Science.gov

Sample records for state security

  1. Asean States Security: Resilience through Security Cooperation

    DTIC Science & Technology

    1989-03-01

    New Zealand , the United States, and the United Nations Development Program. ASEAN now repre- sents a market of well over $70 billion, providing a ready...Brunei, have close mili- tary links with the Commonwealth countries--namely Australia, New Zealand , and the United Kingdom. The Philippines and Thailand... New Zealand , Australia, and the United Kingdom. Furthermore, the RMAF is planning to purchase a new generation fighter aircraft as well as a surface-to

  2. Bioethics and the national security state.

    PubMed

    Moreno, Jonathan D

    2004-01-01

    In previous work, I have described the history and ethics of human experiments for national security purposes during he cold war and developed the bioethical issues that will be apparent in the "war on terror". This paper is an attempt to bring these two previous lines of work together under the rubric of the "national security state," a concept familiar to Cold War historians and political scientists. The founding of the national security state was associated with the first articulations of informed consent requirements by national security agencies. My analysis indicates that strengthened consent standards, though conventionally thought to be antithetical crisis, can be seen as an attempt by the postwar national security state to protect itself from critics of expanded governmental power. During the coming years the renewed mission of the national security state in the war on terror should impel students of bioethics to consider its implications for the field.

  3. Secure communication using mesoscopic coherent states.

    PubMed

    Barbosa, Geraldo A; Corndorf, Eric; Kumar, Prem; Yuen, Horace P

    2003-06-06

    We demonstrate theoretically and experimentally that secure communication using intermediate-energy (mesoscopic) coherent states is possible. Our scheme is different from previous quantum cryptographic schemes in that a short secret key is explicitly used and in which quantum noise hides both the bit and the key. This encryption scheme allows optical amplification. New avenues are open to secure communications at high speeds in fiber-optic or free-space channels.

  4. Water security - Nation state and international security implications

    USGS Publications Warehouse

    Tindall, James A.; Andrew A. Campbell,

    2009-01-01

    A terrorist attack such as poisoning and sabotage of the national water supply and water-quality infrastructure of the continental United States or any country, could disrupt the delivery of vital human services, threaten both public health and the environment, potentially cause mass casualties and pose grave public concern for homeland security. Most significantly, an attack on water resources would weaken social cohesion and trust in government. A threat to continuity of services is a potential threat to continuity of government since both are necessary for continuity of operations. Water infrastructure is difficult to protect, as it extends over vast areas across the U.S. and for which ownership is overwhelmingly nonfederal (approximately 85 percent). Since the 9111 attacks, federal dam operators and water and wastewater utilities have established counter measures. Similar measures have been taken in countries around the world. These include enhanced physical security, improved coordination between corporate ownership, Department of Homeland Security, and local law enforcement, and research into risk assessment and vulnerability analysis to ensure greater system safety. A key issue is the proportionate additional resources directed at public and private sector specific priorities. Agencies that have the scientific and technological ability to leverage resources, exploit integrated science approaches, focus on interdisciplinary practices, utilize informatics expertise and employ a wide use of evolving technologies should play a key role in water security and related issues.

  5. Weak States and Security Assistance

    DTIC Science & Technology

    2010-06-01

    and El Salvador hosts a regional peacekeeping institute attracting military personnel from countries throughout the Western Hemisphere. This approach...fy2010_SSJ.pdf>. 14 Bill Daly , “Building Global Partnerships,” U.S. Naval Institute Proceedings (April 2007), 44–47. 15 Department of State, “Foreign

  6. Realities and Choices: Helping States Enhance Family Economic Security.

    ERIC Educational Resources Information Center

    Venner, Sandra

    This document, which is designed to help state administrators and legislators formulate policies enhancing family economic security, summarizes research findings regarding barriers to economic self-sufficiency and policies used by various states to improve poor family's available work opportunities and economic security. Discussed in the…

  7. State Security Breach Response Laws: State-by-State Summary Table. Using Data to Improve Education: A Legal Reference Guide to Protecting Student Privacy and Data Security

    ERIC Educational Resources Information Center

    Data Quality Campaign, 2011

    2011-01-01

    Under security breach response laws, businesses--and sometimes state and governmental agencies--are required to inform individuals when the security, confidentiality or integrity of their personal information has been compromised. This resource provides a state-by-state analysis of security breach response laws. [The Data Quality Campaign has…

  8. Nuclear Security Education Program at the Pennsylvania State University

    SciTech Connect

    Uenlue, Kenan; Jovanovic, Igor

    2015-07-01

    The availability of trained and qualified nuclear and radiation security experts worldwide has decreased as those with hands-on experience have retired while the demand for these experts and skills have increased. The U.S. Department of Energy's National Nuclear Security Administration's (NNSA) Global Threat Reduction Initiative (GTRI) has responded to the continued loss of technical and policy expertise amongst personnel and students in the security field by initiating the establishment of a Nuclear Security Education Initiative, in partnership with Pennsylvania State University (PSU), Texas A and M (TAMU), and Massachusetts Institute of Technology (MIT). This collaborative, multi-year initiative forms the basis of specific education programs designed to educate the next generation of personnel who plan on careers in the nonproliferation and security fields with both domestic and international focus. The three universities worked collaboratively to develop five core courses consistent with the GTRI mission, policies, and practices. These courses are the following: Global Nuclear Security Policies, Detectors and Source Technologies, Applications of Detectors/Sensors/Sources for Radiation Detection and Measurements Nuclear Security Laboratory, Threat Analysis and Assessment, and Design and Analysis of Security Systems for Nuclear and Radiological Facilities. The Pennsylvania State University (PSU) Nuclear Engineering Program is a leader in undergraduate and graduate-level nuclear engineering education in the USA. The PSU offers undergraduate and graduate programs in nuclear engineering. The PSU undergraduate program in nuclear engineering is the largest nuclear engineering programs in the USA. The PSU Radiation Science and Engineering Center (RSEC) facilities are being used for most of the nuclear security education program activities. Laboratory space and equipment was made available for this purpose. The RSEC facilities include the Penn State Breazeale Reactor

  9. Securing the United States' power infrastructure

    SciTech Connect

    Happenny, Sean F.

    2015-08-01

    The United States’ power infrastructure is aging, underfunded, and vulnerable to cyber attack. Emerging smart grid technologies may take some of the burden off of existing systems and make the grid as a whole more efficient, reliable, and secure. The Pacific Northwest National Laboratory (PNNL) is funding research into several aspects of smart grid technology and grid security, creating a software simulation tool that will allow researchers to test power distribution networks utilizing different smart grid technologies to determine how the grid and these technologies react under different circumstances. Demonstrating security in embedded systems is another research area PNNL is tackling. Many of the systems controlling the U.S. critical infrastructure, such as the power grid, lack integrated security and the networks protecting them are becoming easier to breach. Providing a virtual power substation network to each student team at the National Collegiate Cyber Defense Competition, thereby supporting the education of future cyber security professionals, is another way PNNL is helping to strengthen the security of the nation’s power infrastructure.

  10. How Nation-States Craft National Security Strategy Documents

    DTIC Science & Technology

    2012-10-01

    Africa, Sir David Omand in the United Kingdom, and in the United States, former National Security Advisor Steve Hadley provided time that he did not have...officials, Major General John Cantwell and Ms. Maria Fernandez, individually responsible for force structure, information technol- ogy, and human...about the need for an NSS.179 Speaking at the annual DEMOS security lec- ture in December 2006, Sir David Omand, former UK Security and Intelligence

  11. Neuroscience, Ethics, and National Security: The State of the Art

    PubMed Central

    Tennison, Michael N.; Moreno, Jonathan D.

    2012-01-01

    National security organizations in the United States, including the armed services and the intelligence community, have developed a close relationship with the scientific establishment. The latest technology often fuels warfighting and counter-intelligence capacities, providing the tactical advantages thought necessary to maintain geopolitical dominance and national security. Neuroscience has emerged as a prominent focus within this milieu, annually receiving hundreds of millions of Department of Defense dollars. Its role in national security operations raises ethical issues that need to be addressed to ensure the pragmatic synthesis of ethical accountability and national security. PMID:22448146

  12. Neuroscience, ethics, and national security: the state of the art.

    PubMed

    Tennison, Michael N; Moreno, Jonathan D

    2012-01-01

    National security organizations in the United States, including the armed services and the intelligence community, have developed a close relationship with the scientific establishment. The latest technology often fuels warfighting and counter-intelligence capacities, providing the tactical advantages thought necessary to maintain geopolitical dominance and national security. Neuroscience has emerged as a prominent focus within this milieu, annually receiving hundreds of millions of Department of Defense dollars. Its role in national security operations raises ethical issues that need to be addressed to ensure the pragmatic synthesis of ethical accountability and national security.

  13. Attachment and culture. Security in the United States and Japan.

    PubMed

    Rothbaum, F; Weisz, J; Pott, M; Miyake, K; Morelli, G

    2000-10-01

    Attachment theorists maintain that cultural differences are relatively minor, and they focus on universals. Here the authors highlight evidence of cultural variations and note ways in which attachment theory is laden with Western values and meaning. Comparisons of the United States and Japan highlight the cultural relativity of 3 core hypotheses of attachment theory: that caregiver sensitivity leads to secure attachment, that secure attachment leads to later social competence, and that children who are securely attached use the primary caregiver as a secure base for exploring the external world. Attachment theorists use measures of sensitivity, competence, and secure base that are biased toward Western ways of thinking: The measures emphasize the child's autonomy, individuation, and exploration. In Japan, sensitivity, competence, and secure base are viewed very differently, calling into question the universality of fundamental tenets of attachment theory. The authors call for an indigenous approach to the psychology of attachment.

  14. 76 FR 9034 - Privacy Act of 1974; Department of Homeland Security United States Citizenship and Immigration...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-02-16

    ... Security (DHS) United States Citizenship and Immigration Services (USCIS) proposes to establish a new DHS... SECURITY Office of the Secretary Privacy Act of 1974; Department of Homeland Security United States... Security system of records titled, ``Department of Homeland Security/ United States Citizenship...

  15. A secure quantum group signature scheme based on Bell states

    NASA Astrophysics Data System (ADS)

    Zhang, Kejia; Song, Tingting; Zuo, Huijuan; Zhang, Weiwei

    2013-04-01

    In this paper, we propose a new secure quantum group signature with Bell states, which may have applications in e-payment system, e-government, e-business, etc. Compared with the recent quantum group signature protocols, our scheme is focused on the most general situation in practice, i.e. only the arbitrator is trusted and no intermediate information needs to be stored in the signing phase to ensure the security. Furthermore, our scheme has achieved all the characteristics of group signature—anonymity, verifiability, traceability, unforgetability and undeniability, by using some current developed quantum and classical technologies. Finally, a feasible security analysis model for quantum group signature is presented.

  16. Prevalence of Perceived Food and Housing Security - 15 States, 2013.

    PubMed

    Njai, Rashid; Siegel, Paul; Yin, Shaoman; Liao, Youlian

    2017-01-13

    Recent global (1) and national (2,3) health equity initiatives conclude that the elimination of health disparities requires improved understanding of social context (4,5) and ability to measure social determinants of health, including food and housing security (3). Food and housing security reflect the availability of and access to essential resources needed to lead a healthy life. The 2013 Behavioral Risk Factor Surveillance System (BRFSS) included two questions to assess perceived food and housing security in 15 states.* Among 95,665 respondents, the proportion who answered "never or rarely" to the question "how often in the past 12 months would you say you were worried or stressed about having enough money to buy nutritious meals?" ranged from 68.5% to 82.4% by state. Among 90,291 respondents living in housing they either owned or rented, the proportion who answered "never or rarely" to the question, "how often in the past 12 months would you say you were worried or stressed about having enough money to pay your rent/mortgage?" ranged from 59.9% to 72.8% by state. Food security was reported less often among non-Hispanic blacks (blacks) (68.5%) and Hispanics (64.6%) than non-Hispanic whites (whites) (81.8%). These racial/ethnic disparities were present across all levels of education; housing security followed a similar pattern. These results highlight racial/ethnic disparities in two important social determinants of health, food and housing security, as well as a substantial prevalence of worry or stress about food or housing among all subgroups in the United States. The concise nature of the BRFSS Social Context Module's single-question format for food and housing security makes it possible to incorporate these questions into large health surveys so that social determinants can be monitored at the state and national levels and populations at risk can be identified.

  17. Social Security Number Protection Laws: State-by-State Summary Table

    ERIC Educational Resources Information Center

    Data Quality Campaign, 2011

    2011-01-01

    As state policymakers implement statewide longitudinal data systems that collect, store, link and share student-level data, it is critical that they understand applicable privacy and data security standards and laws designed to ensure the privacy, security, and confidentiality of that data. To help state policymakers navigate this complex legal…

  18. Peru: Forum for a New United States Security Strategy?

    DTIC Science & Technology

    1992-03-20

    United States security policy. With the economy in a desperate state, and social tensions dividing its people, Peru is plagued by rising insur- gency...desperate state, and social tensions dividing its people, Peru is plagued by rising insurgency. The country is heavily dependent on the income from the...traditions of Marx, Lenin and Mao, synthesised with the "native socialism " of Jose Carlos Mariategui, founder of the Peruvian Communist Party. Mariategui

  19. United States Energy Policy: Security Not Independence

    DTIC Science & Technology

    2013-03-01

    corn ethanol or biodiesel . In 2011, 13 billion gallons of ethanol were consumed as an additive to gasoline, 10% of the total 136 billion gallons of...gasoline consumed.38 Additionally, the United States consumed 878 million gallons of biodiesel made from oils that come from animal fats or vegetable... biodiesel are 74 times greater than diesel subsidies per volume.42 The renewable fuel standard (RFS) requires the use of biofuels.43 The Energy

  20. The State of Homeland Security 2007

    DTIC Science & Technology

    2007-01-01

    divisions. • The State of Biosecurity. The Department’s grade in this area is a B-. A robust biointelligence and biosurveillance capability must...critical DNDO methods to conduct Advanced Spectroscopic Portal Monitors (ASP) cost-benefit analysis. The Department must improve upon the...methodologies applied toward radiation portal monitors. The Department should also examine the possibilities and implications of aggressive deployment of

  1. Attachment and Culture: Security in the United States and Japan.

    ERIC Educational Resources Information Center

    Rothman, Fred; Weisz, John; Pott, Martha; Morelli, Gilda; Miyake, Kazuo

    2000-01-01

    Highlights evidence of cultural variations in child attachment, noting how western values and meanings permeate attachment theory. Comparisons of the United States and Japan emphasize the cultural relativity of three core hypotheses of attachment theory related to: caregiver sensitivity, child social competence, and a secure base for exploring the…

  2. Oil market power and United States national security

    PubMed Central

    Stern, Roger

    2006-01-01

    It is widely believed that an oil weapon could impose scarcity upon the United States. Impending resource exhaustion is thought to exacerbate this threat. However, threat seems implausible when we consider strategic deficits of prospective weapon users and the improbability of impending resource exhaustion. Here, we explore a hypothesis relating oil to national security under a different assumption, abundance. We suggest that an oil cartel exerts market power to keep abundance at bay, commanding monopoly rents [or wealth transfers (wt)] that underwrite security threats. We then compare security threats attributed to the oil weapon to those that may arise from market power. We first reexamine whether oil is abundant or scarce by reviewing current development data, then we estimate a competitive price for oil. From this, we derive wt2004 collections by Persian Gulf states ≈ $132-178 × 109. We find that wt and the behavior of states collecting it interact to actuate security threats. Threats underwritten by wt are (i) the potential for emergence of a Persian Gulf superpower and (ii) terrorism. It is therefore oil market power, not oil per se, that actuates threats. We also describe a paradox in the relation of market power to the United States' defense doctrine of force projection to preempt a Gulf superpower. Because the superpower threat derives from wt, force alone cannot preempt it. A further paradox is that because foreign policy is premised on oil weapon fear, market power is appeased. Threats thereby grow unimpeded. PMID:16428291

  3. Oil market power and United States national security.

    PubMed

    Stern, Roger

    2006-01-31

    It is widely believed that an oil weapon could impose scarcity upon the United States. Impending resource exhaustion is thought to exacerbate this threat. However, threat seems implausible when we consider strategic deficits of prospective weapon users and the improbability of impending resource exhaustion. Here, we explore a hypothesis relating oil to national security under a different assumption, abundance. We suggest that an oil cartel exerts market power to keep abundance at bay, commanding monopoly rents [or wealth transfers (wt)] that underwrite security threats. We then compare security threats attributed to the oil weapon to those that may arise from market power. We first reexamine whether oil is abundant or scarce by reviewing current development data, then we estimate a competitive price for oil. From this, we derive wt(2004) collections by Persian Gulf states approximately USD $132-178 x 10(9). We find that wt and the behavior of states collecting it interact to actuate security threats. Threats underwritten by wt are (i) the potential for emergence of a Persian Gulf superpower and (ii) terrorism. It is therefore oil market power, not oil per se, that actuates threats. We also describe a paradox in the relation of market power to the United States' defense doctrine of force projection to preempt a Gulf superpower. Because the superpower threat derives from wt, force alone cannot preempt it. A further paradox is that because foreign policy is premised on oil weapon fear, market power is appeased. Threats thereby grow unimpeded.

  4. Experimental Extraction of Secure Correlations from a Noisy Private State

    NASA Astrophysics Data System (ADS)

    Dobek, K.; Karpiński, M.; Demkowicz-Dobrzański, R.; Banaszek, K.; Horodecki, P.

    2011-01-01

    We report experimental generation of a noisy entangled four-photon state that exhibits a separation between the secure key contents and distillable entanglement, a hallmark feature of the recently established quantum theory of private states. The privacy analysis, based on the full tomographic reconstruction of the prepared state, is utilized in a proof-of-principle key generation. The inferiority of distillation-based strategies to extract the key is exposed by an implementation of an entanglement distillation protocol for the produced state.

  5. United States security strategy for Europe and NATO

    SciTech Connect

    1995-06-01

    The United States National Security Strategy, published in February 1995, is designed to meet this European challenge. Our global strategy seeks to enlarge the community of market democracies while deterring and containing a range of threats to our nation and our interests through engagement with our allies. Focusing on new threats and new opportunities, its central goals are to enhance security by maintaining a strong defense capability and promoting cooperative security measures; to promote democracy abroad; and to open foreign markets and spur global economic growth. This document explains how U.S. defense policy is furthering these goals in Europe. As will be seen, we are pursuing our security strategy not only through NATO, but also through other multilateral institutions, such as the Organization for Security and Cooperation in Europe (OSCE), supporting separate yet complementary efforts by our allies and friends in the European Union, and through the bilateral relationships that have played such a valuable role in U.S.-European cooperation for more than forty years.

  6. 78 FR 27276 - Privacy Act; System of Records: Security Records, State-36

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-05-09

    ... Act; System of Records: Security Records, State-36 SUMMARY: Notice is hereby given that the Department of State proposes to amend an existing system of records, Security Records, State-36, pursuant to the... Department of State proposes that the current system retain the name ``Security Records''...

  7. Deterministic secure communications using two-mode squeezed states

    SciTech Connect

    Marino, Alberto M.; Stroud, C. R. Jr.

    2006-08-15

    We propose a scheme for quantum cryptography that uses the squeezing phase of a two-mode squeezed state to transmit information securely between two parties. The basic principle behind this scheme is the fact that each mode of the squeezed field by itself does not contain any information regarding the squeezing phase. The squeezing phase can only be obtained through a joint measurement of the two modes. This, combined with the fact that it is possible to perform remote squeezing measurements, makes it possible to implement a secure quantum communication scheme in which a deterministic signal can be transmitted directly between two parties while the encryption is done automatically by the quantum correlations present in the two-mode squeezed state.

  8. The Security Concerns of the Baltic States as NATO Allies

    DTIC Science & Technology

    2013-08-01

    national cyber attack on Estonia, apparently mounted from Russia, is another point of friction. In the Baltic States, there are large Russian...results when it is presented as an attrac- tive proposition to the local populations and govern- ments. Soft power backed up by lies, bullying , and...All the 35 Estonians noted that national cyber protection was an important security concern. This is understandable, because in April and May 2007

  9. DoD Role for Securing United States Cyberspace

    DTIC Science & Technology

    2008-03-01

    on the effects that cyberspace attacks could have on countries. If a cyber attack of national significance occurred against the United States, what...2.2. National Security “If the attacking side secretly...launches a sneak attack against its financial markets, then after causing a financial...Destruction or producing WMD-like effects ; and (4) Disruptive: Use of technology to affect Critical Infrastructure and Key Resources (CI/KR): for

  10. United States national security policy making and Vietnam

    SciTech Connect

    Davidson, M.W.

    1985-01-01

    The United States failed to achieve its goals in waging a war in Vietnam. This thesis endeavors to show that this failure was due to errors in the formulation of American national security policy regarding Vietnam. The policy making process went astray, at least in part, due to a narrowing of the role of senior military officers as national security policy makers. The restricted role of senior officers as national security policy makers adversely affected American policy formulation regarding Vietnam. The United States response to the coup against Diem in 1963 and the deployment of conventional American forces to ground combat in Vietnam, in 1965 were undertaken without a clear recognition of the considerable costs of the commitments being assumed. Senior military officers had prompted such a recognition in similar previous crises but were not in a policy making position to do so concerning Vietnam. The policymaking input that was absent was ethical counsel of a fundamental nature. Clausewitz viewed the mortality of a war as being embodied in the national will to fight that war. The absence of an accurate appreciation of the costs of a military solution in Vietnam denied civilian officials a critical policy making factor and contributed significantly to the defeat of the American purpose there.

  11. 75 FR 55392 - State of the Municipal Securities Market Field Hearings

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-09-10

    ... COMMISSION State of the Municipal Securities Market Field Hearings AGENCY: Securities and Exchange Commission. ACTION: Notice of field hearings. SUMMARY: On May 7, 2010, the Chairman of the Securities and Exchange... facts, opinions and analyses about the municipal securities market by holding a series of field...

  12. Steady state security assessment in deregulated power systems

    NASA Astrophysics Data System (ADS)

    Manjure, Durgesh Padmakar

    Power system operations are undergoing changes, brought about primarily due to deregulation and subsequent restructuring of the power industry. The primary intention of the introduction of deregulation in power systems was to bring about competition and improved customer focus. The underlying motive was increased economic benefit. Present day power system analysis is much different than what it was earlier, essentially due to the transformation of the power industry from being cost-based to one that is price-based and due to open access of transmission networks to the various market participants. Power is now treated as a commodity and is traded in an open market. The resultant interdependence of the technical criteria and the economic considerations has only accentuated the need for accurate analysis in power systems. The main impetus in security analysis studies is on efficient assessment of the post-contingency status of the system, accuracy being of secondary consideration. In most cases, given the time frame involved, it is not feasible to run a complete AC load flow for determining the post-contingency state of the system. Quite often, it is not warranted as well, as an indication of the state of the system is desired rather than the exact quantification of the various state variables. With the inception of deregulation, transmission networks are subjected to a host of multilateral transactions, which would influence physical system quantities like real power flows, security margins and voltage levels. For efficient asset utilization and maximization of the revenue, more often than not, transmission networks are operated under stressed conditions, close to security limits. Therefore, a quantitative assessment of the extent to which each transaction adversely affects the transmission network is required. This needs to be done accurately as the feasibility of the power transactions and subsequent decisions (execution, curtailment, pricing) would depend upon the

  13. 31 CFR 601.4 - Use of paper; interest-bearing securities of the United States.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 31 Money and Finance:Treasury 3 2012-07-01 2012-07-01 false Use of paper; interest-bearing... PAPER FOR UNITED STATES CURRENCY AND OTHER SECURITIES § 601.4 Use of paper; interest-bearing securities...-bearing securities of the United States, and for any other printing where the use of distinctive paper...

  14. 31 CFR 601.4 - Use of paper; interest-bearing securities of the United States.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 31 Money and Finance:Treasury 3 2014-07-01 2014-07-01 false Use of paper; interest-bearing... PAPER FOR UNITED STATES CURRENCY AND OTHER SECURITIES § 601.4 Use of paper; interest-bearing securities...-bearing securities of the United States, and for any other printing where the use of distinctive paper...

  15. 31 CFR 601.4 - Use of paper; interest-bearing securities of the United States.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 31 Money and Finance:Treasury 3 2011-07-01 2011-07-01 false Use of paper; interest-bearing... PAPER FOR UNITED STATES CURRENCY AND OTHER SECURITIES § 601.4 Use of paper; interest-bearing securities...-bearing securities of the United States, and for any other printing where the use of distinctive paper...

  16. 31 CFR 601.4 - Use of paper; interest-bearing securities of the United States.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 31 Money and Finance:Treasury 3 2013-07-01 2013-07-01 false Use of paper; interest-bearing... PAPER FOR UNITED STATES CURRENCY AND OTHER SECURITIES § 601.4 Use of paper; interest-bearing securities...-bearing securities of the United States, and for any other printing where the use of distinctive paper...

  17. 31 CFR 601.4 - Use of paper; interest-bearing securities of the United States.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false Use of paper; interest-bearing... PAPER FOR UNITED STATES CURRENCY AND OTHER SECURITIES § 601.4 Use of paper; interest-bearing securities...-bearing securities of the United States, and for any other printing where the use of distinctive paper...

  18. 76 FR 26738 - Privacy Act of 1974; Department of Homeland Security/United States Citizenship and Immigration...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-05-09

    ... SECURITY Office of the Secretary Privacy Act of 1974; Department of Homeland Security/United States... 1974, the Department of Homeland Security proposes to update and reissue a current Department of Homeland Security system of records titled ``Department of Homeland Security/United States Citizenship...

  19. State and Urban Area Homeland Security Strategy v3.0: Evolving Strategic Planning

    DTIC Science & Technology

    2006-03-01

    This thesis proposes to overhaul the state and urban area homeland security strategy program by improving the strategic planning process guidance and...urban homeland security strategies as generally inadequate and indicative of limited strategic planning processes. Comprehensive enterprise-wide homeland...and state and local stakeholders would promote a value innovation in strategic planning that will transform state and urban area homeland security strategies.

  20. Quantum secure direct communication of digital and analog signals using continuum coherent states

    NASA Astrophysics Data System (ADS)

    Guerra, Antônio Geovan de Araújo Holanda; Rios, Francisco Franklin Sousa; Ramos, Rubens Viana

    2016-11-01

    In this work, we present optical schemes for secure direct quantum communication of digital and analog signals using continuum coherent states and frequency-dependent phase modulation. The main advantages of the proposed schemes are that they do not use entangled states and they can be implemented with today technology. The theory of quantum interference of continuum coherent state is described, and the optical setups for secure direct communication are presented and their securities are discussed.

  1. Architectural design of a secure forensic state psychiatric hospital.

    PubMed

    Dvoskin, Joel A; Radomski, Steven J; Bennett, Charles; Olin, Jonathan A; Hawkins, Robert L; Dotson, Linda A; Drewnicky, Irene N

    2002-01-01

    This article describes the architectural design of a secure forensic state psychiatric hospital. The project combined input from staff at all levels of the client organization, outside consultants, and a team of experienced architects. The design team was able to create a design that maximized patient dignity and privacy on one hand, and the ability of staff to observe all patient activity on the other. The design centers around 24-bed units, broken into smaller living wings of eight beds each. Each eight-bed living wing has its own private bathrooms (two) and showers (two), as well as a small living area solely reserved for these eight patients and their guests. An indoor-outdoor dayroom allows patients to go outside whenever they choose, while allowing staff to continue observing them. The heart of the facility is a large treatment mall, designed to foster the acquisition of social, emotional, cognitive, and behavioral skills that will help patients to safely return to their communities.

  2. 75 FR 39437 - Optimizing the Security of Biological Select Agents and Toxins in the United States

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-07-08

    ... Executive Order 13546--Optimizing the Security of Biological Select Agents and Toxins in the United States... July 2, 2010 Optimizing the Security of Biological Select Agents and Toxins in the United States By the... and productive scientific enterprise that utilizes biological select agents and toxins (BSAT)...

  3. Affairs of State: The Interagency and National Security

    DTIC Science & Technology

    2008-12-01

    budgeting, humanitarian assistance, peace operations, counternarcotics, counterterrorism, security assistance, 43 environmental security, human rights ... rights , and protection of the environment. American capital, technology, and culture influence the globe. American power and influence is pervasive... right , in getting all the agencies in Washington, DC, and in the field to work relatively well in integrating their respective contributions

  4. State-of-the-art research on electromagnetic information security

    NASA Astrophysics Data System (ADS)

    Hayashi, Yu-ichi

    2016-07-01

    As information security is becoming increasingly significant, security at the hardware level is as important as in networks and applications. In recent years, instrumentation has become cheaper and more precise, computation has become faster, and capacities have increased. With these advancements, the threat of advanced attacks that were considerably difficult to carry out previously has increased not only in military and diplomatic fields but also in general-purpose manufactured devices. This paper focuses on the problem of the security limitations concerning electromagnetic waves (electromagnetic information security) that has rendered attack detection particularly difficult at the hardware level. In addition to reviewing the mechanisms of these information leaks and countermeasures, this paper also presents the latest research trends and standards.

  5. United States security strategy for the east Asia-Pacific region

    SciTech Connect

    1995-02-01

    The United States National Security Strategy published in July 1994 is based on enlarging the community of market democracies while deterring and containing a range of threats to our nation, our allies and our interests. Focusing on new threats and new opportunities, its central goals are: to enhance security by maintaining a strong defense capability and promoting cooperative security measures; to open foreign markets and spur global economic growth; and to promote democracy abroad. In accordance with the National Security Strategy, this document explains United States defense policy toward furthering these goals in the Asia-Pacific region. It builds upon the Strategy`s emphasis on maintaining a strong defense capability to enhance U.S. security and to provide a foundation for regional stability through mutually beneficial security partnerships. As the Strategy states, East Asia is a region of growing importance to American goals: nowhere are the strands of our three-part strategy more intertwined; nowhere is the need for continued engagement more evident. In thinking about the Asia-Pacific region, security comes first, and a committed United States military presence will continue to serve as a bedrock for America`s security role in this dynamic area of the world. The regional security strategy for the Asia-Pacific region emphasizes strengthening the bilateral alliances that have been at the heart of United States strategy for more than forty years. The United States is also committed to contribute to regional security through active participation in new multi-lateral fora like the ASEAN Regional Forum. Through such multi-lateral mechanisms the countries of the region seek to develop new cooperative approaches to achieve greater stability and security. Additionally, the Pacific Command sponsors multi-national military activities.

  6. Security of six-state quantum key distribution protocol with threshold detectors

    PubMed Central

    Kato, Go; Tamaki, Kiyoshi

    2016-01-01

    The security of quantum key distribution (QKD) is established by a security proof, and the security proof puts some assumptions on the devices consisting of a QKD system. Among such assumptions, security proofs of the six-state protocol assume the use of photon number resolving (PNR) detector, and as a result the bit error rate threshold for secure key generation for the six-state protocol is higher than that for the BB84 protocol. Unfortunately, however, this type of detector is demanding in terms of technological level compared to the standard threshold detector, and removing the necessity of such a detector enhances the feasibility of the implementation of the six-state protocol. Here, we develop the security proof for the six-state protocol and show that we can use the threshold detector for the six-state protocol. Importantly, the bit error rate threshold for the key generation for the six-state protocol (12.611%) remains almost the same as the one (12.619%) that is derived from the existing security proofs assuming the use of PNR detectors. This clearly demonstrates feasibility of the six-state protocol with practical devices. PMID:27443610

  7. Security of six-state quantum key distribution protocol with threshold detectors.

    PubMed

    Kato, Go; Tamaki, Kiyoshi

    2016-07-22

    The security of quantum key distribution (QKD) is established by a security proof, and the security proof puts some assumptions on the devices consisting of a QKD system. Among such assumptions, security proofs of the six-state protocol assume the use of photon number resolving (PNR) detector, and as a result the bit error rate threshold for secure key generation for the six-state protocol is higher than that for the BB84 protocol. Unfortunately, however, this type of detector is demanding in terms of technological level compared to the standard threshold detector, and removing the necessity of such a detector enhances the feasibility of the implementation of the six-state protocol. Here, we develop the security proof for the six-state protocol and show that we can use the threshold detector for the six-state protocol. Importantly, the bit error rate threshold for the key generation for the six-state protocol (12.611%) remains almost the same as the one (12.619%) that is derived from the existing security proofs assuming the use of PNR detectors. This clearly demonstrates feasibility of the six-state protocol with practical devices.

  8. Security of two-state and four-state practical quantum bit-commitment protocols

    NASA Astrophysics Data System (ADS)

    Loura, Ricardo; Arsenović, Dušan; Paunković, Nikola; Popović, Duška B.; Prvanović, Slobodan

    2016-12-01

    We study cheating strategies against a practical four-state quantum bit-commitment protocol [A. Danan and L. Vaidman, Quant. Info. Proc. 11, 769 (2012)], 10.1007/s11128-011-0284-4 and its two-state variant [R. Loura et al., Phys. Rev. A 89, 052336 (2014)], 10.1103/PhysRevA.89.052336 when the underlying quantum channels are noisy and the cheating party is constrained to using single-qubit measurements only. We show that simply inferring the transmitted photons' states by using the Breidbart basis, optimal for ambiguous (minimum-error) state discrimination, does not directly produce an optimal cheating strategy for this bit-commitment protocol. We introduce a strategy, based on certain postmeasurement processes and show it to have better chances at cheating than the direct approach. We also study to what extent sending forged geographical coordinates helps a dishonest party in breaking the binding security requirement. Finally, we investigate the impact of imperfect single-photon sources in the protocols. Our study shows that, in terms of the resources used, the four-state protocol is advantageous over the two-state version. The analysis performed can be straightforwardly generalized to any finite-qubit measurement, with the same qualitative results.

  9. 75 FR 10633 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security United States...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-03-09

    ... United States Immigration and Customs Enforcement-- 011 Immigration and Enforcement Operational Records... Security/U.S. Immigration and Customs Enforcement system of records titled, ``Department of Homeland Security/U.S. Immigration and Customs Enforcement--011 Removable Alien Records System of Records''...

  10. Security on Virginia's Campuses. Report of the State Council of Higher Education.

    ERIC Educational Resources Information Center

    Virginia State Council of Higher Education, Richmond.

    This report is in response to a Virginia state legislature mandate of a study of security on the campuses of Virginia public institutions of higher education. The study scope included institutional characteristics, security department characteristics, personnel and training, information about relations on and off campus, needs and concerns of the…

  11. A Review of State Test Security Laws in 2013. ACT Research Report Series, 2014 (1)

    ERIC Educational Resources Information Center

    Croft, Michelle

    2014-01-01

    Test security has increased in importance in the last few years given high-profile cases of educator misconduct. This paper provides a review of state test security statutes and regulations related to statewide achievement testing using as a framework recent best practices reports by the U.S. Department of Education's National Center for Education…

  12. Concept of Security for Gulf States After Gulf War

    DTIC Science & Technology

    2007-11-02

    112 27 Ibid page 113 28 Ibid pages 114-115 29 Abdul Munam Al Mashad Towards The ArabicFormula for The National Security Theory Dar Al Mustaqbil...Search For Strategic Stability. England: Mansell Publishing, 1985 Noyes, James H. The Persian Gulf After The Cold War. Westport, CT, 1984 Al Mashad

  13. Military Police: Assisting in Securing the United States Southern Border

    DTIC Science & Technology

    2012-03-12

    has not been a flood of companies fleeing Mexico for safety reasons. However, security is a significant concern. Most experts who are monitoring the...Aguilar, “Texas Police Under Cross-Border Gunfire,” Tucson Sentinel Online, June 9, 2011, http://www.tucsonsentinel.com/nationworld/report

  14. The Role of Higher Education in a Security State

    ERIC Educational Resources Information Center

    Perelman, Michael

    2005-01-01

    What is the role of higher education when a nation moves toward a political climate in which the government has a free hand to do whatever it wants in the name of national security? If society faces a real threat that could destroy life as we know it, then we should all--including higher education--rise to its defense. However, if national…

  15. United States Homeland Security and National Biometric Identification

    DTIC Science & Technology

    2002-04-09

    IMPORTANCE OF AMERICA’S FREEDOMS AND HOMELAND SECURITY: ................... 1 W HAT IS A BIO M ETRIC...2 W AYS/M EANS O F BIO M ETRICS...9 THE DEPARTMENT OF DEFENSE’S ROLE IN NATIONAL IDENTIFICATION AND BIO M ETRICS

  16. Homeland Security: Developing National Doctrine to Guide State Strategy Development

    DTIC Science & Technology

    2012-03-01

    reminders to stop procrastinating and newfound cooking skills, I not only would never have finished, I also may have starved. xvi THIS PAGE INTENTIONALLY...doctrine in developing a homeland security doctrine. There are limitations, however, in that the military model is a narrow view. To overcome this

  17. State Defense Forces: Forces for NORTHCOM and Homeland Security?

    DTIC Science & Technology

    2010-07-26

    Listing of State Defense Forces: 1. Alabama State Defense Force (ALSDF). http://www.alsdf.org 2. Alaska State Defense Force ( ASDF ) http://www.ak...prepared.com/ asdf 3. California State Military Reserve (CASMR) http://www.militarymuseum.org/CASMR.html 4. Connecticut State Militia http://ctarng

  18. 77 FR 76076 - Information Security Oversight Office; State, Local, Tribal, and Private Sector Policy Advisory...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-12-26

    ... RECORDS ADMINISTRATION Information Security Oversight Office; State, Local, Tribal, and Private Sector Policy Advisory Committee (SLTPS-PAC) AGENCY: National Archives and Records Administration, Information.... ADDRESSES: National Archives and Records Administration, 700 Pennsylvania Avenue NW, Jefferson...

  19. Securing Emergency State Data in a Tactical Computing Environment

    DTIC Science & Technology

    2010-12-01

    Table 3. Group Requirements Identifier Interface should be modular and usable by higher layer applications. 2.1 All communicating parties shall support...Identifier Requirements Remarks 2.1 Protocol should be usable by higher layer applications. UDP is a well known transport layer protocol with...K. Seo , Security Architecture for the Internet Protocol, RFC 4301, Dec 2005. [26] C. M. Kozierok, The TCP/IP Guide, Available from http

  20. State Defense Force Monograph Series. Winter 2005, Homeland Security

    DTIC Science & Technology

    2005-01-01

    Fish and Game Commission by flying reconnaissance missions over the Shenandoah Valley searching for poachers as bear poaching is on the rise in the...terror on a daily basis. Every day we see terrorist groups killing and destroying to demonstrate that what we believe, what we stand for, is of no value...in New York City with ferry services across the Hudson River ; provided the waterborne security that allowed for the opening of the George Washington

  1. India-United States Security Cooperation: Past, Present, and Future

    DTIC Science & Technology

    2011-12-16

    IOR Indian Ocean Region ISI Inter-Services Intelligence JeM Jaish-e-Mohammad ix JTG Joint Technical Group LCA Light Combat Aircraft LeT...for developing nations, and provides an opportunity for increased economic, scientific, environmental and security partnership. Working together...aspect of defense cooperation between the two countries remained US collaboration on the Light Combat Aircraft ( LCA ). Other than the slow progress on

  2. Software Security Assurance: A State-of-Art Report (SAR)

    DTIC Science & Technology

    2007-07-31

    systems . The CORAS model has been tested successfully on telemedicine and e - commerce systems ...Security Assurance E X C E L L E N C E S E R V IC E IN INFORMAT IO N DoD Data & Analysis Center for Software Information Assurance Technology Analysis...Computer Systems ), “Attack- Potential- based Survivability Modeling for High-Consequence Systems ,” in Proceedings

  3. Security Assistance and Cooperation: Shared Responsibility of the Departments of State and Defense

    DTIC Science & Technology

    2016-04-04

    Security Assistance and Cooperation: Shared Responsibility of the Departments of State and Defense Nina M. Serafino Specialist in... Responsibility Congressional Research Service Summary The Department of State and the Department of Defense (DOD) have long shared responsibility for U.S...soon after World War II, when Congress charged the Secretary of State with responsibility for overseeing and providing general direction for military

  4. 28 CFR 20.24 - State laws on privacy and security.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... Section 20.24 Judicial Administration DEPARTMENT OF JUSTICE CRIMINAL JUSTICE INFORMATION SYSTEMS State and Local Criminal History Record Information Systems § 20.24 State laws on privacy and security. Where a State originating criminal history record information provides for sealing or purging thereof,...

