed of light in order to obtain security guarantees that cannot be achieved from the laws of quantum mechanics alone. Recently, Lunghi et al. [Phys. Rev. Lett. 115, 030502 (2015), 10.1103/PhysRevLett.115.030502] presented a bit-commitment scheme where each party uses two agents that exchange classical information in a synchronized fashion, and that is both hiding and binding. A caveat is that the commitment time is intrinsically limited by the spatial configuration of the players, and increasing this time requires the agents to exchange messages during the whole duration of the protocol. While such a solution remains computationally attractive, its practicality is severely limited in realistic settings since all communication must remain perfectly synchronized at all times. In this work, we introduce a robust protocol for relativistic bit commitment that tolerates failures of the classical communication network. This is done by adding a third agent to both parties. Our scheme provides a quadratic improvement in terms of expected sustain time compared with the original protocol, while retaining the same level of security.

  5. Device Data Protection in Mobile Healthcare Applications

    NASA Astrophysics Data System (ADS)

    Weerasinghe, Dasun; Rajarajan, Muttukrishnan; Rakocevic, Veselin

    The rapid growth in mobile technology makes the delivery of healthcare data and services on mobile phones a reality. However, the healthcare data is very sensitive and has to be protected against unauthorized access. While most of the development work on security of mobile healthcare today focuses on the data encryption and secure authentication in remote servers, protection of data on the mobile device itself has gained very little attention. This paper analyses the requirements and the architecture for a secure mobile capsule, specially designed to protect the data that is already on the device. The capsule is a downloadable software agent with additional functionalities to enable secure external communication with healthcare service providers, network operators and other relevant communication parties.

  6. 31 CFR 285.5 - Centralized offset of Federal payments to collect nontax debts owed to the United States.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    .... 1 et seq.), the tariff laws of the United States, or the Social Security Act (42 U.S.C. 301 et seq... individual, the taxpayer identifying number is generally the individual's social security number. (c) General...) Social Security benefit payments (excluding Supplemental Security Income payments), Black Lung (part B...

  7. [Compliance with guidelines by state plans for food and nutritional security in Brazil].

    PubMed

    Machado, Mick Lennon; Gabriel, Cristine Garcia; Soar, Claudia; Mamed, Gisele Rockenbach; Machado, Patrícia Maria de Oliveira; Lacerda, Josimari Telino de; Martins, Milena Corrêa; Marcon, Maria Cristina

    2018-02-05

    A descriptive and documental study was performed from August to October 2016 to analyze compliance by state plans for food and nutritional security (PlanSAN) with the guidelines set by the Brazilian National Policy for Food and Nutritional Security (PNSAN). The state plans were accessed via the websites of the Inter-Ministerial Chamber for Food and Nutritional Security (CAISAN) or the state governments, plus complementary data collection at the state level. All the states of Brazil joined the National System for Food and Nutritional Security (SISAN), while fewer than half (13 states, 48%) had drafted their plans. Of these, 5 (38%) of the PlanSAN had schedules that coincided with the same state's pluriannual plan, 5 (38%) of the PlanSAN specified the budget requirements for meeting the proposed targets, 7 (54%) specified mechanisms for monitoring the plan, and only 2 (15%) defined methodologies for monitoring food and nutritional security. The recent existence of (and adherence to) the CAISAN appear to be related to the lack of state plans in half the states. Although most of the states that did have plans met some of the guidelines laid out by the PNSAN, these mechanisms become weak and impractical when they lack earmarked budget funds to meet their targets. Since the PNSAN is structurally inter-sectorial, the development of plans requires collective work by various government departments. Importantly, the items analyzed here are all guidelines, which implies the need for mechanisms to monitor their actual implementation.

  8. An evaluation index system of water security in China based on macroeconomic data from 2000 to 2012

    NASA Astrophysics Data System (ADS)

    Li, X. S.; Peng, Z. Y.; Li, T. T.

    2016-08-01

    This paper establishes an evaluation index system of water security. The index system employs 5 subsystems (water circulation security, water environment security, water ecology security, water society security and water economy security) and has 39 indicators. Using the AHP method, each indicator is given a relative weight to integrate within the whole system. With macroeconomic data from 2000 to 2012, a model of water security evaluation is applied to assess the state of water security in China. The results show an improving trend in the overall state of China's water security. In particular, the cycle of water security is at a high and low fluctuation. Water environment security presents an upward trend on the whole; however, this trend is unsteady and has shown a descending tendency in some years. Yet, water ecology security, water society security, and water economy security are basically on the rise. However, the degree of coordination of China's water security system remains in need of consolidation.

