2008-07-28
continue to be beyond our technical ability to realize aggresively pursue advanced technical solutions to stay at the leading edge of technological...inherent to each caf Way and to seek continual improvement through exploration of innovative concepts, advanced capabilities, game -changing...available online at the air force portal: https://wwwd.my.af.mil/afknprod/strat_plan COMBAT AIR FORCE STRATEGIC PLAN Points of Contact securing the high
Transition of advanced technology to military, homeland security, and law enforcement users
NASA Astrophysics Data System (ADS)
Jarrett, Stephen M.
2004-09-01
With the attack on the United States and the subsequent war on terror and the wars in Afghanistan and Iraq a need has been exposed for the transition of technology to all of our defenders both combat forces on the foreign battlefield and domestic forces here at home. The establishment of the Department of Homeland Security has also provided a focus on inserting technology to dramatically improve the capability of airport security forces, law enforcement, and all first responder networks. The drastic increase in the use of Special Forces in combat has also required new advanced technology capabilities at a much faster rate of development than the standard military procurement system. Technology developers must address the questions of interoperability, cost, commercialization, of how these groups will use the technology delivered and the adoption criteria of users in the deployment environment. The successful transition to the field must address the formation of complex concepts of operations in the user's adoption criteria. Prototype transition for two systems, a pocket infrared camera and an acoustic/seismic detector, will be highlighted in their effect on the wars in Iraq and Afghanistan and in the heightening of homeland security.
National Center for Combating Terrorism Strategic Plan, September 2003
DOE Office of Scientific and Technical Information (OSTI.GOV)
Bechtel Nevada
2003-09-01
National Center for Combating Terrorism Strategic Plan is to document the mission, vision, and goals for success; define the build plan; and describe initiatives that support the U.S. Department of Homeland Security, U.S. Department of Defense, U.S. Department of Energy, U.S. Department of Justice, intelligence community, National Governors Association, and other organizations or departments with combating terrorism training, testing, and technology responsibilities.
ERIC Educational Resources Information Center
Wynn, Cynthia L.
2017-01-01
An increase in information technology has caused and increased in threats towards information security. Threats are malware, viruses, sabotage from employees, and hacking into computer systems. Organizations have to find new ways to combat vulnerabilities and threats of internal and external threats to protect their information security and…
The MANPAD Threat to Civilian Airliners
2006-03-03
PAGES: 19 KEY TERMS: Homeland Security; Non-Proliferation; Airport Security CLASSIFICATION: Unclassified This paper investigates strategic approaches...technological solutions and law enforcement operations to provide a competent airport security perimeter.”18 To combat this ominous threat of MANPADS...sites for phone and computer tips should be established with access for airport security , local and federal law enforcement, as well as intelligence
76 FR 39859 - Notice of Federal Advisory Committee Meeting
Federal Register 2010, 2011, 2012, 2013, 2014
2011-07-07
... Threat Reduction Advisory Committee (Hereafter referred to as ``the Committee''). 1. Purpose of Meeting... technology security, combating weapons of mass destruction (WMD), counter terrorism and counter proliferation... discussions on WMD related national security matters. 3. Meeting Accessibility: Pursuant to 5 U.S.C. 552b, as...
78 FR 77663 - Threat Reduction Advisory Committee; Notice of Federal Advisory Committee Meeting
Federal Register 2010, 2011, 2012, 2013, 2014
2013-12-24
..., Technology and Logistics), DoD. ACTION: Federal Advisory Committee meeting notice. SUMMARY: The Department of...: National Geospatial-Intelligence Agency, Springfield, Virginia on January 28 and CENTRA Technology Inc... related to the Committee's mission to advise on technology security, Combating Weapons of Mass Destruction...
2001-09-16
technologies to improve airport security - e.g. biometrics systems and explosive detections systems (Page 5) 4. Allocate additional resources to airport and...been debated are the policy of allowing knives on aircraft, weak cockpit security, and the possibility of federalizing airport security staff.6 A...Improve staff selection and training Airport security staff, and particularly screeners, who are responsible for identifying weapons and explosive
Multi-Agent Coordination Techniques for Naval Tactical Combat Resources Management
2008-07-01
resource coordination and cooperation problems. The combat resource allocation planning problem is treated in the companion report [2]. 2.3 Resource...report focuses on the resource coordination problem, while allocation algorithms are discussed in the companion report [2]. First, coordination in...classification of each should be indicated as with the title.) Canada’s Leader in Defence and National Security Science and Technology Chef de file au Canada en
ERIC Educational Resources Information Center
Aurigemma, Salvatore
2013-01-01
Information and information systems have become embedded in the fabric of contemporary organizations throughout the world. As the reliance on information technology has increased, so too have the threats and costs associated with protecting organizational information resources. To combat potential information security threats, organizations rely…
Doorstep: A doorbell security system for the prevention of doorstep crime.