  5. 28 CFR 20.24 - State laws on privacy and security.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... Section 20.24 Judicial Administration DEPARTMENT OF JUSTICE CRIMINAL JUSTICE INFORMATION SYSTEMS State and Local Criminal History Record Information Systems § 20.24 State laws on privacy and security. Where a State originating criminal history record information provides for sealing or purging thereof,...

  6. 28 CFR 20.24 - State laws on privacy and security.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... Section 20.24 Judicial Administration DEPARTMENT OF JUSTICE CRIMINAL JUSTICE INFORMATION SYSTEMS State and Local Criminal History Record Information Systems § 20.24 State laws on privacy and security. Where a State originating criminal history record information provides for sealing or purging thereof,...

  7. 28 CFR 20.24 - State laws on privacy and security.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... Section 20.24 Judicial Administration DEPARTMENT OF JUSTICE CRIMINAL JUSTICE INFORMATION SYSTEMS State and Local Criminal History Record Information Systems § 20.24 State laws on privacy and security. Where a State originating criminal history record information provides for sealing or purging thereof,...

  8. 28 CFR 20.24 - State laws on privacy and security.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... Section 20.24 Judicial Administration DEPARTMENT OF JUSTICE CRIMINAL JUSTICE INFORMATION SYSTEMS State and Local Criminal History Record Information Systems § 20.24 State laws on privacy and security. Where a State originating criminal history record information provides for sealing or purging thereof,...

  9. Securitization, alterity, and the state Human (in)security on an Amazonian frontier.

    PubMed

    Brightman, Marc; Grotti, Vanessa

    2014-12-01

    Focusing on the region surrounding the Maroni River, which forms the border between Suriname and French Guiana, we examine how relations between different state and non-state social groups are articulated in terms of security. The region is characterised by multiple "borders" and frontiers of various kinds, the state boundary having the features of an interface or contact zone. Several key collectivities meet in this border zone: native Amazonians, tribal Maroon peoples, migrant Brazilian gold prospectors, and metropolitan French state functionaries. We explore the relationships between these different sets of actors and describe how their mutual encounters center on discourses of human and state security, thus challenging the commonly held view of the region as a stateless zone and showing that the "human security" of citizens from the perspective of the state may compete with locally salient ideas or experiences of well-being.

  10. Security

    ERIC Educational Resources Information Center

    Technology & Learning, 2008

    2008-01-01

    Anytime, anywhere, learning provides opportunities to create digital learning environments for new teaching styles and personalized learning. As part of making sure the program is effective, the safety and security of students and assets are essential--and mandated by law. The Children's Internet Protection Act (CIPA) addresses Internet content…

  11. The State-Society/Citizen Relationship in Security Analysis: Implications for Planning and Implementation of U.S. Intervention and Peace/State-Building Operations

    DTIC Science & Technology

    2015-04-01

    food but, more important, access to quality food . People need physi- cal access to food products. This implies that there should be conditions that...definition of security as well as the idea of human security. Since international stability is based on the stability of states, the United States needs...international politics and security/strate- gic studies. Dr. Stivachtis’ most relevant publications include: Human and State (In)Security in a Globalized

  12. 75 FR 51619 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security/United States...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-08-23

    .../United States Citizenship and Immigration Services-- 009 Compliance Tracking and Management System of.../United States Citizenship and Immigration system of records entitled the ``United States Citizenship and... Homeland Security/United States Citizenship and Immigration Services--009 Compliance Tracking...

  13. Increasing the resilience and security of the United States' power infrastructure

    SciTech Connect

    Happenny, Sean F.

    2015-08-01

    The United States' power infrastructure is aging, underfunded, and vulnerable to cyber attack. Emerging smart grid technologies may take some of the burden off of existing systems and make the grid as a whole more efficient, reliable, and secure. The Pacific Northwest National Laboratory (PNNL) is funding research into several aspects of smart grid technology and grid security, creating a software simulation tool that will allow researchers to test power infrastructure control and distribution paradigms by utilizing different smart grid technologies to determine how the grid and these technologies react under different circumstances. Understanding how these systems behave in real-world conditions will lead to new ways to make our power infrastructure more resilient and secure. Demonstrating security in embedded systems is another research area PNNL is tackling. Many of the systems controlling the U.S. critical infrastructure, such as the power grid, lack integrated security and the aging networks protecting them are becoming easier to attack.

  14. State Defense Forces and Their Role in American Homeland Security

    DTIC Science & Technology

    2015-03-01

    Southern Poverty Law Center TAG The Adjutant General TCA Tennessee Code Annotated TSG Tennessee State Guard U.S.C. United States Code USNORTHCOM...Active ‘Patriot’ Groups in the United States in 2011,” Southern Poverty Law Center, http://www.splcenter.org/get- informed/intelligence-report/browse... teach them. The colonial period is no exception.58 —John Shy Understanding the evolution of the term militia, within the confines of U.S. history and

  15. Wireless Sensor Network Security Enhancement Using Directional Antennas: State of the Art and Research Challenges.

    PubMed

    Curiac, Daniel-Ioan

    2016-04-07

    Being often deployed in remote or hostile environments, wireless sensor networks are vulnerable to various types of security attacks. A possible solution to reduce the security risks is to use directional antennas instead of omnidirectional ones or in conjunction with them. Due to their increased complexity, higher costs and larger sizes, directional antennas are not traditionally used in wireless sensor networks, but recent technology trends may support this method. This paper surveys existing state of the art approaches in the field, offering a broad perspective of the future use of directional antennas in mitigating security risks, together with new challenges and open research issues.

  16. Wireless Sensor Network Security Enhancement Using Directional Antennas: State of the Art and Research Challenges

    PubMed Central

    Curiac, Daniel-Ioan

    2016-01-01

    Being often deployed in remote or hostile environments, wireless sensor networks are vulnerable to various types of security attacks. A possible solution to reduce the security risks is to use directional antennas instead of omnidirectional ones or in conjunction with them. Due to their increased complexity, higher costs and larger sizes, directional antennas are not traditionally used in wireless sensor networks, but recent technology trends may support this method. This paper surveys existing state of the art approaches in the field, offering a broad perspective of the future use of directional antennas in mitigating security risks, together with new challenges and open research issues. PMID:27070601

  17. State and Local Homeland Security Officials: Who Are They and What Do They Do?

    DTIC Science & Technology

    2011-09-01

    Homeland Security Strategy of 2002. The definition does, however, make the point that ―homeland security is evolving‖ ( Hutton , 2003). The Barron‘s guide...at best and are housed with the state‘s SEMO or governor‘s offices. ( Hutton , 2003, p. 99) It also includes a statement explains that: Like police...SEMO‘s utilize existing state employees in various agencies for staffing. ( Hutton , 2003, p. 99) 12 These passages seem to indicate that, from the

  18. Security of decoy-state protocols for general photon-number-splitting attacks

    NASA Astrophysics Data System (ADS)

    Somma, Rolando D.; Hughes, Richard J.

    2013-06-01

    Decoy-state protocols provide a way to defeat photon-number-splitting attacks in quantum cryptography implemented with weak coherent pulses. We point out that previous security analyses of such protocols relied on assumptions about eavesdropping attacks that considered treating each pulse equally and independently. We give an example to demonstrate that, without such assumptions, the security parameters of previous decoy-state implementations could be worse than the ones claimed. Next we consider more general photon-number-splitting attacks, which correlate different pulses, and give an estimation procedure for the number of single-photon signals with rigorous security statements. The impact of our result is that previous analyses of the number of times a decoy-state quantum cryptographic system can be reused before it makes a weak key must be revised.

  19. 'Known Secure Sensor Measurements' for Critical Infrastructure Systems: Detecting Falsification of System State

    SciTech Connect

    Miles McQueen; Annarita Giani

    2011-09-01

    This paper describes a first investigation on a low cost and low false alarm, reliable mechanism for detecting manipulation of critical physical processes and falsification of system state. We call this novel mechanism Known Secure Sensor Measurements (KSSM). The method moves beyond analysis of network traffic and host based state information, in fact it uses physical measurements of the process being controlled to detect falsification of state. KSSM is intended to be incorporated into the design of new, resilient, cost effective critical infrastructure control systems. It can also be included in incremental upgrades of already in- stalled systems for enhanced resilience. KSSM is based on known secure physical measurements for assessing the likelihood of an attack and will demonstrate a practical approach to creating, transmitting, and using the known secure measurements for detection.

  20. Securitization, alterity, and the state Human (in)security on an Amazonian frontier

    PubMed Central

    Brightman, Marc; Grotti, Vanessa

    2016-01-01

    Focusing on the region surrounding the Maroni River, which forms the border between Suriname and French Guiana, we examine how relations between different state and non-state social groups are articulated in terms of security. The region is characterised by multiple “borders” and frontiers of various kinds, the state boundary having the features of an interface or contact zone. Several key collectivities meet in this border zone: native Amazonians, tribal Maroon peoples, migrant Brazilian gold prospectors, and metropolitan French state functionaries. We explore the relationships between these different sets of actors and describe how their mutual encounters center on discourses of human and state security, thus challenging the commonly held view of the region as a stateless zone and showing that the “human security” of citizens from the perspective of the state may compete with locally salient ideas or experiences of well-being. PMID:27996063

  1. The Effect of Secure Attachment State and Infant Facial Expressions on Childless Adults’ Parental Motivation

    PubMed Central

    Ding, Fangyuan; Zhang, Dajun; Cheng, Gang

    2016-01-01

    This study examined the association between infant facial expressions and parental motivation as well as the interaction between attachment state and expressions. Two-hundred eighteen childless adults (Mage = 19.22, 118 males, 100 females) were recruited. Participants completed the Chinese version of the State Adult Attachment Measure and the E-prime test, which comprised three components (a) liking, the specific hedonic experience in reaction to laughing, neutral, and crying infant faces; (b) representational responding, actively seeking infant faces with specific expressions; and (c) evoked responding, actively retaining images of three different infant facial expressions. While the first component refers to the “liking” of infants, the second and third components entail the “wanting” of an infant. Random intercepts multilevel models with emotion nested within participants revealed a significant interaction between secure attachment state and emotion on both liking and representational response. A hierarchical regression analysis was conducted to examine the unique contributions of secure attachment state. Findings demonstrated that, after controlling for sex, anxious, and avoidant, secure attachment state positively predicted parental motivations (liking and wanting) in the neutral and crying conditions, but not the laughing condition. These findings demonstrate the significant role of secure attachment state in parental motivation, specifically when infants display uncertain and negative emotions. PMID:27582724

  2. State of security at US colleges and universities: a national stakeholder assessment and recommendations.

    PubMed

    Greenberg, Sheldon F

    2007-09-01

    In 2004 the US Department of Justice, Office of Community Oriented Policing Services, sponsored a National Summit on Campus Public Safety. The summit brought together various stakeholders including campus police and security officials, local police chiefs, college and university faculty and administrators, federal officials, students and parents, and community leaders to address the issues and complexities of campus safety. Delegates to the summit identified key issues in campus safety and security, which included establishing a national center on campus safety, balancing traditional open environments with the need to secure vulnerable sites, improving coordination with state and local police, reducing internal fragmentation, elevating professionalism, and increasing eligibility of campus police and security agencies to compete for federal law enforcement funds. Focus on "active shooters" on campus, resulting from the Virginia Tech incident, should not diminish attention placed on the broader, more prevalent safety and security issues facing the nation's educational campuses. Recommendations resulting from the summit called for establishing a national agenda on campus safety, formation of a national center on campus public safety, and increased opportunity for campus police and security agencies to compete for federal and state funds.

  3. Multi-State Initiatives---Agriculture Security Preparedness

    DTIC Science & Technology

    2004-06-01

    Service, Agriculture Information Bulletin No. 742, July 1998. 6 farming, including seed , feed, fertilizer, machinery, food processing...pathological organism. • This lack of diversity is compounded by the fact that 80 percent of the nation’s seed derives from one locale, the Idaho valley...due to the exceptionally dry climate in the region. • A notable percentage of imported hybrid seed used for crop production in the United States

  4. The United States Air Force in Europe: An Analysis within the Post-Cold War Security Environment

    DTIC Science & Technology

    1992-12-01

    ANALYSIS WITHIN THE POST-COLD WAR SECURITY ENVIRONMENT by Matthew K. Moeller December 1992 Thesis Advisor: R. Mitchell Brown III Second Reader: Rodney...WORK UNIT ELEMENT NO. NO. NO. ACCESSION NO. 11. I ITLE (Include Security Classification) The United States Air Force in Europe: An Analysis within... Analysis Within the Post-Cold War Security Environment by Matthew K. Moeller Lieutenant, United States Air Force B.S., San Jose State University, 1989

  5. 76 FR 49494 - Privacy Act of 1974; Department of Homeland Security United States Coast Guard DHS/USCG-027...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-10

    ... records titled, ``Department of Homeland Security/United States Coast Guard-027 Recruiting Files System of Records.'' This system of records allows the Department of Homeland Security/United States Coast Guard to...: Marilyn Scott-Perez (202-475-3515), Privacy Officer, United States Coast Guard, 2100 2nd Street, SW.,...

  6. Measuring Information Security Performance with 10 by 10 Model for Holistic State Evaluation.

    PubMed

    Bernik, Igor; Prislan, Kaja

    Organizations should measure their information security performance if they wish to take the right decisions and develop it in line with their security needs. Since the measurement of information security is generally underdeveloped in practice and many organizations find the existing recommendations too complex, the paper presents a solution in the form of a 10 by 10 information security performance measurement model. The model-ISP 10×10M is composed of ten critical success factors, 100 key performance indicators and 6 performance levels. Its content was devised on the basis of findings presented in the current research studies and standards, while its structure results from an empirical research conducted among information security professionals from Slovenia. Results of the study show that a high level of information security performance is mostly dependent on measures aimed at managing information risks, employees and information sources, while formal and environmental factors have a lesser impact. Experts believe that information security should evolve systematically, where it's recommended that beginning steps include technical, logical and physical security controls, while advanced activities should relate predominantly strategic management activities. By applying the proposed model, organizations are able to determine the actual level of information security performance based on the weighted indexing technique. In this manner they identify the measures they ought to develop in order to improve the current situation. The ISP 10×10M is a useful tool for conducting internal system evaluations and decision-making. It may also be applied to a larger sample of organizations in order to determine the general state-of-play for research purposes.

  7. Measuring Information Security Performance with 10 by 10 Model for Holistic State Evaluation

    PubMed Central

    2016-01-01

    Organizations should measure their information security performance if they wish to take the right decisions and develop it in line with their security needs. Since the measurement of information security is generally underdeveloped in practice and many organizations find the existing recommendations too complex, the paper presents a solution in the form of a 10 by 10 information security performance measurement model. The model—ISP 10×10M is composed of ten critical success factors, 100 key performance indicators and 6 performance levels. Its content was devised on the basis of findings presented in the current research studies and standards, while its structure results from an empirical research conducted among information security professionals from Slovenia. Results of the study show that a high level of information security performance is mostly dependent on measures aimed at managing information risks, employees and information sources, while formal and environmental factors have a lesser impact. Experts believe that information security should evolve systematically, where it’s recommended that beginning steps include technical, logical and physical security controls, while advanced activities should relate predominantly strategic management activities. By applying the proposed model, organizations are able to determine the actual level of information security performance based on the weighted indexing technique. In this manner they identify the measures they ought to develop in order to improve the current situation. The ISP 10×10M is a useful tool for conducting internal system evaluations and decision-making. It may also be applied to a larger sample of organizations in order to determine the general state-of-play for research purposes. PMID:27655001

  8. An assessment of the cyber security legislation and its impact on the United States electrical sector

    NASA Astrophysics Data System (ADS)

    Born, Joshua

    The purpose of this research was to examine the cyber-security posture for the United States' electrical grid, which comprises a major component of critical infrastructure for the country. The United States electrical sector is so vast, that the Department of Homeland Security (DHS) estimates, it contains more than 6,413 power plants (this includes 3,273 traditional electric utilities and 1,738 nonutility power producers) with approximately 1,075 gigawatts of energy produced on a daily basis. A targeted cyber-security attack against the electric grid would likely have catastrophic results and could even serve as a precursor to a physical attack against the United States. A recent report by the consulting firm Black and Veatch found that one of the top five greatest concerns for United States electric utilities is the risk that cybersecurity poses to their industry and yet, only one-third state they are currently prepared to meet the increasingly likely threat. The report goes on to state, "only 32% of electric utilities surveyed had integrated security systems with the proper segmentation, monitoring and redundancies needed for cyber threat protection. Another 48 % said they did not" Recent estimates indicate that a large-scale cyber-attack against this sector could cost the United States economy as much as a trillion dollars within a weeks' time. Legislative efforts in the past have primarily been focused on creating mandates that encourage public and private partnership, which have been not been adopted as quickly as desired. With 85 % of all electric utilities being privately owned, it is key that the public and private sector partner in order to mitigate risks and respond as a cohesive unit in the event of a major attack. Keywords: Cybersecurity, Professor Riddell, cyber security, energy, intelligence, outlook, electrical, compliance, legislation, partnerships, critical infrastructure.

  9. Security aspects of electronic data interchange between a state health department and a hospital emergency department.

    PubMed

    Magnuson, J A; Klockner, Rocke; Ladd-Wilson, Stephen; Zechnich, Andrew; Bangs, Christopher; Kohn, Melvin A

    2004-01-01

    Electronic emergency department reporting provides the potential for enhancing local and state surveillance capabilities for a wide variety of syndromes and reportable conditions. The task of protecting data confidentiality and integrity while developing electronic data interchange between a hospital emergency department and a state public health department proved more complex than expected. This case study reports on the significant challenges that had to be resolved to accomplish this goal; these included application restrictions and incompatibilities, technical malfunctions, changing standards, and insufficient dedicated resources. One of the key administrative challenges was that of coordinating project security with enterprise security. The original project has evolved into an ongoing pilot, with the health department currently receiving secure data from the emergency department at four-hour intervals. Currently, planning is underway to add more emergency departments to the project.

  10. Composable Security Proof for Continuous-Variable Quantum Key Distribution with Coherent States

    NASA Astrophysics Data System (ADS)

    Leverrier, Anthony

    2015-02-01

    We give the first composable security proof for continuous-variable quantum key distribution with coherent states against collective attacks. Crucially, in the limit of large blocks the secret key rate converges to the usual value computed from the Holevo bound. Combining our proof with either the de Finetti theorem or the postselection technique then shows the security of the protocol against general attacks, thereby confirming the long-standing conjecture that Gaussian attacks are optimal asymptotically in the composable security framework. We expect that our parameter estimation procedure, which does not rely on any assumption about the quantum state being measured, will find applications elsewhere, for instance, for the reliable quantification of continuous-variable entanglement in finite-size settings.

  11. Robust Anti-Collective Noise Quantum Secure Direct Dialogue Using Logical Bell States

    NASA Astrophysics Data System (ADS)

    Wu, Di; Lv, Hong-Jun; Xie, Guang-Jun

    2016-01-01

    In this paper we propose two quantum secure direct dialogue (QSDD) schemes with logical Bell states which can resist collective noise. The two users Alice and Bob encode their secret messages with the help of unitary operations. Compared with many quantum secure direct communication (QSDC), there is no strict information sender and receiver in these schemes, one logical Bell state can be operated twice by Alice and Bob based on what messages they prefer to encode. As a result, the two users are able to share their messages mutually, so the efficiency of communication is improved. By rearranging the order of particles and inserting decoy photons, our protocols are able to avoid the information leakage and detect eavesdropping, and they can be proved to have unconditional security.

  12. An efficient controlled quantum secure direct communication and authentication by using four particle cluster states

    NASA Astrophysics Data System (ADS)

    Nanvakenari, Milad; Houshmand, Monireh

    In this paper, a three-party controlled quantum secure direct communication and authentication (QSDCA) protocol is proposed by using four particle cluster states via a quantum one-time pad and local unitary operations. In the present scheme, only under the permission of the controller, the sender and the receiver can implement secure direct communication successfully. But under any circumstances, Charlie cannot obtain the secret message. Eavesdropping detection and identity authentication are achieved with the help of the previously shared reusable base identity strings of users. This protocol is unconditionally secure in both ideal and practical noisy cases. In one transmission, a qubit of each four particle cluster state is used as controller’s permission and the same qubit with another qubit are used to recover two classical bits of information. In the proposed scheme, the efficiency is improved compared with the previous works.

  13. The Iranian petroleum crisis and United States national security

    PubMed Central

    Stern, Roger

    2007-01-01

    The U.S. case against Iran is based on Iran's deceptions regarding nuclear weapons development. This case is buttressed by assertions that a state so petroleum-rich cannot need nuclear power to preserve exports, as Iran claims. The U.S. infers, therefore, that Iran's entire nuclear technology program must pertain to weapons development. However, some industry analysts project an Irani oil export decline [e.g., Clark JR (2005) Oil Gas J 103(18):34–39]. If such a decline is occurring, Iran's claim to need nuclear power could be genuine. Because Iran's government relies on monopoly proceeds from oil exports for most revenue, it could become politically vulnerable if exports decline. Here, we survey the political economy of Irani petroleum for evidence of this decline. We define Iran's export decline rate (edr) as its summed rates of depletion and domestic demand growth, which we find equals 10–12%. We estimate marginal cost per barrel for additions to Irani production capacity, from which we derive the “standstill” investment required to offset edr. We then compare the standstill investment to actual investment, which has been inadequate to offset edr. Even if a relatively optimistic schedule of future capacity addition is met, the ratio of 2011 to 2006 exports will be only 0.40–0.52. A more probable scenario is that, absent some change in Irani policy, this ratio will be 0.33–0.46 with exports declining to zero by 2014–2015. Energy subsidies, hostility to foreign investment, and inefficiencies of its state-planned economy underlie Iran's problem, which has no relation to “peak oil.” PMID:17190820

  14. The Iranian petroleum crisis and United States national security.

    PubMed

    Stern, Roger

    2007-01-02

    The U.S. case against Iran is based on Iran's deceptions regarding nuclear weapons development. This case is buttressed by assertions that a state so petroleum-rich cannot need nuclear power to preserve exports, as Iran claims. The U.S. infers, therefore, that Iran's entire nuclear technology program must pertain to weapons development. However, some industry analysts project an Irani oil export decline [e.g., Clark JR (2005) Oil Gas J 103(18):34-39]. If such a decline is occurring, Iran's claim to need nuclear power could be genuine. Because Iran's government relies on monopoly proceeds from oil exports for most revenue, it could become politically vulnerable if exports decline. Here, we survey the political economy of Irani petroleum for evidence of this decline. We define Iran's export decline rate (edr) as its summed rates of depletion and domestic demand growth, which we find equals 10-12%. We estimate marginal cost per barrel for additions to Irani production capacity, from which we derive the "standstill" investment required to offset edr. We then compare the standstill investment to actual investment, which has been inadequate to offset edr. Even if a relatively optimistic schedule of future capacity addition is met, the ratio of 2011 to 2006 exports will be only 0.40-0.52. A more probable scenario is that, absent some change in Irani policy, this ratio will be 0.33-0.46 with exports declining to zero by 2014-2015. Energy subsidies, hostility to foreign investment, and inefficiencies of its state-planned economy underlie Iran's problem, which has no relation to "peak oil."

  15. Security of Small States, Problems of the States of the South Asian Region and Bangladesh’s Options for Security,

    DTIC Science & Technology

    1988-03-10

    the eastern part of J. Sinkiang and Russia was delimited in 1884. The boundary between the Indian- protected state of Sikkim and Tibet was delimited in...Kashmir and Sinkiang and Tibet. It starts at the Karakoram Pass in the extreme north of Kashmir, and extends to the Spiti-Tibet border just north of where...which the Chinese have built a motor road linking western Tibet with Sinkiang . The second is the issue of the Ladakh-Tibet boundary from the

  16. Modernizing Selection and Promotion Procedures in the State Employment Security Service Agency.

    ERIC Educational Resources Information Center

    Derryck, Dennis A.; Leyes, Richard

    The purpose of this feasibility study was to discover the types ofselection and promotion models, strategies, and processes that must be employed if current State Employment Security Service Agency selection practices are to be made more directly relevant to the various populations currently being served. Specifically, the study sought to…

  17. State Sales Tax and Assistive Technology: Securing Exemptions for Sensory, Communication, and Mobility Aids.

    ERIC Educational Resources Information Center

    Mendelsohn, Steven

    This paper examines issues involved in identifying and securing sales tax exemptions to curtail the potential negative impact of state sales taxes on assistive technology. Chapter I discusses the nature of sales taxes, including their definition, their impact, their structure and administration, and the sources of exemptions. Chapter II considers…

  18. State of Hispanic America: Working toward a More Secure Future. White Paper

    ERIC Educational Resources Information Center

    Vargas Poppe, Samanatha

    2016-01-01

    This document provides an analysis of key themes, as they relate to the U.S. Latino population, included in the President's 2016 State of the Union Address. Addressing these issues is critical to extend opportunity to more people to help ensure national prosperity and security for generations to come.

  19. Reforming a Breadwinner Welfare State: Gender, Race, Class, and Social Security Reform

    ERIC Educational Resources Information Center

    Herd, Pamela

    2005-01-01

    A key challenge facing western welfare states is that they offset income risks faced by those in breadwinner families. Social Security is an excellent example. It best protects individuals with lengthy work histories or individuals who get married, stay married, and are never employed. Most women fit neither model. Thus, I analyze…

  20. Can Social Security Explain Trends in Labor Force Participation of Older Men in the United States?

    ERIC Educational Resources Information Center

    Blau, David M.; Goodstein, Ryan M.

    2010-01-01

    After a long decline, the Labor Force Participation Rate (LFPR) of older men in the United States leveled off in the 1980s, and began to increase in the late 1990s. We examine how changes in Social Security rules affected these trends. We attribute only a small portion of the decline from the 1960s-80s to the increasing generosity of Social…

  1. Practical security analysis of two-way quantum-key-distribution protocols based on nonorthogonal states

    NASA Astrophysics Data System (ADS)

    Henao, C. Ivan; Serra, Roberto M.

    2015-11-01

    Within the broad research scenario of quantum secure communication, two-way quantum key distribution (TWQKD) is a relatively new proposal for sharing secret keys that is not yet fully explored. We analyze the security of TWQKD schemes that use qubits prepared in nonorthogonal states to transmit the key. Investigating protocols that employ an arbitrary number of bases for the channel preparation, we show, in particular, that the security of the LM05 protocol cannot be improved by the use of more than two preparation bases. We also provide an alternative proof of unconditional security for a deterministic TWQKD protocol recently proposed in Beaudry et al., Phys. Rev. A 88, 062302 (2013), 10.1103/PhysRevA.88.062302. In addition, we introduce a deterministic protocol named "TWQKD six-state" and compute an analytical lower bound (which can be tightened) for the maximum amount of information that an eavesdropper could extract in this case. An interesting advantage of our approach to the security analysis of TWQKD is the great simplicity and transparency of the derivations.

  2. 75 FR 81371 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security/United States...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-12-28

    .../United States Citizenship and Immigration Services- 012 Citizenship and Immigration Data Repository... of records titled ``Department of Homeland Security/United States Citizenship and Immigration Services-012 Citizenship and Immigration Data Repository System of Records'' from certain provisions of...

  3. 78 FR 13931 - Delegation by the Secretary of State to the Assistant Secretary for International Security and...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-03-01

    ... From the Federal Register Online via the Government Publishing Office ] DEPARTMENT OF STATE Delegation by the Secretary of State to the Assistant Secretary for International Security and Nonproliferation of Authority To Submit Certain Matters to Congress Regarding Implementation of the...

  4. Social security reform in the twenty-first century: the United States.

    PubMed

    Gramlich, Edward M

    2002-01-01

    The paper reviews the history of the Social Security system in the United States in the twentieth century and discusses options for the twenty-first. Because of the steady aging of the U.S. population and the impending retirement of the large baby boom cohort, the Social Security program now is in long-term actuarial deficit. The standard twentieth century approach to this actuarial deficit would be to raise payroll taxes enough to pay for anticipated future benefit increases, but for several reasons that approach may not be so popular this time around. The author's preferred approach is a gradual trimming of long-term benefit growth, plus "add on" individual accounts to provide new saving, for the economy and for the retirement system. The paper also criticizes proposals for Social Security reform made by President Clinton and a committee appointed by President Bush, generally because these proposals do not provide enough new saving.

  5. Fault-tolerant controlled deterministic secure quantum communication using EPR states against collective noise

    NASA Astrophysics Data System (ADS)

    Kao, Shih-Hung; Yang, Chun-Wei; Hwang, Tzonelih

    2016-11-01

    This paper proposes two new fault-tolerant controlled deterministic secure quantum communication (CDSQC) protocols based only on Einstein-Podolsky-Rosen (EPR) entangled states. The proposed protocols are designed to be robust against the collective-dephasing noise and the collective-rotation noise, respectively. Compared to the existing fault-tolerant controlled quantum communication protocols, the proposed protocols not only can do without a quantum channel between the receiver and the controller as the state-of-the-art protocols do, but also have the advantage that the number of quantum particles required in the CDSQC protocols is reduced owing to the use of the simplest entangled states.

  6. What Practices in Airport Security Should the United States Implement at Commercial Airports in Light of the Events of September 11, 2001?

    DTIC Science & Technology

    2002-06-01

    NAVAL POSTGRADUATE SCHOOL Monterey, California THESIS WHAT PRACTICES IN AIRPORT SECURITY SHOULD THE UNITED STATES IMPLEMENT AT...COVERED Master’s Thesis 4. TITLE AND SUBTITLE What Practices in Airport Security Should the United States Implement at Commercial...complacency and conflicts of interest. 14. SUBJECT TERMS Airport Security , Aviation Security Systems, Terrorism, Hijacking

  7. Security Culture in Times of War: How Did the Balkan War Affect the Security Cultures in Germany and United States?

    DTIC Science & Technology

    2007-06-01

    like to thank Professor Rafael Biermann and Professor Donald Abenheim for their ongoing support and guidance as thesis advisors and for sharing their...relevant to the increasingly shared security culture among actors in the transitional process. The basic insight is this: culture matters in world...security cultures and changed policy choices. The thesis focuses on two components of security cultures, the shared perception of the use of force and

  8. Countries at Risk: Heightened Human Security Risk to States With Transboundary Water Resources and Instability

    NASA Astrophysics Data System (ADS)

    Veilleux, J. C.; Sullivan, G. S.; Paola, C.; Starget, A.; Watson, J. E.; Hwang, Y. J.; Picucci, J. A.; Choi, C. S.

    2014-12-01

    The Countries at Risk project is a global assessment of countries with transboundary water resources that are at risk for conflict because of high human security instability. Building upon Basins at Risk (BAR) research, our team used updated Transboundary Freshwater Dispute Database georeferenced social and environmental data, quantitative data from global indices, and qualitative data from news media sources. Our assessment considered a combination of analyzing 15 global indices related to water or human security to identify which countries scored as highest risk in each index. From this information, we were able to assess the highest risk countries' human security risk by using a new human security measurement tool, as well as comparing this analysis to the World Bank's Fragile States Index and the experimental Human Security Index. In addition, we identified which countries have the highest number of shared basins, the highest percentage of territory covered by a transboundary basin, and the highest dependency of withdrawal from transboundary waters from outside their country boundaries. By synthesizing these social and environmental data assessments, we identified five countries to analyze as case studies. These five countries are Afghanistan, China, Iraq, Moldova, and Sudan. We created a series of 30 maps to spatial analyze the relationship between the transboundary basins and social and environmental parameters to include population, institutional capacity, and physical geography by country. Finally, we synthesized our spatial analysis, Human Security Key scores, and current events scored by using the BAR scale to determine what aspects and which basins are most at risk with each country in our case studies and how this concerns future global water resources.

  9. Diplomatic Security: State Department Should Better Manage Risks to Residences and Other Soft Targets Overseas

    DTIC Science & Technology

    2015-07-09

    for security upgrades at schools attended by children of U.S. government personnel and off-compound employee association facilities; classified...age American children overseas, of which approximately 8,000 are U.S. government dependents. State provides assistance to almost 200 “American...sponsored” schools worldwide to help provide quality education for children of U.S. government employees.10 U.S. government dependents may also attend

  10. United States National Security Interests and North Korea: Leveraging Common Interests

    DTIC Science & Technology

    2007-06-15

    and discusses its meaning to agreeable solutions. Chapter 5 provides the conclusions and recommendations based on the findings. Specifically, a...each nation. Furthermore, it is assumed that the nations will continue policymaking based on their most recent national security strategies. In... based on having a direct interest in the stability of and influence on North Korea. Background Since the end of World War II, the United States has

  11. Sun-Burned: Space Weather's Impact on United States National Security

    NASA Astrophysics Data System (ADS)

    Stebbins, B.

    2014-12-01

    The heightened media attention surrounding the 2013-14 solar maximum presented an excellent opportunity to examine the ever-increasing vulnerability of US national security and its Department of Defense to space weather. This vulnerability exists for three principal reasons: 1) a massive US space-based infrastructure; 2) an almost exclusive reliance on an aging and stressed continental US power grid; and 3) a direct dependence upon a US economy adapted to the conveniences of space and uninterrupted power. I tailored my research and work for the national security policy maker and military strategists in an endeavor to initiate and inform a substantive dialogue on America's preparation for, and response to, a major solar event that would severely degrade core national security capabilities, such as military operations. Significant risk to the Department of Defense exists from powerful events that could impact its space-based infrastructure and even the terrestrial power grid. Given this ever-present and increasing risk to the United States, my work advocates raising the issue of space weather and its impacts to the level of a national security threat. With the current solar cycle having already peaked and the next projected solar maximum just a decade away, the government has a relatively small window to make policy decisions that prepare the nation and its Defense Department to mitigate impacts from these potentially catastrophic phenomena.

  12. United States and environmental security: Deforestation and conflict in southeast Asia. Master's thesis

    SciTech Connect

    Greenwald, P.T.

    1992-06-01

    In the post Cold War era, the East-West conflict may be succeeded by a new confrontation which pits an industrialized North against a developing South. In June 1992, world attention was fixed on the Earth Summit in Rio de Janeiro. This event marked a milestone in global environmental awareness; but just as the end of the Cold War has provided new opportunities for the US, the world is now faced with new sources of conflict which have advanced to the forefront of the national security debate. Among the new sources of conflict, environmental problems are rapidly becoming preeminent. Within national security debates, those environmental problems which respect no international boundary are of particular concern. Worldwide deforestation, and the related issues of global warming and the loss of biodiversity, represent a clear threat to national security. Two percent of the Earth's rainforests are lost each year; one 'football field' is lost each second. Deforestation has already led to conflict and instability within several regions of the world including Southeast Asia. The United States must recognize the character and dynamics of these new sources of conflict in order to successfully realize its policy aims in national security. The US should preempt conflict through cooperation and develop a shared concern for the environment throughout the world. The US military may play a key role in this effort. Rainforest, Deforestation, Tropical timber, Logging, Southeast Asia, Philippines, Malaysia, Indonesia, Thailand, Burma, Laos, Japan Cambodia, Vietnam, Human rights, Plywood, Pulp, Paper, World Bank, U.S. Agency for International Development.

  13. Synchronized states in a ring of four mutually coupled oscillators and experimental application to secure communications

    NASA Astrophysics Data System (ADS)

    Nana, B.; Woafo, P.

    2011-04-01

    Data encryption has become increasingly important for many applications including phone, internet and satellite communications. Considering the desirable properties of ergodicity and high sensitivity to initial conditions and control parameters, chaotic signals are suitable for encryption systems. Chaotic encryption systems generally have high speed with low cost, which makes them better candidates than many traditional ciphers for multimedia data encryption. In this paper, analytical and numerical methods as well as experimental implementation are used to prove partial and complete synchronized states in a ring of four autonomous oscillators in their chaotic states. Application to secure communication is discussed.

  14. Chaotic synchronization based on nonlinear state-observer and its application in secure communication

    NASA Astrophysics Data System (ADS)

    Chen, Ming-Jie; Li, Dian-Pu; Zhang, Ai-Jun

    2004-06-01

    Chaotic synchronization is a branch of chaotic control. Nowadays, the research and application of chaotic synchronization have become a hot topic and one of the development directions is for the research on chaos. In this paper, a universal nonlinear state-observer is presented for a class of universal chaotic systems to realize the chaotic synchronization, according to the theory of state-observer in the modern control theory. And theoretic analysis and simulation results have illustrated the validity of the approach. Moreover, the approach of synchronization proposed in this paper is very easy, flexible and universal with high synchronization precision. When the approach is applied to secure communication, the results are satisfying.

  15. Improving Control System Cyber-State Awareness using Known Secure Sensor Measurements

    SciTech Connect

    Ondrej Linda; Milos Manic; Miles McQueen

    2012-09-01

    Abstract—This paper presents design and simulation of a low cost and low false alarm rate method for improved cyber-state awareness of critical control systems - the Known Secure Sensor Measurements (KSSM) method. The KSSM concept relies on physical measurements to detect malicious falsification of the control systems state. The KSSM method can be incrementally integrated with already installed control systems for enhanced resilience. This paper reviews the previously developed theoretical KSSM concept and then describes a simulation of the KSSM system. A simulated control system network is integrated with the KSSM components. The effectiveness of detection of various intrusion scenarios is demonstrated on several control system network topologies.

  16. Technical Training Skills Needs of Youth for Sustainable Job Security in Rice Production in Ebonyi State, Nigeria

    ERIC Educational Resources Information Center

    Edu, Chukwuma Nwofe; Ogba, Ernest Ituma

    2016-01-01

    The study identifies technical training skills needs of youth for sustainable job security in rice production in Ebonyi State, Nigeria. This study was carried out in secondary schools in three educational zones in Ebonyi State, Nigeria. Ebonyi state is one of the states in the southeast geopolitical zone in Nigeria. Descriptive survey design was…

  17. 12 CFR 362.8 - Restrictions on activities of insured state nonmember banks affiliated with certain securities...

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... DEPOSIT INSURANCE CORPORATION REGULATIONS AND STATEMENTS OF GENERAL POLICY ACTIVITIES OF INSURED STATE... with any securities underwriting affiliate company that directly engages in the public sale, distribution or underwriting of stocks, bonds, debentures, notes, or other securities activity, of a type...