  9. Agent oriented programming: An overview of the framework and summary of recent research

    NASA Technical Reports Server (NTRS)

    Shoham, Yoav

    1993-01-01

    This is a short overview of the agent-oriented programming (AOP) framework. AOP can be viewed as an specialization of object-oriented programming. The state of an agent consists of components called beliefs, choices, capabilities, commitments, and possibly others; for this reason the state of an agent is called its mental state. The mental state of agents is captured formally in an extension of standard epistemic logics: beside temporalizing the knowledge and belief operators, AOP introduces operators for commitment, choice and capability. Agents are controlled by agent programs, which include primitives for communicating with other agents. In the spirit of speech-act theory, each communication primitive is of a certain type: informing, requesting, offering, etc. This document describes these features in more detail and summarizes recent results and ongoing AOP-related work.

  10. 42 CFR 420.201 - Definitions.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... claimed by the entity under any plan or program established under title V of the Social Security Act or...; or (3) A Medicaid fiscal agent. Ownership interest means the possession of equity in the capital, the...

  11. 42 CFR 420.201 - Definitions.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... claimed by the entity under any plan or program established under title V of the Social Security Act or...; or (3) A Medicaid fiscal agent. Ownership interest means the possession of equity in the capital, the...

  12. 76 FR 34299 - Securities Whistleblower Incentives and Protections

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-06-13

    ... protection strikes the appropriate balance between encouraging individuals to provide us with high-quality... Section 806 of the Sarbanes-Oxley Act have also been read to cover employees of agents or contractors of...

  13. A nonlinear merging protocol for consensus in multi-agent systems on signed and weighted graphs

    NASA Astrophysics Data System (ADS)

    Feng, Shasha; Wang, Li; Li, Yijia; Sun, Shiwen; Xia, Chengyi

    2018-01-01

    In this paper, we investigate the multi-agent consensus for networks with undirected graphs which are not connected, especially for the signed graph in which some edge weights are positive and some edges have negative weights, and the negative-weight graph whose edge weights are negative. We propose a novel nonlinear merging consensus protocol to drive the states of all agents to converge to the same state zero which is not dependent upon the initial states of agents. If the undirected graph whose edge weights are positive is connected, then the states of all agents converge to the same state more quickly when compared to most other protocols. While the undirected graph whose edge weights might be positive or negative is unconnected, the states of all agents can still converge to the same state zero under the premise that the undirected graph can be divided into several connected subgraphs with more than one node. Furthermore, we also discuss the impact of parameter r presented in our protocol. Current results can further deepen the understanding of consensus processes for multi-agent systems.

  14. NINJA: a noninvasive framework for internal computer security hardening

    NASA Astrophysics Data System (ADS)

    Allen, Thomas G.; Thomson, Steve

    2004-07-01

    Vulnerabilities are a growing problem in both the commercial and government sector. The latest vulnerability information compiled by CERT/CC, for the year ending Dec. 31, 2002 reported 4129 vulnerabilities representing a 100% increase over the 2001 [1] (the 2003 report has not been published at the time of this writing). It doesn"t take long to realize that the growth rate of vulnerabilities greatly exceeds the rate at which the vulnerabilities can be fixed. It also doesn"t take long to realize that our nation"s networks are growing less secure at an accelerating rate. As organizations become aware of vulnerabilities they may initiate efforts to resolve them, but quickly realize that the size of the remediation project is greater than their current resources can handle. In addition, many IT tools that suggest solutions to the problems in reality only address "some" of the vulnerabilities leaving the organization unsecured and back to square one in searching for solutions. This paper proposes an auditing framework called NINJA (acronym for Network Investigation Notification Joint Architecture) for noninvasive daily scanning/auditing based on common security vulnerabilities that repeatedly occur in a network environment. This framework is used for performing regular audits in order to harden an organizations security infrastructure. The framework is based on the results obtained by the Network Security Assessment Team (NSAT) which emulates adversarial computer network operations for US Air Force organizations. Auditing is the most time consuming factor involved in securing an organization's network infrastructure. The framework discussed in this paper uses existing scripting technologies to maintain a security hardened system at a defined level of performance as specified by the computer security audit team. Mobile agents which were under development at the time of this writing are used at a minimum to improve the noninvasiveness of our scans. In general, noninvasive scans with an adequate framework performed on a daily basis reduce the amount of security work load as well as the timeliness in performing remediation, as verified by the NINJA framework. A vulnerability assessment/auditing architecture based on mobile agent technology is proposed and examined at the end of the article as an enhancement to the current NINJA architecture.