Ennis, Andrew; Cleland, Ian; Patterson, Timothy; Nugent, Chris D; Cruciani, Federico; Paggetti, Cristiano; Morrison, Gareth; Taylor, Richard
2016-08-01
Safety and security rank highly in the priorities of older people on both an individual and policy level. Older people are commonly targeted as victims of doorstep crime, as they can be perceived as being vulnerable. As a result, this can have a major effect on the victim's health and wellbeing. There have been numerous prevention strategies implemented in an attempt to combat and reduce the number of doorstep crimes. There is, however, little information available detailing the effectiveness of these strategies and how they impact on the fear of crime, particularly with repeat victims. There is therefore clear merit in the creation and piloting of a technology based solution to combat doorstep crime. This paper presents a developed solution to provide increased security for older people within their home.
Combating the counterfeits with web portal technology
NASA Astrophysics Data System (ADS)
Ting, S. L.; Ip, W. H.
2015-10-01
Due to the globalisation of counterfeiting activities, the penetration of fake products in open market is growing. So far, the technologies to combat counterfeiting are mostly applied to high-value products (e.g. premium wine and branded handbags); however, in the medium- and low-value products' perspective, there is no secure way for consumers to identify whether the purchased items are genuine or not. To address the counterfeiting problems effectively, a platform for identifying authenticated products and promoting anti-counterfeit activities is very important. The aim of this paper is to design and develop an anti-counterfeit platform which includes two functions: providing customers a secure network to ascertain the genuineness of their purchased product and increasing public awareness of the current counterfeit problems and updated anti-counterfeit solutions. By combining these two functions, it enables public to fight against fake and beware of counterfeit. Results of adopting portal technology in anti-counterfeiting show high accuracy in product checking and improved creditability. This reveals that the applicability and advantage of the proposed methodology are satisfactory.
Physical security equipment for combating terrorism
NASA Astrophysics Data System (ADS)
Toscano, Michael
2002-08-01
The objective of the Department of Defense Physical Security Equipment (DoD PSE) RDT&E program is to provide end users within the four Services with the most efficient and productive physical security (PS) at the most reasonable cost to ensure the effective protection of DoD resources. These resources include personnel, nuclear weapons, classified information, materiel, and readiness assets. As a result of the1996 Khobar Towers terrorist bombing incident, the DoD PSE program began to receive additional funding in 1997 for Force Protection Commercial-Off-The-Shelf (FP COTS) equipment evaluation and testing. The FP COTS testing applies to all available technologies, which are considered effective for DoD use. Successive terrorist incidents occurring since Khobar Towers have resulted in increasing focus on the demonstration and validation of equipment necessary to combat the ubiquitously asymmetric terrorist threat.
Journal of Special Operations Medicine. Volume 2, Edition 4, Fall 2002
2002-01-01
Blessing Journal of Special Operations Medicine6 GENERAL RULES FOR SUBMISSIONS 1. Use the active voice when possible. 2. Secure permission before...Afghanistan to the Philippines . I am currently writ- ing this at the "Advanced Technology Applications for Combat Casualty Care" (ATACCC) meeting...ference some of the time. 91W Transition- All active component SOF units with medics that are not 18D are 91Ws as 91W_W1 Special Operations Combat
Future Warfare: Anthology Revised Edition
2001-06-01
film “ Saving Private Ryan ” are compelling and chilling. But the information age promises to make ground combat considerably less destructive that the...116 Saving Private Ryan , 80–81 Schwarzkopf, Norman, 242, 243–244 Science and technology, 191–202 Scipio, 44 Security beyond the year 2010, 128–131, 137... Private Ryan ” where the true horror of face-to-face ground combat is driven into the psyche of the movie goer. I am increasingly convinced, however
From Fob to Noc: A Pathway to a Cyber Career for Combat Veterans
2014-06-01
Assurance Certifications GS general schedule HSAC Homeland Security Advisory Council IDS intrusion detection system IP internet protocol IPS...NIPRNET non-secure internet protocol router network NIST National Institute for Standards and Technology NOC network operations center NSA National...twice a day on an irregular schedule or during contact with the enemy to keep any observing enemy wary of the force protection 13 condition at any
Alternative Futures: United States Air Force Security Police in the Twenty-First Century
1988-04-01
34What policies should today’s Air Force leadership be pursuing to prepare for tomorrow’s combat support and security police roles?’ The monograph...Further, it addresses the capability of the Air Force to respond to its future combat support and security police missions and their integration into the...security police organizations. His most recent assignments were as the deputy commander of a combat support group and the commander of a security police
A review of existing and emerging digital technologies to combat the global trade in fake medicines.