  18. 76 FR 24905 - Privacy Act of 1974; Department of Homeland Security United States Coast Guard-DHS/USCG-007...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-05-03

    ... SECURITY Office of the Secretary Privacy Act of 1974; Department of Homeland Security United States Coast Guard--DHS/USCG-007 Special Needs Program System of Records AGENCY: Privacy Office, DHS. ACTION: Notice of Privacy Act system of records. SUMMARY: In accordance with the Privacy Act of 1974, the...

  19. Science and the Energy Security Challenge: The Example of Solid-State Lighting

    ScienceCinema

    Philips, Julia [Sandia

    2016-07-12

    Securing a viable, carbon neutral energy future for humankind will require an effort of gargantuan proportions. As outlined clearly in a series of workshops sponsored by the DOE Office of Basic Energy Sciences (http://www.sc.doe.gov/bes/reports/list.html), fundamental advances in scientific understanding are needed to broadly implement many of the technologies that are held out as promising options to meet future energy needs, ranging from solar energy, to nuclear energy, to approaches to clean combustion. Using solid state lighting based on inorganic materials as an example, I will discuss some recent results and new directions, emphasizing the multidisciplinary, team nature of the endeavor. I will also offer some thoughts about how to encourage translation of the science into attractive, widely available products – a significant challenge that cannot be ignored. This case study offers insight into approaches that are likely to be beneficial for addressing other aspects of the energy security challenge.

  20. Improving the security of protocols of quantum key agreement solely using Bell states and Bell measurement

    NASA Astrophysics Data System (ADS)

    Zhu, Zhen-Chao; Hu, Ai-Qun; Fu, An-Min

    2015-11-01

    In a recent study, Shukla et al. (Quantum Inf Process 13:2391-2405, 2014) proposed two quantum key agreement protocols based on Bell state and Bell measurement, and they claimed that their two protocols were secure. However, in this study, we will show that the three-party protocol they proposed is not secure. Any participant in the protocol can directly obtain other two participants' secret keys. More seriously, two dishonest participants in the protocol can conclude to determine the shared key alone. Furthermore, we will show that there is another minor flaw in their two protocols; that is, eavesdroppers can flip any bit of the final key without introducing any error. In the end, some possible improvements are proposed to avoid these flaws.

  1. Social security and mortality: the role of income support policies and population health in the United States.

    PubMed

    Arno, Peter S; House, James S; Viola, Deborah; Schechter, Clyde

    2011-05-01

    Social Security is the most important and effective income support program ever introduced in the United States, alleviating the burden of poverty for millions of elderly Americans. We explored the possible role of Social Security in reducing mortality among the elderly. In support of this hypothesis, we found that declines in mortality among the elderly exceeded those among younger age groups following the initial implementation of Social Security in 1940, and also in the periods following marked improvements in Social Security benefits via legislation and indexing of benefits that occurred between the mid-1960s and the early 1970s. A better understanding of the link between Social Security and health status among the elderly would add a significant and missing dimension to the public discourse over the future of Social Security, and the potential role of income support programs in reducing health-related socioeconomic disparities and improving population health.

  2. A Secure Key Distribution System of Quantum Cryptography Based on the Coherent State

    NASA Technical Reports Server (NTRS)

    Guo, Guang-Can; Zhang, Xiao-Yu

    1996-01-01

    The cryptographic communication has a lot of important applications, particularly in the magnificent prospects of private communication. As one knows, the security of cryptographic channel depends crucially on the secrecy of the key. The Vernam cipher is the only cipher system which has guaranteed security. In that system the key must be as long as the message and most be used only once. Quantum cryptography is a method whereby key secrecy can be guaranteed by a physical law. So it is impossible, even in principle, to eavesdrop on such channels. Quantum cryptography has been developed in recent years. Up to now, many schemes of quantum cryptography have been proposed. Now one of the main problems in this field is how to increase transmission distance. In order to use quantum nature of light, up to now proposed schemes all use very dim light pulses. The average photon number is about 0.1. Because of the loss of the optical fiber, it is difficult for the quantum cryptography based on one photon level or on dim light to realize quantum key-distribution over long distance. A quantum key distribution based on coherent state is introduced in this paper. Here we discuss the feasibility and security of this scheme.

  3. Field test of a practical secure communication network with decoy-state quantum cryptography.

    PubMed

    Chen, Teng-Yun; Liang, Hao; Liu, Yang; Cai, Wen-Qi; Ju, Lei; Liu, Wei-Yue; Wang, Jian; Yin, Hao; Chen, Kai; Chen, Zeng-Bing; Peng, Cheng-Zhi; Pan, Jian-Wei

    2009-04-13

    We present a secure network communication system that operated with decoy-state quantum cryptography in a real-world application scenario. The full key exchange and application protocols were performed in real time among three nodes, in which two adjacent nodes were connected by approximate 20 km of commercial telecom optical fiber. The generated quantum keys were immediately employed and demonstrated for communication applications, including unbreakable real-time voice telephone between any two of the three communication nodes, or a broadcast from one node to the other two nodes by using one-time pad encryption.

  4. State Regulatory Authority (SRA) Coordination of Safety, Security, and Safeguards of Nuclear Facilities: A Framework for Analysis

    SciTech Connect

    Mladineo, Stephen V.; Frazar, Sarah L.; Kurzrok, Andrew J.; Martikka, Elina; Hack, Tapani; Wiander, Timo

    2013-05-30

    This paper will explore the development of a framework for conducting an assessment of safety-security-safeguards integration within a State. The goal is to examine State regulatory structures to identify conflicts and gaps that hinder management of the three disciplines at nuclear facilities. Such an analysis could be performed by a State Regulatory Authority (SRA) to provide a self-assessment or as part of technical cooperation with either a newcomer State, or to a State with a fully developed SRA.

  5. Integrating statewide research and education resources for homeland security: the State University System of Florida Consortium on Homeland Security (Invited Paper)

    NASA Astrophysics Data System (ADS)

    Pearson, James E.; Olson, Peter J.

    2005-05-01

    The eleven universities of the State University System of Florida (SUS-FL) have established a consortium to address the full range of homeland security and domestic preparedness requirements for both Florida and the U.S. The Consortium has established the Florida Homeland Security Institute to provide an effective and efficient mechanism to coordinate, mobilize, combine, and form into teams the diverse, cross-disciplinary expertise, facilities, and established large base of technology development activities within the SUS-FL institutions and their established associates at industrial companies, governmental labs, and other universities. The Florida Consortium and Institute may provide a model for other state university systems for how to combine established resources effectively to address specific homeland security and domestic preparedness needs. This paper describes the Consortium and Institute goals, structure, and operations, with examples of how it has functioned in its brief existence as an effective mechanism for integrating the wide range of university, industry, and government capabilities within the state for addressing homeland security requirements.

  6. Finite-key security analyses on passive decoy-state QKD protocols with different unstable sources.

    PubMed

    Song, Ting-Ting; Qin, Su-Juan; Wen, Qiao-Yan; Wang, Yu-Kun; Jia, Heng-Yue

    2015-10-16

    In quantum communication, passive decoy-state QKD protocols can eliminate many side channels, but the protocols without any finite-key analyses are not suitable for in practice. The finite-key securities of passive decoy-state (PDS) QKD protocols with two different unstable sources, type-II parametric down-convention (PDC) and phase randomized weak coherent pulses (WCPs), are analyzed in our paper. According to the PDS QKD protocols, we establish an optimizing programming respectively and obtain the lower bounds of finite-key rates. Under some reasonable values of quantum setup parameters, the lower bounds of finite-key rates are simulated. The simulation results show that at different transmission distances, the affections of different fluctuations on key rates are different. Moreover, the PDS QKD protocol with an unstable PDC source can resist more intensity fluctuations and more statistical fluctuation.

  7. Finite-key security analyses on passive decoy-state QKD protocols with different unstable sources

    PubMed Central

    Song, Ting-Ting; Qin, Su-Juan; Wen, Qiao-Yan; Wang, Yu-Kun; Jia, Heng-Yue

    2015-01-01

    In quantum communication, passive decoy-state QKD protocols can eliminate many side channels, but the protocols without any finite-key analyses are not suitable for in practice. The finite-key securities of passive decoy-state (PDS) QKD protocols with two different unstable sources, type-II parametric down-convention (PDC) and phase randomized weak coherent pulses (WCPs), are analyzed in our paper. According to the PDS QKD protocols, we establish an optimizing programming respectively and obtain the lower bounds of finite-key rates. Under some reasonable values of quantum setup parameters, the lower bounds of finite-key rates are simulated. The simulation results show that at different transmission distances, the affections of different fluctuations on key rates are different. Moreover, the PDS QKD protocol with an unstable PDC source can resist more intensity fluctuations and more statistical fluctuation. PMID:26471947

  8. 12 CFR 208.34 - Recordkeeping and confirmation of certain securities transactions effected by State member banks.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 12 Banks and Banking 2 2010-01-01 2010-01-01 false Recordkeeping and confirmation of certain securities transactions effected by State member banks. 208.34 Section 208.34 Banks and Banking FEDERAL RESERVE SYSTEM BOARD OF GOVERNORS OF THE FEDERAL RESERVE SYSTEM MEMBERSHIP OF STATE BANKING...

  9. 76 FR 28795 - Privacy Act of 1974; Department of Homeland Security United States Coast Guard-024 Auxiliary...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-05-18

    ... titled, ``Department of Homeland Security/United States Coast Guard-024 Auxiliary Database (AUXDATA... Coast Guard to track and report contact, activity, performance, and achievement information about the members of its volunteer workforce element, the United States Coast Guard Auxiliary. As a result of...

  10. Security Analysis of an Arbitrated Quantum Signature Scheme with Bell States

    NASA Astrophysics Data System (ADS)

    Xu, Guoliang; Zou, Xiangfu

    2016-09-01

    Recently, to resist attacks using the anticommutativity of nontrivial Pauli operators, an arbitrated quantum signature scheme with Bell states (Int. J. Theor. Phys. 53(5), 1569-1579 2014) was proposed. The scheme randomly adds Hadamard operations to strengthen the quantum one-time pad encryption. Based on this, it claimed that the scheme could resist the receiver's existential forgery and no party had chances to change the message without being discovered. This paper introduces two security issues of the scheme: It can't resist the signer's disavowal and the receiver's existential forgery. Furthermore, we show that the scheme is still vulnerable to the receiver's existential forgery even if the Hadamard operation in the encryption algorithm is replaced with any 2nd-order unitary operation.

  11. Mixed coherent states in coupled chaotic systems: Design of secure wireless communication

    NASA Astrophysics Data System (ADS)

    Vigneshwaran, M.; Dana, S. K.; Padmanaban, E.

    2016-12-01

    A general coupling design is proposed to realize a mixed coherent (MC) state: coexistence of complete synchronization, antisynchronization, and amplitude death in different pairs of similar state variables of the coupled chaotic system. The stability of coupled system is ensured by the Lyapunov function and a scaling of each variable is also separately taken care of. When heterogeneity as a parameter mismatch is introduced in the coupled system, the coupling function facilitates to retain its coherence and displays the global stability with renewed scaling factor. Robust synchronization features facilitated by a MC state enable to design a dual modulation scheme: binary phase shift key (BPSK) and parameter mismatch shift key (PMSK), for secure data transmission. Two classes of decoders (coherent and noncoherent) are discussed, the noncoherent decoder shows better performance over the coherent decoder, mostly a noncoherent demodulator is preferred in biological implant applications. Both the modulation schemes are demonstrated numerically by using the Lorenz oscillator and the BPSK scheme is demonstrated experimentally using radio signals.

  12. Midwives as drivers of reproductive health commodity security in Kaduna State, Nigeria

    PubMed Central

    Alayande, Audu; Mamman-Daura, Fatima; Adedeji, Olanike; Muhammad, Ado Zakari

    2016-01-01

    Abstract Objectives: The significant improvement in the contraceptive prevalence rate in Kaduna State, Nigeria, from 8.4% in 2008 to 18.5% in 2013 is a notable achievement. This article analyses the role of midwives as drivers of reproductive health commodity security (RHCS) and their impact on contraceptive use in Kaduna State. Methods: The United Nations Population Fund (UNFPA) supported the bimonthly review resupply meetings facilitated by midwives at State and local government area (LGA) levels. The midwives deliver contraception to the LGAs for onward distribution to 6974 of the 25,000 health facilities across the country according to usage data from the previous 2 months. They also collect requisition, issue and resupply form data from the previous 2 months. Results: The active participation of midwives at the bimonthly meetings improved data timeliness by 23% and data completeness by 50% in 1 year. Only one health facility ran out of intrauterine devices and only 17% reported running out of female condoms. The total number of contraceptives issued increased from 31,866 in 2012 to 177,828 in 2013, resulting in a couple–year protection increase from 3408 in 2012 to 102,207 in 2013. Conclusions: Creation of increased demand and engagement of midwives in providing family planning services, especially long-acting contraceptive methods, coupled with the removal of cost to the user and the strengthening of the supply chain have been major factors in more than doubling the contraceptive prevalence rate. PMID:26909871

  13. State-society relations and electricity infrastructure: Negotiating national energy security in Sri Lanka

    NASA Astrophysics Data System (ADS)

    Caron, Cynthia Marie

    In this dissertation, I use electricity production and distribution and grid expansion as a lens to view and understand state-society relations. After discussing how electricity has resource-like characteristics and institutional characteristics as a field of organization, I examine how groups in society interact with state officials and their corresponding institutions over electricity production and distribution and the pursuit of national energy security. Taking Sri Lanka as the focus of my inquiry, I conducted a qualitative research project to: (1) identify how class, ethnicity, and locality (urban or rural location) are constitutive of and constituted by electricity-infrastructure development and grid expansion initiatives; (2) identify how grid expansion contributes to processes of social inclusion and exclusion by reconstituting on-grid and off-grid populations, and; (3) determine the effects of privatization and environmental regulation on relationships between the state and groups in society. The methodological approaches include analyses of open-ended interviews, participant observation, surveys of government documents, and speeches and sermons delivered at protests against power-plant sitings to examine how groups in society engage the state as a social force. The study finds that privatization occurring in Sri Lanka's energy sector may have the effect of maintaining exclusion from electricity access rather than increasing access to electricity as the neoliberal paradigm asserts. Environmental regulations enable groups in society to include their concerns into the development process and to challenge state decision making that have been made on their behalf by the Ceylon Electricity Board (CEB). The research suggests that class, ethnic, and rural-urban relations are constitutive factors in electricity production and distribution that complement foci on the technical and economic dimensions of electricity-infrastructure planning.

  14. Suspicious Indicators and Security Countermeasures for Foreign Collection Activities Directed Against the United States

    DTIC Science & Technology

    2006-06-19

    DEPARTMENT OF COMMERCE Office of Security Suspicious Indicators and Security Countermeasures for Foreign Collection...NUMBER 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) Robert H. Department of Commerce ,Office of Security,Norfolk,VA,23669 8. PERFORMING...faxing, mailing, e -mailing, or telephoning to individual U.S. persons rather than corporate marketing departments. The requests may involve surveys or

  15. Compact, diode-pumped, solid-state lasers for next generation defence and security sensors

    NASA Astrophysics Data System (ADS)

    Silver, M.; Lee, S. T.; Borthwick, A.; McRae, I.; Jackson, D.; Alexander, W.

    2015-06-01

    Low-cost semiconductor laser diode pump sources have made a dramatic impact in sectors such as advanced manufacturing. They are now disrupting other sectors, such as defence and security (D&S), where Thales UK is a manufacturer of sensor systems for application on land, sea, air and man portable. In this talk, we will first give an overview of the market trends and challenges in the D&S sector. Then we will illustrate how low cost pump diodes are enabling new directions in D&S sensors, by describing two diode pumped, solid- state laser products currently under development at Thales UK. The first is a new generation of Laser Target Designators (LTD) that are used to identify targets for the secure guiding of munitions. Current systems are bulky, expensive and require large battery packs to operate. The advent of low cost diode technology, merged with our novel solid-state laser design, has created a designator that will be the smallest, lowest cost, STANAG compatible laser designator on the market. The LTD delivers greater that 50mJ per pulse up to 20Hz, and has compact dimensions of 125×70×55mm. Secondly, we describe an ultra-compact, eye-safe, solid-state laser rangefinder (LRF) with reduced size, weight and power consumption compared to existing products. The LRF measures 100×55×34mm, weighs 200g, and can range to greater than 10km with a single laser shot and at a reprate of 1Hz. This also leverages off advances in laser pump diodes, but also utilises low cost, high reliability, packaging technology commonly found in the telecoms sector. As is common in the D&S sector, the products are designed to work in extreme environments, such as wide temperature range (-40 to +71°C) and high levels of shock and vibration. These disruptive products enable next- generation laser sensors such as rangefinders, target designators and active illuminated imagers.

  16. Technical cooperation on nuclear security between the United States and China : review of the past and opportunities for the future.

    SciTech Connect

    Pregenzer, Arian Leigh

    2011-12-01

    The United States and China are committed to cooperation to address the challenges of the next century. Technical cooperation, building on a long tradition of technical exchange between the two countries, can play an important role. This paper focuses on technical cooperation between the United States and China in the areas of nonproliferation, arms control and other nuclear security topics. It reviews cooperation during the 1990s on nonproliferation and arms control under the U.S.-China Arms Control Exchange, discusses examples of ongoing activities under the Peaceful Uses of Technology Agreement to enhance security of nuclear and radiological material, and suggests opportunities for expanding technical cooperation between the defense nuclear laboratories of both countries to address a broader range of nuclear security topics.

  17. Robust quantum secure direct communication and authentication protocol against decoherence noise based on six-qubit DF state

    NASA Astrophysics Data System (ADS)

    Chang, Yan; Zhang, Shi-Bin; Yan, Li-Li; Han, Gui-Hua

    2015-05-01

    By using six-qubit decoherence-free (DF) states as quantum carriers and decoy states, a robust quantum secure direct communication and authentication (QSDCA) protocol against decoherence noise is proposed. Four six-qubit DF states are used in the process of secret transmission, however only the |0‧⟩ state is prepared. The other three six-qubit DF states can be obtained by permuting the outputs of the setup for |0‧⟩. By using the |0‧⟩ state as the decoy state, the detection rate and the qubit error rate reach 81.3%, and they will not change with the noise level. The stability and security are much higher than those of the ping-pong protocol both in an ideal scenario and a decoherence noise scenario. Even if the eavesdropper measures several qubits, exploiting the coherent relationship between these qubits, she can gain one bit of secret information with probability 0.042. Project supported by the National Natural Science Foundation of China (Grant No. 61402058), the Science and Technology Support Project of Sichuan Province of China (Grant No. 2013GZX0137), the Fund for Young Persons Project of Sichuan Province of China (Grant No. 12ZB017), and the Foundation of Cyberspace Security Key Laboratory of Sichuan Higher Education Institutions, China (Grant No. szjj2014-074).

  18. Should Cops Be Spies? Evaluating the Collection and Sharing of National Security Intelligence by State, Local and Tribal Law Enforcement

    DTIC Science & Technology

    2013-03-01

    to form the Department of Homeland Security” ( Clovis , 2006, p. 1). This new cabinet–level department was “composed of nearly 180,000 federal...... Clovis , 2006, p. 6). These issues are highlighted in regards to how state, local and tribal law enforcement understand classified national security

  19. Development and Validation of Mechanical Engineering Trade Skills Assessment Instrument for Sustainable Job Security in Yobe State

    ERIC Educational Resources Information Center

    Adamu, Gishua Garba; Dawha, Josphine Musa; Kamar, Tiamiyu Salihu

    2015-01-01

    Mechanical Engineering Trade Skills Assessment Instrument (METSAI) is aimed at determining the extent to which students have acquired practical skills before graduation that will enable them get employment for sustainable job security in Yobe state. The study employed instrumentation research design. The populations of the study were 23 mechanical…

  20. 76 FR 66940 - Privacy Act of 1974; Department of Homeland Security/United States Secret Service-004 Protection...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-10-28

    ... Service--004 Protection Information System of Records AGENCY: Privacy Office, DHS. ACTION: Notice of..., ``Department of Homeland Security/United States Secret Service--004 Protection Information System of Records.'' As a result of biennial review of this system, information has been updated within the categories...

  1. United States-Japanese National Interests in Asia: Security in the 1990s

    DTIC Science & Technology

    1989-12-01

    National Security," in International Security, Vol. II, No. 2, Fall 1986, for a critique and rebuttal of the Maritime Strategy. 3 ’Julian S . Corbett...DOWNGRADING SCHEDULE Distribution is unlimited 4. PERFORMING ORGANIZATION REPORT NUMBER( S ) S . MONITORING ORGANIZATION REPORT NUMBER( S ) 6a. NAME OF...Interests in Asia: Security in the 1990s 12. PERSONAL AUTHOR( S ) Staples, Mark T. 13a. TYPE OF REPORT 13b. TIME COVERED 14. DATE OF REPORT (year, month, day

  2. 76 FR 78085 - Permissible Investments for Federal and State Savings Associations: Corporate Debt Securities

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-12-15

    ... requirement if, based on the assessment of the savings association, the issuer presents a low risk of default... total capital, write-down the value of the security to reflect an impairment, or divest the security... satisfy this requirement if the savings association appropriately determines that the obligor presents...

  3. Geothermal heating retrofit at the Utah State Prison Minimum Security Facility. Final report, March 1979-January 1986

    SciTech Connect

    Not Available

    1986-01-01

    This report is a summary of progress and results of the Utah State Prison Geothermal Space Heating Project. Initiated in 1978 by the Utah State Energy Office and developed with assistance from DOE's Division of Geothermal and Hydropower Technologies PON program, final construction was completed in 1984. The completed system provides space and water heating for the State Prison's Minimum Security Facility. It consists of an artesian flowing geothermal well, plate heat exchangers, and underground distribution pipeline that connects to the existing hydronic heating system in the State Prison's Minimum Security Facility. Geothermal water disposal consists of a gravity drain line carrying spent geothermal water to a cooling pond which discharges into the Jordan River, approximately one mile from the well site. The system has been in operation for two years with mixed results. Continuing operation and maintenance problems have reduced the expected seasonal operation from 9 months per year to 3 months. Problems with the Minimum Security heating system have reduced the expected energy contribution by approximately 60%. To date the system has saved the prison approximately $18,060. The total expenditure including resource assessment and development, design, construction, performance verification, and reporting is approximately $827,558.

  4. Security for grids

    SciTech Connect

    Humphrey, Marty; Thompson, Mary R.; Jackson, Keith R.

    2005-08-14

    Securing a Grid environment presents a distinctive set of challenges. This paper groups the activities that need to be secured into four categories: naming and authentication; secure communication; trust, policy, and authorization; and enforcement of access control. It examines the current state of the art in securing these processes and introduces new technologies that promise to meet the security requirements of Grids more completely.

  5. Epidemiological and Biological Determinants of Staphylococcus aureus Clinical Infection in New York State Maximum Security Prisons

    PubMed Central

    Miko, Benjamin A.; Befus, Montina; Herzig, Carolyn T. A.; Mukherjee, Dhritiman V.; Apa, Zoltan L.; Bai, Ruo Yu; Tanner, Joshua P.; Gage, Dana; Genovese, Maryann; Koenigsmann, Carl J.; Larson, Elaine L.; Lowy, Franklin D.

    2015-01-01

    Background. Large outbreaks of Staphylococcus aureus (SA) infections have occurred in correctional facilities across the country. We aimed to define the epidemiological and microbiological determinants of SA infection in prisons to facilitate development of prevention strategies for this underserved population. Methods. We conducted a case-control study of SA infection at 2 New York State maximum security prisons. SA-infected inmates were matched with 3 uninfected controls. Subjects had cultures taken from sites of infection and colonization (nose and throat) and were interviewed via structured questionnaire. SA isolates were characterized by spa typing. Bivariate and multivariable analyses were conducted using conditional logistic regression. Results. Between March 2011 and January 2013, 82 cases were enrolled and matched with 246 controls. On bivariate analysis, the use of oral and topical antibiotics over the preceding 6 months was strongly associated with clinical infection (OR, 2.52; P < .001 and 4.38, P < .001, respectively). Inmates with clinical infection had 3.16 times the odds of being diabetic compared with inmates who did not have clinical infection (P < .001). Concurrent nasal and/or oropharyngeal colonization was also associated with an increased odds of infection (OR, 1.46; P = .002). Among colonized inmates, cases were significantly more likely to carry the SA clone spa t008 (usually representing the epidemic strain USA300) compared to controls (OR, 2.52; P = .01). Conclusions. Several inmate characteristics were strongly associated with SA infection in the prison setting. Although many of these factors were likely present prior to incarceration, they may help medical staff identify prisoners for targeted prevention strategies. PMID:25810281

  6. Identifying and Mitigating Risks in Security Sector Assistance for Africa’s Fragile States

    DTIC Science & Technology

    2015-01-01

    Ball, Piet Biesheuvel, Tom Hamilton -Baillie, and ‘Funmi Olonisakin, Security and Justice Sector Reform Programming in Africa, Evaluation Working...2013. 18 Alice Hills, “Trojan Horses? USAID, Counterterrorism, and Africa’s Police,” Third World Quarterly, Vol. 27, No. 4, 2006, pp. 629–643. 19 Gerard...Development, April 2005. Ball, Nicole, Piet Biesheuvel, Tom Hamilton -Baillie, and ‘Funmi Olonisakin, Security and Justice Sector Reform Programming in

  7. Secure and robust transmission and verification of unknown quantum states in Minkowski space.

    PubMed

    Kent, Adrian; Massar, Serge; Silman, Jonathan

    2014-01-28

    An important class of cryptographic applications of relativistic quantum information work as follows. B generates a random qudit and supplies it to A at point P. A is supposed to transmit it at near light speed c to to one of a number of possible pairwise spacelike separated points Q1, …, Qn. A's transmission is supposed to be secure, in the sense that B cannot tell in advance which Qj will be chosen. This poses significant practical challenges, since secure reliable long-range transmission of quantum data at speeds near to c is presently not easy. Here we propose different techniques to overcome these diffculties. We introduce protocols that allow secure long-range implementations even when both parties control only widely separated laboratories of small size. In particular we introduce a protocol in which A needs send the qudit only over a short distance, and securely transmits classical information (for instance using a one time pad) over the remaining distance. We further show that by using parallel implementations of the protocols security can be maintained in the presence of moderate amounts of losses and errors.

  8. Secure and Robust Transmission and Verification of Unknown Quantum States in Minkowski Space

    PubMed Central

    Kent, Adrian; Massar, Serge; Silman, Jonathan

    2014-01-01

    An important class of cryptographic applications of relativistic quantum information work as follows. B generates a random qudit and supplies it to A at point P. A is supposed to transmit it at near light speed c to to one of a number of possible pairwise spacelike separated points Q1, …, Qn. A's transmission is supposed to be secure, in the sense that B cannot tell in advance which Qj will be chosen. This poses significant practical challenges, since secure reliable long-range transmission of quantum data at speeds near to c is presently not easy. Here we propose different techniques to overcome these diffculties. We introduce protocols that allow secure long-range implementations even when both parties control only widely separated laboratories of small size. In particular we introduce a protocol in which A needs send the qudit only over a short distance, and securely transmits classical information (for instance using a one time pad) over the remaining distance. We further show that by using parallel implementations of the protocols security can be maintained in the presence of moderate amounts of losses and errors. PMID:24469425

  9. United States security strategy for the East Asia-Pacific region

    SciTech Connect

    1998-12-31

    The three years since release of the last East Asia Strategy Report (EASR) have produced important development in the security environment of the Asia-Pacific region. The 1998 EASR outlines a multifaceted regional security strategy, including: maintenance of comprehensive US engagement, including not only the presence of approximately 100,000 US military personnel in Asia but also a variety of other public and private interaction with the region; continued enhancement of the alliance relationships with Japan, Korea, Australia, Thailand and the Philippines; comprehensive engagement with China to build the foundation for a long-term relationship based on cooperation and mutual interest; broadening of cooperation with the nations of Southeast Asia on security and confidence building; expansion of regional cooperation with Russia; support for the development of security pluralism, including expansion of multilateral, minilateral and bilateral dialogue in the region; promotion of democracy; stemming and countering proliferation of weapons of mass destruction (WMD): and increased attention to terrorism, environmental degradation, emerging infectious diseases, drug trafficking and other transnational challenges as critical elements of `comprehensive security.`

  10. There's no place like (a) home: ontological security among persons with serious mental illness in the United States.

    PubMed

    Padgett, Deborah K

    2007-05-01

    As the homelessness 'crisis' in the United States enters a third decade, few are as adversely affected as persons with serious mental illness. Despite recent evidence favoring a 'housing first' approach, the dominant 'treatment first' approach persists in which individuals must climb a ladder of program requirements before becoming eligible for an apartment of their own. Drawing upon the concept of 'ontological security', this qualitative study examines the subjective meaning of 'home' among 39 persons who were part of a unique urban experiment that provided New York City's homeless mentally ill adults with immediate access to independent housing in the late 1990s. The study design involved purposively sampling from the experimental (housing first) group (N=21) and the control (treatment first) group (N=18) and conducting two life history interviews with each participant. Markers of ontological security-constancy, daily routines, privacy, and having a secure base for identity construction-provided sensitizing concepts for grounded theory analyses designed to also yield emergent, or new, themes. Findings revealed clear evidence of the markers of ontological security among participants living in their own apartments. This study expands upon previous research showing that homeless mentally ill persons are capable of independent living in the community. The emergent theme of 'what's next' questions and uncertainty about the future points to the need to address problems of stigma and social exclusion that extend beyond the minimal achievement of having a 'home'.

  11. Strategies for Improving Polio Surveillance Performance in the Security-Challenged Nigerian States of Adamawa, Borno, and Yobe During 2009–2014

    PubMed Central

    Hamisu, Abdullahi Walla; Johnson, Ticha Muluh; Craig, Kehinde; Mkanda, Pascal; Banda, Richard; Tegegne, Sisay G.; Oyetunji, Ajiboye; Ningi, Nuhu; Mohammed, Said M.; Adamu, Mohammed Isa; Abdulrahim, Khalid; Nsubuga, Peter; Vaz, Rui G.; Muhammed, Ado J. G.

    2016-01-01

    Background. The security-challenged states of Adamawa, Borno, and Yobe bear most of the brunt of the Boko Haram insurgency in Nigeria. The security challenge has led to the killing of health workers, destruction of health facilities, and displacement of huge populations. To identify areas of polio transmission and promptly detect possible cases of importation in these states, polio surveillance must be very sensitive. Methods. We conducted a retrospective review of acute flaccid paralysis surveillance in the security-compromised states between 2009 and 2014, using the acute flaccid paralysis database at the World Health Organization Nigeria Country Office. We also reviewed the reports of surveillance activities conducted in these security-challenged states, to identify strategies that were implemented to improve polio surveillance. Results. Environmental surveillance was implemented in Borno in 2013 and in Yobe in 2014. All disease surveillance and notification officers in the 3 security-challenged states now receive annual training, and the number of community informants in these states has dramatically increased. Media-based messaging (via radio and television) is now used to sensitize the public to the importance of surveillance, and contact samples have been regularly collected in both states since 2014. Conclusions. The strategies implemented in the security-challenged states improved the quality of polio surveillance during the review period. PMID:26655842

  12. An evaluation of security measures implemented to address physical threats to water infrastructure in the state of Mississippi.

    PubMed

    Barrett, Jason R; French, P Edward

    2013-01-01

    The events of September 11, 2001, increased and intensified domestic preparedness efforts in the United States against terrorism and other threats. The heightened focus on protecting this nation's critical infrastructure included legislation requiring implementation of extensive new security measures to better defend water supply systems against physical, chemical/biological, and cyber attacks. In response, municipal officials have implemented numerous safeguards to reduce the vulnerability of these systems to purposeful intrusions including ongoing vulnerability assessments, extensive personnel training, and highly detailed emergency response and communication plans. This study evaluates fiscal year 2010 annual compliance assessments of public water systems with security measures that were implemented by Mississippi's Department of Health as a response to federal requirements to address these potential terrorist threats to water distribution systems. The results show that 20 percent of the water systems in this state had at least one security violation on their 2010 Capacity Development Assessment, and continued perseverance from local governments is needed to enhance the resiliency and robustness of these systems against physical threats.

  13. The Treatment of Peace and Security Issues in Social Studies Textbooks in the United States.

    ERIC Educational Resources Information Center

    Fleming, Dan B.

    This examination of the treatment given to peace and security issues in American social studies textbooks begins by summarizing the National Council for the Social Studies (NCSS) Curriculum Guidelines and a 1983 study of high school social studies topic priorities. Following a review of past textbook studies and a brief discussion of textbook…

  14. 75 FR 38595 - Guidance to States Regarding Driver History Record Information Security, Continuity of Operation...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-07-02

    ... adhere to standards established by the Federal Information Security Management Act (FISMA). Similar FISMA... authentication to enterprise password management. II. System and Service Unavailability To mitigate the risks... (BIA) to determine: the interdependence of systems and work priorities in the event of a...

  15. The Great Lakes of the United States, National Security and the Budget

    DTIC Science & Technology

    2007-11-02

    suppliers and manufacturers; specialty materials; and limited supply of feedstock and raw materials. For most of the 20th Century the USA has had a...religious, military, financial, political, technology) when developing a national security policy. “The overarching goal of such a globalization- infused

  16. What Are the Security Requirements for a Two-State Solution between Israel and Palestine?

    DTIC Science & Technology

    2011-03-01

    REFUGEES, RIGHT OF RETURN..................... 45 G. DISCUSSION...police force guaranteeing the rule-of-law or a military to protect the borders. It involves every aspect of life . To understand what a peaceful two...government that keeps the rights of its citizens as its primary purpose. For there to be security for Israel and development for Palestine, both must

  17. United States Security and Salt Two. Report of a Wingspread Conference (Racine, Wisconsin, February 9, 1979).

    ERIC Educational Resources Information Center

    McLain, Douglas, Jr.

    Eugene Rostow (Yale University) and David Tarr (University of Wisconsin) present their views concerning the wisdom and validity of U.S. security policies, including SALT, and the adequacy of the country's political/military planning. Rostow, representing the views of the Committee on the Present Danger, believes that America is losing the…

  18. 77 FR 33634 - U.S. Treasury Securities-State and Local Government Series

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-06-07

    ... revising the definition of ``Y'' in the annualized effective Demand Deposit rate calculation formula to clarify the calculation method to be used during a year that contains a leap day. DATES: This final rule... will prevent the calculation of the rates for SLGS securities from resulting in negative rates....

  19. United States Responses to Japanese Wartime Inhuman Experimentation after World War II: National Security and Wartime Exigency

    PubMed Central

    Brody, Howard; Leonard, Sarah E.; Nie, Jing-Bao; Weindling, Paul

    2015-01-01

    In 1945-46, representatives of the United States government made similar discoveries in both Germany and Japan, unearthing evidence of unethical experiments on human beings that could be viewed as war crimes. The outcomes in the two defeated nations, however, were strikingly different. In Germany, the U.S., influenced by the Canadian physician John Thompson, played a key role in bringing Nazi physicians to trial and publicizing their misdeeds. In Japan, the U.S. played an equally key role in concealing information about the biological warfare experiments and securing immunity from prosecution for the perpetrators. The greater force of appeals to national security and wartime exigency help to explain these different outcomes. PMID:24534743

  20. Security Notice To Federal, State and Local Officials Receiving Access to the Risk Management Program’s Off-site Consequence Analysis Information

    EPA Pesticide Factsheets

    Based on the Chemical Safety Information, Site Security and Fuels Regulatory Relief Act (CSISSFRRA), this notice states that while you may share with the public data from OCA sections, it is illegal to disclose/distribute the sections themselves.

  1. United States Security Assistance Training of Latin American Militaries: Intentions and Results.

    DTIC Science & Technology

    1995-09-01

    nuns, the 1980 murder of Archbishop Romero, the 1982 El Mozate massacre of 600 civilians, and the 1989 murder of Jesuits . Other SOA graduates were...Salvador’s armed forces have been linked to the killing of Archbishop Romero, the Maryknoll nuns, El Mozate massacre, and the 1989 murder of Jesuits ...the November 1989 murder of the six Jesuit priests (GAO, 1991: 27). Francisco Elena of the Salvadoran army, a security assistance trained graduate

  2. National Security Mission, Members and Budgeting in the United States and Australia: A Comparative Analysis

    DTIC Science & Technology

    2011-06-01

    U.S. General Services Administration HHS Department of Health and Human Services HSAC Homeland Security Advisory Committee JUG Joined-Up...to thank my wife, Jenni, for her unwavering support, endless patience and critical eye. Without her friendship, love, and laughter none of this...horizontally and vertically co-ordinated thinking and action. Through the co-ordination it is hoped that a number of benefits can be achieved. First

  3. United States Security Policy Implications of a Post-Fidel Cuba

    DTIC Science & Technology

    2012-03-10

    trigger a security crisis.62 U.S. Ambassador Vicki Huddleston frames the exodus problem in 2010’s Learning to Salsa : The scale of future migration...Sweig, U.S. Ambassador and co-author of Learning to Salsa , Vicki Huddleston, and Congressional Research Service (CRS) Cuba expert, Mark Sullivan to...name a notable few. 27 Huddleston, Vicki and Carlos Pascual, Learning to Salsa : New Steps in U.S.-Cuba Relations (Washington, DC: Brookings

  4. The Securitization of Migration: An Analysis of United States Border Security and Migration Policy Toward Mexico

    DTIC Science & Technology

    2013-03-01

    5 Buzan et al., Security, 33. 6 Ronald Mize and Alicia Swords, Consuming Mexican Labor: From the Bracero Program to NAFTA (University of Toronto...December 1923 to March 1925, 68th Congress 1923–1925, Vol 43 Part 1 Public Laws (Government Printing Office, Washington, D.C.), 240. 109 Kelly Hernandez ...Edward M. Kennedy (Washington, D.C.: Government Printing Office, 1980), 27. 115 Hernandez , Migra! 76–77. See also Josiah Heyman, “Putting Power in the

  5. Environmental Security in the Danube River Basin: Policy Implications for the United States

    DTIC Science & Technology

    1999-01-01

    of the canal in 1845, which operated for over a century. First conceived by Emperor Charlemagne in the eighth century, this 1 71 kilometer trans...Mathews, J. 1989. Redefining Security. Foreign Aflairs, 68(2): 162- 183. McEvedy, C. 1967. m e Penguin Atlas ofAncient History. Hong Kong: Penguin Books... Penguin Books. 122 9. A - B - C - D - E - F - G - H - I - Metrics for Policy Formulation and Evaluation Environmental Decision

  6. The Origin of the United States Security Commitment to the Republic of Korea

    DTIC Science & Technology

    1987-06-01

    to end or even significantly change them. In much the same manner as the administration, the bureaucracy can acquire a stake in the commitment as a...of the struggle between the US and the USSR and between democracy and Cornunism. As this view has changed over the years, as the Cold War has ebbed and...flowed, the perceived utility of the security commitment to the ROK has changed also. By contrast, the ROK has been constantly confronted with a

  7. United States-Nigeria Relations: Impact on Nigeria’s Security

    DTIC Science & Technology

    2014-12-01

    of the prominent diseases include malaria, tuberculosis , hepatitis, cholera, typhoid, HIV/AIDS, and most recently Ebola virus disease (EVD...treatment for the prevention of mother-to-child transmission.110 The figure is better than in South Africa, with a prevalence infection rate of 10 percent...various sectors of the economy. Research also reveals that HIV/AIDS is more prevalent among the security forces than the civilians.112 Thus, an infected

  8. United States Seaport Security: Protection Against a Nuclear Device Attack Delivered in a Shipping Cargo Container

    DTIC Science & Technology

    2014-06-13

    help my wife and kids in their times of need cannot be conveyed in words. Lastly, I would like to express appreciation to my beloved wife of eleven...and Gulf of Mexico. Inner coastal ports, river terminals, and Great Lakes shipping ports will not be considered. The research on this subject is...2007, PLB’s security division placed in full-time service two video - equipped submersible robots (worth $30,000 each) outfitted with video , sonar

  9. Establishing public health security in a postwar Iraq: constitutional obstacles and lessons for other federalizing states.