  15. Privacy, confidentiality, and security in information systems of state health agencies.

    PubMed

    O'Brien, D G; Yasnoff, W A

    1999-05-01

    To assess the employment and status of privacy, confidentiality, security and fair information practices in electronic information systems of U.S. state health agencies. A survey instrument was developed and administered to key contacts within the state health agencies of each of the 50 U.S. states, Puerto Rico and the District of Columbia. About a third of U.S. state health agencies have no written policies in place regarding privacy and confidentiality in electronic information systems. The doctrines of fair information practice often seemed to be ignored. One quarter of the agencies reported at least one security breach during the past two years, and 16% experienced a privacy and confidentiality related transgression. Most of the breaches were committed by personnel from within the agencies. These results raise questions about the integrity of existing privacy, confidentiality and security measures in the information systems of U.S. state health agencies. Recommendations include the development and vigorous enforcement of written privacy and confidentiality policies, increased personnel training, and expanded implementation of security measures such as encryption and system firewalls. A discussion of the current status of U.S. privacy, confidentiality and security issues is offered.

  16. 76 FR 49494 - Privacy Act of 1974; Department of Homeland Security United States Coast Guard DHS/USCG-027...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-10

    ... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS-2011-0062] Privacy Act of 1974; Department of Homeland Security United States Coast Guard DHS/USCG-027 Recruiting Files System of... accordance with the Privacy Act of 1974 the Department of Homeland Security proposes to update and reissue an...

  17. Fluorescent sensors for the detection of chemical warfare agents.

    PubMed

    Burnworth, Mark; Rowan, Stuart J; Weder, Christoph

    2007-01-01

    Along with biological and nuclear threats, chemical warfare agents are some of the most feared weapons of mass destruction. Compared to nuclear weapons they are relatively easy to access and deploy, which makes them in some aspects a greater threat to national and global security. A particularly hazardous class of chemical warfare agents are the nerve agents. Their rapid and severe effects on human health originate in their ability to block the function of acetylcholinesterase, an enzyme that is vital to the central nervous system. This article outlines recent activities regarding the development of molecular sensors that can visualize the presence of nerve agents (and related pesticides) through changes of their fluorescence properties. Three different sensing principles are discussed: enzyme-based sensors, chemically reactive sensors, and supramolecular sensors. Typical examples are presented for each class and different fluorescent sensors for the detection of chemical warfare agents are summarized and compared.

  18. Computerized bioterrorism education and training for nurses on bioterrorism attack agents.

    PubMed

    Nyamathi, Adeline M; Casillas, Adrian; King, Major L; Gresham, Louise; Pierce, Elaine; Farb, Daniel; Wiechmann, Carrie; Weichmann, Carrie

    2010-08-01

    Biological agents have the ability to cause large-scale mass casualties. For this reason, their likely use in future terrorist attacks is a concern for national security. Recent studies show that nurses are ill prepared to deal with agents used in biological warfare. Achieving a goal for bioterrorism preparedness is directly linked to comprehensive education and training that enables first-line responders such as nurses to diagnose infectious agents rapidly. The study evaluated participants' responses to biological agents using a computerized bioterrorism education and training program versus a standard bioterrorism education and training program. Both programs improved participants' ability to complete and solve case studies involving the identification of specific biological agents. Participants in the computerized bioterrorism education and training program were more likely to solve the cases critically without reliance on expert consultants. However, participants in the standard bioterrorism education and training program reduced the use of unnecessary diagnostic tests.

  19. BTFS: The Border Trade Facilitation System

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Phillips, L.R.

    The author demonstrates the Border Trade Facilitation System (BTFS), an agent-based bilingual e-commerce system built to expedite the regulation, control, and execution of commercial trans-border shipments during the delivery phase. The system was built to serve maquila industries at the US/Mexican border. The BTFS uses foundation technology developed here at Sandia Laboratories' Advanced Information Systems Lab (AISL), including a distributed object substrate, a general-purpose agent development framework, dynamically generated agent-human interaction via the World-Wide Web, and a collaborative agent architecture. This technology is also the substrate for the Multi-Agent Simulation Management System (MASMAS) proposed for demonstration at this conference. Themore » BTFS executes authenticated transactions among agents performing open trading over the Internet. With the BTFS in place, one could conduct secure international transactions from any site with an Internet connection and a web browser. The BTFS is currently being evaluated for commercialization.« less