Mackey, Tim K; Nayyar, Gaurvika
2017-05-01
The globalization of the pharmaceutical supply chain has introduced new challenges, chief among them, fighting the international criminal trade in fake medicines. As the manufacture, supply, and distribution of drugs becomes more complex, so does the need for innovative technology-based solutions to protect patients globally. Areas covered: We conducted a multidisciplinary review of the science/health, information technology, computer science, and general academic literature with the aim of identifying cutting-edge existing and emerging 'digital' solutions to combat fake medicines. Our review identified five distinct categories of technology including mobile, radio frequency identification, advanced computational methods, online verification, and blockchain technology. Expert opinion: Digital fake medicine solutions are unifying platforms that integrate different types of anti-counterfeiting technologies as complementary solutions, improve information sharing and data collection, and are designed to overcome existing barriers of adoption and implementation. Investment in this next generation technology is essential to ensure the future security and integrity of the global drug supply chain.
1992-01-01
Spacecraft Technology 0503401F 450 35 Space Systems Environmental Interactions Technology 060341 OF 468 36 Space Subsystems Technology 0603428F 472 37...Space Systems Environmental Interactions Technology 35 468 0603402F Space Test Program (STP) 191 462 030591OF SPACETRACK 85 195 0604233F Specialized...is in the mid- 1990’s. Combat force commanders and units (equipped with EMP-hardened, secure radio equipment) interact with nearby relay nodes for
NASA Astrophysics Data System (ADS)
Mganga, K. Z.; Musimba, N. K. R.; Nyariki, D. M.
2015-12-01
Drylands occupy more than 80 % of Kenya's total land mass and contribute immensely to the national economy and society through agriculture, livestock production, tourism, and wild product harvesting. Dryland ecosystems are areas of high climate variability making them vulnerable to the threats of land degradation. Consequently, agropastoralists inhabiting these ecosystems develop mechanisms and technologies to cope with the impacts of climate variability. This study is aimed to; (1) determine what agropastoralists inhabiting a semi-arid ecosystem in Kenya attribute to be the causes and indicators of land degradation, (2) document sustainable land management (SLM) technologies being undertaken to combat land degradation, and (3) identify the factors that influence the choice of these SLM technologies. Vegetation change from preferred indigenous forage grass species to woody vegetation was cited as the main indicator of land degradation. Land degradation was attributed to recurrent droughts and low amounts of rainfall, overgrazing, and unsustainable harvesting of trees for fuelwood production. However, despite the challenges posed by climate variability and recurrent droughts, the local community is engaging in simple SLM technologies including grass reseeding, rainwater harvesting and soil conservation, and dryland agroforestry as a holistic approach combating land degradation and improving their rural livelihoods. The choice of these SLM technologies was mainly driven by their additional benefits to combating land degradation. In conclusion, promoting such simple SLM technologies can help reverse the land degradation trend, improve agricultural production, food security including access to food, and subsequently improve livelihoods of communities inhabiting dryland ecosystems.
Mganga, K Z; Musimba, N K R; Nyariki, D M
2015-12-01
Drylands occupy more than 80% of Kenya's total land mass and contribute immensely to the national economy and society through agriculture, livestock production, tourism, and wild product harvesting. Dryland ecosystems are areas of high climate variability making them vulnerable to the threats of land degradation. Consequently, agropastoralists inhabiting these ecosystems develop mechanisms and technologies to cope with the impacts of climate variability. This study is aimed to; (1) determine what agropastoralists inhabiting a semi-arid ecosystem in Kenya attribute to be the causes and indicators of land degradation, (2) document sustainable land management (SLM) technologies being undertaken to combat land degradation, and (3) identify the factors that influence the choice of these SLM technologies. Vegetation change from preferred indigenous forage grass species to woody vegetation was cited as the main indicator of land degradation. Land degradation was attributed to recurrent droughts and low amounts of rainfall, overgrazing, and unsustainable harvesting of trees for fuelwood production. However, despite the challenges posed by climate variability and recurrent droughts, the local community is engaging in simple SLM technologies including grass reseeding, rainwater harvesting and soil conservation, and dryland agroforestry as a holistic approach combating land degradation and improving their rural livelihoods. The choice of these SLM technologies was mainly driven by their additional benefits to combating land degradation. In conclusion, promoting such simple SLM technologies can help reverse the land degradation trend, improve agricultural production, food security including access to food, and subsequently improve livelihoods of communities inhabiting dryland ecosystems.