    PubMed

    Wilson, Kumanan; Fidler, David P; McDougall, Christopher W; Lazar, Harvey

    2009-06-01

    The public health consequences of the conflict in Iraq will likely continue after the violence has subsided. Reestablishing public health security will require large investments in infrastructure and the creation of effective systems of governance. On the question of governance, the allocation of powers in the new constitution of Iraq is critical. Given the ease with which public health threats cross borders, the constitution needs to grant to the federal government the legal authority to manage such threats and simultaneously meet international requirements. Unfortunately, the draft constitution does not accomplish this objective. If politically possible, the constitution should be amended to provide the federal government with this authority. If not possible, the Iraqi federal government would have two options. It could attempt to use alternative constitutional powers, such as national security powers. This option would be contentious and the results uncertain. Alternatively, the federal government could attempt to establish collaborative relationships with regional governments. Residual sectarian tensions create potential problems for this option, however. Reflecting on the Iraqi situation, we conclude that other federalizing countries emerging from conflict should ensure that their constitutions provide the federal government with the necessary authority to manage threats to public health security effectively.

  10. The politics of African energy development: Ethiopia's hydro-agricultural state-building strategy and clashing paradigms of water security.

    PubMed

    Verhoeven, Harry

    2013-11-13

    As key economic, ecological and demographic trends converge to reshape Africa and its relationship with the outside world, a new politics is emerging in the twenty-first century around the water-food-energy nexus, which is central to the continent's relevance in the global economy. On the one hand, Malthusian anxieties are proliferating; pessimists link population growth and growing water scarcity to state failure and 'water wars'. On the other hand, entrepreneurs, sovereign wealth funds and speculators consider Africa's potential in water resources, energy production and food output as one of the last great untapped opportunities for the global economy: Africa is on the brink of an agro-industrial transformation. This article examines how African actors are not merely responding to economic and environmental changes but also thinking politically about water, food and energy security. Many of them are seizing the new opportunities to redefine their national politics, their relationship with local communities and their ties with external players, regionally and globally. Ethiopia's project of hydro-agricultural state-building helps to identify the most important fault lines of this new politics at the national, local and international level. The politics of water security and energy development simultaneously puts African states and their populations on the defensive, as they grapple with huge challenges, but also provides them with unique opportunities to take advantage of a more favourable global configuration of forces.

  11. Advances and current state of the security and privacy in electronic health records: survey from a social perspective.

    PubMed

    Tejero, Antonio; de la Torre, Isabel

    2012-10-01

    E-Health systems are experiencing an impulse in these last years, when many medical agencies began to include digital solutions into their platforms. Electronic Health Records (EHRs) are one of the most important improvements, being in its most part a patient-oriented tool. To achieve a completely operational EHR platform, security and privacy problems have to be resolved, due to the importance of the data included within these records. But given all the different methods to address security and privacy, they still remain in most cases as an open issue. This paper studies existing and proposed solutions included in different scenarios, in order to offer an overview of the current state in EHR systems. Bibliographic material has been obtained mainly from MEDLINE and SCOPUS sources, and over 30 publications have been analyzed. Many EHR platforms are being developed, but most of them present weaknesses when they are opened to the public. These architectures gain significance when they cover all the requisites related to security and privacy.

  12. Do biofuel blending mandates reduce gasoline consumption? Implications of state-level renewable fuel standards for energy security

    NASA Astrophysics Data System (ADS)

    Lim, Shinling

    In an effort to keep America's addiction to oil under control, federal and state governments have implemented a variety of policy measures including those that determine the composition of motor gasoline sold at the pump. Biofuel blending mandates known as Renewable Fuel Standards (RFS) are designed to reduce the amount of foreign crude oil needed to be imported as well as to boost the local ethanol and corn industry. Yet beyond looking at changes in gasoline prices associated with increased ethanol production, there have been no empirical studies that examine effects of state-level RFS implementation on gasoline consumption. I estimate a Generalized Least Squares model for the gasoline demand for the 1993 to 2010 period with state and time fixed effects controlling for RFS. States with active RFS are Minnesota, Hawaii, Missouri, Florida, Washington, and Oregon. I find that, despite the onset of federal biofuel mandates across states in 2007 and the lower energy content of blended gasoline, being in a state that has implemented RFS is associated with 1.5% decrease in gasoline consumption (including blended gasoline). This is encouraging evidence for efforts to lessen dependence on gasoline and has positive implications for energy security.

  13. A Military Campaign Against Gangs: Internal Security Operations in the United States by Active Duty Forces

    DTIC Science & Technology

    1993-05-14

    gangs sprouted as a direct result of the threat from the CRIPs . One of the more well known of these new gangs is the Bloods . Figure 2 - Spread Of The... CRIPs , red for BLOODs , etc. In addition gang members often associate themselves with designer athletic clothing. The gang’s colors are their uniform, much...associated violence and drugs are a real and growing threat to the security of the nation.’ One of the largest street gangs in the country is the CRIPs

  14. United States - Republic of Korea Security Relations: Policy/Strategy for the Future

    DTIC Science & Technology

    1990-06-01

    bok , "Seoul-Moscow Normalization Only at Floating Stage," The Korea Times, 24 April 1990, p. 2. 7Edward A. Olsen, Prospects For An Increased Naval Role...2, No. 4, 1989. Kim, Sung- Bok . "Seoul-Moscow Normalization Only at Floating Stage." The Korea Herald, 24 April 1990, p. 2. Kinnard, Douglas. "The...Public and National Security Policy." Naval War College Review, Autumn 1989, pp. 66-82. Kwang, Soo Choi . "Korea’s Foreign Policy in the 1990’s." Korea

  15. State of the Art of Network Security Perspectives in Cloud Computing

    NASA Astrophysics Data System (ADS)

    Oh, Tae Hwan; Lim, Shinyoung; Choi, Young B.; Park, Kwang-Roh; Lee, Heejo; Choi, Hyunsang

    Cloud computing is now regarded as one of social phenomenon that satisfy customers' needs. It is possible that the customers' needs and the primary principle of economy - gain maximum benefits from minimum investment - reflects realization of cloud computing. We are living in the connected society with flood of information and without connected computers to the Internet, our activities and work of daily living will be impossible. Cloud computing is able to provide customers with custom-tailored features of application software and user's environment based on the customer's needs by adopting on-demand outsourcing of computing resources through the Internet. It also provides cloud computing users with high-end computing power and expensive application software package, and accordingly the users will access their data and the application software where they are located at the remote system. As the cloud computing system is connected to the Internet, network security issues of cloud computing are considered as mandatory prior to real world service. In this paper, survey and issues on the network security in cloud computing are discussed from the perspective of real world service environments.

  16. Weak and Failing States: Evolving Security Threats and U.S. Policy

    DTIC Science & Technology

    2007-11-15

    and procedures for interagency CRS-2 3 Rose E. Brooks, “Failed States, or the State as Failure?” The University of Chicago Law Review 72 (Fall 2005). 4...Weak States and Global Threats: Fact of Fiction?” The Washington Quarterly 29 (2006), pp. 27-53; Rumsfeld (2002), op. cit.; and Ray Takeyh and Nikolas ...government institutions may sometimes be less conducive to a terrorist presence than countries that are still weak, but retain some governmental

  17. Weak and Failing States: Evolving Security Threats and U.S. Policy

    DTIC Science & Technology

    2007-11-15

    and procedures for interagency CRS-2 3 Rose E. Brooks, “Failed States, or the State as Failure?” The University of Chicago Law Review 72 (Fall 2005...Weak States and Global Threats: Fact of Fiction?” The Washington Quarterly 29 (2006), pp. 27-53; Rumsfeld (2002), op. cit.; and Ray Takeyh and Nikolas ...government institutions may sometimes be less conducive to a terrorist presence than countries that are still weak, but retain some governmental

  18. The National Guard’s State Partnerships: Security Cooperation and Force Multiplier

    DTIC Science & Technology

    2013-03-01

    Publishing, 1997), 220. 14 “10 Things about the National Guard State Partnership Program,” July 30, 2012, linked from AFRICOM Home page at “ Wordpress ,” http...July 30, 2012, linked from AFRICOM Home page at “ Wordpress ,” http://africom.wordpress.com/2012/07/30/10- things-about-the-national-guard-state

  19. The Ukrainian Crisis and European Security: Implications for the United States and U.S. Army

    DTIC Science & Technology

    2015-01-01

    American poultry . While in Implications for the United States 19 the medium to long run the losses can be offset by import substitution, in the...with exception of poultry , the United States exports relatively few agri- cultural products or food goods to Russia— about $1.3 billion in 2013. This

  20. Two-step orthogonal-state-based protocol of quantum secure direct communication with the help of order-rearrangement technique

    NASA Astrophysics Data System (ADS)

    Yadav, Preeti; Srikanth, R.; Pathak, Anirban

    2014-12-01

    The Goldenberg-Vaidman (GV) protocol for quantum key distribution uses orthogonal encoding states of a particle. Its security arises because operations accessible to Eve are insufficient to distinguish the two states encoding the secret bit. We propose a two-particle cryptographic protocol for quantum secure direct communication, wherein orthogonal states encode the secret, and security arises from restricting Eve from accessing any two-particle operations. However, there is a non-trivial difference between the two cases. While the encoding states are perfectly indistinguishable in GV, they are partially distinguishable in the bipartite case, leading to a qualitatively different kind of information-versus-disturbance trade-off and also options for Eve in the two cases.

  1. Multi-state Markov model for disability: A case of Malaysia Social Security (SOCSO)

    NASA Astrophysics Data System (ADS)

    Samsuddin, Shamshimah; Ismail, Noriszura

    2016-06-01

    Studies of SOCSO's contributor outcomes like disability are usually restricted to a single outcome. In this respect, the study has focused on the approach of multi-state Markov model for estimating the transition probabilities among SOCSO's contributor in Malaysia between states: work, temporary disability, permanent disability and death at yearly intervals on age, gender, year and disability category; ignoring duration and past disability experience which is not consider of how or when someone arrived in that category. These outcomes represent different states which depend on health status among the workers.

  2. 77 FR 43151 - Permissible Investments for Federal and State Savings Associations: Corporate Debt Securities

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-07-24

    ... 1044 insured state and federal savings associations. Of these 1044 insured savings associations, 356... represents only 0.97 percent of the aggregate total assets of the 1044 savings associations. \\16\\ This...

  3. An Evaluation of Maritime Policy in Meeting the Commercial and Security Needs of the United States

    DTIC Science & Technology

    2009-01-07

    and development of its foreign and domestic commerce that the United States shall have a merchant marine (a) sufficient to carry its domestic water...the policy of the United States to foster the development and encourage the maintenance of such a merchant marine . The legislative authority...world’s most critically endangered large whale species and one of the world’s most endangered mammals. In this regard, the primary cause of the

  4. Weak and Failing States: Evolving Security Threats and U.S. Policy

    DTIC Science & Technology

    2008-04-18

    developing mechanisms and procedures for interagency CRS-2 3 Rose E. Brooks, “Failed States, or the State as Failure?” The University of Chicago Law...27-53; Rumsfeld (2002), op. cit.; and Ray Takeyh and Nikolas Gvosdev, “Do Terrorist Networks Need a Home?” The Washington Quarterly 25 (2002). See also...institutions may sometimes be less conducive to a terrorist presence than countries that are still weak, but retain some governmental effectiveness.14

  5. Weak and Failing States: Evolving Security Threats and U.S. Policy

    DTIC Science & Technology

    2008-08-28

    for International Studies, Working Paper No. 2005/20 (2005); Rose E. Brooks, “Failed States, or the State as Failure?” The University of Chicago Law...Threats: Fact of Fiction?” The Washington Quarterly 29 (2006), pp. 27-53; Rumsfeld (2002), op. cit.; and Ray Takeyh and Nikolas Gvosdev, “Do Terrorist...sometimes be less conducive to a terrorist presence than countries that are still weak, but retain some governmental effectiveness.15 International Crime

  6. German-Israeli Relations: Security of Israel--Reason of State?

    DTIC Science & Technology

    2013-03-01

    political and economic interests, but more importantly by the Holocaust and the resulting sense of responsibility towards Jews and the Jewish state...difficult to get occasional criticism of Israeli government policy and the fundamental responsibility towards Israel as the Jewish state under one...In September 1952, only seven years after World War II and the Holocaust , then Chancellor Adenauer and Israeli Foreign Minister Sharett negotiated

  7. The Strategic Petroleum Reserve: United States energy security, oil politics, and petroleum reserves policies in the twentieth century

    NASA Astrophysics Data System (ADS)

    Beaubouef, Bruce Andre

    The history of U.S. petroleum reserves policies in the twentieth century, including the Strategic Petroleum Reserve (SPR) program, provides a case study of the economic and political aspects of national security, and shows the ways in which the American political economy influences national security. One key problem plagued federal petroleum reserve programs and proposals throughout the twentieth century. In a political economy which traditionally placed strong emphasis upon the sanctity of private property and free markets, could the government develop an emergency petroleum reserve policy despite opposition from the private sector? Previous literature on the SPR and oil-stockpiling programs has largely disregarded the historical perspective, focusing instead upon econometric models, suggesting future oil-stockpiling policy options. This study will also make conclusions about the future of governmental oil-stockpiling policies, particularly with regard to the SPR program, but it will do so informed by a systematic history of the emergency petroleum reserve impulse in the twentieth century. Through a study of the emergency petroleum reserve impulse, one can see how the American political economy of oil and energy changed over the twentieth century. As petroleum became crucial to the military and then economic security of the United States, the federal government sought to develop emergency petroleum reserves first for the military, then for the civilian economy. But while the American petroleum industry could deliver the energy "goods" to American energy consumers at a reasonable price, the companies reigned supreme in the political equation. While that was true, federal petroleum reserve programs and proposals conflicted with and were overwhelmed by the historic American tradition of individual economic and private property rights. The depletion of American petroleum reserves changed that political equation, and the ensuing energy crises of the 1970s not only

  8. Agreed Framework and KEDO: The role of the United States in Korean security

    SciTech Connect

    Gamble, A.J.

    1999-06-01

    The US is moving from a leading security guarantor of the ROK to a mediator of the Korean dispute. The US should understand this fundamental change and adjust its relationship with the ROK and the DPRK to maintain the possibility of Korean reunification. The Agreed Framework is a deal between the US and the DPRK to stop the DPRK`s nuclear program in exchange for energy resources. The Agreed Framework forces the US to go beyond its traditional ROK supportive policy to deal with the DPRK`s nuclear ambition. The US should assess the goals of the PRC, ROK, DPRK, and Japan on the Korean peninsula to determine if a change in policy will enhance the probability of a soft landing by the DPRK. To conduct this assessment, the goals of all nations and the DPRK`s nuclear ambition have been developed. A graphical summary of the subjective analysis was used to pick the US policy option that shows the best credible and clear logic, and mitigates most effectively any international criticism that may dilute the sound reasoning of future policy. The US should change its current policy to mediate the Korean dispute and increase the probability that all concerned actors meet their goals on the Korean peninsula.

  9. PROCESS OF SECURING PLUTONIUM IN NITRIC ACID SOLUTIONS IN ITS TRIVALENT OXIDATION STATE

    DOEpatents

    Thomas, J.R.

    1958-08-26

    >Various processes for the recovery of plutonium require that the plutonium be obtalned and maintained in the reduced or trivalent state in solution. Ferrous ions are commonly used as the reducing agent for this purpose, but it is difficult to maintain the plutonium in a reduced state in nitric acid solutions due to the oxidizing effects of the acid. It has been found that the addition of a stabilizing or holding reductant to such solution prevents reoxidation of the plutonium. Sulfamate ions have been found to be ideally suitable as such a stabilizer even in the presence of nitric acid.

  10. Quantum secret sharing based on reusable Greenberger-Horne-Zeilinger states as secure carriers

    SciTech Connect

    Bagherinezhad, Saber; Karimipour, Vahid

    2003-04-01

    We introduce a protocol for quantum secret sharing based on reusable entangled states. The entangled state between the sender and the receiver acts only as a carrier to which data bits are entangled by the sender and disentangled from it by the receivers, all by local actions of simple gates. We also show that the interception by Eve or the cheating of one of the receivers introduces a quantum bit error rate larger than 25% which can be detected by comparing a subsequence of the bits.

  11. The National Guard State Partnership Program and Regional Security in the Western Balkans

    DTIC Science & Technology

    2014-12-12

    towards a desire of NATO accession as their next big goal. The partnership has also resulted in co-deployments of Bosnian military police and the Maryland...Admiral James Stavridis, who states that the NG SPP “is a very powerful tool. It is unmatched. They are, bang for the buck, one of the best things

  12. Comment on 'Quantum secret sharing based on reusable Greenberger-Horne-Zeilinger states as secure carriers'

    SciTech Connect

    Gao Fei; Guo Fenzhuo; Wen Qiaoyan; Zhu Fuchen

    2005-09-15

    In a recent paper [S. Bagherinezhad and V. Karimipour, Phys. Rev. A 67, 044302 (2003)], a quantum secret sharing protocol based on reusable Greenberger-Horne-Zeilinger states was proposed. However, in this Comment, it is shown that this protocol is insecure if Eve employs a special strategy to attack.

  13. Five States' Innovative Approaches to Welfare: Promoting Economic Security among America's Poor.

    ERIC Educational Resources Information Center

    Tufts Univ., Medford, MA. Center on Hunger, Poverty and Nutrition Policy.

    The Family Support Act of 1988 and the Personal Responsibility and Work Opportunity Reconciliation Act of 1996 provided the basis for a comprehensive reform of welfare programs. This document provides examples of how five states have chosen to implement new provisions in their welfare programs to aid families in achieving greater economic…

  14. Bigger Is Not Always Better - The United States Support to Security Force Assistance

    DTIC Science & Technology

    2015-04-13

    claimed over 200,000 lives.3 Colombia, producer of90% of the cocaine coming into the U.S., was also tom asunder by criminal drug cartels vying for control...With 80 to 90 percent of the cocaine consumed in the United States coming from one country, the narcotics issue was at the top of the bilateral

  15. 48 CFR 52.225-26 - Contractors Performing Private Security Functions Outside the United States.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... means activities engaged in by a Contractor, as follows: (1) Guarding of personnel, facilities... Secretary of Defense and the Secretary of State. (2) For non-DoD contracts, designated areas are areas of... functions believe a weapon was so discharged; or (E) Active, non-lethal countermeasures (other than...

  16. Analysis of Maize versus Ethanol Production in Nebraska, United States and International Agricultural Droughts: Lessons for Global Food Security

    NASA Astrophysics Data System (ADS)

    Boken, V.; Tenkorang, F.

    2012-04-01

    Nebraska is one of the eight main corn (maize) belt states of the United States. Maize is the major crop of Nebraska with an average annual production of about 38 million tons (about 12% of U.S. production), which contributes billions of dollars to the state's economy. The yield of maize has increased significantly over the past century - from 1.6 t/ha in 1900 to 10.4 t/ha in 2010. While the majority of maize (about 40%) is currently used for animal feed and ethanol production, only about six percent is exported. It is estimated that about one billion people accounting for about 15% population of the world live in chronic hunger because of low agricultural productivity and drought. Most of these people depend on the U.S. for grains including maize. If a greater quantity of maize is diverted to ethanol production, considerably less quantity of maize would be available for export to developing countries where it could be used for human consumption and to mitigate hunger and improve food security. This paper presents analysis of maize production in Nebraska for the past three decades and examines how its commercialization for ethanol production has affected its exports in the face of drought at an international level.

  17. Secure portal.

    SciTech Connect

    Nelson, Cynthia Lee

    2007-09-01

    There is a need in security systems to rapidly and accurately grant access of authorized personnel to a secure facility while denying access to unauthorized personnel. In many cases this role is filled by security personnel, which can be very costly. Systems that can perform this role autonomously without sacrificing accuracy or speed of throughput are very appealing. To address the issue of autonomous facility access through the use of technology, the idea of a ''secure portal'' is introduced. A secure portal is a defined zone where state-of-the-art technology can be implemented to grant secure area access or to allow special privileges for an individual. Biometric technologies are of interest because they are generally more difficult to defeat than technologies such as badge swipe and keypad entry. The biometric technologies selected for this concept were facial and gait recognition. They were chosen since they require less user cooperation than other biometrics such as fingerprint, iris, and hand geometry and because they have the most potential for flexibility in deployment. The secure portal concept could be implemented within the boundaries of an entry area to a facility. As a person is approaching a badge and/or PIN portal, face and gait information can be gathered and processed. The biometric information could be fused for verification against the information that is gathered from the badge. This paper discusses a facial recognition technology that was developed for the purposes of providing high verification probabilities with low false alarm rates, which would be required of an autonomous entry control system. In particular, a 3-D facial recognition approach using Fisher Linear Discriminant Analysis is described. Gait recognition technology, based on Hidden Markov Models has been explored, but those results are not included in this paper. Fusion approaches for combining the results of the biometrics would be the next step in realizing the secure portal

  18. Department of Homeland Security Assistance to States and Localities: A Summary and Issues for the 111th Congress

    DTIC Science & Technology

    2009-12-01

    TSGP eligibility.22 Port Security Grant Program The Port Security Grant Program ( PSGP ) provides funding for the protection of ports and port... psgp /index.shtm. 24 U.S. Department of Homeland Security, Grant Programs Directorate, FY2009 Overview Grant Application Guidance, Washington, DC

  19. Department of Homeland Security Assistance to States and Localities: A Summary and Issues for the 111th Congress

    DTIC Science & Technology

    2010-04-30

    Port Security Grant Program The Port Security Grant Program ( PSGP ) provides funding for the protection of ports and port infrastructure from...Federal Emergency Management Agency, Port Security Grant Program: Overview, Washington, DC, 2008, http://www.fema.gov/government/grant/ psgp /index.shtm

  20. Department of Homeland Security Assistance to States and Localities: A Summary and Issues for the 111th Congress

    DTIC Science & Technology

    2009-04-21

    Research Service 6 Port Security Grant Program The Port Security Grant Program ( PSGP ) provides funding for the protection of ports and port...Grant Program: Overview, Washington, DC, 2008, http://www.fema.gov/government/grant/ psgp /index.shtm. 23 U.S. Department of Homeland Security, Grant

  1. 49 CFR 1546.213 - Access to cargo: Security threat assessments for cargo personnel in the United States.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND... 49 Transportation 9 2010-10-01 2010-10-01 false Access to cargo: Security threat assessments for... certain functions related to the transportation, dispatch or security of cargo for transport on...

  2. 49 CFR 1546.213 - Access to cargo: Security threat assessments for cargo personnel in the United States.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND... 49 Transportation 9 2013-10-01 2013-10-01 false Access to cargo: Security threat assessments for... certain functions related to the transportation, dispatch or security of cargo for transport on...

  3. 49 CFR 1546.213 - Access to cargo: Security threat assessments for cargo personnel in the United States.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND... 49 Transportation 9 2011-10-01 2011-10-01 false Access to cargo: Security threat assessments for... certain functions related to the transportation, dispatch or security of cargo for transport on...

  4. 49 CFR 1546.213 - Access to cargo: Security threat assessments for cargo personnel in the United States.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND... 49 Transportation 9 2012-10-01 2012-10-01 false Access to cargo: Security threat assessments for... certain functions related to the transportation, dispatch or security of cargo for transport on...

  5. 49 CFR 1546.213 - Access to cargo: Security threat assessments for cargo personnel in the United States.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND... 49 Transportation 9 2014-10-01 2014-10-01 false Access to cargo: Security threat assessments for... certain functions related to the transportation, dispatch or security of cargo for transport on...

  6. Secure coherent-state quantum key distribution protocols with efficient reconciliation

    SciTech Connect

    Assche, G. van; Cerf, N.J.

    2005-05-15

    We study the equivalence of a realistic quantum key distribution protocol using coherent states and homodyne detection with a formal entanglement purification protocol. Maximally entangled qubit pairs that one can extract in the formal protocol correspond to secret key bits in the realistic protocol. More specifically, we define a qubit encoding scheme that allows the formal protocol to produce more than one entangled qubit pair per entangled oscillator pair or, equivalently for the realistic protocol, more than one secret key bit per coherent state. The entanglement parameters are estimated using quantum tomography. We analyze the properties of the encoding scheme and investigate the resulting secret key rate in the important case of the attenuation channel.

  7. Venezuelas Pursuit of Caribbean Basin Interests: Implications for United States National Security.

    DTIC Science & Technology

    1985-01-01

    planning by the Lusinchi government, and upon whether the market price of petroleum drops no lower than the U.S. $28 per barrel to which it fell in...neutralizing the cazador units. The United States also should keep abreast of any Venezuelan plans to create a conven- tional rapid deployment force that could...Before additional initiatives could be undertaken, Venezuela’s Social Democrats ( Accion 0 Democratica) were ousted from power by the reactionary military

  8. The United States and the Asia-Pacific Region: Security Strategy for the Obama Administration

    DTIC Science & Technology

    2009-02-01

    focused on project organization, history and framing the large issues that would demand further exploration. Panelists Dr. Thomas Bowditch CNA Dr...Strategic Planning and Policy, PACOM Dr. Stanley B. weeks Institute for Defense Analyses Participants Dr. Thomas Bowditch CNA Ambassador Raymond F...USMC (ret) Mr. Robert Gromoll State Department Dr. John Hanley IDA Dr. Katy Oh Hassig IDA Dr. Scott Kastner University of Maryland Mr. Michael Keifer

  9. Groupthink: A Significant Threat to the Homeland Security of the United States

    DTIC Science & Technology

    2014-12-01

    requires the career FAMS to work a long and arduous schedule, to the point at which many were filing complaints that their quality of life was being...terrorists have been spotted with members of MS-13 in El Salvador .171 Both these organizations did pose a legitimate threat to the United States, but...membership in this faction more than the quality of the decision or the decision’s consequences. Janis theorized that the in-group frequently sanctions a

  10. Lowering Total Fertility Rates in Developing States: Security and Policy Implications for Sub-Saharan Africa

    DTIC Science & Technology

    2006-03-15

    of violent crimes worldwide.13 Women’s status in society is thought to play a role in the vulnerability to conflict that a large youth bulge presents...based on gender describes 4 the status quo in most sub-Saharan states. Importantly, the potential risk associated with the youth bulge will worsen...agricultural production, their primary roles are as wife and mother. Women often have limited legal rights and are expected to subordinate to males in

  11. Human Trafficking and the Impact on National Security for the United States

    DTIC Science & Technology

    2006-03-15

    Transportacion Ferroviaria Mexicana. These elements could provide any needed support to potential terrorists traveling via rail); and 2) The Mara Salvatrucha...to use the trains as a way of entering the United States must do business with the Mara Salvatrucha.23 5 Factors Promoting Sex Tourism Governments and...promote sex tourism : • Men’s demand for the sex of prostitution • Increasing poverty, driving women and children into situations of sexual

  12. Northeast Asia Regional Security and the United States Military: Context, Presence, and Roles

    DTIC Science & Technology

    2002-11-01

    144 Michael O ’ Hanlon , “Keep US Forces in Korea After Unification,” The Korean Journal of Defense Analysis X, no. 1 (Summer 1998): 5. 145...of Koreans Oppose NMD,” The Korea Times, April 9, 2001. Accessed online. 113 William O . Odom, “The United States Military in a Reunified Korea...The Diplomatic Role of Non-Weaponized Programs. Rosalind R. Reynolds, January 1996 8. Five Minutes Past Midnight: The Clear and Present Danger

  13. United States-Gulf Cooperation Council Security Cooperation in a Multipolar World

    DTIC Science & Technology

    2014-10-01

    to Asia.49 The mar- ket for GCC exports in liquefied natural gas —coming from Qatar, Abu Dhabi, and Oman—is even more concentrated, where above 95...Kuwait, and the UAE. GCC exporters supply more than a quarter of Japanese and Korean liquefied natural gas (LNG), and around a fifth of Chinese LNG...its natural gas ,1 the Gulf states continue to supply world markets with an important share of their energy supplies. Continuing to be one of the

  14. Nation Assistance: Does an Exercise in Guatemala by Reserve Components Support United States National Security Strategy?

    DTIC Science & Technology

    2007-11-02

    exercises called Fuertes Caminos in 1993, 1994, and 1995. The author was the aviation commander of Fuertes Caminos 95-North. This paper follows a...sequence describing the background of Guatemala and Fuertes Caminos exercises, defining nation assistance policy, then flowing through the United...called Fuertes Caminos. Two key guestions result from this analysis. Is it in the United States’ best interest to perform another Fuertes Caminos

  15. The Drug war: Diplomatic and Security Implications for Mexico and the United States

    DTIC Science & Technology

    2011-06-10

    their labor from services provided by a functional state. Spillover Violence Spillover violence has the potential to become one of the most...and enjoy the fruits of their labor . As enforcement along the U.S. Southwest border improves the DTOs will continue to seek alternative methods to...August 2002), 5. 83 GLOSSARY Commission Nacional de Derechos Humanos (CNDH). Mexico’s National Commission on Human Rights. Counter-drug

  16. [The state of the art on nutrition, food safety and food security].

    PubMed

    Bonaccorsi, Guglielmo; Lorini, Chiara; Porchia, Barbara Rita; Capecchi, Leonardo; Malavolti, Marcella; Aggazzotti, Gabriella

    2014-01-01

    In Italy, public health is experiencing a phase of crisis. A contraction of services and a staff reallocation have affected in particular Food Hygiene services. We explored Pubmed and Google Ngram Viewer© to define the state of the art of research in food and nutritional field from a quantitative point of view and we focused on some areas of interest in terms of improvement of professional practice. The Italian contribution to food and nutritional research is still limited. Our findings seem to demonstrate the need of an alliance between the world of research and Public Health services, so as to develop a sustainable and effective health system.

  17. Mexican Drug Trafficking Organizations: A Threat to the United States National Security

    DTIC Science & Technology

    2011-03-03

    southern and northern borders of the U.S., to prevent DTOs from entering the U.S . . Background Mexican DTOs first entered the U.S. market in the mid...seek alternate routes into the U.S. The proximity of the U.S., one of the largest markets for illicit drugs, and the poor economic state of Mexico...Nuevo Laredo, the Zetas operate a parallel network in Reynosa and Miguel Aleman. 9 The Juare~ Cartel operates in Ciudad Juarez, Chihuahua, Mexico

  18. CONCEPTUALIZING BIOPOLITICS: CITIZEN-STATE INTERACTIONS IN THE SECURING OF WATER SERVICES IN SOUTH AFRICA

    PubMed Central

    Bulled, Nicola

    2015-01-01

    Despite constitutional obligations to provide clean water to all citizens in South Africa, access to water and related services remains highly contested. The discord between constitutional promises and lived realities of water access, particularly through national infrastructure, provides a platform upon which to examine Foucauldian notions of biopolitics, the control of populations through technologies of governing. Drawing on the situations of residents in the rural Vhembe district in the north eastern corner of the country, I examine how individuals conceptualize the relationship that exists between citizen and state and the responsibilities of each in post-apartheid South Africa as it relates to water access. In addition, I describe strategies employed throughout South Africa to voice rights to water and how these approaches are perceived. Finally, I consider how the three primary forms of ‘water citizenship’ – citizen, agent, and subject – influence the current and future health of vulnerable residents. PMID:26087245

  19. CALIFORNIA STATE UNIVERSITY CATASTROPHIC (CAT) LEAVE DONATION PROGRAM: DEMOGRAPHICS, ECONOMIC SECURITY, AND SOCIAL EQUITY.

    PubMed

    Muller, Christina

    2015-01-01

    The California State University (CSU) Chancellor's Office reached an agreement with all CSU collective bargaining units and Employee Relations on a uniform Catastrophic (CAT) Leave Donation Program in 1992. The CAT Leave Donation Program allows employees to donate sick and/or vacation leave credits to employees who are incapacitated due to a catastrophic illness or injury and have exhausted all of their own leave credits. This also extends to employees with whom family illnesses are deemed catastrophic, thus requiring the employee to care for an immediate family member. Stakeholders include union represented employees who accrue leave credits as well as any employee who receives or donates hours of leave credits in the program. Other stakeholders include the family members and program administrators.

  20. To amend title 49, United States Code, to direct the Assistant Secretary of Homeland Security (Transportation Security Administration) to transfer unclaimed money recovered at airport security checkpoints to United Service Organizations, Incorporated, and for other purposes.

    THOMAS, 111th Congress

    Rep. Miller, Jeff [R-FL-1

    2009-04-30

    05/26/2009 Referred to the Subcommittee on Transportation Security and Infrastructure Protection. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  1. Security Cooperation Missions in Africa: Is the United States Conducting the Correct Types of Security Cooperation Missions in the African Continent?

    DTIC Science & Technology

    2015-06-12

    Retired) for their trust and confidence and continuously teaching me to improve and excel as a Marine Air Ground Task Force officer. My actions and...expand its security cooperation missions, it must deal with a slower paced DOS mind -set that is present in the U.S. Embassies in Africa. The second...available to communicate and teach , both 28 internally and externally, the new vision does this. The fifth step is to empower others to act on the

  2. Securing Fatherhood through Kin Work: A Comparison of Black Low-Income Fathers and Families in South Africa and the United States

    ERIC Educational Resources Information Center

    Madhavan, Sangeetha; Roy, Kevin

    2012-01-01

    In this article, the authors examine how low-income Black men in South Africa and the United States work with their kin to secure fathering and ensure the well-being of children. They use ethnographic and life history data on men who fathered children from 1992 to 2005 to demonstrate how fathers' roles as kin workers enable them to meet culturally…

  3. Cause for Concern: A Mixed-Methods Study of Campus Safety and Security Practices in United States-Mexico Border Institutions of Higher Education

    ERIC Educational Resources Information Center

    Holmes, Ryan Clevis

    2014-01-01

    Campus safety has been a source of concern since the 1990s. However, in 2007, the tragedy at the Virginia Polytechnic and State University sent a sense of alarm through many institutions of higher education. Immediately following this tragedy, institutions across the country began to evaluate and question their safety and security practices. While…

  4. Climate change adaptation: a panacea for food security in Ondo State, Nigeria

    NASA Astrophysics Data System (ADS)

    Fatuase, A. I.

    2016-05-01

    This paper examines the likely perceived causes of climate change, adaptation strategies employed and technical inefficiency of arable crop farmers in Ondo State, Nigeria. Data were obtained from primary sources using a set of structured questionnaire assisted with interview schedule. Multistage sampling technique was used. Data were analyzed using the following: descriptive statistics and the stochastic frontier production function. The findings showed that majority of the respondents (59.1 %) still believed that climate change is a natural phenomenon that is beyond man's power to abate while industrial release, improper sewage disposal, fossil fuel use, deforestation and bush burning were perceived as the most human factors that influence climate change by the category that chose human activities (40.9 %) as the main causes of climate change. The main employed adaptation strategies by the farmers were mixed cropping, planting early matured crop, planting of resistant crops and use of agrochemicals. The arable crop farmers were relatively technically efficient with about 53 % of them having technical efficiency above the average of 0.784 for the study area. The study observed that education, adaptation, perception, climate information and farming experience were statistically significant in decreasing inefficiency of arable crop production. Therefore, advocacy on climate change and its adaptation strategies should be intensified in the study area.

  5. Integrated Resources Management Approach to Ensuring Sustainable Food Security in Nigeria-The Nexus of Rice Production in Niger State

    NASA Astrophysics Data System (ADS)

    Omotoso, T.

    2015-12-01

    By 2050, the world will need to feed 9 billion people. This will require a 60% increase in agricultural production and subsequently a 6% increase in water use by the agricultural sector alone. By 2030, global water demand is expected to increase by 40%, mostly in developing countries like Nigeria (Addams, Boccaletti, Kerlin, & Stuchtey, 2009) and global energy demand is expected to increase by 33% in 2035, also, mostly in emerging economies (IEA, 2013). These resources have to be managed efficiently in preparation for these future demands. Population growth leads to increased demand for water, energy and food. More food production will lead to more water-for-food and energy-for-food usage; and more demand for energy will lead to more water-for-energy needs. This nexus between water, energy and food is poorly understood and furthermore, complicated by external drivers such as climate change. Niger State Nigeria, which is blessed with abundant water and arable land resources, houses the three hydropower dams in Nigeria and one of the governments' proposed Staple Crops Processing Zones (SCPZ) for rice production. Both of these capital intensive investments depend heavily on water resources and are all highly vulnerable to changes in climate. Thus, it is essential to know how the local climate in this state will likely change and its impacts on water, energy and food security, so that policy makers can make informed mitigation/adaptation plans; operational and investment decisions. The objective of this project is to provide information, using an integrated resources management approach, on the effects of future climate changes on water, energy (hydropower) and food resources in Niger State, Nigeria and improve knowledge on the interlinkages between water, energy and food at a local scale.

  6. Alternative security

    SciTech Connect

    Weston, B.H. )

    1990-01-01

    This book contains the following chapters: The Military and Alternative Security: New Missions for Stable Conventional Security; Technology and Alternative Security: A Cherished Myth Expires; Law and Alternative Security: Toward a Just World Peace; Politics and Alternative Security: Toward a More Democratic, Therefore More Peaceful, World; Economics and Alternative Security: Toward a Peacekeeping International Economy; Psychology and Alternative Security: Needs, Perceptions, and Misperceptions; Religion and Alternative Security: A Prophetic Vision; and Toward Post-Nuclear Global Security: An Overview.

  7. Homeland Security

    EPA Pesticide Factsheets

    Provides an overview of EPA's homeland security roles and responsibilities, and links to specific homeland security issues: water security, research, emergency response, recovery, and waste management.

  8. A Qualitative Meta-Analysis of the Diffusion of Mandated and Subsidized Technology: United States Energy Security and Independence

    ERIC Educational Resources Information Center

    Noah, Philip D., Jr.

    2013-01-01

    The purpose of this research project was to explore what the core factors are that play a role in the development of the smart-grid. This research study examined The Energy Independence and Security Act (EISA) of 2007 as it pertains to the smart-grid, the economic and security effects of the smart grid, and key factors for its success. The…

  9. 12 CFR 208.34 - Recordkeeping and confirmation of certain securities transactions effected by State member banks.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... reasonable time upon written request of such customer specifying the identity, price and number of shares or... banks having an average of less than 200 securities transactions per year for customers over the prior... securities transactions for customers shall, to ensure safe and sound operations, maintain effective...