  20. Complex dynamics of a nonlinear voter model with contrarian agents

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Tanabe, Shoma; Masuda, Naoki, E-mail: masuda@mist.i.u-tokyo.ac.jp

    2013-12-15

    We investigate mean-field dynamics of a nonlinear opinion formation model with congregator and contrarian agents. Each agent assumes one of the two possible states. Congregators imitate the state of other agents with a rate that increases with the number of other agents in the opposite state, as in the linear voter model and nonlinear majority voting models. Contrarians flip the state with a rate that increases with the number of other agents in the same state. The nonlinearity controls the strength of the majority voting and is used as a main bifurcation parameter. We show that the model undergoes amore » rich bifurcation scenario comprising the egalitarian equilibrium, two symmetric lopsided equilibria, limit cycle, and coexistence of different types of stable equilibria with intertwining attractive basins.« less

  1. Hybrid evolutionary computing model for mobile agents of wireless Internet multimedia

    NASA Astrophysics Data System (ADS)

    Hortos, William S.

    2001-03-01

    The ecosystem is used as an evolutionary paradigm of natural laws for the distributed information retrieval via mobile agents to allow the computational load to be added to server nodes of wireless networks, while reducing the traffic on communication links. Based on the Food Web model, a set of computational rules of natural balance form the outer stage to control the evolution of mobile agents providing multimedia services with a wireless Internet protocol WIP. The evolutionary model shows how mobile agents should behave with the WIP, in particular, how mobile agents can cooperate, compete and learn from each other, based on an underlying competition for radio network resources to establish the wireless connections to support the quality of service QoS of user requests. Mobile agents are also allowed to clone themselves, propagate and communicate with other agents. A two-layer model is proposed for agent evolution: the outer layer is based on the law of natural balancing, the inner layer is based on a discrete version of a Kohonen self-organizing feature map SOFM to distribute network resources to meet QoS requirements. The former is embedded in the higher OSI layers of the WIP, while the latter is used in the resource management procedures of Layer 2 and 3 of the protocol. Algorithms for the distributed computation of mobile agent evolutionary behavior are developed by adding a learning state to the agent evolution state diagram. When an agent is in an indeterminate state, it can communicate to other agents. Computing models can be replicated from other agents. Then the agents transitions to the mutating state to wait for a new information-retrieval goal. When a wireless terminal or station lacks a network resource, an agent in the suspending state can change its policy to submit to the environment before it transitions to the searching state. The agents learn the facts of agent state information entered into an external database. In the cloning process, two agents on a host station sharing a common goal can be merged or married to compose a new agent. Application of the two-layer set of algorithms for mobile agent evolution, performed in a distributed processing environment, is made to the QoS management functions of the IP multimedia IM sub-network of the third generation 3G Wideband Code-division Multiple Access W-CDMA wireless network.

  2. Confirmatory Test of the Irritant Gas Disperser, Helicopter- or Vehicle- Mounted, M5

    DTIC Science & Technology

    1962-07-23

    disperser consists of four major assemblies: An agent-container assembly, a pressure - group assembly, a support assembly, and a throat assembly. (1) The...base. (2) The pressure - group assembly consists of two steel high-pressure tanks, secured by steel band clamps to the pressure - group support assembly...aluminum alloy tubing welded together to provide a support for the agent-container assembly and the pressure - group assembly. Each of these separate

  3. Formation of Ozonic Compound and Used as Therapeutic Agent in Medicine

    NASA Astrophysics Data System (ADS)

    Zhu, Lei; Ye, Chunyong; Min, Xinmin

    2018-03-01

    It has some encouraging results to use ozone in medicine. However, as ozone is usually in gas state, unstable and strong oxidability, it is difficult to be stored and used commonly. Ozone, ethylene, acrylic acid and the ozonic compounds were calculated to study the interaction between ozone and carrier material to form ozonide. The stability of the ozonide, or the bond strength between ozone and ions of carrier are controlled felicitously to release ozone from the ozonide with proper velocity. Ozone antimicrobial has been composed on the above principle. It can be used conveniently, especially for common families. There are some characteristics of ozone antimicrobial or ozone, such as universal applicability, efficiency and rapidity, security, strong penetrability, no drug resistance and sterilization and treatment simultaneity.

  4. 28 CFR 20.24 - State laws on privacy and security.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... Local Criminal History Record Information Systems § 20.24 State laws on privacy and security. Where a State originating criminal history record information provides for sealing or purging thereof, nothing...