Federal Register 2010, 2011, 2012, 2013, 2014
2013-06-21
...] RIN 9000-AM20 Federal Acquisition Regulation; Contractors Performing Private Security Functions...-181). Section 862, entitled ``Contractors Performing Private Security Functions in Areas of Combat...), as amended, entitled ``Contractors Performing Private Security Functions in Areas of Combat...
The Next EFV: Aligning Marine Corps Capabilities With National Security
2011-05-09
However, the technological bugaboo is that propelling a 34 ton rectangular, high drag armored vehicle at 25kt through water is simply not feasible...never reach the point of replacing the warfighter on the scene. Adding a true littoral combatant capability to the U.S. military 11 portfolio
Using agility to combat cyber attacks.
Anderson, Kerry
2017-06-01
Some incident response practitioners feel that they have been locked in a battle with cyber criminals since the popular adoption of the internet. Initially, organisations made great inroads in preventing and containing cyber attacks. In the last few years, however, cyber criminals have become adept at eluding defence security technologies and rapidly modifying their exploit strategies for financial or political gains. Similar to changes in military combat tactics, cyber criminals utilise distributed attack cells, real-time communications, and rapidly mutating exploits to minimise the potential for detection. Cyber criminals have changed their attack paradigm. This paper describes a new incident response paradigm aimed at combating the new model of cyber attacks with an emphasis on agility to increase the organisation's ability to respond rapidly to these new challenges.
2014-09-01
power. The wireless infrastructure is an expansion of the current DOD IE which can be leveraged to connect mobile capabilities and technologies. The...DOD must focus on three critical areas central to mobility : the wireless infrastructure , the devices themselves, and the applications the devices use... infrastructure to support mobile devices. – The intent behind this goal is to improve the existing wireless backbone to support secure voice, data, and video
Future Soldiers: Analysis of Entry-Level Performance Requirements and Their Predictors
2005-09-01
these future missions; "* New technology such as weapons, tools, and vehicles (e.g., robotics ) and the effect of technological change on personnel...Clusters 1. Close Combat 2. Non Line-of-Sight Fire 3. Surveillance, Intelligence, and Communications 4. Unmanned Vehicle/ Robotics Operator 5. Security...minimized with (a) new materials for ballistic protection, (b) new lethalities, and (c) exoskeletons /artificial muscles. • Infantrymen will experience better
Technologies to counter aviation security threats
NASA Astrophysics Data System (ADS)
Karoly, Steve
2017-11-01
The Aviation and Transportation Security Act (ATSA) makes TSA responsible for security in all modes of transportation, and requires that TSA assess threats to transportation, enforce security-related regulations and requirements, and ensure the adequacy of security measures at airports and other transportation facilities. Today, TSA faces a significant challenge and must address a wide range of commercial, military grade, and homemade explosives and these can be presented in an infinite number of configurations and from multiple vectors. TSA screens 2 million passengers and crew, and screens almost 5 million carry-on items and 1.2 million checked bags daily. As TSA explores new technologies for improving efficiency and security, those on the forefront of research and development can help identify unique and advanced methods to combat terrorism. Research and Development (R&D) drives the development of future technology investments that can address an evolving adversary and aviation threat. The goal is to rethink the aviation security regime in its entirety, and rather than focusing security at particular points in the enterprise, distribute security from the time a reservation is made to the time a passenger boards the aircraft. The ultimate objective is to reengineer aviation security from top to bottom with a continued focus on increasing security throughout the system.
2007-12-01
Media Issues in Combating Terrorism • International Approaches • Ethics and Combating Terrorism • Restructuring the Security Sector for...Terrorism • Organized Crime and Terrorism • Civil-Military Cooperation and Terrorism • Ethics and Combating Terrorism • Border Control • Consequence...Simon. “Confl ict, Ecology and the Politics of Envrionmental Security.” Global Environmental Politics 2, No. 4 (November 2002): pp 25-130. 28
2017-05-17
Do the SFA lessons drawn from the unconventional warfare focus of the post-9-11 paradigm hold true across the spectrum of conflict, or are there...relevance. Do the SFA lessons drawn from the unconventional warfare focus of the post-9-11 paradigm hold true across the spectrum of conflict, or...traditional warfare is fought changes from epoch to epoch as technology, armament, and other factors change, but certain immutable principles hold true
2003-06-01
and Multi-Agent Systems 1 no. 1 (1998): 7-38. [23] K. Sycara, A. Pannu , M. Williamson, and D. Zeng, “Distributed Intelligent Agents,” IEEE Expert 11...services that include support for mobility, security, management, persistence, and naming of agents. [i] K. Sycara, A. Pannu , M. Williamson, and D
NASA Astrophysics Data System (ADS)
Boyd, D.