  10. Department of Homeland Security Assistance to States and Localities: A Summary and Issues for the 111th Congress

    DTIC Science & Technology

    2009-02-26

    The Port Security Grant Program ( PSGP ) provides funding for the protection of ports and port infrastructure from terrorism...Overview, Washington, DC, 2008, http://www.fema.gov/government/grant/ psgp /index.shtm. 23 U.S. Department of Homeland Security, Grant Programs Directorate

  11. Department of Homeland Security Assistance to States and Localities: A Summary and Issues for the 111th Congress

    DTIC Science & Technology

    2009-08-05

    Security Grant Program ( PSGP ) provides funding for the protection of ports and port infrastructure from terrorism. It is intended to enhance risk...www.fema.gov/government/grant/ psgp /index.shtm. 23 U.S. Department of Homeland Security, Grant Programs Directorate, FY2009 Overview Grant Application

  12. National Security Restraints of the Federal Government on Academic Freedom and Scientific Communication in the United States.

    ERIC Educational Resources Information Center

    Schwab, Jessica D.

    1990-01-01

    Examines the historic and continuing conflict between academic freedom and national security. Topics discussed include regulation and enforcement, restricted technologies, international committees, statutes, Executive Orders, and the Corson Report on scientific communication and national security. A list of recent events in which academic…

  13. Security analysis and improvement of the dining cryptographer problem-based anonymous quantum communication via non-maximally entanglement state analysis

    NASA Astrophysics Data System (ADS)

    Wang, Qing-le; Zhang, Ke-jia

    2015-01-01

    Recently, two novel anonymous quantum communication (AQC) protocols (Shi et al. in Int. J. Theor. Phys. 52, 376-384, 2013) are presented, respectively. One is in a public-receiver model, the other is in broadcasting channels. In their paper, the dining cryptographer problem (DCP) and the non-maximally entanglement state analysis (NESA) are applied. And they analyze some attack strategies, including the honest-but-curious and malicious participant attacking ones. Unfortunately, we find that there exist some potential loopholes in security. The identity of anonymous sender in the AQC protocol with a public receiver for three participants can be revealed. And the AQC protocol in broadcasting channels for n participants, which is sensitive to some special attacks, such as participant attacks, is still not so secure as expected. Here we detailedly analyze the security of their proposed protocols and make some improvements.

  14. [Food security, income, and the Bolsa Família program: a cohort study of municipalities in Paraíba State, Brazil, 2005-2011].

    PubMed

    Cabral, Caroline Sousa; Lopes, Amanda Gonçalves; Lopes, Johnnatas Mikael; Vianna, Rodrigo Pinheiro de Toledo

    2014-02-01

    This study aims to evaluate the impact of the conditional cash transfer program known as Bolsa Família in overcoming food insecurity. A cohort study was conducted in 2005 and 2011 in a sample of families in São José dos Ramos and Nova Floresta, Paraíba State, Brazil. In 2005, 609 households were interviewed, and in 2011 we located and re-interviewed 406 families. There had been an increase in food security and mild food insecurity and an improvement in socioeconomic indicators. A significant association was observed between higher income and improved food security. The program showed a positive impact by increasing income and providing improved levels of food security and mild food insecurity. Other socioeconomic variables may be contributing to this improvement. The fight against food insecurity and malnutrition thus requires additional policies and programs that act on other determinants.

  15. Obesity as a Determinant of Staphylococcus aureus Colonization Among Inmates in Maximum-Security Prisons in New York State.

    PubMed

    Befus, Montina; Lowy, Franklin D; Miko, Benjamin A; Mukherjee, Dhritiman V; Herzig, Carolyn T A; Larson, Elaine L

    2015-09-15

    Obesity increases a person's susceptibility to a variety of infections, including Staphylococcus aureus infections, which is an important cause of morbidity in correctional settings. Using a cross-sectional design, we assessed the association between obesity and S. aureus colonization, a risk factor for subsequent infection, in New York State maximum-security prisons (2011-2013). Anterior nares and oropharyngeal cultures were collected. Structured interviews and medical records were used to collect demographic, behavioral, and medical data. Body mass index (BMI; weight (kg)/height (m(2))) was categorized as 18.5-24.9, 25-29.9, 30-34.9, or ≥35. The association between BMI and S. aureus colonization was assessed using log-binomial regression. Thirty-eight percent of 638 female inmates and 26% of 794 male inmates had a BMI of 30 or higher. More than 40% of inmates were colonized. Female inmates with a BMI of 25-29.9 (prevalence ratio (PR) = 1.37, 95% confidence interval (CI): 1.06, 1.76), 30-34.9 (PR = 1.52, 95% CI: 1.17, 1.98), or ≥35 (PR = 1.49, 95% CI: 1.13, 1.96) had a higher likelihood of colonization than did those with a BMI of 18.5-24.9 after we controlled for age, educational level, smoking status, diabetes status, and presence of human immunodeficiency virus. Colonization was higher among male inmates with a BMI of 30-34.9 (PR = 1.27, 95% CI: 1.01, 1.61). Our findings demonstrate an association between BMI and S. aureus colonization among female prisoners. Potential contributory biologic and behavioral factors should be explored.

  16. The United States, Russia, Europe, and Security: How to Address the Unfinished Business of the Post-Cold War Era

    DTIC Science & Technology

    2012-04-01

    Security hostage to domestic politics in Russia—usually to a greater extent than in allied countries, where it is simply a matter of different political...have to be a broad framework to discuss European security issues, including conventional force nuclear matters , NATO enlargement, and zero-sum...from Afghanistan, and a trust fund established in support of helicopter maintenance. This has been punctual and limited to specific areas of

  17. East Asian Security: Two Views. The Security Challenges in Northeast Asia: A Chinese View. Security Challenges to the United States in Northeast Asia: Looking beyond the Transformation of the Six-Party Talks

    DTIC Science & Technology

    2007-11-01

    has vowed to push through a sweeping education bill, strengthening the notion of patriotism in public classrooms in a way 11 not seen since the fall...administration was to revise Japan’s pacifist constitution to permit a full-fledged military. Mr. Abe speaks forcefully on security issues and on the...increase its military buildup dramatically. Economically speaking , China today and in the future is in the position of the former Soviet Union in

  18. A Domestic Intelligence Agency for the United States? A Comparative Analysis of Domestic Intelligence Agencies and Their Implications for Homeland Security

    DTIC Science & Technology

    2007-06-01

    Future, 358-359. 86 Saikat Datta, “There Are No Secrets Here,” New Delhi Outlook, 19 November 2006, p.1; http://www.outlookindia.com. The Joint...security shake up,” 2. 101 Saikat Datta, “War Below the Radar,” New Delhi Outlook, 31 July 2006, p.1; http://www.outlookindia.com. 102 National... details . 105 Office of the Director of National Intelligence, The National Intelligence Strategy of the United States: Transformation through

  19. A Study on the Commercialization of Space-Based Remote Sensing in the Twenty-First Century and Its Implications to United States National Security

    DTIC Science & Technology

    2011-06-01

    Remote sensing from space provides critical data for many commercial space applications. Due to global market demand, it has undergone tremendous...commercial space imaging capability in the future, remote sensing policy makers, systems engineers, and industry analysts must be aware of the implications to United States National Security....available dissemination and accessibility. The analysis results, together with the findings from a review of commercial programs, initiatives, and remote

  20. Projected Successes and Shortfalls of a Semi-Permanent Inspection Location in Western Lake Erie for Vessels Entering the United States and Its Effect on National Security

    DTIC Science & Technology

    2013-06-13

    PROJECTED SUCCESSES AND SHORTFALLS OF A SEMI-PERMANENT INSPECTION LOCATION IN WESTERN LAKE ERIE FOR VESSELS ENTERING THE UNITED STATES...TITLE AND SUBTITLE Projected Successes and Shortfalls of a Semi-Permanent Inspection Location in Western Lake Erie for Vessels Entering the...surrounding border security enforcement operations in Western Lake Erie, there is a need to determine if improvement is possible. In a maritime

  1. Security Evolution.

    ERIC Educational Resources Information Center

    De Patta, Joe

    2003-01-01

    Examines how to evaluate school security, begin making schools safe, secure schools without turning them into fortresses, and secure schools easily and affordably; the evolution of security systems into information technology systems; using schools' high-speed network lines; how one specific security system was developed; pros and cons of the…

  2. Addressing Software Security

    NASA Technical Reports Server (NTRS)

    Bailey, Brandon

    2015-01-01

    Historically security within organizations was thought of as an IT function (web sites/servers, email, workstation patching, etc.) Threat landscape has evolved (Script Kiddies, Hackers, Advanced Persistent Threat (APT), Nation States, etc.) Attack surface has expanded -Networks interconnected!! Some security posture factors Network Layer (Routers, Firewalls, etc.) Computer Network Defense (IPS/IDS, Sensors, Continuous Monitoring, etc.) Industrial Control Systems (ICS) Software Security (COTS, FOSS, Custom, etc.)

  3. Enhancing the secure key rate in a quantum-key-distribution system using discrete-variable, high-dimensional, time-frequency states

    NASA Astrophysics Data System (ADS)

    Islam, Nurul T.; Cahall, Clinton; Aragoneses, Andrés.; Lim, Charles Ci Wen; Allman, Michael S.; Verma, Varun; Nam, Sae Woo; Kim, Jungsang; Gauthier, Daniel J.

    2016-10-01

    High-dimensional (dimension d > 2) quantum key distribution (QKD) protocols that encode information in the temporal degree of freedom promise to overcome some of the challenges of qubit-based (d = 2) QKD systems. In particular, the long recovery time of single-photon detectors and large channel noise at long distance both limit the rate at which a final secure key can be generated in a low-dimension QKD system. We propose and demonstrate a practical discrete-variable time-frequency protocol with d = 4 at a wavelength of 1550 nm, where the temporal states are secured by transmitting and detecting their dual states under Fourier transformation, known as the frequency-basis states, augmented by a decoy-state protocol. We show that the discrete temporal and frequency states can be generated and detected using commercially-available equipment with high timing and spectral efficiency. In our initial experiments, we only have access to detectors that have low efficiency (1%) at 1550 nm. Together with other component losses, our system is equivalent to a QKD system with ideal components and a 50-km-long optical-fiber quantum channel. We find that our system maintains a spectral visibility of over 99.0% with a quantum bit error rate of 2.3%, which is largely due to the finite extinction ratio of the intensity modulators used in the transmitter. The estimated secure key rate of this system is 7.7×104 KHz, which should improve drastically when we use detectors optimized for 1550 nm.

  4. A comparative study of protocols for secure quantum communication under noisy environment: single-qubit-based protocols versus entangled-state-based protocols

    NASA Astrophysics Data System (ADS)

    Sharma, Vishal; Thapliyal, Kishore; Pathak, Anirban; Banerjee, Subhashish

    2016-11-01

    The effect of noise on various protocols of secure quantum communication has been studied. Specifically, we have investigated the effect of amplitude damping, phase damping, squeezed generalized amplitude damping, Pauli type as well as various collective noise models on the protocols of quantum key distribution, quantum key agreement, quantum secure direct quantum communication and quantum dialogue. From each type of protocol of secure quantum communication, we have chosen two protocols for our comparative study: one based on single-qubit states and the other one on entangled states. The comparative study reported here has revealed that single-qubit-based schemes are generally found to perform better in the presence of amplitude damping, phase damping, squeezed generalized amplitude damping noises, while entanglement-based protocols turn out to be preferable in the presence of collective noises. It is also observed that the effect of noise depends upon the number of rounds of quantum communication involved in a scheme of quantum communication. Further, it is observed that squeezing, a completely quantum mechanical resource present in the squeezed generalized amplitude channel, can be used in a beneficial way as it may yield higher fidelity compared to the corresponding zero squeezing case.

  5. A Golden Age of Security and Education? Adult Education for Civil Defence in the United States 1950-1970

    ERIC Educational Resources Information Center

    Preston, John

    2015-01-01

    A number of authors consider that the early period of US security and education (1950-1970) was in some way a "golden age" where there was a prevailing societal orientation towards civil defence. This is supported, to some extent, through "Duck and Cover" type activities in schools and in community preparedness efforts. This…

  6. 12 CFR 208.34 - Recordkeeping and confirmation of certain securities transactions effected by State member banks.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... designed to assure the servicing or timely distribution of proceeds to the security holders. (2) Collective... collective investment and reinvestment of monies contributed thereto by the bank in its capacity as trustee... for exemption as necessary or appropriate in the public interest or for the protection of...

  7. Reply to 'Comment on 'Quantum secret sharing based on reusable Greenberger-Horne- Zeilinger states as secure carriers''

    SciTech Connect

    Karimipour, V.

    2005-11-15

    We show that the criticism of a recent Comment by Gao et al. on the insecurity of the quantum secret sharing protocol [proposed in S. Bagherinezhad and V. Karimipour, Phys. Rev. A 67, 044302 (2003)] is based on a misconception about the meaning of security and hence is invalid.

  8. Should the U.S. Department of State Continue to Use Private Security Contractors to Protect U.S. Diplomats

    DTIC Science & Technology

    2008-06-13

    Robert Young Pelton ..............................................................................................22  Government Documents...of privatized security. Respected academics such as P.W. Singer, Jeremy Scahill, Robert Young Pelton , and Deborah D. Avant offer an authoritative... Pelton , unlike any of the previous three authors, actually went to Iraq and spent a month with a crew of Blackwater contractors. Peter Warren (P.W

  9. Department of Homeland Security Assistance to States and Localities: A Summary and Issues for the 111th Congress

    DTIC Science & Technology

    2009-06-08

    Program ( PSGP ) provides funding for the protection of ports and port infrastructure from terrorism. It is intended to enhance risk management...government/grant/ psgp /index.shtm. 23 U.S. Department of Homeland Security, Grant Programs Directorate, FY2009 Overview Grant Application Guidance

  10. Securing the State through the Production of "Global" Citizens: Analyzing Neo-Liberal Educational Reforms in Jordan and the USA

    ERIC Educational Resources Information Center

    Hantzopoulos, Maria; Shirazi, Roozbeh

    2014-01-01

    From a human capital perspective, schooling has long represented an engine of economic growth, individual advancement, and competitiveness in the global market. In recent years, this theorization of schooling has become linked with articulations of national security in both the Global North and South, as policymakers, private sector actors, and…

  11. 12 CFR 208.34 - Recordkeeping and confirmation of certain securities transactions effected by State member banks.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... exempt from Federal income taxation under the Internal Revenue Code (26 U.S.C.). (3) Completion of the... 1940, 15 U.S.C. 80a-1 et seq., shall not be included in this definition. (7) Government security shall... industrial development bond (as defined in 26 U.S.C. 103(c)(2) the interest on which is excludable from...

  12. 25 CFR 101.13 - Security.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 25 Indians 1 2011-04-01 2011-04-01 false Security. 101.13 Section 101.13 Indians BUREAU OF INDIAN... § 101.13 Security. (a) United States direct loans shall be secured by such security as the Commissioner may require. A lack of security will not preclude the making of a loan if the proposed use of...

  13. 25 CFR 101.13 - Security.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 25 Indians 1 2012-04-01 2011-04-01 true Security. 101.13 Section 101.13 Indians BUREAU OF INDIAN... § 101.13 Security. (a) United States direct loans shall be secured by such security as the Commissioner may require. A lack of security will not preclude the making of a loan if the proposed use of...

  14. 25 CFR 101.13 - Security.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 25 Indians 1 2014-04-01 2014-04-01 false Security. 101.13 Section 101.13 Indians BUREAU OF INDIAN... § 101.13 Security. (a) United States direct loans shall be secured by such security as the Commissioner may require. A lack of security will not preclude the making of a loan if the proposed use of...

  15. 25 CFR 101.13 - Security.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 25 Indians 1 2010-04-01 2010-04-01 false Security. 101.13 Section 101.13 Indians BUREAU OF INDIAN... § 101.13 Security. (a) United States direct loans shall be secured by such security as the Commissioner may require. A lack of security will not preclude the making of a loan if the proposed use of...

  16. 25 CFR 101.13 - Security.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 25 Indians 1 2013-04-01 2013-04-01 false Security. 101.13 Section 101.13 Indians BUREAU OF INDIAN... § 101.13 Security. (a) United States direct loans shall be secured by such security as the Commissioner may require. A lack of security will not preclude the making of a loan if the proposed use of...

  17. 6 CFR 37.41 - Security plan.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Security plan. 37.41 Section 37.41 Domestic... Security plan. (a) In General. States must have a security plan that addresses the provisions in paragraph (b) of this section and must submit the security plan as part of its REAL ID certification under §...

  18. 6 CFR 37.41 - Security plan.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 6 Domestic Security 1 2014-01-01 2014-01-01 false Security plan. 37.41 Section 37.41 Domestic... Security plan. (a) In General. States must have a security plan that addresses the provisions in paragraph (b) of this section and must submit the security plan as part of its REAL ID certification under §...

  19. 6 CFR 37.41 - Security plan.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 6 Domestic Security 1 2013-01-01 2013-01-01 false Security plan. 37.41 Section 37.41 Domestic... Security plan. (a) In General. States must have a security plan that addresses the provisions in paragraph (b) of this section and must submit the security plan as part of its REAL ID certification under §...

  20. Countering Overseas Threats: DOD and State Need to Address Gaps in Monitoring of Security Equipment Transferred to Lebanon

    DTIC Science & Technology

    2014-02-01

    2013 5 Figure 3: Photographs of Lebanese Armed Forces Equipment Prepared for End-Use Monitoring 14 Figure 4: U.S. Officials Conducting an Inventory...of U.S.-Provided Equipment at a Lebanese Armed Forces Facility 15 Figure 5: Photographs of U.S. Equipment Provided to Lebanon’s Internal Security...Assistance to Lebanon Figure 3: Photographs of Lebanese Armed Forces Equipment Prepared for End-Use Monitoring During our visit to Beirut in July

  1. Security of Association of Southeast Asian Nations (ASEAN) Member-States in 1995: Is a US Military Presence Necessary?

    DTIC Science & Technology

    1990-06-01

    Sumitro, the security chief, and Gen. Ali Murtopo, the president’s assistant. There were indications that Gen. Sumitro was making use of the students to...1300 UT, 31 January 1990. 5. C. M. Arshad , "Southeast Asia in Soviet Perspective," Asian Defense-Journal, May 1985, 5. 6. Ibid, 7. 7. J. E. Metelko, The...M. "The Cautious Consolidation of ASEAN." Contem- Rorarv Southeast Asia, December 1982. Arshad , C M. "Southeast Asia in Soviet Perspective." Asian

  2. Violence In Honduras: An Analysis of the Failure in Public Security and the States Response to Criminality

    DTIC Science & Technology

    2014-06-01

    SECURITY Honduras has many problems. This poverty-stricken and crime-ridden nation has dealt with declining quality of life since the transition to...strategies. New York City strategy focused on “ quality of life ” offenses such as drinking in public, and urinating in the streets. The strategy was targeted...4  Figure 3.  Number of Deportations and Deportation Ratios, 2000–2009, of Hondurans, Salvadorans , Guatemalans, and

  3. The Child Care and Development Block Grant and Child Care Grants to States under Title IV-A of the Social Security Act: A Description of Major Provisions and Issues To Consider in Implementation.

    ERIC Educational Resources Information Center

    Blank, Helen

    The Child Care and Development Block Grant (CCDBG) and Grants to States under Title IV-A of the Social Security Act for At-Risk Child Care are two recently passed federal child care bills. These bills offer states a unique opportunity to review the ways state and federal child care and early childhood programs work together to support children and…

  4. Hydrological extremes and security

    NASA Astrophysics Data System (ADS)

    Kundzewicz, Z. W.; Matczak, P.

    2015-04-01

    Economic losses caused by hydrological extremes - floods and droughts - have been on the rise. Hydrological extremes jeopardize human security and impact on societal livelihood and welfare. Security can be generally understood as freedom from threat and the ability of societies to maintain their independent identity and their functional integrity against forces of change. Several dimensions of security are reviewed in the context of hydrological extremes. The traditional interpretation of security, focused on the state military capabilities, has been replaced by a wider understanding, including economic, societal and environmental aspects that get increasing attention. Floods and droughts pose a burden and serious challenges to the state that is responsible for sustaining economic development, and societal and environmental security. The latter can be regarded as the maintenance of ecosystem services, on which a society depends. An important part of it is water security, which can be defined as the availability of an adequate quantity and quality of water for health, livelihoods, ecosystems and production, coupled with an acceptable level of water-related risks to people, environments and economies. Security concerns arise because, over large areas, hydrological extremes - floods and droughts - are becoming more frequent and more severe. In terms of dealing with water-related risks, climate change can increase uncertainties, which makes the state's task to deliver security more difficult and more expensive. However, changes in population size and development, and level of protection, drive exposure to hydrological hazards.

  5. Cryptanalysis of Controlled Quantum Secure Direct Communication and Authentication Protocol Based on Five-Particle Cluster State and Quantum One-Time Pad

    NASA Astrophysics Data System (ADS)

    Liu, Zhihao; Chen, Hanwu; Liu, Wenjie

    2016-10-01

    A new attack strategy, the so-called intercept-selectively-measure-resend attack is put forward. It shows that there are some security issues in the controlled quantum secure direct communication (CQSDC) and authentication protocol based on five-particle cluster states and quantum one-time pad. Firstly, an eavesdropper (Eve) can use this attack to eavesdrop on 0.656 bit of every bit of the identity string of the receiver and 1.406 bits of every couple of the corresponding bits of the secret message without being detected. Also, she can eavesdrop on 0.311 bit of every bit of the identity string of the controller. Secondly, the receiver can also take this attack to obtain 1.311 bits of every couple of the corresponding bits of the secret message without the permission of the controller, which is not allowed in the CQSDC protocols. In fact, there is another security issue in this protocol, that is, one half of the information about the secret is leaked out unconsciously. In addition, an alternative attack strategy which is called as the selective-CNOT-operation attack strategy to attack this protocol is discussed.

  6. The grant is what I eat: the politics of social security and disability in the post-apartheid South African state.

    PubMed

    MacGregor, Hayley

    2006-01-01

    In South Africa, disability grant allocation has been under review and tensions are evident in government rhetoric stressing welfare provision on the one hand, and encouraging 'rationalization' on the other. This ambiguity is traced down to the level of grant negotiations between doctors and 'clients' in a psychiatry clinic in Khayelitsha. Here 'having nerves' embodies the distress associated with harsh circumstances and is deemed by supplicants as sufficient to secure a grant. The paper illustrates how national discourses influence the presentation and experience of suffering and the way in which doctors mediate diagnoses. The implications of local understandings of 'health citizenship' for expectations of the post-apartheid state are explored.

  7. United States Department of Energy National Nuclear Security Administration Sandia Field Office NESHAP Annual Report CY2014 for Sandia National Laboratories New Mexico

    SciTech Connect

    evelo, stacie; Miller, Mark L.

    2015-05-01

    This report provides a summary of the radionuclide releases from the United States (U.S.) Department of Energy (DOE) National Nuclear Security Administration facilities at Sandia National Laboratories, New Mexico (SNL/NM) during Calendar Year (CY) 2014, including the data, calculations, and supporting documentation for demonstrating compliance with 40 Code of Federal Regulation (CFR) 61, Subpart H--NATIONAL EMISSION STANDARDS FOR EMISSIONS OF RADIONUCLIDES OTHER THAN RADON FROM DEPARTMENT OF ENERGY FACILITIES. A description is given of the sources and their contributions to the overall dose assessment. In addition, the maximally exposed individual (MEI) radiological dose calculation and the population dose to local and regional residents are discussed.

  8. Climate Change and National Security

    DTIC Science & Technology

    2013-02-01

    does not display a currently valid OMB control number. PLEASE DO NOT RETURN YOUR FORM TO THE ABOVE ADDRESS. a. REPORT Climate Change and National...Security 14. ABSTRACT 16. SECURITY CLASSIFICATION OF: Does climate change constitute a national security threat to the United States? What is climate ...resources for an in-depth discussion on national security and climate change . 1. REPORT DATE (DD-MM-YYYY) 4. TITLE AND SUBTITLE 13. SUPPLEMENTARY NOTES

  9. Current and Projected National Security Threats to the United States. Hearing before the Select Committee on Intelligence of the United States Senate, One Hundred Eleventh Congress, Second Session

    DTIC Science & Technology

    2010-02-02

    and opportuni- ties. Other areas demand our continued attention and focus. They include security in Iraq, on the Korean Peninsula, weapons of mass ...were inspired to attack us because of that incarceration ? You know that’s true. Is there any intelligence that suggests al-Qa’ida would not use a...bringing them here. Director BLAIR. Yes, I’m sure there will be stories about wher- ever they’re incarcerated , but I’m thinking of books that have been

  10. Security Locks

    ERIC Educational Resources Information Center

    Hart, Kevin

    2010-01-01

    According to a 2008 "Year in Review" report by Educational Security Incidents, an online repository that collects data on higher education security issues, the total number of security incidents reported at universities and colleges worldwide rose to 173 in 2008, a 24.5 percent increase over 2007. The number of institutions…

  11. Supporting Data Use While Protecting the Privacy, Security and Confidentiality of Student Information: A Primer for State Policymakers

    ERIC Educational Resources Information Center

    Data Quality Campaign, 2011

    2011-01-01

    The education sector is beginning to embrace a culture that values, demands and uses data to support improved decisionmaking at every level--in classrooms, at kitchen tables and in state capitols. This shift is due in large part to state policymakers' leadership over the last six years in building statewide longitudinal data systems that collect…

  12. The information security needs in radiological information systems-an insight on state hospitals of Iran, 2012.

    PubMed

    Farhadi, Akram; Ahmadi, Maryam

    2013-12-01

    Picture Archiving and Communications System (PACS) was originally developed for radiology services over 20 years ago to capture medical images electronically. Medical diagnosis methods are based on images such as clinical radiographs, ultrasounds, CT scans, MRIs, or other imaging modalities. Information obtained from these images is correlated with patient information. So with regards to the important role of PACS in hospitals, we aimed to evaluate the PACS and survey the information security needed in the Radiological Information system. First, we surveyed the different aspects of PACS that should be in any health organizations based on Department of Health standards and prepared checklists for assessing the PACS in different hospitals. Second, we surveyed the security controls that should be implemented in PACS. Checklists reliability is affirmed by professors of Tehran Science University. Then, the final data are inputted in SPSS software and analyzed. The results indicate that PACS in hospitals can transfer patient demographic information but they do not show route of information. These systems are not open source. They don't use XML-based standard and HL7 standard for exchanging the data. They do not use DS digital signature. They use passwords and the user can correct or change the medical information. PACS can detect alternation rendered. The survey of results demonstrates that PACS in all hospitals has the same features. These systems have the patient demographic data but they do not have suitable flexibility to interface network or taking reports. For the privacy of PACS in all hospitals, there were passwords for users and the system could show the changes that have been made; but there was no water making or digital signature for the users.

  13. There’s No Place Like(a)Home: Ontological Security Among Persons with Serious Mental Illness in the United States

    PubMed Central

    Padgett, Deborah K.

    2007-01-01

    As the homelessness ‘crisis’ in the United States enters a third decade, few are as adversely affected as persons with serious mental illness. Despite recent evidence favoring a ‘housing first’ approach, the dominant ‘treatment first’ approach persists in which individuals must climb a ladder of program requirements before becoming eligible for an apartment of their own. Drawing upon the concept of ‘ontological security’, this qualitative study examines the subjective meaning of ‘home’ among 39 persons who were part of a unique urban experiment that provided New York City’s homeless mentally ill adults with immediate access to independent housing in the late 1990s. The study design involved purposively sampling from the experimental (housing first) group (N=21) and the control (treatment first) group (N=18) and conducting two life history interviews with each participant. Markers of ontological security--constancy, daily routines, privacy, and having a secure base for identity construction—provided sensitizing concepts for grounded theory analyses designed to also yield emergent, or new, themes. Findings revealed clear evidence of the markers of ontological security among participants living in their own apartments. This study expands upon previous research showing that homeless mentally ill persons are capable of independent living in the community. The emergent theme of ‘what’s next’ questions and uncertainty about the future points to the need to address problems of stigma and social exclusion that extend beyond the minimal achievement of having a ‘home’. PMID:17355900

  14. The National Military Strategy of the United States of America 2015: The United States Military’s Contribution to National Security

    DTIC Science & Technology

    2015-06-01

    need to counter revisionist states that are challenging international norms as well as violent extremist organizations (VEOs) that are undermining...more information than entire governments once possessed. They can swiftly organize and act on what they learn, sometimes leading to violent change...urging both nations to settle their disputes peacefully and in accordance with international law. Concurrent with state challenges, violent

  15. A Guide to Directors of Homeland Security, Emergency Management, and Military Departments in the States and Territories of the United States

    DTIC Science & Technology

    2007-12-01

    electors of this State at the same time and in the same manner and for the same term of office as other State officials. His rank shall be that of major...http://www.fortaleza.gobierno.pr/admin_fortaleza/ sistema /ordens/0028.pdf. Adjutant General Director: Colonel David Carrion Baralt Functions

  16. Climate change in the federated states of Micronesia: Food and water security, climate risk management, and adaptive strategies

    USGS Publications Warehouse

    Fletcher, Charles H.; Richmond, Bruce M.

    2010-01-01

    This is a report of findings following research and a three-week field assessment (April 2009) of the Federated States of Micronesia (FSM) in response to nation-wide marine inundation by extreme tides (December 2007, September 2008, December 2008).3 The study was conducted at the request of the US Department of Agriculture Forest Service and the state and federal governments of FSM.

  17. Challenge theme 7: Information support for management of border security and environmental protection: Chapter 9 in United States-Mexican Borderlands: Facing tomorrow's challenges through USGS science

    USGS Publications Warehouse

    Parcher, Jean W.; Page, William R.

    2013-01-01

    Historically, international borders were located far from the major political and economic capitals of their countries and rarely received adequate planning or infrastructure development. Today, as a result of global economics and increased movement of goods between nations, border regions play a much greater role in commerce, tourism, and transportation. For example, Mexico is the second largest destination for United States exports (Woodrow Wilson Center Mexico Institute, 2009). The rapid population and economic growth along the United States–Mexican border, undocumented human border crossings, and the unique natural diversity of resources in the Borderlands present challenges for border security and environmental protection. Assessing risks and implementing sustainable growth policies to protect the environment and quality of life greatly increase in complexity when the issues cross an international border, where social services, environmental regulations, lifestyles, and cultural beliefs are unique for each country. Shared airsheds, water and biological resources, national security issues, and disaster management needs require an integrated binational approach to assess risks and develop binational management strategies.

  18. Using Secure Coprocessors

    DTIC Science & Technology

    1994-05-01

    to/from the host. The entire disk image provided by c i t in the host is encrypted , and my code uses encryption / decryption DMA transfers to access it...uses an encrypted file system image supplied by the host to load system servers and applications (the decryption key is kept in secure RAM). This... encryption / decryption hardware may be used. Secure coprocessors must be packaged so that physical attempts to gain access to the internal state of the

  19. Secure quantum key distribution

    NASA Astrophysics Data System (ADS)

    Lo, Hoi-Kwong; Curty, Marcos; Tamaki, Kiyoshi

    2014-08-01

    Secure communication is crucial in the Internet Age, and quantum mechanics stands poised to revolutionize cryptography as we know it today. In this Review, we introduce the motivation and the current state of the art of research in quantum cryptography. In particular, we discuss the present security model together with its assumptions, strengths and weaknesses. After briefly introducing recent experimental progress and challenges, we survey the latest developments in quantum hacking and countermeasures against it.

  20. 22 CFR 8.7 - Security.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 22 Foreign Relations 1 2011-04-01 2011-04-01 false Security. 8.7 Section 8.7 Foreign Relations DEPARTMENT OF STATE GENERAL ADVISORY COMMITTEE MANAGEMENT § 8.7 Security. (a) All officers and members of a committee must have a security clearance for the subject matter level of security at which the...

  1. 22 CFR 8.7 - Security.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Security. 8.7 Section 8.7 Foreign Relations DEPARTMENT OF STATE GENERAL ADVISORY COMMITTEE MANAGEMENT § 8.7 Security. (a) All officers and members of a committee must have a security clearance for the subject matter level of security at which the...

  2. A Security Checklist for ERP Implementations

    ERIC Educational Resources Information Center

    Hughes, Joy R.; Beer, Robert

    2007-01-01

    The EDUCAUSE/Internet2 Computer and Network Security Task Force consulted with IT security professionals on campus about concerns with the current state of security in enterprise resource planning (ERP) systems. From these conversations, it was clear that security issues generally fell into one of two areas: (1) It has become extremely difficult…

  3. Policy based network management : state of the industry and desired functionality for the enterprise network: security policy / testing technology evaluation.

    SciTech Connect

    Morgan, Christine A.; Ernest, Martha J.; Tolendino, Lawrence F.; Klaus, Edward J.; MacAlpine, Timothy L.; Rios, Michael A.; Keliiaa, Curtis M.; Taylor, Jeffrey L.

    2005-02-01

    Policy-based network management (PBNM) uses policy-driven automation to manage complex enterprise and service provider networks. Such management is strongly supported by industry standards, state of the art technologies and vendor product offerings. We present a case for the use of PBNM and related technologies for end-to-end service delivery. We provide a definition of PBNM terms, a discussion of how such management should function and the current state of the industry. We include recommendations for continued work that would allow for PBNM to be put in place over the next five years in the unclassified environment.

  4. The cost of IT security.

    PubMed

    McMillan, Mac

    2015-04-01

    Breaches in data security have become commonplace in health care, making IT security a necessary cost for healthcare organizations. Organizations that do not invest proactively in IT security face a significant risk of incurring much greater costs from incidents involving compromised data security. Direct costs of security breaches include the costs of discovery, response, investigation, and notification and also can include state or federal penalties and costs of compliance with corrective action plans and resolution agreements. Hidden costs can include damage to brand, loss of consumer confidence, reduced HCAHPS scores, and--by extension--reduced value-based purchasing payments.

  5. Building Partner Capacity: State and DOD Need to Define Time Frames to Guide and Track Global Security Contingency Fund Projects

    DTIC Science & Technology

    2014-11-01

    Reviews monitoring and evaluation reports for non-performing programs and proposals for significant program modifications, such as activities or...responsibilities including supporting project oversight and monitoring and evaluation . Includes a small number of personnel from State and DOD. Geographic...including implementation planning, plan endorsement, and execution. Participate in program assessment, to include monitoring and evaluation . Include

  6. Air Quality Impacts of Increased Use of Ethanol under the United States' Energy Independence and Security Act

    EPA Science Inventory

    Increased use of ethanol in the United States fuel supply will impact emissions and ambient concentrations of greenhouse gases, “criteria” pollutants for which the U. S. EPA sets ambient air quality standards, and a variety of air toxic compounds. This paper focuses on impacts of...

  7. Assessing the Need for an On-Line Educational Module for Volunteer Leaders on Bio-Security in Washington State 4-H Livestock Projects

    ERIC Educational Resources Information Center

    Stevenson, Jill L.; Moore, Dale A.; Newman, Jerry; Schmidt, Janet L.; Smith, Sarah M.; Smith, Jean; Kerr, Susan; Wallace, Michael; BoyEs, Pat

    2011-01-01

    4-H livestock projects present disease transmission risks that can be reduced by the use of bio-security practices. The responsibility of teaching bio-security to youth belongs primarily to volunteer leaders, who may not be aware of the importance of these practices. A needs assessment for an online educational module about bio-security revealed…

  8. Comment II on 'Quantum secret sharing based on reusable Greenberger-Horne-Zeilinger states as secure carriers'

    SciTech Connect

    Du Jianzhong; Qin Sujuan; Wen Qiaoyan; Zhu Fuchen

    2006-07-15

    In a recent paper [S. Bagherinezhad and V. Karimipour, Phys. Rev. A 67, 044302 (2003)], a quantum secret sharing protocol based on reusable GHZ states was proposed. However, in this comment, it is shown that this protocol is insecure because a cheater can gain all the secret bits before sharing, while introducing one data bit error at most in the whole communication, which makes the cheater avoid the detection by the communication parities.

  9. Physical Security

    SciTech Connect

    2008-01-01

    The future of physical security at government facilities and national laboratories is rapidly progressing beyond the cliché of gates, guns and guards, and is quickly being replaced by radars, sensors and cameras. Learn more about INL's security research at http://www.facebook.com/idahonationallaboratory.

  10. Social Security.

    ERIC Educational Resources Information Center

    Social and Labour Bulletin, 1983

    1983-01-01

    This group of articles discusses a variety of studies related to social security and retirement benefits. These studies are related to both developing and developed nations and are also concerned with studying work conditions and government role in administering a democratic social security system. (SSH)

  11. School Security.

    ERIC Educational Resources Information Center

    Bete, Tim, Ed.

    1998-01-01

    Presents the opinions of four security experts on the issue of guns in schools. The experts respond to the following questions: will schools ever be free of weapons; will card access systems become common in public schools; will metal detectors solve school security problems; and will students ever be issued bullet-proof vests along with…

  12. OSI-Security and Relations with other Security Standards

    DTIC Science & Technology

    1991-03-01

    voordeel van het gebruik van standaard, commercicel verkrijgbare informatie technologie- producten voor militaire toepassingen wordt door de NAVO...onderkend. Gebruik van deze producten is alleen mogelijk als aan specifieke militaire eisen wordt voldaan, met name op beveiligingsgebied. De OSI Security...TNO mpolt Page 4 CONTENTS ABSTRACT 2 SAMENVATING 3 CONTENTS 4 1 INTRODUCTION 5 2 OSI AND SECURITY: STATE OF THE ART 6 3 PLACEMENT OF OSI SECURITY

  13. To amend title 49, United States Code, to establish a 10-year term of office for any individual appointed as the Assistant Secretary of Homeland Security (Transportation Security Administration), and for other purposes.

    THOMAS, 111th Congress

    Rep. Wolf, Frank R. [R-VA-10

    2010-01-13

    01/28/2010 Referred to the Subcommittee on Transportation Security and Infrastructure Protection. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  14. To amend title 49, United States Code, to direct the Secretary of Homeland Security to carry out a program to ensure fair treatment in the security screening of individuals with metal implants traveling in air transportation.

    THOMAS, 111th Congress

    Rep. Oberstar, James L. [D-MN-8

    2009-05-07

    05/26/2009 Referred to the Subcommittee on Transportation Security and Infrastructure Protection. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  15. Secure Objectives for School Security

    ERIC Educational Resources Information Center

    Dalton-Noblitt, April

    2012-01-01

    In a study conducted among more than 980 American four-year and two-year colleges and universities, including institutions such as the University of Michigan, MIT, UCLA and Columbia, security staff and other administrators identified the five leading goals for their security systems: (1) Preventing unauthorized people from entering their…

  16. The Agricultural Job Opportunity Benefits and Security Act of 1999. Hearing before the Subcommittee on Immigration of the Committee on the Judiciary. United States Senate, One Hundred Sixth Congress, Second Session (May 4, 2000).

    ERIC Educational Resources Information Center

    Congress of the U.S., Washington, DC. Senate Committee on the Judiciary.

    This publication documents a congressional hearing on the Agricultural Job Opportunity Benefits and Security Act of 1999, which focuses on these three major concerns: the United States (US) is the home of a large and growing number of undocumented agricultural workers; the current H-2A Program is administratively burdensome, does not work well for…

  17. The Shaping of Managers' Security Objectives through Information Security Awareness Training

    ERIC Educational Resources Information Center

    Harris, Mark A.