  5. 28 CFR 20.24 - State laws on privacy and security.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... Local Criminal History Record Information Systems § 20.24 State laws on privacy and security. Where a State originating criminal history record information provides for sealing or purging thereof, nothing...

  6. 28 CFR 20.24 - State laws on privacy and security.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... Local Criminal History Record Information Systems § 20.24 State laws on privacy and security. Where a State originating criminal history record information provides for sealing or purging thereof, nothing...

  7. 28 CFR 20.24 - State laws on privacy and security.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... Local Criminal History Record Information Systems § 20.24 State laws on privacy and security. Where a State originating criminal history record information provides for sealing or purging thereof, nothing...

  8. 28 CFR 20.24 - State laws on privacy and security.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... Local Criminal History Record Information Systems § 20.24 State laws on privacy and security. Where a State originating criminal history record information provides for sealing or purging thereof, nothing...

  9. 77 FR 65048 - Privacy Act; System of Records: Personal Property Claims, State-27

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-10-24

    ... cyber security awareness training which covers the procedures for handling Sensitive but Unclassified... Property Claims. SECURITY CLASSIFICATION: Unclassified. SYSTEM LOCATION: Department of State, SA-3, Suite... which can include information such as names, birthdates, social security numbers (SSNs), employee IDs...

  10. 10 CFR 1015.210 - Liquidation of collateral.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... States. Collection from other sources, including liquidation of security or collateral, is not a... Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) COLLECTION OF CLAIMS OWED THE UNITED STATES Standards... liquidate security or collateral through the exercise of a power of sale in the security instrument or a...

  11. 78 FR 27276 - Privacy Act; System of Records: Security Records, State-36

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-05-09

    ... records maintained in State-36, Security Records, capture data related to incidents and threats affecting..., or witnesses associated with investigations into possible unlawful activity conducted by the Bureau... Security; individuals subject to investigations conducted on behalf of other Federal agencies; and...

  12. 77 FR 66862 - Agency Information Collection Activities: Extension, Without Change, of an Existing Information...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-11-07

    ... DEPARTMENT OF HOMELAND SECURITY United States Immigration and Customs Enforcement Agency... Department of Homeland Security, U.S. Immigration and Customs Enforcement (ICE), will submit the following... United States Immigration and Customs Enforcement, Department of Homeland Security, and sent via...

  13. Security of quantum key distribution with multiphoton components

    PubMed Central

    Yin, Hua-Lei; Fu, Yao; Mao, Yingqiu; Chen, Zeng-Bing

    2016-01-01

    Most qubit-based quantum key distribution (QKD) protocols extract the secure key merely from single-photon component of the attenuated lasers. However, with the Scarani-Acin-Ribordy-Gisin 2004 (SARG04) QKD protocol, the unconditionally secure key can be extracted from the two-photon component by modifying the classical post-processing procedure in the BB84 protocol. Employing the merits of SARG04 QKD protocol and six-state preparation, one can extract secure key from the components of single photon up to four photons. In this paper, we provide the exact relations between the secure key rate and the bit error rate in a six-state SARG04 protocol with single-photon, two-photon, three-photon, and four-photon sources. By restricting the mutual information between the phase error and bit error, we obtain a higher secure bit error rate threshold of the multiphoton components than previous works. Besides, we compare the performances of the six-state SARG04 with other prepare-and-measure QKD protocols using decoy states. PMID:27383014

  14. 49 CFR 580.3 - Definitions.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... whom ownership of a motor vehicle is transferred, by purchase, gift, or any means other than by the..., gift, or any means other than by the creation of a security interest, and any person who, as agent...

  15. Effects of Manipulation on Attributions of Causation, Free Will, and Moral Responsibility.

    PubMed

    Murray, Dylan; Lombrozo, Tania

    2017-03-01

    If someone brings about an outcome without intending to, is she causally and morally responsible for it? What if she acts intentionally, but as the result of manipulation by another agent? Previous research has shown that an agent's mental states can affect attributions of causal and moral responsibility to that agent, but little is known about what effect one agent's mental states can have on attributions to another agent. In Experiment 1, we replicate findings that manipulation lowers attributions of responsibility to manipulated agents. Experiments 2-7 isolate which features of manipulation drive this effect, a crucial issue for both philosophical debates about free will and attributions of responsibility in situations involving social influence more generally. Our results suggest that "bypassing" a manipulated agent's mental states generates the greatest reduction in responsibility, and we explain our results in terms of the effects that one agent's mental states can have on the counterfactual relations between another agent and an outcome. Copyright © 2016 Cognitive Science Society, Inc.

  16. 6 CFR 37.59 - DHS reviews of State compliance.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 37.59 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY REAL ID DRIVER'S... compliance. State REAL ID programs will be subject to DHS review to determine whether the State meets the... review of the State's compliance at any time. In addition, the State must: (1) Provide any reasonable...

  17. 6 CFR 37.59 - DHS reviews of State compliance.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 37.59 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY REAL ID DRIVER'S... compliance. State REAL ID programs will be subject to DHS review to determine whether the State meets the... review of the State's compliance at any time. In addition, the State must: (1) Provide any reasonable...

  18. Biodefense research: can secrecy and safety coexist?

    PubMed

    Kahn, Laura H

    2004-01-01

    Over the next 10 years, the United States will spend 6 billion US dollars to develop countermeasures against biological and chemical weapons. Much of this research on highly virulent pathogens will be done in academic settings around the country. This article explores the challenges in ensuring secrecy to protect national security while accommodating the right of local communities to have access to safety information regarding select agents and laboratory-acquired infections. Secrecy has been defended as being vital for protecting national security. Problems with secrecy can include the misinterpretation of intentions, particularly in laboratories located in nuclear weapons design facilities, and the restricted access to information relevant to public health and safety. While federal select agent legislation requires laboratories to have emergency plans in place with first responders, these plans do not necessarily include public health professionals, who will be responsible for any future public health action, such as quarantine, surveillance, or mass vaccinations, in the unlikely event that a laboratory-acquired infection spreads into a community. Laboratory-acquired infections do occur, even with the best safety mechanisms in place; however, the epidemiology of the incidence and severity of these infections are not known since there is no national surveillance reporting system. Evidence suggests that many of these infections occur in the absence of an actual laboratory accident. The best emergency plans and surveillance systems are only as good as the participation and vigilance of the laboratory workers themselves. Thus, laboratory workers have a responsibility to themselves and others to report all laboratory accidents and spills, regardless how minor. In addition, they should have a lower threshold than normal in seeking medical attention when feeling ill, and their physicians should be aware of what pathogens they work with to reduce the risk of a delay in diagnosis.

  19. 45 CFR 95.621 - ADP reviews.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... use; (C) Software and data security; (D) Telecommunications security; (E) Personnel security; (F... Federal review. (f) ADP System Security Requirements and Review Process—(1) ADP System Security Requirement. State agencies are responsible for the security of all ADP projects under development, and...

  20. 78 FR 25324 - Proposed Collection; Comment Request

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-04-30

    ... rules governing offers and sales of securities made outside the United States without registration under... 5 of the Securities Act applies to offers and sales of securities outside of the United States...) Whether this collection of information is necessary for the proper performance of the functions of the...

  1. 12 CFR 550.320 - What is acceptable collateral for uninsured deposits?

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ...) Readily marketable securities of the classes in which State-chartered corporate fiduciaries are permitted to invest fiduciary funds under applicable State law. (c) Other readily marketable securities as the OTS may determine. (d) Surety bonds, to the extent they provide adequate security, unless prohibited...

  2. 12 CFR 550.320 - What is acceptable collateral for uninsured deposits?

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ...) Readily marketable securities of the classes in which State-chartered corporate fiduciaries are permitted to invest fiduciary funds under applicable State law. (c) Other readily marketable securities as the OTS may determine. (d) Surety bonds, to the extent they provide adequate security, unless prohibited...

  3. 12 CFR 150.320 - What is acceptable collateral for uninsured deposits?

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ...) Readily marketable securities of the classes in which state-chartered corporate fiduciaries are permitted to invest fiduciary funds under applicable state law. (c) Other readily marketable securities as the OCC may determine. (d) Surety bonds, to the extent they provide adequate security, unless prohibited...

  4. 12 CFR 550.320 - What is acceptable collateral for uninsured deposits?

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ...) Readily marketable securities of the classes in which State-chartered corporate fiduciaries are permitted to invest fiduciary funds under applicable State law. (c) Other readily marketable securities as the OTS may determine. (d) Surety bonds, to the extent they provide adequate security, unless prohibited...

  5. 12 CFR 150.320 - What is acceptable collateral for uninsured deposits?

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ...) Readily marketable securities of the classes in which state-chartered corporate fiduciaries are permitted to invest fiduciary funds under applicable state law. (c) Other readily marketable securities as the OCC may determine. (d) Surety bonds, to the extent they provide adequate security, unless prohibited...

  6. 12 CFR 550.320 - What is acceptable collateral for uninsured deposits?