    2010-01-01

    Information security research states that corporate security policy and information security training should be socio-technical in nature and that corporations should consider training as a primary method of protecting their information systems. However, information security policies and training are predominately technical in nature. In addition,…

  18. Secure PVM

    SciTech Connect

    Dunigan, T.H.; Venugopal, N.

    1996-09-01

    This research investigates techniques for providing privacy, authentication, and data integrity to PVM (Parallel Virtual Machine). PVM is extended to provide secure message passing with no changes to the user`s PVM application, or, optionally, security can be provided on a message-by message basis. Diffe-Hellman is used for key distribution of a single session key for n-party communication. Keyed MD5 is used for message authentication, and the user may select from various secret-key encryption algorithms for message privacy. The modifications to PVM are described, and the performance of secure PVM is evaluated.

  19. Security Detail.

    ERIC Educational Resources Information Center

    Epstein, Marc A.

    2003-01-01

    Describes problems of maintaining discipline and security at Jamaica High School in Queens, New York. Argues that court decisions and school regulations have allowed minority of aggressive and disruptive students to destabilize the learning environment. (PKP)

  20. [Food security in Mexico].

    PubMed

    Urquía-Fernández, Nuria

    2014-01-01

    An overview of food security and nutrition in Mexico is presented, based on the analysis of the four pillars of food security: availability, access, utilization of food, and stability of the food supply. In addition, the two faces of malnutrition in Mexico were analyzed: obesity and undernourishment. Data were gathered from the food security indicators of the United Nations's Food and Agriculture Organization, from the Mexican Scale of Food Security, and from the National Health and Nutrition Survey. Mexico presents an index of availability of 3 145 kilocalories per person per day, one of the highest indexes in the world, including both food production and imports. In contrast, Mexico is affected by a double burden of malnutrition: whereas children under five present 14% of stunt, 30% of the adult population is obese. Also, more than 18% of the population cannot afford the basic food basket (food poverty). Using perception surveys, people reports important levels of food insecurity, which concentrates in seven states of the Mexican Federation. The production structure underlying these indicators shows a very heterogeneous landscape, which translates in to a low productivity growth across the last years. Food security being a multidimensional concept, to ensure food security for the Mexican population requires a revision and redesign of public productive and social policies, placing a particular focus on strengthening the mechanisms of institutional governance.

  1. Cyber Security Applications: Freeware & Shareware

    ERIC Educational Resources Information Center

    Rogers, Gary; Ashford, Tina

    2015-01-01

    This paper will discuss some assignments using freeware/shareware instructors can find on the Web to use to provide students with hands-on experience in this arena. Also, the college, Palm Beach State College, via a grant with the U.S. Department of Labor, has recently purchased a unique cyber security device that simulates cyber security attacks…

  2. 45 CFR 303.104 - Procedures for posting security, bond or guarantee to secure payment of overdue support.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 45 Public Welfare 2 2010-10-01 2010-10-01 false Procedures for posting security, bond or guarantee... § 303.104 Procedures for posting security, bond or guarantee to secure payment of overdue support. (a... security, bond or give some other guarantee to secure payment of overdue support. (b) The State...

  3. Market Reactions to Publicly Announced Privacy and Security Breaches Suffered by Companies Listed on the United States Stock Exchanges: A Comparative Empirical Investigation

    ERIC Educational Resources Information Center

    Coronado, Adolfo S.

    2012-01-01

    Using a sample of security and privacy breaches the present research examines the comparative announcement impact between the two types of events. The first part of the dissertation analyzes the impact of publicly announced security and privacy breaches on abnormal stock returns, the change in firm risk, and abnormal trading volume are measured.…

  4. 78 FR 4393 - Applications for New Awards; Minorities and Retirement Security Program

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-01-22

    ... SOCIAL SECURITY ADMINISTRATION Applications for New Awards; Minorities and Retirement Security Program... Policy, Social Security Administration. ACTION: Notice. Overview Information: Minorities and Retirement... Education (ED or the Department) and the United States Social Security Administration (SSA). The MRS...

  5. Quantum-secured imaging

    NASA Astrophysics Data System (ADS)

    Malik, Mehul; Magaña-Loaiza, Omar S.; Boyd, Robert W.

    2012-12-01

    We have built an imaging system that uses a photon's position or time-of-flight information to image an object, while using the photon's polarization for security. This ability allows us to obtain an image which is secure against an attack in which the object being imaged intercepts and resends the imaging photons with modified information. Popularly known as "jamming," this type of attack is commonly directed at active imaging systems such as radar. In order to jam our imaging system, the object must disturb the delicate quantum state of the imaging photons, thus introducing statistical errors that reveal its activity.

  6. Data security.

    PubMed

    2016-09-01

    A government-commissioned review of data security across health and care has led to the proposal of new standards for security and options for a consent/opt-out model. Standards include that all staff complete appropriate annual data security training and pass a mandatory test provided through the revised Information Governance Toolkit, that personal confidential data is only accessible to staff who need it for their current role, and that access is removed as soon as it is no longer required. The consent/opt-out model is outlined under 8 statements, and includes certain circumstances where it will not apply, for example, where there is an overriding public interest, or mandatory legal requirement.

  7. 22 CFR 16.6 - Security clearances.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 22 Foreign Relations 1 2013-04-01 2013-04-01 false Security clearances. 16.6 Section 16.6 Foreign Relations DEPARTMENT OF STATE PERSONNEL FOREIGN SERVICE GRIEVANCE SYSTEM § 16.6 Security clearances. The agencies shall use their best endeavors to expedite security clearances whenever necessary to ensure a...

  8. 22 CFR 16.6 - Security clearances.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 22 Foreign Relations 1 2014-04-01 2014-04-01 false Security clearances. 16.6 Section 16.6 Foreign Relations DEPARTMENT OF STATE PERSONNEL FOREIGN SERVICE GRIEVANCE SYSTEM § 16.6 Security clearances. The agencies shall use their best endeavors to expedite security clearances whenever necessary to ensure a...

  9. 22 CFR 16.6 - Security clearances.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 22 Foreign Relations 1 2011-04-01 2011-04-01 false Security clearances. 16.6 Section 16.6 Foreign Relations DEPARTMENT OF STATE PERSONNEL FOREIGN SERVICE GRIEVANCE SYSTEM § 16.6 Security clearances. The agencies shall use their best endeavors to expedite security clearances whenever necessary to ensure a...

  10. 22 CFR 16.6 - Security clearances.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Security clearances. 16.6 Section 16.6 Foreign Relations DEPARTMENT OF STATE PERSONNEL FOREIGN SERVICE GRIEVANCE SYSTEM § 16.6 Security clearances. The agencies shall use their best endeavors to expedite security clearances whenever necessary to ensure a...

  11. School Security Assessment Programme in Australia

    ERIC Educational Resources Information Center

    Marrapodi, John

    2007-01-01

    This article describes a successful security risk management programme in Australia. The state-wide programme follows a structured risk management approach focusing on the safety and security of people, information, provision, and assets in the school environment. To assist school principals, a Security Risk Assessment Programme was developed on a…

  12. Status of the National Security Workforce

    SciTech Connect

    2008-03-31

    This report documents the status of the national security workforce as part of the National Security Preparedness Project, being performed by the Arrowhead Center of New Mexico State University under a DOE/NNSA grant. This report includes an assessment of the current workforce situation. The national security workforce is an important component of national security for our country. With the increase of global threats of terrorism, this workforce is being called upon more frequently. This has resulted in the need for an increasing number of national security personnel. It is imperative to attract and retain a skilled and competitive national security workforce.

  13. Securing Europe's future

    SciTech Connect

    Flanagan, S.J.; Hampson, F.O.

    1986-01-01

    The book provides a comprehensive review of the major political, social and economic issues that will shape the course of European security in the coming decade. It offers a thorough assessment of such critical questions as European views of the U.S. Strategic Defense Initiative, the likely contribution of new technologies and tactics to NATO's conventional defense capabilities, and domestic factors that influence security policy. It also provides original analysis of a number of issues, such as economic dimensions of security, the quest for a European defense identity, protection of Western interests outside the NATO area, and the role of the European neutral states in the security sphere, that have not received the attention they deserve. It provides a fresh review of the nuclear question and of the German security debate in the aftermath of the initial U.S. INF missile deployments. The final chapter is a careful synthesis of the various contributions that advances a framework for assessing NATO's policy alternatives.

  14. To require the Secretary of Homeland Security to establish a United States Citizenship and Immigration Services field office in Kodiak, Alaska.

    THOMAS, 111th Congress

    Rep. Young, Don [R-AK-At Large

    2010-03-19

    04/26/2010 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  15. Airline Security and a Strategy for Change

    DTIC Science & Technology

    2006-01-15

    profit. As a result, today’s airport security systems are not as technologically advanced as needed. In short, terrorists managed to defeat the...efficient method of securing the skies. The desired end state is known. Americans want an airport security system that allows the safe conduct of air...issue 34 p 3. 35 Ibid., 4. 36 Sara Goo, “Registered Traveler Test Ends Inconclusively; Airport Security Scheme Lacks Broad Support,” The Washington

  16. 17 CFR 270.8b-3 - Title of securities.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 17 Commodity and Securities Exchanges 3 2013-04-01 2013-04-01 false Title of securities. 270.8b-3 Section 270.8b-3 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) RULES AND REGULATIONS, INVESTMENT COMPANY ACT OF 1940 § 270.8b-3 Title of securities. Wherever the title of securities is required to be stated,...

  17. 17 CFR 270.8b-3 - Title of securities.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 17 Commodity and Securities Exchanges 4 2014-04-01 2014-04-01 false Title of securities. 270.8b-3 Section 270.8b-3 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) RULES AND REGULATIONS, INVESTMENT COMPANY ACT OF 1940 § 270.8b-3 Title of securities. Wherever the title of securities is required to be stated,...

  18. 17 CFR 270.8b-3 - Title of securities.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 17 Commodity and Securities Exchanges 3 2011-04-01 2011-04-01 false Title of securities. 270.8b-3 Section 270.8b-3 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) RULES AND REGULATIONS, INVESTMENT COMPANY ACT OF 1940 § 270.8b-3 Title of securities. Wherever the title of securities is required to be stated,...

  19. 17 CFR 270.8b-3 - Title of securities.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 17 Commodity and Securities Exchanges 3 2012-04-01 2012-04-01 false Title of securities. 270.8b-3 Section 270.8b-3 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) RULES AND REGULATIONS, INVESTMENT COMPANY ACT OF 1940 § 270.8b-3 Title of securities. Wherever the title of securities is required to be stated,...

  20. Breaking the cyber-security dilemma: aligning security needs and removing vulnerabilities.

    PubMed

    Dunn Cavelty, Myriam

    2014-09-01

    Current approaches to cyber-security are not working. Rather than producing more security, we seem to be facing less and less. The reason for this is a multi-dimensional and multi-faceted security dilemma that extends beyond the state and its interaction with other states. It will be shown how the focus on the state and "its" security crowds out consideration for the security of the individual citizen, with detrimental effects on the security of the whole system. The threat arising from cyberspace to (national) security is presented as possible disruption to a specific way of life, one building on information technologies and critical functions of infrastructures, with relatively little consideration for humans directly. This non-focus on people makes it easier for state actors to militarize cyber-security and (re-)assert their power in cyberspace, thereby overriding the different security needs of human beings in that space. Paradoxically, the use of cyberspace as a tool for national security, both in the dimension of war fighting and the dimension of mass-surveillance, has detrimental effects on the level of cyber-security globally. A solution out of this dilemma is a cyber-security policy that is decidedly anti-vulnerability and at the same time based on strong considerations for privacy and data protection. Such a security would have to be informed by an ethics of the infosphere that is based on the dignity of information related to human beings.

  1. A coastal perspective on security.

    PubMed

    Emerson, Steven D; Nadeau, John

    2003-11-14

    This paper examines security issues from the unique perspective of our nation's coastlines and associated infrastructure. It surveys ongoing efforts to secure offshore shipping lanes, as well as the transportation systems and huge capital investments on the narrow strip of land intersecting with coastal waters. The paper recounts the extraordinary demands recently placed on the Coast Guard, port authorities and other agencies charged with offshore security. New federal requirements such as port assessments continue to be mandated, while solutions to finding are still unfolding. An up-to-date summary of maritime security functions is provided. Those requirements are compared and contrasted with security guidelines and regulatory demands placed upon mobile and fixed assets of the Chemical Process Industry (CPI) in coastal environs. These span the gamut from recommendations by industry groups and professional organizations, to federal and state requirements, to insurance demands, to general duty obligations.

  2. Extreme hydrological events and security

    NASA Astrophysics Data System (ADS)

    Kundzewicz, Z. W.; Matczak, P.

    2015-06-01

    Economic losses caused by hydrological extremes - floods and droughts - have been on the rise, worldwide. Hydrological extremes jeopardize human security and cause serious threats to human life and welfare and societal livelihood. Floods and droughts can undermine societies' security, understood as freedom from threat and the ability of societies to maintain their independent identity and their functional integrity against forces of change. Several dimensions of security are reviewed in the context of hydrological extremes. Floods and droughts pose a burden and serious challenges to the state, responsible to sustain economic development, societal and environmental security - the maintenance of ecosystem services, on which a society depends. It is shown that reduction of risk of hydrological disasters improves human security.

  3. Security system

    DOEpatents

    Baumann, Mark J.; Kuca, Michal; Aragon, Mona L.

    2016-02-02

    A security system includes a structure having a structural surface. The structure is sized to contain an asset therein and configured to provide a forceful breaching delay. The structure has an opening formed therein to permit predetermined access to the asset contained within the structure. The structure includes intrusion detection features within or associated with the structure that are activated in response to at least a partial breach of the structure.

  4. Image Security

    DTIC Science & Technology

    2007-11-02

    popularity, contemplates the cru- cial needs for protecting intellectual property rights on multimedia content like images, video, audio , and oth- ers...protection for still images, audio , video, and multimedia products.’ The networking environment of the future will require tools that provide m secure and fast...technique known as steganography ? Steganography , or “covered writing,” George Voyatzis and Ioannis Pitas University of Thessaloniki has a long

  5. Security seal

    DOEpatents

    Gobeli, Garth W.

    1985-01-01

    Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to "fingerprints" are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

  6. Expeditionary Diplomacy: A Security Challenge

    DTIC Science & Technology

    2014-07-14

    affect the composition of a RSO Office. If for example, civil unrest, 16 US State Department, "Bureau of Diplomatic Security," OS NET , https...Incendiary Device I I Kidnapping 2 2 Shooting I 8 9 Small Arms Fire I I I 3 Suicide Bombc.T 2 2 VB lED I I Violent D~111onstration s 6 4 3 I 19 Total...34Bureau of Diplomatic Security." OS NET . https://intranet.ds.state.sbu/DS/default.aspx (accessed September 10, 2013). US Department of State. The

  7. Securing smart grid technology

    NASA Astrophysics Data System (ADS)

    Chaitanya Krishna, E.; Kosaleswara Reddy, T.; Reddy, M. YogaTeja; Reddy G. M., Sreerama; Madhusudhan, E.; AlMuhteb, Sulaiman

    2013-03-01

    In the developing countries electrical energy is very important for its all-round improvement by saving thousands of dollars and investing them in other sector for development. For Growing needs of power existing hierarchical, centrally controlled grid of the 20th Century is not sufficient. To produce and utilize effective power supply for industries or people we should have Smarter Electrical grids that address the challenges of the existing power grid. The Smart grid can be considered as a modern electric power grid infrastructure for enhanced efficiency and reliability through automated control, high-power converters, modern communications infrastructure along with modern IT services, sensing and metering technologies, and modern energy management techniques based on the optimization of demand, energy and network availability and so on. The main objective of this paper is to provide a contemporary look at the current state of the art in smart grid communications as well as critical issues on smart grid technologies primarily in terms of information and communication technology (ICT) issues like security, efficiency to communications layer field. In this paper we propose new model for security in Smart Grid Technology that contains Security Module(SM) along with DEM which will enhance security in Grid. It is expected that this paper will provide a better understanding of the technologies, potential advantages and research challenges of the smart grid and provoke interest among the research community to further explore this promising research area.

  8. Update: Science and security

    NASA Astrophysics Data System (ADS)

    Richman, Barbara T.

    Although ‘a substantial and serious technology transfer [to the Soviet Union] exists,’ open communication of federally funded research does not damage our national security, according to Dale R. Corson, president emeritus of Cornell University and chairman of the National Academy of Sciences' Panel on Scientific Communication and National Security. Corson characterized those technology transfers at a recent press conference on the panel's findings, which are summarized in their report, ‘Science Communications and National Security’ (Eos, October 5, p. 801).‘A net flow of products, processes, and ideas is continually moving from the United States and its allies to the Soviet Union, through both overt and covert means,’ Corson said. While some of this technology transfer has not compromised national security (‘in part because a technology in question had little or no military significance’), a ‘substantial portion of the transfer has been damaging to national security,’ Corson explained. The ‘damaging transfers’ occur through the ‘legal as well as illegal sale of products, through transfers via third countries, and through a highly organized espionage operation.’

  9. Statistical security for Social Security.

    PubMed

    Soneji, Samir; King, Gary

    2012-08-01

    The financial viability of Social Security, the single largest U.S. government program, depends on accurate forecasts of the solvency of its intergenerational trust fund. We begin by detailing information necessary for replicating the Social Security Administration's (SSA's) forecasting procedures, which until now has been unavailable in the public domain. We then offer a way to improve the quality of these procedures via age- and sex-specific mortality forecasts. The most recent SSA mortality forecasts were based on the best available technology at the time, which was a combination of linear extrapolation and qualitative judgments. Unfortunately, linear extrapolation excludes known risk factors and is inconsistent with long-standing demographic patterns, such as the smoothness of age profiles. Modern statistical methods typically outperform even the best qualitative judgments in these contexts. We show how to use such methods, enabling researchers to forecast using far more information, such as the known risk factors of smoking and obesity and known demographic patterns. Including this extra information makes a substantial difference. For example, by improving only mortality forecasting methods, we predict three fewer years of net surplus, $730 billion less in Social Security Trust Funds, and program costs that are 0.66% greater for projected taxable payroll by 2031 compared with SSA projections. More important than specific numerical estimates are the advantages of transparency, replicability, reduction of uncertainty, and what may be the resulting lower vulnerability to the politicization of program forecasts. In addition, by offering with this article software and detailed replication information, we hope to marshal the efforts of the research community to include ever more informative inputs and to continue to reduce uncertainties in Social Security forecasts.

  10. 7 CFR 764.103 - General security requirements.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 7 Agriculture 7 2014-01-01 2014-01-01 false General security requirements. 764.103 Section 764.103... security requirements. (a) Security requirements specific to each loan program are outlined in subparts D... included in the Agency's additional security requirement stated in paragraph (c) of this section....

  11. 49 CFR 659.23 - System security plan: contents.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 7 2010-10-01 2010-10-01 false System security plan: contents. 659.23 Section 659... State Oversight Agency § 659.23 System security plan: contents. The system security plan must, at a... system security plan; and (e) Document the rail transit agency's process for making its system...

  12. 49 CFR 659.23 - System security plan: contents.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 7 2011-10-01 2011-10-01 false System security plan: contents. 659.23 Section 659... State Oversight Agency § 659.23 System security plan: contents. The system security plan must, at a... system security plan; and (e) Document the rail transit agency's process for making its system...

  13. 31 CFR 344.4 - What are Time Deposit securities?

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 31 Money and Finance:Treasury 2 2011-07-01 2011-07-01 false What are Time Deposit securities? 344...) FISCAL SERVICE, DEPARTMENT OF THE TREASURY BUREAU OF THE PUBLIC DEBT U.S. TREASURY SECURITIES-STATE AND LOCAL GOVERNMENT SERIES Time Deposit Securities § 344.4 What are Time Deposit securities? Time...

  14. 31 CFR 344.4 - What are Time Deposit securities?

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 31 Money and Finance: Treasury 2 2014-07-01 2014-07-01 false What are Time Deposit securities? 344...) FISCAL SERVICE, DEPARTMENT OF THE TREASURY BUREAU OF THE FISCAL SERVICE U.S. TREASURY SECURITIES-STATE AND LOCAL GOVERNMENT SERIES Time Deposit Securities § 344.4 What are Time Deposit securities?...

  15. Estonian National Security Strategy: Current and Future Challenges

    DTIC Science & Technology

    2013-03-01

    2013 2 . REPORT TYPE STRATEGY RESEARCH PROJECT .33 3. DATES COVERED (From - To) 4. TITLE AND SUBTITLE Estonian National Security Strategy...the existing Estonian Security Strategy and offers recommendations. 2 1. Estonian Security Environment: International Relations...Copenhagen School is understood in wider terms than the political-military and state-centered view of traditional security studies. 2 According to Buzan

  16. 17 CFR 230.480 - Title of securities.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Title of securities. 230.480 Section 230.480 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION GENERAL RULES AND... shares, the par or stated value, if any; the rate of dividends, if fixed, and whether cumulative or...

  17. Development and Evaluation of an On-Line Educational Module for Volunteer Leaders on Bio-Security in Washington State 4-H Livestock Projects

    ERIC Educational Resources Information Center

    Stevenson, Jill L.; Moore, Dale A.; Newman, Jerry; Schmidt, Janet L.; Smith, Sarah M.; Smith, Jean; Kerr, Susan; Wallace, Michael; BoyEs, Pat

    2011-01-01

    An on-line module on disease prevention was created for 4-H volunteer leaders who work with livestock projects in Washington to better prepare them to teach youth about bio-security and its importance in 4-H livestock projects. Evaluation of the module and usage statistics since the module's debut were collected and evaluated. The module increases…

  18. Development and Evaluation of an On-Line Educational Module for Volunteer Leaders on Bio-Security in Washington State 4-H Livestock Projects

    ERIC Educational Resources Information Center

    Stevenson, Jill L.; Moore, Dale A.; Newman, Jerry; Schmidt, Janet L.; Smith, Sarah M.; Smith, Jean; Kerr, Susan; Wallace, Michael; BoyEs, Pat

    2011-01-01

    A module on disease prevention was created for 4-H volunteer leaders who work with livestock projects in Washington to better prepare them to teach youth about bio-security and its importance in 4-H livestock projects. Evaluation of the module and usage statistics since the module's debut were collected and evaluated. The module increases…

  19. Security on Campus. Hearing before a Subcommittee of the Committee on Appropriations, United State Senate, One Hundred Fifth Congress, Second Session. Special Hearing.

    ERIC Educational Resources Information Center

    Congress of the U.S., Washington, DC. Senate Committee on Appropriations.

    This document presents the transcript of a congressional hearing held before a Senate subcommittee concerning reporting requirements of the Student Right to Know and Campus Security Act of 1990. Among issues addressed is whether the definition of "campus" includes buildings used partially or completely for commercial purposes, sidewalks,…

  20. Nuclear security

    SciTech Connect

    Dingell, J.D.

    1991-02-01

    The Department of Energy's (DOE) Lawrence Livermore National Laboratory, located in Livermore, California, generates and controls large numbers of classified documents associated with the research and testing of nuclear weapons. Concern has been raised about the potential for espionage at the laboratory and the national security implications of classified documents being stolen. This paper determines the extent of missing classified documents at the laboratory and assesses the adequacy of accountability over classified documents in the laboratory's custody. Audit coverage was limited to the approximately 600,000 secret documents in the laboratory's custody. The adequacy of DOE's oversight of the laboratory's secret document control program was also assessed.

  1. AVIATION SECURITY: FAA’s Actions to Study Responsibilities and Funding for Airport Security and to Certify Screening Companies

    DTIC Science & Technology

    1999-02-01

    Actions to Study Responsibilities and Funding for Airport Security and to Certify Screening Companies DISTRIBUTION STATEMENT A Approved for...local law enforcement support relating to air carrier and airport security measures. The funding of the security operations is divided among FAA, the...generally agreed with the current division of airport security responsibilities. These officials stated that the continuity of screening would be

  2. Food and nutrition security.

    PubMed

    1997-01-01

    This article discusses the deficits in food security in India. It is recommended that India commit to nutrition security by direct actions. Programs should provide essential staples and a nutrient distribution system with affordable prices. India should adopt an Employment Guarantee Program. Creches should provide maternal-child health care, nutrition, literacy, and employment. Government must resolve the internal conflicts of interest between overlapping sectors. India should resolve the "dysfunction" between macroeconomic policies and anti-poverty strategies. Interventions should be people oriented, rely on social mobilization, and provide information and financial resources in a nonconflict context. Efforts will require the cooperation between the private sector, voluntary organizations, state agencies, and local self-governing decentralized agencies. There is a need to build capacity and viable institutions. Poverty agencies do not have access to the minimum required cereals for the poor. The Public Distribution System (PDS) does not guarantee a minimum quantity of foodstuffs per household regardless of income level. More high quality varieties of rice are produced due to higher prices in the marketplace. Most state governments do not provide staple cereals to the PDS at affordable prices. The government sets fair prices for sugar, but not cereal. The government sells more cereal in the open market than to PDS. PDS should target poor households; that is, the 29.9% who live below the poverty line. Lack of nutrition security is due to poverty that is enhanced by ignorance and the lack of health and nutrition education.

  3. National security

    SciTech Connect

    Not Available

    1992-04-01

    This paper summarizes the views presented on October 31, 1991, at a GAO-sponsored conference on worldwide threats to U.S. national security. The conference was designed to provide insight into potential military threats to U.S. security interests and necessary modifications to current and planned U.S. forces to meet those threats. Conference participants, including defense analysts and retired military officers, discussed and analyzed the possibility of U.S. and allied involvement in various regional contingencies in Europe and the Soviet Union, Eat Asia and the Pacific, and the Near East and South Asia. Topics ranged from the possibility of nuclear war to a general discussion of low-intensity conflict. To serve as a starting point for discussion, we asked several of the participants to provide papers representing a wide range of views. The participants agreed that for many years the Soviet/Warsaw Pact threat to Europe shaped U.S. force planning but that the Soviet union no longer posed a conventional threat. Nuclear weapons held by the former Soviet republics and other nations, however, remain a concern. There was no agreement of the methodology for sizing U.S. forces. Some argued for sizing based on specific threats; other argued for flexibility to meet any and all contingencies and cited the Gulf War as a example.

  4. The Cyber Security Crisis

    ScienceCinema

    Spafford, Eugene [Purdue University, West Lafayette, Indiana, United States

    2016-07-12

    Despite considerable activity and attention, the overall state of information security continues to get worse. Attacks are increasing, fraud and theft are rising, and losses may exceed $100 billion per year worldwide. Many factors contribute to this, including misplaced incentives for industry, a lack of attention by government, ineffective law enforcement, and an uninformed image of who the perpetrators really are. As a result, many of the intended attempts at solutions are of limited (if any) overall effectiveness. This presentation will illustrate some key aspects of the cyber security problem and its magnitude, as well as provide some insight into causes and enabling factors. The talk will conclude with some observations on how the computing community can help improve the situation, as well as some suggestions for 'cyber self-defense.'

  5. The Cyber Security Crisis

    SciTech Connect

    Spafford, Eugene

    2006-05-10

    Despite considerable activity and attention, the overall state of information security continues to get worse. Attacks are increasing, fraud and theft are rising, and losses may exceed $100 billion per year worldwide. Many factors contribute to this, including misplaced incentives for industry, a lack of attention by government, ineffective law enforcement, and an uninformed image of who the perpetrators really are. As a result, many of the intended attempts at solutions are of limited (if any) overall effectiveness. This presentation will illustrate some key aspects of the cyber security problem and its magnitude, as well as provide some insight into causes and enabling factors. The talk will conclude with some observations on how the computing community can help improve the situation, as well as some suggestions for 'cyber self-defense.'

  6. Perimeter security for Minnesota correctional facilities

    SciTech Connect

    Crist, D.; Spencer, D.D.

    1996-12-31

    For the past few years, the Minnesota Department of Corrections, assisted by Sandia National Laboratories, has developed a set of standards for perimeter security at medium, close, and maximum custody correctional facilities in the state. During this process, the threat to perimeter security was examined and concepts about correctional perimeter security were developed. This presentation and paper will review the outcomes of this effort, some of the lessons learned, and the concepts developed during this process and in the course of working with architects, engineers and construction firms as the state upgraded perimeter security at some facilities and planned new construction at other facilities.

  7. 78 FR 64260 - Overseas Security Advisory Council (OSAC) Meeting Notice

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-10-28

    ... Security Advisory Council (OSAC) Meeting Notice Closed Meeting The Department of State announces a meeting of the U.S. State Department--Overseas Security Advisory Council on November 19, 20, and 21, 2013... meeting will focus on an examination of corporate security policies and procedures and will...

  8. 75 FR 65550 - Overseas Security Advisory Council (OSAC) Meeting Notice

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-10-25

    ... Security Advisory Council (OSAC) Meeting Notice Closed Meeting The Department of State announces a meeting of the U.S. State Department--Overseas Security Advisory Council on November 16, 17, and 18 at the U... security policies and procedures and will involve extensive discussion of trade secrets and...

  9. 78 FR 25521 - Overseas Security Advisory Council (Osac) Meeting Notice

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-05-01

    ... Security Advisory Council (Osac) Meeting Notice Closed Meeting The Department of State announces a meeting of the U.S. State Department--Overseas Security Advisory Council on June 4 and 5, 2013. Pursuant to... focus on an examination of corporate security policies and procedures and will involve...

  10. 49 CFR 659.23 - System security plan: contents.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 49 Transportation 7 2013-10-01 2013-10-01 false System security plan: contents. 659.23 Section 659... ADMINISTRATION, DEPARTMENT OF TRANSPORTATION RAIL FIXED GUIDEWAY SYSTEMS; STATE SAFETY OVERSIGHT Role of the State Oversight Agency § 659.23 System security plan: contents. The system security plan must, at...

  11. 49 CFR 659.23 - System security plan: contents.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 49 Transportation 7 2012-10-01 2012-10-01 false System security plan: contents. 659.23 Section 659... ADMINISTRATION, DEPARTMENT OF TRANSPORTATION RAIL FIXED GUIDEWAY SYSTEMS; STATE SAFETY OVERSIGHT Role of the State Oversight Agency § 659.23 System security plan: contents. The system security plan must, at...

  12. Governing for Enterprise Security

    DTIC Science & Technology

    2005-06-01

    1 2 W hat Is Governing for Enterprise Security? ................................................ 5 3 W hat Are the Risks...23 4.3 Determ ining Adequate Security ........................................................ 25 5 What Are the...security. Section 4 lays the foundation for determining how much security is enough and further expands the definition of adequate security. Section 5

  13. Social Security income measurement in two surveys.

    PubMed

    Iams, Howard M; Purcell, Patrick J

    2013-01-01

    As a major source of income for retired persons in the United States, Social Security benefits directly influence economic well-being. That fact underscores the importance of measuring Social Security income accurately in household surveys. Using Social Security Administration (SSA) records, we examine Social Security income as reported in two Census Bureau surveys, the Survey of Income and Program Participation (SIPP) and the Current Population Survey (CPS). Although SSA usually deducts Medicare premiums from benefit payments, both the CPS and the SIPP aim to collect and record gross Social Security benefit amounts (before Medicare premium deductions). We find that the Social Security benefit recorded in the CPS closely approximates the gross benefit recorded for CPS respondents in SSA's records, but the Social Security benefit recorded in the SIPP more closely approximates SSA's record of net benefit payments (after deducting Medicare premiums).

  14. Security in the Transport of Radioactive Materials

    SciTech Connect

    Pope, Ron; Rawl, Richard R

    2010-01-01

    The United States Department of Energy National Nuclear Security Administration's (DOE/NNSA)Global Threat Reduction Initiative (GTRI), the International Atomic Energy Agency (IAEA) and active IAEA Donor States are working together to strengthen the security of nuclear and radioactive materials during transport to mitigate the risks of theft, diversion, or sabotage. International activities have included preparing and publishing the new IAEA guidance document Security in the Transport of Radioactive Material while ensuring that security recommendations do not conflict with requirements for safety during transport, and developing and providing training programs to assist other countries in implementing radioactive material transport security programs. This paper provides a brief update on the status of these transportation security efforts.

  15. Securing mobile code.

    SciTech Connect

    Link, Hamilton E.; Schroeppel, Richard Crabtree; Neumann, William Douglas; Campbell, Philip LaRoche; Beaver, Cheryl Lynn; Pierson, Lyndon George; Anderson, William Erik

    2004-10-01

    If software is designed so that the software can issue functions that will move that software from one computing platform to another, then the software is said to be 'mobile'. There are two general areas of security problems associated with mobile code. The 'secure host' problem involves protecting the host from malicious mobile code. The 'secure mobile code' problem, on the other hand, involves protecting the code from malicious hosts. This report focuses on the latter problem. We have found three distinct camps of opinions regarding how to secure mobile code. There are those who believe special distributed hardware is necessary, those who believe special distributed software is necessary, and those who believe neither is necessary. We examine all three camps, with a focus on the third. In the distributed software camp we examine some commonly proposed techniques including Java, D'Agents and Flask. For the specialized hardware camp, we propose a cryptographic technique for 'tamper-proofing' code over a large portion of the software/hardware life cycle by careful modification of current architectures. This method culminates by decrypting/authenticating each instruction within a physically protected CPU, thereby protecting against subversion by malicious code. Our main focus is on the camp that believes that neither specialized software nor hardware is necessary. We concentrate on methods of code obfuscation to render an entire program or a data segment on which a program depends incomprehensible. The hope is to prevent or at least slow down reverse engineering efforts and to prevent goal-oriented attacks on the software and execution. The field of obfuscation is still in a state of development with the central problem being the lack of a basis for evaluating the protection schemes. We give a brief introduction to some of the main ideas in the field, followed by an in depth analysis of a technique called 'white-boxing'. We put forth some new attacks and improvements

  16. Transportation Security Administration

    MedlinePlus

    ... content Official website of the Department of Homeland Security Transportation Security Administration A - Z Index What Can I Bring? ... form Search the Site Main menu Administrator Travel Security Screening Special Procedures TSA Pre✓® Passenger Support Travel ...

  17. Secure Quantum Technologies

    NASA Astrophysics Data System (ADS)

    Malik, Mehul

    Over the past three decades, quantum mechanics has allowed the development of technologies that provide unconditionally secure communication. In parallel, the quantum nature of the transverse electromagnetic field has spawned the field of quantum imaging that encompasses technologies such as quantum lithography, quantum ghost imaging, and high-dimensional quantum key distribution (QKD). The emergence of such quantum technologies also highlights the need for the development of accurate and efficient methods of measuring and characterizing the elusive quantum state itself. In this thesis, I present new technologies that use the quantum properties of light for security. The first of these is a technique that extends the principles behind QKD to the field of imaging and optical ranging. By applying the polarization-based BB84 protocol to individual photons in an active imaging system, we obtained images that were secure against any intercept-resend jamming attacks. The second technology presented in this thesis is based on an extension of quantum ghost imaging, a technique that uses position-momentum entangled photons to create an image of an object without directly gaining any spatial information from it. We used a holographic filtering technique to build a quantum ghost image identification system that uses a few pairs of photons to identify an object from a set of known objects. The third technology addressed in this thesis is a high-dimensional QKD system that uses orbital-angular-momentum (OAM) modes of light for encoding. Moving to a high-dimensional state space in QKD allows one to impress more information on each photon, as well as introduce higher levels of security. I discuss the development of two OAM-QKD protocols based on the BB84 and Ekert protocols of QKD. In addition, I present a study characterizing the effects of turbulence on a communication system using OAM modes for encoding. The fourth and final technology presented in this thesis is a relatively

  18. Fiscal Year 2000 Security Assistance Legislation

    DTIC Science & Technology

    1999-01-01

    Fiscal Year 2000 Security Assistance Legislation By Kenneth W. Martin and Craig M. Brandt Defense Institute of Security Assistance Management...Introduction This report is the sixteenth in a series of annual legislative studies published in The DISAM Journal. This year’s report presents a summary...and analysis of the legislation impacting on United States security assistance programs in FY2000 and beyond. As in prior years, the report is presented

  19. Effectiveness of the Civil Aviation Security Program.

    DTIC Science & Technology

    1981-04-15

    on item were processed through the screening system daily. The airline and airport security measures developed continue to provide increased safety...United States or Puerto Rico. None of these 16 hijackings resulted from insufficient airport security measures or a breakdown in the FAA-approved airport ... airport security programs is conducted at the Transportation Safety Institute in Oklahoma City, Oklahoma. The course provides in-depth coverage of civil

  20. 78 FR 56266 - Consent Based Social Security Number Verification (CBSV) Service

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-09-12

    ... Security number (SSN) verification services to enrolled private businesses, State and local government... From the Federal Register Online via the Government Publishing Office SOCIAL SECURITY ADMINISTRATION Consent Based Social Security Number Verification (CBSV) Service AGENCY: Social...

  1. Security Force Assistance and Security Sector Reform

    DTIC Science & Technology

    2013-09-01

    development, and planning, 63 Shultz: Security Force Assistance and Security Sector Reform budgeting and management are critical in reforming a defense...and Security Sector Reform Richard H. Shultz, Jr. JSOU Report 13-5 September 2013 Joint Special Operations University 7701 Tampa Point Boulevard...Assistance and Security Sector Reform 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT NUMBER 5e. TASK

  2. Security guide for subcontractors

    SciTech Connect

    Adams, R.C.

    1991-01-01

    This security guide of the Department of Energy covers contractor and subcontractor access to DOE and Mound facilities. The topics of the security guide include responsibilities, physical barriers, personnel identification system, personnel and vehicular access controls, classified document control, protecting classified matter in use, storing classified matter repository combinations, violations, security education clearance terminations, security infractions, classified information nondisclosure agreement, personnel security clearances, visitor control, travel to communist-controlled or sensitive countries, shipment security, and surreptitious listening devices.

  3. Homeland security planning: what victory gardens and Fidel Castro can teach us in preparing for food crises in the United States.

    PubMed

    Endres, A Bryan; Endres, Jody M

    2009-01-01

    Two historical examples provide important insight into how federal government policies can integrate regional and local food systems to achieve food security during a time of acute crisis. During World War II, American home gardeners, through the federal government's Victory Garden program, supplied 40 percent of the nation's fresh produce, while simultaneously maintaining pre-war commodity production policies favoring large agricultural interests. The recent food crisis in Cuba, precipitated by the collapse of Soviet-bloc trade in the early 1990s, is another historical example that could inform U.S. policymakers on how to achieve food self-sufficiency through reemphasis on small farmers using sustainable practices supplemented with urban gardening. This article aims to ignite government action to strengthen and integrate regional and local food systems into federal food security planning so that citizens can be best prepared for a food emergency. The article first examines laws, regulations and policies put in place during World War II that employed regional and local food networks to satisfy a significant amount of civilian food supply needs. The article also looks at more recent Cuban efforts to achieve forced food self-reliance when, after the end of the Cold War, Soviet subsidies and preferential trading of energy and food supplies ceased almost overnight.