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ...) Readily marketable securities of the classes in which State-chartered corporate fiduciaries are permitted to invest fiduciary funds under applicable State law. (c) Other readily marketable securities as the OTS may determine. (d) Surety bonds, to the extent they provide adequate security, unless prohibited...

  7. Caribbean and Eastern Pacific Maritime Security: Regional Cooperation in Bridge and Insular States

    DTIC Science & Technology

    The international cocaine market has transformed the Caribbean Basin into the most violent region in the world. Against the onslaught of drugs and... violence , interstate security cooperation and intelligence sharing are increasingly prominent features of state security strategies. The evolution of

  8. 75 FR 15991 - Designation of Greece for the Visa Waiver Program

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-03-31

    ... of Homeland Security, in consultation with the Secretary of State, designated Greece as a country... Security, Office of Policy, (202) 282-8732. SUPPLEMENTARY INFORMATION: I. Background A. The Visa Waiver... of Homeland Security (the Secretary), in consultation with the Secretary of State, may designate...

  9. Multi-Agent Strategic Modeling in a Specific Environment

    NASA Astrophysics Data System (ADS)

    Gams, Matjaz; Bezek, Andraz

    Multi-agent modeling in ambient intelligence (AmI) is concerned with the following task [19]: How can external observations of multi-agent systems in the ambient be used to analyze, model, and direct agent behavior? The main purpose is to obtain knowledge about acts in the environment thus enabling proper actions of the AmI systems [1]. Analysis of such systems must thus capture complex world state representation and asynchronous agent activities. Instead of studying basic numerical data, researchers often use more complex data structures, such as rules and decision trees. Some methods are extremely useful when characterizing state space, but lack the ability to clearly represent temporal state changes occurred by agent actions. To comprehend simultaneous agent actions and complex changes of state space, most often a combination of graphical and symbolical representation performs better in terms of human understanding and performance.

  10. A U.S. Biodefense Strategy Primer

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Poulin, D

    2009-05-11

    The anthrax mailings that followed the attacks of September 11, 2001 highlighted the need for a comprehensive national strategy to prevent, prepare for, respond to, and mitigate the effects of biological attacks. The goal of U.S. biodefense strategy is to reduce the likelihood of a future biological event, improve overall U.S. public health security, and minimize the economic and social disruption of a biological incident. Presidential communications, federal legislation, and executive agency planning documents provide the foundation for this strategy. Central to current U.S. biodefense strategy is the 2004 Homeland Security Presidential Directive (HSPD) 10, Biodefense for the 21st Century,more » which states that ''the United States will use all means necessary to prevent, protect against, and mitigate biological weapons attacks perpetrated against our homeland and our global interests.'' HSPD-10 also sets forth four pillars of U.S. biodefense: {sm_bullet} Threat awareness includes timely, accurate, and relevant intelligence, threat assessment, and the anticipation of future threats. {sm_bullet} Prevention and protection involve continuing and expanding efforts to limit access to agents, technologies, and knowledge to certain groups and countries as well as protecting critical infrastructure from the effects of biological attacks. {sm_bullet} Surveillance and detection provide early warning or recognition of biological attacks to permit a timely response and mitigation of consequences as well as attribution. {sm_bullet} Response and recovery include pre-attack planning and preparedness, capabilities to treat casualties, risk communications, physical control measures, medical countermeasures, and decontamination capabilities.« less

  11. Effect of quantum noise on deterministic joint remote state preparation of a qubit state via a GHZ channel

    NASA Astrophysics Data System (ADS)

    Wang, Ming-Ming; Qu, Zhi-Guo

    2016-11-01

    Quantum secure communication brings a new direction for information security. As an important component of quantum secure communication, deterministic joint remote state preparation (DJRSP) could securely transmit a quantum state with 100 % success probability. In this paper, we study how the efficiency of DJRSP is affected when qubits involved in the protocol are subjected to noise or decoherence. Taking a GHZ-based DJRSP scheme as an example, we study all types of noise usually encountered in real-world implementations of quantum communication protocols, i.e., the bit-flip, phase-flip (phase-damping), depolarizing and amplitude-damping noise. Our study shows that the fidelity of the output state depends on the phase factor, the amplitude factor and the noise parameter in the bit-flip noise, while the fidelity only depends on the amplitude factor and the noise parameter in the other three types of noise. And the receiver will get different output states depending on the first preparer's measurement result in the amplitude-damping noise. Our results will be helpful for improving quantum secure communication in real implementation.

  12. Challenge and Response: Anticipating US Military Security Concerns

    DTIC Science & Technology

    1994-08-01

    in the U.S. And the Russian Orthodox Church may emerge as another such political force as was evidenced by its mediative role in the turbulent days...objectives (ends) and public opinion. Recall the turmoil in the United States during the Vietnam War and how 471 internal politics affected the...ABSTRACT 15. SUBJECT TERMS Military planning - United States; National Security - United States; World politics - 1989 - 16. SECURITY CLASSIFICATION OF

  13. Assessing the Effectiveness of Cumulative Sum Normal- and Poisson-Based Tests for Detecting Rare Diseases

    DTIC Science & Technology

    2010-12-01

    The Francisella tularensis is one of these and is the causal agent of the tularemia disease. Tularemia is used as the motivating problem to evaluate...PAGES 79 14. SUBJECT TERMS Biosurveillance, Rare Disease, Tularemia , Cumulative Sum, CUSUM 16. PRICE CODE 17. SECURITY CLASSIFICATION OF REPORT...is one of these, and is the causal agent of the tularemia disease. Tularemia is used as the motivating problem to evaluate and compare the

  14. 20 CFR 404.1018b - Medicare qualified government employment.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ....1018b Section 404.1018b Employees' Benefits SOCIAL SECURITY ADMINISTRATION FEDERAL OLD-AGE, SURVIVORS... Federal, State, or local government employee not otherwise subject to Social Security coverage may... Security Act, except for the fact that the service was performed by a Federal, State or local government...

  15. 49 CFR 659.23 - System security plan: contents.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 49 Transportation 7 2014-10-01 2014-10-01 false System security plan: contents. 659.23 Section 659.23 Transportation Other Regulations Relating to Transportation (Continued) FEDERAL TRANSIT ADMINISTRATION, DEPARTMENT OF TRANSPORTATION RAIL FIXED GUIDEWAY SYSTEMS; STATE SAFETY OVERSIGHT Role of the State Oversight Agency § 659.23 System security...

  16. 75 FR 51854 - Privacy Act of 1974: Systems of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-08-23

    ... schedules of the United States Securities and Exchange Commission and as approved by the National Archives... of Trading and Markets, U.S. Securities and Exchange Commission, 100 F Street, NE., Washington, DC... schedules of the United States Securities and Exchange Commission and as approved by the National Archives...

  17. 76 FR 6596 - Submission for OMB Review; Comment Request

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-02-07

    .... The Food Security Act of 1985 permits the states to establish ``central filing systems.'' These... in section 1324 of the Food Security Act of 1985. The information received from the State is... responsibility for the Clear Title Program (Section 1324 of the Food Security Act of 1985. Clear Title Program...

  18. 78 FR 9768 - Bureau of International Security and Nonproliferation Imposition of Missile Sanctions on Two...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-02-11

    ... DEPARTMENT OF STATE [Public Notice 8183] Bureau of International Security and Nonproliferation Imposition of Missile Sanctions on Two Chinese Foreign Persons AGENCY: Bureau of International Security and Nonproliferation, Department of State. ACTION: Notice. SUMMARY: A determination has been made that two foreign...

  19. 75 FR 10633 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security United States...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-03-09

    ... of 1974: Implementation of Exemptions; Department of Homeland Security United States Immigration and Customs Enforcement-- 011 Immigration and Enforcement Operational Records System of Records AGENCY... rule to amend its regulations to exempt portions of a Department of Homeland Security/U.S. Immigration...

  20. Re-designing the PhEDEx Security Model

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Huang, C.-H.; Wildish, T.; Zhang, X.

    2014-01-01

    PhEDEx, the data-placement tool used by the CMS experiment at the LHC, was conceived in a more trusting time. The security model provided a safe environment for site agents and operators, but offerred little more protection than that. Data was not sufficiently protected against loss caused by operator error or software bugs or by deliberate manipulation of the database. Operators were given high levels of access to the database, beyond what was actually needed to accomplish their tasks. This exposed them to the risk of suspicion should an incident occur. Multiple implementations of the security model led to difficulties maintainingmore » code, which can lead to degredation of security over time. In order to meet the simultaneous goals of protecting CMS data, protecting the operators from undue exposure to risk, increasing monitoring capabilities and improving maintainability of the security model, the PhEDEx security model was redesigned and re-implemented. Security was moved from the application layer into the database itself, fine-grained access roles were established, and tools and procedures created to control the evolution of the security model over time. In this paper we describe this work, we describe the deployment of the new security model, and we show how these enhancements improve security on several fronts simultaneously.« less

Top