  4. Redefining security.

    PubMed

    Mathews, J T

    1989-01-01

    The concept of US national security was redefined in the 1970s to include international economics, and lately environmental degradation has also become a factor, as pollution transcends boundaries. By 2100 another 5-6 billion people may be added to the world's population requiring dramatic production and technology transformation with the resultant expanded energy use, emissions, and waste impacting the ecosystem. Climate change through global warming is in the offing. The exponential growth of the population in the developing world poses a crucial challenge for food production, housing, and employment. At a 1% growth rate population doubles in 72 years, while at 3% it doubles in 24 years. Africa's growth rate is almost 3%, it is close to 2% in Latin America, and it is somewhat less in Asia. Renewable resources such as overfished fishing grounds can become nonrenewable, and vanished species can never be resurrected. Deforestation leads to soil erosion, damage to water resources through floods and silting of irrigation networks, and accelerated loss of species. 20% of species could disappear by 2000 thereby losing genetic resources for chemicals, drugs, and food sources. Overcultivation has caused major erosion and decline of agricultural productivity in Haiti, Guatemala, Turkey, and India. Lopsided land ownership in Latin America requires land reform for sustainable agricultural production in the face of the majority of people cultivating plots for bare subsistence. Human practices that have caused environmental damage include concessions granted to logging companies in the Philippines, mismanagement of natural resources in sub-Saharan Africa, the ozone hole, and the greenhouse effect with potential climate changes. Solutions include family planning, efficient energy use, sustainable agroforestry techniques, and environmental accounting of goods and services.

  5. New initiatives in materials security

    SciTech Connect

    Cynthia, G.; Jones, Ph.D.

    2008-07-01

    Security Measures (61 Orders issued 1/04, Inspections done); Transportation of Radioactive Material Quantities of Concern (167 Orders Issued 07/05, Inspections done); Orders for Increased Control Measures for other types of sources by categories of licenses (1,098 NRC Orders and 1782 binding State requirements issued by 12/05, Implemented 06/06, Inspections done by NRC and States). Security Inspection Results: All first year Increased Control inspections completed; NRC Information Notice (IN) 2007-16 issued May 2007; Since IN 2007-16 was issued, {approx}50% of the NRC inspections performed resulted in violations; Licensees misinterpreted or incompletely implemented requirements; Common theme: failure to properly document actions or programs when implementing the Increased Controls. Energy Policy Act of 2005: Established Radiation Source Protection and Security Task Force: cooperative effort with 14 Federal agencies, 2 State organizations; Comprehensive analysis of the security of radiation sources in the U.S.; Directed NRC to contract with National Academy of Sciences to conduct a study on radiation source use and replacement; Report to the President and Congress issued 8/06 and every 4 years thereafter. Radiation Source Protection and Security Task Force: Need higher priority on international transport security; Evaluate feasibility of using new and existing technologies to detect and discourage theft during transport; Conduct a feasibility study on the possible phase out of CsCl in highly dispersible forms; Further evaluate potential alternative technologies; Expedite completion of fingerprint requirements in Act. National Source Tracking System: Joint NRC/DOE 2003 report on Radiological Dispersal Devices recommended development of a national source tracking system; IAEA Code of Conduct recommended establishment of a national registry; U.S. Energy Policy Act of 2005 placed requirements for NRC to issue regulations establishing a mandatory tracking system. New

  6. Security guide for subcontractors

    SciTech Connect

    Adams, R.C.

    1993-06-01

    This guide is provided to aid in the achievement of security objectives in the Department of Energy (DOE) contractor/subcontractor program. The objectives of security are to protect information that, if released, would endanger the common defense and security of the nation and to safeguard plants and installations of the DOE and its contractors to prevent the interruption of research and production programs. The security objective and means of achieving the objective are described. Specific security measures discussed in this guide include physical barriers, personnel identification systems, personnel and vehicular access control, classified document control, protection of classified matter in use, storing classified matter, and repository combinations. Means of dealing with security violations and security infractions are described. Maintenance of a security education program is discussed. Also discussed are methods of handling clearance terminations, visitor control, travel to sensitive countries, and shipment security. The Technical Surveillance Countermeasures Program (TSCM), the Computer Security Program, and the Operations Security Plan (OPSEC) are examined.

  7. Test Security Procedures for Nevada Proficiency Examinations.

    ERIC Educational Resources Information Center

    Nevada State Dept. of Education, Carson City.

    Nevada statutes and administrative regulations specifically prohibit the disclosure of the content of examinations used in the Nevada Proficiency Examination Program. This document focuses on procedures to insure examination security. The state's test security requirements are outlined. Other sections deal with access to and copying of examination…

  8. Cyber Security--Are You Prepared?

    ERIC Educational Resources Information Center

    Newman, Scott

    2007-01-01

    During the summer 2002 term, Oklahoma State University-Okmulgee's Information Technologies Division offered a one credit-hour network security course--which barely had adequate student interest to meet the institution's enrollment requirements. Today, OSU-Okmulgee boasts one of the nation's premier cyber security programs. Many prospective…

  9. Desktop Security ... Now More than Ever

    ERIC Educational Resources Information Center

    Huber, Joe

    2005-01-01

    Desktop security is the foundation of your overall security plan in K-12 education. National Educational Technology Standards (NETS) mainly states that students at all grade levels should know to make changes in the default settings for the operating system and its applications.

  10. 50 CFR 600.240 - Security assurances.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ....240 Wildlife and Fisheries FISHERY CONSERVATION AND MANAGEMENT, NATIONAL OCEANIC AND ATMOSPHERIC... meetings, materials classified for national security purposes, the agency or individual (e.g., DOS, USCG... classified for national security purposes, the agency or individual (e.g., Department of State, U.S....

  11. Surface Transportation Security Priority Assessment

    DTIC Science & Technology

    2010-03-01

    Protection Plan (NIPP) framework priorities with the Sector- Specific Agencies (SSA); surface transportation owners/operators; and State, local, tribal...and recommendations. Issue Identification To identify national interagency priorities and guide Federal efforts to secure the surface...the Nation’s critical infrastructure and key resources (CIKR). These activities encompass national and sector planning and policy, program

  12. From Secure Memories to Smart Card Security

    NASA Astrophysics Data System (ADS)

    Handschuh, Helena; Trichina, Elena

    Non-volatile memory is essential in most embedded security applications. It will store the key and other sensitive materials for cryptographic and security applications. In this chapter, first an overview is given of current flash memory architectures. Next the standard security features which form the basis of so-called secure memories are described in more detail. Smart cards are a typical embedded application that is very vulnerable to attacks and that at the same time has a high need for secure non-volatile memory. In the next part of this chapter, the secure memories of so-called flash-based high-density smart cards are described. It is followed by a detailed analysis of what the new security challenges for such objects are.

  13. Reusable Security Requirements

    DTIC Science & Technology

    2016-06-13

    terms of subfactor of security quality factor, asset, threat, attacker, and situation • Standard measures for security subfactors • Parameterized...2003 by Carnegie Mellon University page 5 Carnegie Mellon Software Engineering Institute Types of Security Requirements Use Quality Model of factors...subfactors, criteria, and measures. Small number of Security Quality Subfactors: • Access Control (Identification, Authentication, and Authorization

  14. Chapter 3: Energy Security

    SciTech Connect

    Foust, Thomas D.; Arent, Doug; de Carvalho Macedo, Isaias; Goldemberg, Jose; Hoysala, Chanakya; Filho, Rubens Maciel; Nigro, Francisco E. B.; Richard, Tom L.; Saddler, Jack; Samseth, Jon; Somerville, Chris R.

    2015-04-01

    This chapter considers the energy security implications and impacts of bioenergy. We provide an assessment to answer the following questions: What are the implications for bioenergy and energy security within the broader policy environment that includes food and water security, development, economic productivity, and multiple foreign policy aspects? What are the conditions under which bioenergy contributes positively to energy security?

  15. Building Security into Schools.

    ERIC Educational Resources Information Center

    Kosar, John E.; Ahmed, Faruq

    2000-01-01

    Offers tips for redesigning safer school sites; installing and implementing security technologies (closed-circuit television cameras, door security hardware, electronic security panels, identification cards, metal detectors, and panic buttons); educating students and staff about security functions; and minimizing costs via a comprehensive campus…

  16. Unix Security Cookbook

    NASA Astrophysics Data System (ADS)

    Rehan, S. C.

    This document has been written to help Site Managers secure their Unix hosts from being compromised by hackers. I have given brief introductions to the security tools along with downloading, configuring and running information. I have also included a section on my recommendations for installing these security tools starting from an absolute minimum security requirement.

  17. School Security Roundtable, 2000.

    ERIC Educational Resources Information Center

    Agron, Joe, Ed.; Anderson, Larry, Ed.

    A roundtable discussion is presented revealing what experts say about school security problems and how they are being addressed. Also included are trend data from the School Security 2000 survey revealing top security concerns, strategies, and security equipment preferences; how site surveys can be used to keep schools safe; and how creating a…

  18. Secure Key from Bound Entanglement

    NASA Astrophysics Data System (ADS)

    Horodecki, Karol; Horodecki, Michał; Horodecki, Paweł; Oppenheim, Jonathan

    2005-04-01

    We characterize the set of shared quantum states which contain a cryptographically private key. This allows us to recast the theory of privacy as a paradigm closely related to that used in entanglement manipulation. It is shown that one can distill an arbitrarily secure key from bound entangled states. There are also states that have less distillable private keys than the entanglement cost of the state. In general, the amount of distillable key is bounded from above by the relative entropy of entanglement. Relationships between distillability and distinguishability are found for a class of states which have Bell states correlated to separable hiding states. We also describe a technique for finding states exhibiting irreversibility in entanglement distillation.

  19. Texting "boosts" felt security.

    PubMed

    Otway, Lorna J; Carnelley, Katherine B; Rowe, Angela C

    2014-01-01

    Attachment security can be induced in laboratory settings (e.g., Rowe & Carnelley, 2003) and the beneficial effects of repeated security priming can last for a number of days (e.g., Carnelley & Rowe, 2007). The priming process, however, can be costly in terms of time. We explored the effectiveness of security priming via text message. Participants completed a visualisation task (a secure attachment experience or neutral experience) in the laboratory. On three consecutive days following the laboratory task, participants received (secure or neutral) text message visualisation tasks. Participants in the secure condition reported significantly higher felt security than those in the neutral condition, immediately after the laboratory prime, after the last text message prime and one day after the last text prime. These findings suggest that security priming via text messages is an innovative methodological advancement that effectively induces felt security, representing a potential direction forward for security priming research.

  20. Predictive Dynamic Security Assessment through Advanced Computing

    SciTech Connect

    Huang, Zhenyu; Diao, Ruisheng; Jin, Shuangshuang; Chen, Yousu

    2014-11-30

    Abstract— Traditional dynamic security assessment is limited by several factors and thus falls short in providing real-time information to be predictive for power system operation. These factors include the steady-state assumption of current operating points, static transfer limits, and low computational speed. This addresses these factors and frames predictive dynamic security assessment. The primary objective of predictive dynamic security assessment is to enhance the functionality and computational process of dynamic security assessment through the use of high-speed phasor measurements and the application of advanced computing technologies for faster-than-real-time simulation. This paper presents algorithms, computing platforms, and simulation frameworks that constitute the predictive dynamic security assessment capability. Examples of phasor application and fast computation for dynamic security assessment are included to demonstrate the feasibility and speed enhancement for real-time applications.

  1. An overview in healthcare information systems security.

    PubMed

    Bourka, A; Polemi, N; Koutsouris, D

    2001-01-01

    The scope of this paper is to present the current needs and trends in the field of healthcare systems security. The approach applied within the described review was based on three major steps. The first step was to define the point and ways of penetration and integration of security services in current healthcare related applications addressing technical, organisational and legal/regulatory issues. The second step was to specify and evaluate common security technologies applied in healthcare information systems pointing out gaps and efficient solutions, whereas the third was to draw conclusions for the present conditions and identify the future trends of healthcare information security. A number of EU RTD Projects were selected, categorised, analysed and comparatively evaluated in terms of security. The technical focus was on key security technologies, like Public Key Infrastructures (PKIs) based on Trusted Third Parties (TTPs) in conjunction with other state-of-the-art security components (programming tools, data representation formats, security standards and protocols, security policies and risk assessment techniques). The experience gained within this review will provide valuable input for future security applications in the healthcare sector, solving existing problems and addressing real user needs.

  2. Climate-derived tensions in Arctic security.

    SciTech Connect

    Backus, George A.; Strickland, James Hassler

    2008-09-01

    Globally, there is no lack of security threats. Many of them demand priority engagement and there can never be adequate resources to address all threats. In this context, climate is just another aspect of global security and the Arctic just another region. In light of physical and budgetary constraints, new security needs must be integrated and prioritized with existing ones. This discussion approaches the security impacts of climate from that perspective, starting with the broad security picture and establishing how climate may affect it. This method provides a different view from one that starts with climate and projects it, in isolation, as the source of a hypothetical security burden. That said, the Arctic does appear to present high-priority security challenges. Uncertainty in the timing of an ice-free Arctic affects how quickly it will become a security priority. Uncertainty in the emergent extreme and variable weather conditions will determine the difficulty (cost) of maintaining adequate security (order) in the area. The resolution of sovereignty boundaries affects the ability to enforce security measures, and the U.S. will most probably need a military presence to back-up negotiated sovereignty agreements. Without additional global warming, technology already allows the Arctic to become a strategic link in the global supply chain, possibly with northern Russia as its main hub. Additionally, the multinational corporations reaping the economic bounty may affect security tensions more than nation-states themselves. Countries will depend ever more heavily on the global supply chains. China has particular needs to protect its trade flows. In matters of security, nation-state and multinational-corporate interests will become heavily intertwined.

  3. An evaluation index system of water security in China based on macroeconomic data from 2000 to 2012

    NASA Astrophysics Data System (ADS)

    Li, X. S.; Peng, Z. Y.; Li, T. T.

    2016-08-01

    This paper establishes an evaluation index system of water security. The index system employs 5 subsystems (water circulation security, water environment security, water ecology security, water society security and water economy security) and has 39 indicators. Using the AHP method, each indicator is given a relative weight to integrate within the whole system. With macroeconomic data from 2000 to 2012, a model of water security evaluation is applied to assess the state of water security in China. The results show an improving trend in the overall state of China's water security. In particular, the cycle of water security is at a high and low fluctuation. Water environment security presents an upward trend on the whole; however, this trend is unsteady and has shown a descending tendency in some years. Yet, water ecology security, water society security, and water economy security are basically on the rise. However, the degree of coordination of China's water security system remains in need of consolidation.

  4. National Security Science and Technology Strategy

    DTIC Science & Technology

    1995-01-01

    Infectious Disease Threats (1994); Committee on National Security—Strategic Implementation Plan (March 1995), and Committee on International Science...country’s first comprehensive Presidential statement of national security science and technology priorities . It augments the President’s National Security...this theme is a priority on engagement with other nations . Rather than isolate a state as we did the Soviet Union, we now seek to integrate states

  5. Comparison of computing capability and information system abilities of state hospitals owned by Ministry of Labor and Social Security and Ministry of Health.

    PubMed

    Tengilimoğlu, Dilaver; Celik, Yusuf; Ulgü, Mahir

    2006-08-01

    The main purpose of this study is to give an idea to the readers about how big and important the computing and information problems that hospital managers as well as policy makers will face with after collecting the Ministry of Labor and Social Security (MoLSS) and Ministry of Health (MoH) hospitals under single structure in Turkey by comparing the current level of computing capability of hospitals owned by two ministries. The data used in this study were obtained from 729 hospitals that belong to both ministries by using a data collection tool. The results indicate that there have been considerable differences among the hospitals owned by the two ministries in terms of human resources and information systems. The hospital managers and decision makers making their decisions based on the data produced by current hospital information system (HIS) would more likely face very important difficulties after merging MoH and MoLSS hospitals in Turkey. It is also possible to claim that the level and adequacy of computing abilities and devices do not allow the managers of public hospitals to use computer technology effectively in their information management practices. Lack of technical information, undeveloped information culture, inappropriate management styles, and being inexperienced are the main reasons of why HIS does not run properly and effectively in Turkish hospitals.

  6. Life Expectancy Among U.S.-born and Foreign-born Older Adults in the United States: Estimates From Linked Social Security and Medicare Data.

    PubMed

    Mehta, Neil K; Elo, Irma T; Engelman, Michal; Lauderdale, Diane S; Kestenbaum, Bert M

    2016-08-01

    In recent decades, the geographic origins of America's foreign-born population have become increasingly diverse. The sending countries of the U.S. foreign-born vary substantially in levels of health and economic development, and immigrants have arrived with distinct distributions of socioeconomic status, visa type, year of immigration, and age at immigration. We use high-quality linked Social Security and Medicare records to estimate life tables for the older U.S. population over the full range of birth regions. In 2000-2009, the foreign-born had a 2.4-year advantage in life expectancy at age 65 relative to the U.S.-born, with Asian-born subgroups displaying exceptionally high longevity. Foreign-born individuals who migrated more recently had lower mortality compared with those who migrated earlier. Nonetheless, we also find remarkable similarities in life expectancy among many foreign-born subgroups that were born in very different geographic and socioeconomic contexts (e.g., Central America, western/eastern Europe, and Africa).

  7. Joint research for tomorrow's security and defence

    NASA Astrophysics Data System (ADS)

    Krug, Rainer

    2009-09-01

    The global security environment in the near future will feature accelerating, and possibly momentous, changes in the international system. The large-scale trends in this scenario are - the increasing globalization (with both beneficial and disruptive side effects); - the quickening pace of technological innovation; - the accelerating proliferation of mass destruction technologies; - the growing capacities of non-state actors relative to nation-states; - the persistence of corrosive regional, ethnic, and religious conflicts and - the increasing resource scarcity and environment degradation. Thus, the strategic global security environment with its impact on our security of the future will be characterized by continued and possibly increased instability and the potential for catalytic events.

  8. S. 2166: A bill to reduce the Nation's dependence on imported oil, to provide for the energy security of the Nation, and for other purposes, introduced in the United States Senate, One Hundred Second Congress, Second Session, January 29, 1992

    SciTech Connect

    Not Available

    1992-01-01

    This bill, also referred to as the National Energy Security Act of 1992, contains the following: Title I - Findings and purposes: Goals, least-cost energy strategy, and Director of climate protection: Title II - Definitions; Title III (none); Title IV - Fleets and alternative fuels: Alternative fuel fleets, Electric and electric-hybrid vehicle demonstration, infrastructure development, and conforming amendments, Alternative fuels, Mass transit and training; Title V - Renewable energy: CORECT and COEECT, Renewable energy initiatives, Hydropower; Title VI - Energy efficiency: Industrial, commercial, and residential, Federal energy management, Utilities, State, local, insular, and tribal energy assistance, LIHEAP options pilot program; Title VII (none); Title VIII - Advanced nuclear reactor commercialization; Title IX - Nuclear reactor licensing; Title X - Uranium: Uranium enrichment, Uranium; Title XI - Natural gas; Title XII - Outer continental shelf; Title XIII - Research, development, demonstration and commercialization activities; Title XIV - Coal, coal technology, and electricity; Title XV - Public Utility Holding Company Act reform; Title XVI - Strategic Petroleum Reserve.

  9. 45 CFR 205.52 - Furnishing of social security numbers.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 45 Public Welfare 2 2010-10-01 2010-10-01 false Furnishing of social security numbers. 205.52... GENERAL ADMINISTRATION-PUBLIC ASSISTANCE PROGRAMS § 205.52 Furnishing of social security numbers. The State plan under title I, IV-A, X, XIV, or CVI (AABD) of the Social Security Act must provide that:...

  10. 49 CFR 659.21 - System security plan: general requirements.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 7 2011-10-01 2011-10-01 false System security plan: general requirements. 659.21... State Oversight Agency § 659.21 System security plan: general requirements. (a) The oversight agency shall require the rail transit agency to implement a system security plan that, at a minimum,...

  11. 49 CFR 659.21 - System security plan: general requirements.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 7 2010-10-01 2010-10-01 false System security plan: general requirements. 659.21... State Oversight Agency § 659.21 System security plan: general requirements. (a) The oversight agency shall require the rail transit agency to implement a system security plan that, at a minimum,...

  12. 75 FR 70814 - Securities Held in Treasury Direct

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-11-19

    ... Fiscal Service 31 CFR Part 363 Securities Held in Treasury Direct AGENCY: Bureau of the Public Debt...: Elisha Whipkey, Director, Division of Program Administration, Office of Retail Securities, Bureau of the... . SUPPLEMENTARY INFORMATION: United States Savings Bonds are non- marketable Treasury securities which have...

  13. 77 FR 3320 - Overseas Security Advisory Council (OSAC) Meeting Notice

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-01-23

    ... No: 2012-1260] DEPARTMENT OF STATE [Public Notice: 7759] Overseas Security Advisory Council (OSAC...--Overseas Security Advisory Council on February 22 and 23, 2012. Pursuant to Section 10(d) of the Federal... corporate security policies and procedures and will involve extensive discussion of trade secrets...

  14. 78 FR 19277 - National Maritime Security Advisory Committee; Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-03-29

    ... SECURITY Coast Guard National Maritime Security Advisory Committee; Meeting AGENCY: United States Coast... published a notice of meeting for the National Maritime Security Advisory Committee (NMSAC) in the Federal... reported. NMSAC will now meet on April 2, 2013 via web and teleconference to discuss various...

  15. 12 CFR 208.37 - Government securities sales practices.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 12 Banks and Banking 2 2012-01-01 2012-01-01 false Government securities sales practices. 208.37... Securities-Related Activities § 208.37 Government securities sales practices. (a) Scope. This subpart is applicable to state member banks that have filed notice as, or are required to file notice as,...

  16. 78 FR 66603 - Critical Infrastructure Security and Resilience Month, 2013

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-11-05

    ... November 5, 2013 Part III The President Proclamation 9047--Critical Infrastructure Security and Resilience... Infrastructure Security and Resilience Month, 2013 By the President of the United States of America A... Infrastructure Security and Resilience Month, we resolve to remain vigilant against foreign and domestic...

  17. 40 CFR 92.908 - National security exemption.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 40 Protection of Environment 21 2013-07-01 2013-07-01 false National security exemption. 92.908... Provisions § 92.908 National security exemption. A manufacturer or remanufacturer requesting a national security exemption must state the purpose for which the exemption is required and the request must...

  18. 40 CFR 92.908 - National security exemption.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 40 Protection of Environment 20 2011-07-01 2011-07-01 false National security exemption. 92.908... Provisions § 92.908 National security exemption. A manufacturer or remanufacturer requesting a national security exemption must state the purpose for which the exemption is required and the request must...

  19. 40 CFR 92.908 - National security exemption.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 40 Protection of Environment 20 2014-07-01 2013-07-01 true National security exemption. 92.908... Provisions § 92.908 National security exemption. A manufacturer or remanufacturer requesting a national security exemption must state the purpose for which the exemption is required and the request must...

  20. 40 CFR 92.908 - National security exemption.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 40 Protection of Environment 20 2010-07-01 2010-07-01 false National security exemption. 92.908... Provisions § 92.908 National security exemption. A manufacturer or remanufacturer requesting a national security exemption must state the purpose for which the exemption is required and the request must...

  1. 40 CFR 92.908 - National security exemption.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 40 Protection of Environment 21 2012-07-01 2012-07-01 false National security exemption. 92.908... Provisions § 92.908 National security exemption. A manufacturer or remanufacturer requesting a national security exemption must state the purpose for which the exemption is required and the request must...

  2. 45 CFR 205.52 - Furnishing of social security numbers.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 45 Public Welfare 2 2014-10-01 2012-10-01 true Furnishing of social security numbers. 205.52... GENERAL ADMINISTRATION-PUBLIC ASSISTANCE PROGRAMS § 205.52 Furnishing of social security numbers. The State plan under title I, IV-A, X, XIV, or CVI (AABD) of the Social Security Act must provide that:...

  3. 45 CFR 205.52 - Furnishing of social security numbers.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 45 Public Welfare 2 2011-10-01 2011-10-01 false Furnishing of social security numbers. 205.52... GENERAL ADMINISTRATION-PUBLIC ASSISTANCE PROGRAMS § 205.52 Furnishing of social security numbers. The State plan under title I, IV-A, X, XIV, or CVI (AABD) of the Social Security Act must provide that:...

  4. 45 CFR 205.52 - Furnishing of social security numbers.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 45 Public Welfare 2 2012-10-01 2012-10-01 false Furnishing of social security numbers. 205.52... GENERAL ADMINISTRATION-PUBLIC ASSISTANCE PROGRAMS § 205.52 Furnishing of social security numbers. The State plan under title I, IV-A, X, XIV, or CVI (AABD) of the Social Security Act must provide that:...

  5. 45 CFR 205.52 - Furnishing of social security numbers.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 45 Public Welfare 2 2013-10-01 2012-10-01 true Furnishing of social security numbers. 205.52... GENERAL ADMINISTRATION-PUBLIC ASSISTANCE PROGRAMS § 205.52 Furnishing of social security numbers. The State plan under title I, IV-A, X, XIV, or CVI (AABD) of the Social Security Act must provide that:...

  6. Climate Change and National Security

    SciTech Connect

    Malone, Elizabeth L.

    2013-02-01

    Climate change is increasingly recognized as having national security implications, which has prompted dialogue between the climate change and national security communities – with resultant advantages and differences. Climate change research has proven useful to the national security community sponsors in several ways. It has opened security discussions to consider climate as well as political factors in studies of the future. It has encouraged factoring in the stresses placed on societies by climate changes (of any kind) to help assess the potential for state stability. And it has shown that, changes such as increased heat, more intense storms, longer periods without rain, and earlier spring onset call for building climate resilience as part of building stability. For the climate change research community, studies from a national security point of view have revealed research lacunae, for example, such as the lack of usable migration studies. This has also pushed the research community to consider second- and third-order impacts of climate change, such as migration and state stability, which broadens discussion of future impacts beyond temperature increases, severe storms, and sea level rise; and affirms the importance of governance in responding to these changes. The increasing emphasis in climate change science toward research in vulnerability, resilience, and adaptation also frames what the intelligence and defense communities need to know, including where there are dependencies and weaknesses that may allow climate change impacts to result in security threats and where social and economic interventions can prevent climate change impacts and other stressors from resulting in social and political instability or collapse.

  7. Security-by-design handbook.

    SciTech Connect

    Snell, Mark Kamerer; Jaeger, Calvin Dell; Scharmer, Carol; Jordan, Sabina Erteza; Tanuma, Koji; Ochiai, Kazuya; Iida, Toru

    2013-01-01

    This document is a draft SecuritybyDesign (SeBD) handbook produced to support the Work Plan of the Nuclear Security Summit to share best practices for nuclear security in new facility design. The Work Plan calls on States to %E2%80%9Cencourage nuclear operators and architect/engineering firms to take into account and incorporate, where appropriate, effective measures of physical protection and security culture into the planning, construction, and operation of civilian nuclear facilities and provide technical assistance, upon request, to other States in doing so.%E2%80%9D The materials for this document were generated primarily as part of a bilateral project to produce a SeBD handbook as a collaboration between the Japan Atomic Energy Agency (JAEA) Nuclear Nonproliferation Science and Technology Center and Sandia National Laboratories (SNL), which represented the US Department Energy (DOE) National Nuclear Security Administration (NNSA) under a Project Action Sheet PASPP04. Input was also derived based on tours of the Savannah River Site (SRS) and Japan Nuclear Fuel Limited (JNFL) Rokkasho Mixed Oxide Fuel fabrication facilities and associated project lessonslearned. For the purposes of the handbook, SeBD will be described as the systemlevel incorporation of the physical protection system (PPS) into a new nuclear power plant or nuclear facility resulting in a PPS design that minimizes the risk of malicious acts leading to nuclear material theft; nuclear material sabotage; and facility sabotage as much as possible through features inherent in (or intrinsic to) the design of the facility. A fourelement strategy is presented to achieve a robust, durable, and responsive security system.

  8. ASSESSING THE SECURITY OF ECOLOGICAL POPULATIONS WITH REGARDS T0 TOXIC AIR POLLUTANTS AND HABITATE THREATS ACROSS THE SOUTHEASTERN UNITED STATES

    EPA Science Inventory

    The Southeastern United States is one of the most biologically diverse regions of the country and is home to significant numbers of threatened and endangered species. It is also one of the fastest growing regions in terms of human population, urban development, and the associated...

  9. Contributions of Dr. George Washington Carver to global food security: historical reflections of Dr. Carver’s fungal plant disease survey in the southeastern United States

    Technology Transfer Automated Retrieval System (TEKTRAN)

    Dr. George Washington Carver was a world renowned scientist whose research in the agricultural sciences in the late 1800’s and early 1900’s was critical for improving the living standards of American farmers especially in the southern United States. Although best known for developing the many uses o...

  10. 12 CFR 250.142 - Meaning of “obligor or maker” in determining limitation on securities investments by member State...

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... one college may not be used to service bonds issued for another. (e) Accordingly, the Board has... RESERVE SYSTEM (CONTINUED) BOARD OF GOVERNORS OF THE FEDERAL RESERVE SYSTEM (CONTINUED) MISCELLANEOUS.... The Board of Governors of the Federal Reserve System has been asked whether a member State bank...

  11. 12 CFR 250.142 - Meaning of “obligor or maker” in determining limitation on securities investments by member State...

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... one college may not be used to service bonds issued for another. (e) Accordingly, the Board has... RESERVE SYSTEM (CONTINUED) BOARD OF GOVERNORS OF THE FEDERAL RESERVE SYSTEM (CONTINUED) MISCELLANEOUS.... The Board of Governors of the Federal Reserve System has been asked whether a member State bank...

  12. Venezuela’s Potential Threat to the United States’ National Security: An Analysis of the Conflictual Inter-Country Relationship

    DTIC Science & Technology

    2006-03-07

    State run oil company, Petróleos de Venezuela ( PDVSA ), is in a chaotic turmoil. “ PDVSA has become far more poorly managed since a strike two years ago...corruption, PDVSA oil production is declining which requires private companies to make up more of the oil supply. 25 However, Venezuela current economy

  13. 17 CFR 229.701 - (Item 701) Recent sales of unregistered securities; use of proceeds from registered securities.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... securities not publicly offered, name the persons or identify the class of persons to whom the securities were sold. (c) Consideration. As to securities sold for cash, state the aggregate offering price and...) of the Exchange Act through the later of disclosure of the application of all the offering...

  14. 22 CFR 1101.5 - Security, confidentiality and protection of records.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... Bureau of Standard's booklet “Computer Security Guidelines for Implementing the Privacy Act of 1974” (May... STATES AND MEXICO, UNITED STATES SECTION PRIVACY ACT OF 1974 § 1101.5 Security, confidentiality...

  15. 78 FR 9768 - Bureau of International Security and Nonproliferation Imposition of Missile Sanctions on Two...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-02-11

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF STATE Bureau of International Security and Nonproliferation Imposition of Missile Sanctions on Two Chinese Foreign Persons AGENCY: Bureau of International Security and Nonproliferation, Department of State. ACTION:...

  16. Restricted access processor - An application of computer security technology

    NASA Technical Reports Server (NTRS)

    Mcmahon, E. M.

    1985-01-01

    This paper describes a security guard device that is currently being developed by Computer Sciences Corporation (CSC). The methods used to provide assurance that the system meets its security requirements include the system architecture, a system security evaluation, and the application of formal and informal verification techniques. The combination of state-of-the-art technology and the incorporation of new verification procedures results in a demonstration of the feasibility of computer security technology for operational applications.

  17. Changes in the Legal System of the People’s Republic of China and the Projected Impact on National Security of the United States

    DTIC Science & Technology

    1992-04-01

    and how disputes would be resolved. In China, rules were prone to change without public announcement or publication . 32 The Chinese believed in guanxI ...upon which it is based, consideration is given to how United States national strategy options may be pursued relating to the People’s Republic of China...part for distribution outside the federal executive branch without permission of the Director of Research and Publications , Industrial College of the

  18. Judicial Review: State Supreme Judicial Views on Balancing Civil Liberties and Public Safety/Security Measures during the Global War on Terror

    DTIC Science & Technology

    2009-03-01

    one clear effect [i]t would return all constitutional decision making to the people acting politically.”); Noting that United States senators may...Whingtton reasons that U.S. political leaders delegate tasks to the courts, because “the courts may be able to perform more effectively or reliably than...to cooperate with one another in order to perform effectively .”); see also, Jeffery K. Staton, “Constitutional Review and the Selective Promotion of

  19. To deny admission to the United States to any representative to the United Nations who has engaged in espionage activities against the United States, poses a threat to United States national security interests, or has engaged in a terrorist activity against the United States.

    THOMAS, 113th Congress

    Rep. Lamborn, Doug [R-CO-5

    2014-04-01

    04/16/2014 Referred to the Subcommittee on Immigration and Border Security. (All Actions) Notes: For further action, see S.2195, which became Public Law 113-100 on 4/18/2014. Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  20. 12 CFR 987.4 - Creation of Participant's Security Entitlement; security interests.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ...; security interests. 987.4 Section 987.4 Banks and Banking FEDERAL HOUSING FINANCE BOARD OFFICE OF FINANCE... Bank is a party, governing the security interest. (c)(1) The Banks, the Finance Board, the Office of Finance, the United States and the Federal Reserve Banks have no obligation to agree to act on behalf...

  1. Security system signal supervision

    SciTech Connect

    Chritton, M.R. ); Matter, J.C. )

    1991-09-01

    This purpose of this NUREG is to present technical information that should be useful to NRC licensees for understanding and applying line supervision techniques to security communication links. A review of security communication links is followed by detailed discussions of link physical protection and DC/AC static supervision and dynamic supervision techniques. Material is also presented on security for atmospheric transmission and video line supervision. A glossary of security communication line supervision terms is appended. 16 figs.

  2. Securing General Aviation

    DTIC Science & Technology

    2009-03-03

    ajor vulnerabilities still exist in ... general aviation security ,”3 the commission did not further elaborate on the nature of those vulnerabilities...commercial operations may make them an attractive alternative to terrorists seeking to identify and exploit vulnerabilities in aviation security . In this...3, 2003, p. A7. 2 See Report of the Aviation Security Advisory Committee Working Group on General Aviation Airport Security (October 1, 2003); and

  3. Homeland Security and Information.

    ERIC Educational Resources Information Center

    Relyea, Harold C.

    2002-01-01

    Reviews the development of two similar policy concepts, national security and internal security, before exploring the new phrase homeland security that has become popular since the September 11 terrorist attacks. Discusses the significance of each for information policy and practice. (Author/LRW)

  4. Selecting Security Technology Providers

    ERIC Educational Resources Information Center

    Schneider, Tod

    2009-01-01

    The world of security technology holds great promise, but it is fraught with opportunities for expensive missteps and misapplications. The quality of the security technology consultants and system integrators one uses will have a direct bearing on how well his school masters this complex subject. Security technology consultants help determine…

  5. Filling a Security Gap

    ERIC Educational Resources Information Center

    Parks and Recreation, 1978

    1978-01-01

    A new type of public facility security system, utilizing a radio system and voice logging recorder, has effectively improved security at the John F. Kennedy Center for the Performing Arts. The system monitors security operations, provides a reliable record in the case of conflicting claims, and accurately pinpoints the time of events. (DS)

  6. School Violence: Physical Security.

    ERIC Educational Resources Information Center

    Utah State Office of Education, Salt Lake City.

    This booklet provides an overview of security technology product areas that might be appropriate and affordable for school applications. Topics cover security concepts and operational issues; security issues when designing for new schools; the role of maintenance; video camera use; walk-through metal detectors; duress alarm devices; and a partial…

  7. Lemnos interoperable security project.

    SciTech Connect

    Halbgewachs, Ronald D.

    2010-03-01

    With the Lemnos framework, interoperability of control security equipment is straightforward. To obtain interoperability between proprietary security appliance units, one or both vendors must now write cumbersome 'translation code.' If one party changes something, the translation code 'breaks.' The Lemnos project is developing and testing a framework that uses widely available security functions and protocols like IPsec - to form a secure communications channel - and Syslog, to exchange security log messages. Using this model, security appliances from two or more different vendors can clearly and securely exchange information, helping to better protect the total system. Simplify regulatory compliance in a complicated security environment by leveraging the Lemnos framework. As an electric utility, are you struggling to implement the NERC CIP standards and other regulations? Are you weighing the misery of multiple management interfaces against committing to a ubiquitous single-vendor solution? When vendors build their security appliances to interoperate using the Lemnos framework, it becomes practical to match best-of-breed offerings from an assortment of vendors to your specific control systems needs. The Lemnos project is developing and testing a framework that uses widely available open-source security functions and protocols like IPsec and Syslog to create a secure communications channel between appliances in order to exchange security data.

  8. Secure Database Management Study.

    DTIC Science & Technology

    1978-12-01

    3.1.2 McCauleYls Security Atoms Additional concepts are introduced in (MCCAES) which enhance the security aspects of the attribute- bar id model...sLgnificance. Physical access remains as an overriding factor of system security. Without protection of the physeal operating environment (computer

  9. Security: Progress and Challenges

    ERIC Educational Resources Information Center

    Luker, Mark A.

    2004-01-01

    The Homepage column in the March/April 2003 issue of "EDUCAUSE Review" explained the national implication of security vulnerabilities in higher education and the role of the EDUCAUSE/Internet2 Computer and Network Security Task Force in representing the higher education sector in the development of the National Strategy to Secure Cyberspace. Among…

  10. Structuring Homeland Security

    DTIC Science & Technology

    2002-04-09

    20 AIRPORT SECURITY .............................................................................................. 20...using an existing command and control structure. Since September 11, 2001 airport security has been of heightened importance to the American public...In order to use Reserves to provide airport security the airports themselves should be made federal property. This would allow greater flexibility for

  11. Challenges and Responses to Asian Food Security

    NASA Astrophysics Data System (ADS)

    Teng, Paul P. S.; Oliveros, Jurise A. P.

    2015-10-01

    Food security is a complex phenomenon made up of multiple dimensions — food availability, physical access to food, economic access to food, food utilization — each of which has a stability dimension which underpins it. This review provides details on these dimensions and links them to two published indices which provide assessments of the state of food security in a country. The paper further provides analyses of the main supply and demand factors in the food security equation. Food security faces natural and anthropogenic threats such as loss of productive land and water, climate change and declining crop productivity, all of which are potentially amenable to solutions provided by science and technology. Demographic and accompanying diet changes further exacerbate the demands made on the natural resource base for food production. Finally, possible responses to the challenges confronting a secured food future are discussed from technological, policy and system level perspectives.

  12. Analysis of optical parity gates of generating Bell state for quantum information and secure quantum communication via weak cross-Kerr nonlinearity under decoherence effect

    NASA Astrophysics Data System (ADS)

    Heo, Jino; Hong, Chang-Ho; Yang, Hyung-Jin; Hong, Jong-Phil; Choi, Seong-Gon

    2017-04-01

    We demonstrate the advantages of an optical parity gate using weak cross-Kerr nonlinearities (XKNLs), quantum bus (qubus) beams, and photon number resolving (PNR) measurement through our analysis, utilizing a master equation under the decoherence effect (occurred the dephasing and photon loss). To generate Bell states, parity gates based on quantum non-demolition measurement using XKNL are extensively employed in quantum information processing. When designing a parity gate via XKNL, the parity gate can be diversely constructed according to the measurement strategies. In practice, the interactions of XKNLs in optical fiber are inevitable under the decoherence effect. Thus, by our analysis of the decoherence effect, we show that the designed parity gate employing homodyne measurement would not be expected to provide reliable quantum operation. Furthermore, compared with a parity gate using a displacement operator and PNR measurement, we conclude there is experimental benefit from implementation of a parity gate via qubus beams and PNR measurement under the decoherence effect.

  13. Addressing Global Warming, Air Pollution, Energy Security, and Jobs with Roadmaps for Changing the All-Purpose Energy Infrastructure of the 50 United States

    NASA Astrophysics Data System (ADS)

    Jacobson, M. Z.

    2014-12-01

    Global warming, air pollution, and energy insecurity are three of the most significant problems facing the world today. This talk discusses the development of technical and economic plans to convert the energy infrastructure of each of the 50 United States to those powered by 100% wind, water, and sunlight (WWS) for all purposes, namely electricity, transportation, industry, and heating/cooling, after energy efficiency measures have been accounted for. The plans call for all new energy to be WWS by 2020, ~80% conversion of existing energy by 2030, and 100% by 2050 through aggressive policy measures and natural transition. Resource availability, footprint and spacing areas required, jobs created versus lost, energy costs, avoided costs from air pollution mortality and morbidity and climate damage, and methods of ensuring reliability of the grid are discussed. Please see http://web.stanford.edu/group/efmh/jacobson/Articles/I/WWS-50-USState-plans.html

  14. Secure Transportation Management

    SciTech Connect

    Gibbs, P. W.

    2014-10-15

    Secure Transport Management Course (STMC) course provides managers with information related to procedures and equipment used to successfully transport special nuclear material. This workshop outlines these procedures and reinforces the information presented with the aid of numerous practical examples. The course focuses on understanding the regulatory framework for secure transportation of special nuclear materials, identifying the insider and outsider threat(s) to secure transportation, organization of a secure transportation unit, management and supervision of secure transportation units, equipment and facilities required, training and qualification needed.

  15. Secure communications using quantum cryptography

    SciTech Connect

    Hughes, R.J.; Buttler, W.T.; Kwiat, P.G.

    1997-08-01

    The secure distribution of the secret random bit sequences known as {open_quotes}key{close_quotes} material, is an essential precursor to their use for the encryption and decryption of confidential communications. Quantum cryptography is an emerging technology for secure key distribution with single-photon transmissions, nor evade detection (eavesdropping raises the key error rate above a threshold value). We have developed experimental quantum cryptography systems based on the transmission of non-orthogonal single-photon states to generate shared key material over multi-kilometer optical fiber paths and over line-of-sight links. In both cases, key material is built up using the transmission of a single-photon per bit of an initial secret random sequence. A quantum-mechanically random subset of this sequence is identified, becoming the key material after a data reconciliation stage with the sender. In our optical fiber experiment we have performed quantum key distribution over 24-km of underground optical fiber using single-photon interference states, demonstrating that secure, real-time key generation over {open_quotes}open{close_quotes} multi-km node-to-node optical fiber communications links is possible. We have also constructed a quantum key distribution system for free-space, line-of-sight transmission using single-photon polarization states, which is currently undergoing laboratory testing. 7 figs.

  16. Medical database security evaluation.

    PubMed

    Pangalos, G J

    1993-01-01

    Users of medical information systems need confidence in the security of the system they are using. They also need a method to evaluate and compare its security capabilities. Every system has its own requirements for maintaining confidentiality, integrity and availability. In order to meet these requirements a number of security functions must be specified covering areas such as access control, auditing, error recovery, etc. Appropriate confidence in these functions is also required. The 'trust' in trusted computer systems rests on their ability to prove that their secure mechanisms work as advertised and cannot be disabled or diverted. The general framework and requirements for medical database security and a number of parameters of the evaluation problem are presented and discussed. The problem of database security evaluation is then discussed, and a number of specific proposals are presented, based on a number of existing medical database security systems.

  17. Securing collaborative environments

    SciTech Connect

    Agarwal, Deborah; Jackson, Keith; Thompson, Mary

    2002-05-16

    The diverse set of organizations and software components involved in a typical collaboratory make providing a seamless security solution difficult. In addition, the users need support for a broad range of frequency and locations for access to the collaboratory. A collaboratory security solution needs to be robust enough to ensure that valid participants are not denied access because of its failure. There are many tools that can be applied to the task of securing collaborative environments and these include public key infrastructure, secure sockets layer, Kerberos, virtual and real private networks, grid security infrastructure, and username/password. A combination of these mechanisms can provide effective secure collaboration capabilities. In this paper, we discuss the requirements of typical collaboratories and some proposals for applying various security mechanisms to collaborative environments.

  18. Secure quantum communication using classical correlated channel

    NASA Astrophysics Data System (ADS)

    Costa, D.; de Almeida, N. G.; Villas-Boas, C. J.

    2016-10-01

    We propose a secure protocol to send quantum information from one part to another without a quantum channel. In our protocol, which resembles quantum teleportation, a sender (Alice) and a receiver (Bob) share classical correlated states instead of EPR ones, with Alice performing measurements in two different bases and then communicating her results to Bob through a classical channel. Our secure quantum communication protocol requires the same amount of classical bits as the standard quantum teleportation protocol. In our scheme, as in the usual quantum teleportation protocol, once the classical channel is established in a secure way, a spy (Eve) will never be able to recover the information of the unknown quantum state, even if she is aware of Alice's measurement results. Security, advantages, and limitations of our protocol are discussed and compared with the standard quantum teleportation protocol.

  19. Formal policies for flexible EHR security.

    PubMed

    Blobel, Bernd; Pharow, Peter

    2006-01-01

    State of the Art methodologies for establishing requirements and solutions to securing applications are based on narrative descriptions about the use of available system, sometimes also dedicated to system components. Even nowadays new developments to ruling application security services by the use of predicate logic suffer from being administered manually. Therefore, security and privacy requirements cannot be properly met resulting in restrictions and fears for allowing the use of sensitive data and functions. Because of the sensitivity of personal health information and especially of genetic data with its wider implications beyond the original subject of care, weaknesses in guaranteeing fine-grained security and privacy rules lead to less acceptance or even the avoidance of essential information transfer and use. To overcome the problem, security and privacy have to become properties of the architectural components of the respective health information system. Embedding security into the systems architecture allows for negotiating and enforcing any security and privacy services related to principals, their roles, their relationships, further contextual information as well as other regulations summarized in formally modeled policies. The paper introduces the evolving paradigm of the model-driven architecture, first time also comprehensively deployed for security and privacy services in bio-genetic and health information systems.

  20. It's a national security policy, stupid

    SciTech Connect

    Isaacs, J.

    1993-09-01

    This article discusses the first few national security decisions of the Clinton administration. The first decision was to have the United States continue to honor the nuclear testing moratorium through September, 1994 (or until another nation tested first). The second decision of the Clinton administration was the independence of the Arms Control and Disarmament Agency (ACDA) from the State Department. The third decision was to formally denounce the Reagan Administration's interpretation of the US/Soviet Anti-Ballistic Missile Treaty. The issue of the financing of United States involvement in Somalia was also addressed. The implications of these policy decisions as related to national security are evaluated in this article.

  1. [How to establish the hospital information system security policies].

    PubMed

    Gong, Qing-Yue; Shi, Cheng

    2008-03-01

    It is important to establish the hospital information system security policies. While these security policies are being established, a comprehensive consideration should be given to the acceptable levels of users, IT supporters and hospital managers. We should have a formal policy designing process that is consistently followed by all security policies. Reasons for establishing the security policies and their coverage and applicable objects should be stated clearly. Besides, each policy should define user's responsibilities and penalties of violation. Every organization will need some key policies, such as of information sources usage, remote access, information protection, perimeter security, and baseline host/device security. Security managing procedures are the mechanisms to enforce the policies. An incident-handling procedure is the most important security managing procedure for all organizations.

  2. Dynamic security assessment processing system

    NASA Astrophysics Data System (ADS)

    Tang, Lei

    The architecture of dynamic security assessment processing system (DSAPS) is proposed to address online dynamic security assessment (DSA) with focus of the dissertation on low-probability, high-consequence events. DSAPS upgrades current online DSA functions and adds new functions to fit into the modern power grid. Trajectory sensitivity analysis is introduced and its applications in power system are reviewed. An index is presented to assess transient voltage dips quantitatively using trajectory sensitivities. Then the framework of anticipatory computing system (ACS) for cascading defense is presented as an important function of DSAPS. ACS addresses various security problems and the uncertainties in cascading outages. Corrective control design is automated to mitigate the system stress in cascading progressions. The corrective controls introduced in the dissertation include corrective security constrained optimal power flow, a two-stage load control for severe under-frequency conditions, and transient stability constrained optimal power flow for cascading outages. With state-of-the-art computing facilities to perform high-speed extended-term time-domain simulation and optimization for large-scale systems, DSAPS/ACS efficiently addresses online DSA for low-probability, high-consequence events, which are not addressed by today's industrial practice. Human interference is reduced in the computationally burdensome analysis.

  3. [National health security agencies: facts and perspectives].

    PubMed

    Houssin, Didier

    2013-10-01

    Despite major changes in its composition over the past two decades, the French health security infrastructure, currently consisting of eight agencies, has endured. This infrastructure has reinforced the French state's capacity to protect the health of its population, but it did not yet provide total protection. The future of national health agencies will depend on their ability to maintain the priority given to public health security ; to preserve credible, high-level scientific expertise ; to meet the challenges of healthcare safety ; and to organize health security at the European level.

  4. 76 FR 4987 - Overseas Security Advisory Council (OSAC) Meeting Notice

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-01-27

    ... From the Federal Register Online via the Government Publishing Office STATE DEPARTMENT Overseas Security Advisory Council (OSAC) Meeting Notice Closed Meeting The Department of State announces a meeting... focus on an examination of corporate security policies and procedures and will involve...

  5. What is Security? A perspective on achieving security

    SciTech Connect

    Atencio, Julian J.

    2014-05-05

    This presentation provides a perspective on achieving security in an organization. It touches upon security as a mindset, ability to adhere to rules, cultivating awareness of the reason for a security mindset, the quality of a security program, willingness to admit fault or acknowledge failure, peer review in security, science as a model that can be applied to the security profession, the security vision, security partnering, staleness in the security program, security responsibilities, and achievement of success over time despite the impossibility of perfection.

  6. Securing iris recognition systems against masquerade attacks

    NASA Astrophysics Data System (ADS)

    Galbally, Javier; Gomez-Barrero, Marta; Ross, Arun; Fierrez, Julian; Ortega-Garcia, Javier

    2013-05-01

    A novel two-stage protection scheme for automatic iris recognition systems against masquerade attacks carried out with synthetically reconstructed iris images is presented. The method uses different characteristics of real iris images to differentiate them from the synthetic ones, thereby addressing important security flaws detected in state-of-the-art commercial systems. Experiments are carried out on the publicly available Biosecure Database and demonstrate the efficacy of the proposed security enhancing approach.

  7. 75 FR 43528 - Seeking Public Comment on Draft National Health Security Strategy Biennial Implementation Plan

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-07-26

    ... HUMAN SERVICES Office of the Secretary Seeking Public Comment on Draft National Health Security Strategy... achieve national health security and to implement the first quadrennial National Health Security Strategy... the National Health Security Strategy of the United States of America (2009) the U.S. Government...

  8. 31 CFR 344.6 - How do I redeem a Time Deposit security before maturity?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... SECURITIES-STATE AND LOCAL GOVERNMENT SERIES Time Deposit Securities § 344.6 How do I redeem a Time Deposit security before maturity? (a) What is the minimum time a security must be held? (1) Zero percent... 31 Money and Finance: Treasury 2 2010-07-01 2010-07-01 false How do I redeem a Time...

  9. 31 CFR 344.5 - What other provisions apply to subscriptions for Time Deposit securities?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... U.S. TREASURY SECURITIES-STATE AND LOCAL GOVERNMENT SERIES Time Deposit Securities § 344.5 What other provisions apply to subscriptions for Time Deposit securities? (a) When is my subscription due... subscriptions for Time Deposit securities? 344.5 Section 344.5 Money and Finance: Treasury Regulations...

  10. Exploring the Lack of Interoperability of Databases within Department of Homeland Security Interagency Environment Concerning Maritime Port Security

    DTIC Science & Technology

    2009-03-01

    41 V. DATA SHARING ENVIROMENT EXPERIMENT IN MIO 08-4 .........45 VI. CONCLUSION .............................................57...agencies across the United States. An example of this is the establishment of Data Fusion Centers in major urban areas. The Fusion Centers...connecting all fifty states, five territories, Washington, D.C and fifty major urban areas. HSIN is Department of Homeland Security secure, Sensitive

  11. Extender for securing a closure

    DOEpatents

    Thomas, II, Patrick A.

    2012-10-02

    An apparatus for securing a closure such as door or a window that opens and closes by movement relative to a fixed structure such as a wall or a floor. Many embodiments provide a device for relocating a padlock from its normal location where it secures a fastener (such as a hasp) to a location for the padlock that is more accessible for locking and unlocking the padlock. Typically an extender is provided, where the extender has a hook at a first end that is disposed through the eye of the staple of the hasp, and at an opposing second end the extender has an annulus, such as a hole in the extender or a loop or ring affixed to the extender. The shackle of the padlock may be disposed through the annulus and may be disposed through the eye of a second staple to secure the door or window in a closed or open position. Some embodiments employ a rigid sheath to enclose at least a portion of the extender. Typically the rigid sheath has an open state where the hook is exposed outside the sheath and a closed state where the hook is disposed within the sheath.

  12. Materialism and food security.

    PubMed

    Allen, M W; Wilson, M

    2005-12-01

    The present studies examined if materialists have an elevated concern about food availability, presumably stemming from a general survival security motivation. Study 1 found that materialists set a greater life goal of food security, and reported more food insecurity during their childhood. Materialists reported less present-day food insecurity. Study 2 revealed that materialists stored/hoarded more food at home, and that obese persons endorsed materialism more than low/normal weight persons. Study 3 found that experimentally decreasing participants' feelings of survival security (via a mortality salience manipulation) led to greater endorsement of materialism, food security as goal, and using food for emotional comfort. The results imply that materialists overcame the food insecurity of their childhood by making food security a top life goal, but that materialists' current concerns about food security may not wholly stem from genuine threats to their food supply.

  13. State Methods for a Cyber Incident

    DTIC Science & Technology

    2012-03-01

    Statewide Emergency Response and Response Plan SIPC State Infrastructure Protection Center SIRT Security Incident Response Team SIRT State Incident...by statute and policy to report agency information security incidents to the state Security Incident Response Team ( SIRT ). Those reports are made...through recent state statutes. P-16 Yes, agencies are required by statute and policy to report information security incidents to the SIRT . Q-17

  14. Vehicle Tracking and Security

    NASA Astrophysics Data System (ADS)

    Scorer, A. G.

    1998-09-01

    This paper covers the wide area and short range locational technologies that are available for vehicle tracking in particular and mobile user security in general. It also summarises the radio communications services that can deliver information to the user. It considers the use that can be made of these technologies, when combined with procedures for delivering a response, in the security field, notably in relation to personal security, high-value load protection and the after-theft tracking markets.

  15. Beyond grid security

    NASA Astrophysics Data System (ADS)

    Hoeft, B.; Epting, U.; Koenig, T.

    2008-07-01

    While many fields relevant to Grid security are already covered by existing working groups, their remit rarely goes beyond the scope of the Grid infrastructure itself. However, security issues pertaining to the internal set-up of compute centres have at least as much impact on Grid security. Thus, this talk will present briefly the EU ISSeG project (Integrated Site Security for Grids). In contrast to groups such as OSCT (Operational Security Coordination Team) and JSPG (Joint Security Policy Group), the purpose of ISSeG is to provide a holistic approach to security for Grid computer centres, from strategic considerations to an implementation plan and its deployment. The generalised methodology of Integrated Site Security (ISS) is based on the knowledge gained during its implementation at several sites as well as through security audits, and this will be briefly discussed. Several examples of ISS implementation tasks at the Forschungszentrum Karlsruhe will be presented, including segregation of the network for administration and maintenance and the implementation of Application Gateways. Furthermore, the web-based ISSeG training material will be introduced. This aims to offer ISS implementation guidance to other Grid installations in order to help avoid common pitfalls.

  16. Kaliningrad and Baltic Security

    DTIC Science & Technology

    2001-06-01

    impossible to solve. By shifting the paradigm toward regional development and regional cooperation to address common problems, the future security relationship of the Baltic littoral becomes more optimistic.

  17. Laser security systems

    NASA Astrophysics Data System (ADS)

    Kolev, Ivan S.; Stoeva, Ivelina S.

    2004-06-01

    This report presents the development of single-beam barrier laser security system. The system utilizes the near infrared (IR) range λ=(850-900)nm. The security system consists of several blocks: Transmitter; Receiver; Logical Unit; Indication; Power Supply. There are four individually software programmable security zones Z1 - Z4. The control logic is implemented on a PIC16F84 MCU. The infrared beam is a pulse pack, coded and modulated in the transmitter with frequency of 36 kHz. The receiver demodulates and decodes the beam. The software for the MCU is developed along with the electrical circuits of the security system.

  18. secureBLAST.

    PubMed

    Wiezer, Arnim; Merkl, Rainer

    2003-01-01

    secureBLAST supplements NCBI wwwblast with features necessary to control in an easy manageable way usage of BLAST data sets and their update. The concept we implemented allows to offer on a single BLAST server several data sets with individually configurable access rights. Security is provided by user authentication and encryption of the http traffic via SSL. By using secureBLAST, the administration of users and databases can be done via a web interface. Therefore, secureBLAST is valuable for institutions that have to restrict access to their datasets or just want to administer BLAST servers via a web interface.

  19. Enhanced Radioactive Material Source Security.

    PubMed

    Klinger, Joseph G

    2016-02-01

    Requirements for additional security measures for sealed radioactive sources have evolved since they were first implemented after the terrorist events of 11 September 2001. This paper will describe the sequence of those measures, commencing with the early orders issued by the U.S. Nuclear Regulatory Commission to the May 2013 adoption of 10 CFR Part 37, Physical Protections of Category 1 and Category 2 Quantities of Radioactive Material. Part 37 requirements will be discussed in detail, as the 37 NRC Agreement States, which regulate approximately 88% of the radioactive material licensees, will be required to enact by 19 March 2016. In addition to the Part 37 requirements, the paper will also highlight some of the other ongoing efforts of the U.S. Department of Energy's National Nuclear Security Administration's Global Threat Reduction Initiative and the Conference of Radiation Control Program Directors.

  20. Building a strategic security organisation.

    PubMed

    Howard, Mike

    2016-01-01

    In everyone's day-to-day jobs there is constant need to deal with current and newly detected matters. This is now a world of immediacy, driven by the cadence of the business and its needs. These concerns should not be ignored, as failing to deal with these issues would not bode well for the future. It is essential that the gears are kept spinning. The challenge for any security organisation is to identify its short-term tactical requirements, while developing longer-term strategic needs. Once done, the differences can be accounted for and strides can be made toward a desired future state. This paper highlights several steps that the author and his team have taken in their own journey. There is no magic answer, each organisation will have its own unique challenges. Nevertheless, some of the approaches to building a strategic security organisation described in this paper are applicable to all organisations, irrespective of their size.

  1. Fifty Years of Social Security: Past Achievements and Future Challenges. An Information Paper Prepared for Use by the Special Committee on Aging. United States Senate, Ninety-Ninth Congress, First Session.

    ERIC Educational Resources Information Center

    Congress of the U.S., Washington, DC. Senate Special Committee on Aging.

    This document contains six essays examining the history and impact of the social security program on America's economic and social development. "Social Security: The Cornerstone of American Social Welfare Policy," by Malcolm H. Morrison, presents brief background information on the system and discusses the basic principles of social…

  2. 49 CFR 1542.201 - Security of the secured area.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 49 Transportation 9 2014-10-01 2014-10-01 false Security of the secured area. 1542.201 Section 1542.201 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT...

  3. 49 CFR 1542.201 - Security of the secured area.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 49 Transportation 9 2013-10-01 2013-10-01 false Security of the secured area. 1542.201 Section 1542.201 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT...

  4. 49 CFR 1542.201 - Security of the secured area.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 9 2011-10-01 2011-10-01 false Security of the secured area. 1542.201 Section 1542.201 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT...

  5. 49 CFR 1542.201 - Security of the secured area.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Security of the secured area. 1542.201 Section 1542.201 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT...

  6. 49 CFR 1542.201 - Security of the secured area.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 49 Transportation 9 2012-10-01 2012-10-01 false Security of the secured area. 1542.201 Section 1542.201 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT...

  7. National Security Technology Incubator Business Plan

    SciTech Connect

    None, None

    2007-12-31

    This document contains a business plan for the National Security Technology Incubator (NSTI), developed as part of the National Security Preparedness Project (NSPP) and performed under a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This business plan describes key features of the NSTI, including the vision and mission, organizational structure and staffing, services, evaluation criteria, marketing strategies, client processes, a budget, incubator evaluation criteria, and a development schedule. The purpose of the NSPP is to promote national security technologies through business incubation, technology demonstration and validation, and workforce development. The NSTI will focus on serving businesses with national security technology applications by nurturing them through critical stages of early development. The vision of the NSTI is to be a successful incubator of technologies and private enterprise that assist the NNSA in meeting new challenges in national safety, security, and protection of the homeland. The NSTI is operated and managed by the Arrowhead Center, responsible for leading the economic development mission of New Mexico State University (NMSU). The Arrowhead Center will recruit business with applications for national security technologies recruited for the NSTI program. The Arrowhead Center and its strategic partners will provide business incubation services, including hands-on mentoring in general business matters, marketing, proposal writing, management, accounting, and finance. Additionally, networking opportunities and technology development assistance will be provided.

  8. National security in the third world

    SciTech Connect

    Al-Mashat, A.M.M.

    1985-01-01

    For nations of the Third World, national security poses serious dilemmas. Unlike Western nations, less-developed countries must balance the complex and often contradictory requirements of socio-economic and political development with problems of internal stability and the requirements of national defense. For these countries, a concept of national security that focuses primarily on the international threat system and its overt manifestations of wars and violence, ignoring domestic well-being, is inadequate on theoretical and pragmatic grounds. This book addresses the security problems of Third World states, arguing for new ways to define and measure national security so that the concept may be appropriately applied to the needs of developing countries. In addition, the author argues that the tranquility of a state, a concept traditionally linked with national security, cannot necessarily be associated with quality of life as measured by conventional means. Dr. Al-Mashat constructs a tranquility index for 95 developing nations and tests its relationship with the physical quality-of-life index to demonstrate this point. Attempts to improve quality of life, he suggests, may in many countries lead to a reduction in security unless simultaneous attempts are made to democratize the regime.

  9. Information security implementations for remote monitoring

    SciTech Connect

    Nilsen, C.A.

    1997-10-01

    In September 1993, President Clinton stated the United States would ensure that its fissile material meet the {open_quotes}highest standards of safety, security, and international accountability.{close_quotes} Frequent human inspection of the material could be used to ensure these standards. However, it may be more effective and less expensive to replace these manual inspections with virtual inspections via remote monitoring technologies. A successful implementation of a comprehensive remote monitoring system, however, requires significant attention to a variety of information security issues. In pursuing Project Straight-Line and the follow-on Storage Monitoring System, Sandia National Laboratories developed remote monitoring implementations that can satisfy a variety of information security requirements. Special emphasis was given to developing methods for using the Internet to disseminate the data securely. This paper describes the various information security implementations applied to the Project Straight-Line and the Storage Monitoring System. Also included is a discussion of the security provided by the Windows NT operating system.

  10. The Canadian Forces Use of Private Security in Afghanistan: A Consequence of National Decisions

    DTIC Science & Technology

    2013-12-10

    rise of PSCs, Elke Krahmann, Senior Lecturer in International Relations at the University of Bristol, stated three primary causes that have...International Security: the Rise of Private Military Companies. Contemporary Security Studies. New York: Rutledge, 2006. 49 Krahmann, Elke , Simon...2009. Krahmann, Elke . Private Security Companies and the State Monopoly on Violence:A Case of Norm. Peace Research Institute Frankfurt, 2009. Krugman

  11. 22 CFR 1101.5 - Security, confidentiality and protection of records.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... Bureau of Standard's booklet “Computer Security Guidelines for Implementing the Privacy Act of 1974” (May... STATES AND MEXICO, UNITED STATES SECTION PRIVACY ACT OF 1974 § 1101.5 Security, confidentiality and... 22 Foreign Relations 2 2012-04-01 2009-04-01 true Security, confidentiality and protection...

  12. Secure Enclaves: An Isolation-centric Approach for Creating Secure High Performance Computing Environments

    SciTech Connect

    Aderholdt, Ferrol; Caldwell, Blake A.; Hicks, Susan Elaine; Koch, Scott M.; Naughton, III, Thomas J.; Pelfrey, Daniel S.; Pogge, James R; Scott, Stephen L; Shipman, Galen M.; Sorrillo, Lawrence

    2017-01-01

    High performance computing environments are often used for a wide variety of workloads ranging from simulation, data transformation and analysis, and complex workflows to name just a few. These systems may process data at various security levels but in so doing are often enclaved at the highest security posture. This approach places significant restrictions on the users of the system even when processing data at a lower security level and exposes data at higher levels of confidentiality to a much broader population than otherwise necessary. The traditional approach of isolation, while effective in establishing security enclaves poses significant challenges for the use of shared infrastructure in HPC environments. This report details current state-of-the-art in virtualization, reconfigurable network enclaving via Software Defined Networking (SDN), and storage architectures and bridging techniques for creating secure enclaves in HPC environments.

  13. Implementing the global health security agenda: lessons from global health and security programs.

    PubMed

    Paranjape, Suman M; Franz, David R

    2015-01-01

    The Global Health Security Agenda (GHSA) describes a vision for a world that is safe and secure from infectious disease threats; it underscores the importance of developing the international capacity to prevent, detect, and respond to pandemic agents. In February 2014, the United States committed to support the GHSA by expanding and intensifying ongoing efforts across the US government. Implementing these goals will require interagency coordination and harmonization of diverse health security elements. Lessons learned from the Global Health Initiative (GHI), the President's Emergency Program for AIDS Relief (PEPFAR), and the Cooperative Threat Reduction (CTR) program underscore that centralized political, technical, and fiscal authority will be key to developing robust, sustainable, and integrated global health security efforts across the US government. In this article, we review the strengths and challenges of GHI, PEPFAR, and CTR and develop recommendations for implementing a unified US global health security program.

  14. National Information Systems Security (INFOSEC) Glossary

    DTIC Science & Technology

    2000-09-01

    Systems Security Engineering ISSM Information Systems Security Manager ISSO Information Systems Security Officer IT Information Technology ITAR ...Digital Net Radio Interface Unit SDNS Secure Data Network System SDR System Design Review SFA Security Fault Analysis SHA Secure Hash Algorithm

  15. Privacy and Security: A Bibliography.

    ERIC Educational Resources Information Center

    Computer and Business Equipment Manufacturers Association, Washington, DC.

    Compiled at random from many sources, this bibliography attempts to cite as many publications concerning privacy and security as are available. The entries are organized under seven headings: (1) systems security, technical security, clearance of personnel, (2) corporate physical security, (3) administrative security, (4) miscellaneous--privacy…

  16. Addressing Information Security Risk

    ERIC Educational Resources Information Center

    Qayoumi, Mohammad H.; Woody, Carol

    2005-01-01

    Good information security does not just happen--and often does not happen at all. Resources are always in short supply, and there are always other needs that seem more pressing. Why? Because information security is hard to define, the required tasks are unclear, and the work never seems to be finished. However, the loss to the organization can be…

  17. Incidents of Security Concern

    SciTech Connect

    Atencio, Julian J.

    2014-05-01

    This presentation addresses incidents of security concern and an incident program for addressing them. It addresses the phases of an inquiry, and it divides incidents into categories based on severity and interest types based on whether security, management, or procedural interests are involved. A few scenarios are then analyzed according to these breakdowns.

  18. Security in the cloud.

    PubMed

    Degaspari, John

    2011-08-01

    As more provider organizations look to the cloud computing model, they face a host of security-related questions. What are the appropriate applications for the cloud, what is the best cloud model, and what do they need to know to choose the best vendor? Hospital CIOs and security experts weigh in.

  19. Secure video communications system

    DOEpatents

    Smith, Robert L.

    1991-01-01

    A secure video communications system having at least one command network formed by a combination of subsystems. The combination of subsystems to include a video subsystem, an audio subsystem, a communications subsystem, and a control subsystem. The video communications system to be window driven and mouse operated, and having the ability to allow for secure point-to-point real-time teleconferencing.

  20. Technology's Role in Security.

    ERIC Educational Resources Information Center

    Day, C. William

    1999-01-01

    Examines the use of technology to bolster the school security system, tips on selecting a security consultant, and several basic strategies to make buildings and grounds safer. Technological ideas discussed include the use of telephones in classrooms to expedite care in emergency situations, surveillance cameras to reduce crime, and metal…

  1. NSI security task: Overview

    NASA Technical Reports Server (NTRS)

    Tencati, Ron

    1991-01-01

    An overview is presented of the NASA Science Internet (NSI) security task. The task includes the following: policies and security documentation; risk analysis and management; computer emergency response team; incident handling; toolkit development; user consulting; and working groups, conferences, and committees.

  2. EU Research for Security

    DTIC Science & Technology

    2004-10-25

    biometrics, smart card , IPv6, Economic, business and social aspects of security in Information Society Research and Technology FP6, FP7 (Security...wireless and reconfigurability – Next generation networks and computing models – Smart Cards and Access technologies – Biometrics – Pre-normative/standards

  3. Network Security Is Manageable

    ERIC Educational Resources Information Center

    Roberts, Gary

    2006-01-01

    An effective systems librarian must understand security vulnerabilities and be proactive in preventing problems. Specifics of future attacks or security challenges cannot possibly be anticipated, but this paper suggests some simple measures that can be taken to make attacks less likely to occur: program the operating system to get automatic…

  4. School Security Technologies

    ERIC Educational Resources Information Center

    Schneider, Tod

    2010-01-01

    Over the past decade electronic security technology has evolved from an exotic possibility into an essential safety consideration. Before resorting to high-tech security solutions, school officials should think carefully about the potential for unintended consequences. Technological fixes may be mismatched to the problems being addressed. They can…

  5. School Safety and Security.

    ERIC Educational Resources Information Center

    California State Dept. of Education, Sacramento.

    This document offers additional guidelines for school facilities in California in the areas of safety and security, lighting, and cleanliness. It also offers a description of technology resources available on the World Wide Web. On the topic of safety and security, the document offers guidelines in the areas of entrances, doors, and controlled…

  6. National Security Strategy of the United States.

    DTIC Science & Technology

    1993-01-01

    for- Organization UNIDO ), the U.N. Committee on tlrade eign assistance should be to reduce dependency, not pro- and Development ( UNCTA[), the Economic...ofconlic. Th Opn SiesTrety illresponses to aggression, and possibly underwriting ballis-was a major focus of conflict. The O)pen Skies Treaty will tic

  7. National Security Strategy of the United States

    DTIC Science & Technology

    1993-01-01

    to the Food and Agriculture Organization (FAO), the U.N. Industrial Development Organization ( UNIDO ), the U.N. Committee on Trade and Development...possibly underwriting ballis- tic -missile arms control measures. 17 At the June 1992 Summit, Presidents Bush and Yeltsin agreed to work together

  8. United States Security Strategy Towards Cuba

    DTIC Science & Technology

    2010-01-14

    relations took center stage during the 1980 presidential elections. Several incidents including the “Soviet Brigade” and the “ Mariel Boatlift” in 1980...replace existing obligations, either by lengthening 7 maturities, deferring of loan principal payment.”13 The last meaningful opportunity for change...from Africa and reclaimed 2,700 Cuban refugees that had departed to America during the 1980 Mariel Boatlift. Castro even allowed a U.S. Human Rights

  9. Future Energy and United States Security.

    DTIC Science & Technology

    1983-04-13

    American Petroleum Institute , p. 35. 8. Ibid., p. 39. 9. Ibid., pp. 41-42. 10. Ibid., pp. 43-44. 11. Ibid., p. 45. 12. Ibid., p. 46. 13...p. 5. 18. American Petroleum Institute , pp. 66-67. 19. Ibid., p. 67. 20. Ibid., p. 85. 21. Ibid., p. 86. 22. Robert Stobaugh and Daniel Yergin...Energy Future, pp. 102-103. 23. Ibid., p. 103. 28 24. American Petroleum Institute , p. 101. "-’ൡ. Ibid., p. 92. 26. US Department of Energy, The

  10. Energy Security in the United States

    DTIC Science & Technology

    2012-05-01

    gas facility. Biomass can also be burned with coal (at volumes of up to 10 percent without affecting performance) to generate electricity.26 In...2008, coal-burning facilities substituted biomass for coal to generate 1.3 percent of electricity. 26. See David Ortiz and others, Near-Term...Opportunities for Integrat- ing Biomass into the U.S. Electricity Supply (Santa Monica, Calif.: RAND, 2011), www.rand.org/pubs/technical_reports/ TR984.html

  11. National Security Strategy of the United States

    DTIC Science & Technology

    1990-03-01

    10 Eastern Europe... 11 The Western Hemisphere ... 12 East Asia and the Pacific ... 12 The Middle East and South Asia. Africa... 13 13 IV...Technology... 22 Energy ... 22 VI. RELATING MEANS TO ENDS: OUR DEFENSE AGENDA...23 Overall Priorities... 23 Deterring Nuclear War... 24 24 Strategic...promote a strong, prosperous, and competitive U.S. economy; • ensure access to foreign markets, energy , mineral resources, the oceans, and space; and

  12. National Security Technology Incubation Project Continuation Plan

    SciTech Connect

    2008-09-30

    This document contains a project continuation plan for the National Security Technology Incubator (NSTI). The plan was developed as part of the National Security Preparedness Project (NSPP) funded by a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This continuation plan describes the current status of NSTI (staffing and clients), long-term goals, strategies, and long-term financial solvency goals.The Arrowhead Center of New Mexico State University (NMSU) is the operator and manager of the NSTI. To realize the NSTI, Arrowhead Center must meet several performance objectives related to planning, development, execution, evaluation, and sustainability. This continuation plan is critical to the success of NSTI in its mission of incubating businesses with security technology products and services.

  13. International Nuclear Security

    SciTech Connect

    Doyle, James E.

    2012-08-14

    This presentation discusses: (1) Definitions of international nuclear security; (2) What degree of security do we have now; (3) Limitations of a nuclear security strategy focused on national lock-downs of fissile materials and weapons; (4) What do current trends say about the future; and (5) How can nuclear security be strengthened? Nuclear security can be strengthened by: (1) More accurate baseline inventories; (2) Better physical protection, control and accounting; (3) Effective personnel reliability programs; (4) Minimize weapons-usable materials and consolidate to fewer locations; (5) Consider local threat environment when siting facilities; (6) Implement pledges made in the NSS process; and (7) More robust interdiction, emergency response and special operations capabilities. International cooperation is desirable, but not always possible.

  14. Network systems security analysis

    NASA Astrophysics Data System (ADS)

    Yilmaz, Ä.°smail

    2015-05-01

    Network Systems Security Analysis has utmost importance in today's world. Many companies, like banks which give priority to data management, test their own data security systems with "Penetration Tests" by time to time. In this context, companies must also test their own network/server systems and take precautions, as the data security draws attention. Based on this idea, the study cyber-attacks are researched throughoutly and Penetration Test technics are examined. With these information on, classification is made for the cyber-attacks and later network systems' security is tested systematically. After the testing period, all data is reported and filed for future reference. Consequently, it is found out that human beings are the weakest circle of the chain and simple mistakes may unintentionally cause huge problems. Thus, it is clear that some precautions must be taken to avoid such threats like updating the security software.

  15. Indirection and computer security.

    SciTech Connect

    Berg, Michael J.

    2011-09-01

    The discipline of computer science is built on indirection. David Wheeler famously said, 'All problems in computer science can be solved by another layer of indirection. But that usually will create another problem'. We propose that every computer security vulnerability is yet another problem created by the indirections in system designs and that focusing on the indirections involved is a better way to design, evaluate, and compare security solutions. We are not proposing that indirection be avoided when solving problems, but that understanding the relationships between indirections and vulnerabilities is key to securing computer systems. Using this perspective, we analyze common vulnerabilities that plague our computer systems, consider the effectiveness of currently available security solutions, and propose several new security solutions.

  16. Wireless physical layer security

    NASA Astrophysics Data System (ADS)

    Poor, H. Vincent; Schaefer, Rafael F.

    2017-01-01

    Security in wireless networks has traditionally been considered to be an issue to be addressed separately from the physical radio transmission aspects of wireless systems. However, with the emergence of new networking architectures that are not amenable to traditional methods of secure communication such as data encryption, there has been an increase in interest in the potential of the physical properties of the radio channel itself to provide communications security. Information theory provides a natural framework for the study of this issue, and there has been considerable recent research devoted to using this framework to develop a greater understanding of the fundamental ability of the so-called physical layer to provide security in wireless networks. Moreover, this approach is also suggestive in many cases of coding techniques that can approach fundamental limits in practice and of techniques for other security tasks such as authentication. This paper provides an overview of these developments.

  17. Wireless physical layer security

    PubMed Central

    Schaefer, Rafael F.

    2017-01-01

    Security in wireless networks has traditionally been considered to be an issue to be addressed separately from the physical radio transmission aspects of wireless systems. However, with the emergence of new networking architectures that are not amenable to traditional methods of secure communication such as data encryption, there has been an increase in interest in the potential of the physical properties of the radio channel itself to provide communications security. Information theory provides a natural framework for the study of this issue, and there has been considerable recent research devoted to using this framework to develop a greater understanding of the fundamental ability of the so-called physical layer to provide security in wireless networks. Moreover, this approach is also suggestive in many cases of coding techniques that can approach fundamental limits in practice and of techniques for other security tasks such as authentication. This paper provides an overview of these developments. PMID:28028211

  18. Wireless physical layer security.

    PubMed

    Poor, H Vincent; Schaefer, Rafael F

    2017-01-03

    Security in wireless networks has traditionally been considered to be an issue to be addressed separately from the physical radio transmission aspects of wireless systems. However, with the emergence of new networking architectures that are not amenable to traditional methods of secure communication such as data encryption, there has been an increase in interest in the potential of the physical properties of the radio channel itself to provide communications security. Information theory provides a natural framework for the study of this issue, and there has been considerable recent research devoted to using this framework to develop a greater understanding of the fundamental ability of the so-called physical layer to provide security in wireless networks. Moreover, this approach is also suggestive in many cases of coding techniques that can approach fundamental limits in practice and of techniques for other security tasks such as authentication. This paper provides an overview of these developments.

  19. Economic security for the elderly in India: an overview.

    PubMed

    Kumar, S Vijaya

    2003-01-01

    The basic concept of social security is not new in India. Traditionally, a sort of moral economy existed to provide security to older destitute and other vulnerable groups in society. However, gradually, traditional support systems are disappearing, and state-based social security systems have come into existence. Under standardized economic security policies, government is covering retirement benefits for those in the organized sector; economic security benefits for those in the unorganized sector; and old-age pension for rural elderly. These are contributory as well as non-contributory programs. Besides life insurance approaches, savings-linked insurance and Annapurna (food security) are other important programs. However, in terms of coverage, program quality and effectiveness have been largely criticized by social security experts, suggesting immediate reforms to old-age programs.

  20. 33 CFR 103.505 - Elements of the Area Maritime Security (AMS) Plan.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... port in case of security threats or breaches of security; (j) Procedures for periodic plan review... of Federal, State, Indian Tribal, and local government agencies and law enforcement entities...