2002-05-01
The National Institute of Justice (NIJ) is the research arm of the Department of Justice. Through its Office of Science & Technology (OS&T), NIJ has actively pursued development of better tools for public safety agencies to combat terrorism since 1997, when, pursuant to the Anti-Terrorism and Effective Penalty Act of 1996 (P.L. 104 -132), it began development of technology to better enable law enforcement agencies to combat terrorism. NIJ quickly realized that effectively combating terrorism required a multi disciplinary, multi agency response. Additionally, it came to understand that, as noted by the Gilmore Commission, the best way to prepare the responder community to deal with the consequences of terrorist incidents, was to ``emphasize programs and initiatives that build appropriately on existing State and local capabilities for other emergencies and disasters.'' For example, an effective critical incident management system is just as important to the ability to deal with a terrorist attack, such as occurred at the World Trade Center, as with a major natural disaster or the crash of a commercial airliner or passenger train. Consequently, NIJ's efforts have evolved to focus on the responder community's common, unaddressed needs for better tools to deal with critical incidents. The Institutes efforts focus on five technology areas: infrastructure security, personnel location, explosives detection and remediation, communications and information technology and training, and development of standards.
Building Partner Capacity and Strengthening Security Through Medical Security Force Assistance
2013-06-01
Combatants,” The American Journal of Bioethics 8, no.2 (2008): 13–14. 71 emergencies will decrease the requirement for U.S. forces to engage in...Just Healthcare for Combatants.” The American Journal of Bioethics 8. no.2. 2008: 13–14. Joint Center for International Security Force Assistance
Building Partner Capacity to Combat Weapons of Mass Destruction
2009-01-01
EDUCATION ENERGY AND ENVIRONMENT HEALTH AND HEALTH CARE INTERNATIONAL AFFAIRS NATIONAL SECURITY POPULATION AND AGING PUBLIC SAFETY SCIENCE AND...also met with officials from the government of the United Kingdom (the 12 The Science Applications International Corporation study team identified...Activity Description Ends Ways International Science and Technology Center Provides weapons experts in CIS the opportunity to redirect their
2012-05-04
FINAL 3. DATES COVERED (From - To) 4. TITLE AND SUBTITLE 5a. CONTRACT NUMBER Combatting Terrorism, Rebel Groups , and Armed...facing many security threats. Al-Shabaab in Somalia, armed rebel groups , and armed militia in South Sudan pose the greatest security challenges to the...these groups . 15. SUBJECT TERMS United States Africa Command, Al-Shabaab, Lamu Oil Pipeline, Security. 16. SECURITY CLASSIFICATION OF: 17
Technology Against Terrorism: Structuring Security
1992-01-01
outbreak of non is global in scope and, unfortunately, continues hostilities in January 1991, the number of interna- to demand attention and protective...against non -combatants, ranging from attacks on clinics by foes of abortion to mass murder by sophisticated international terrorist groups (e.g., attacks...findings were reached The fourth chapter discusses strategies for design - that involved first, the overall Federal funding of ing integrated systems
Combating Terrorism Technology Support Office 2006 Review
2006-01-01
emplaced beyond the control point, activated manually or automatically , with warning lights and an audible alarm to alert innocent pedestrians. The...throughout a vehicle. When a tamper event is detected, SERVANT automatically records sensor data and surveillance video and sends an alert to the security...exposure to organophosphate nerve agents, botulinum toxin, cyanide, and carbon monoxide and will be packaged into a portable , lightweight, mobile hand
The Blurring of Lines Between Combatants and Civilians in Twenty-First Century Armed Conflict
2013-03-28
concern for retirement, pensions , placement, or medical care. Speed, technical expertise, continuity, and flexibility are advantages gained by using...including the Internet, telecommunications networks, computer systems , and embedded processors and controllers.”42 Cyberspace and the technologies that... systems . Additionally, the Department of Defense relies heavily on its National Security Agency to defend the United States from attacks against its
2009-04-01
terrorist social networks are quite vulnerable to penetration and exploitation by indigenous personnel working in the communities where the groups operate...LEVERAGING INDIGENOUS SECURITY FORCES by Mack-Jan H. Spencer, Maj, USAF A Research Report Submitted to the Faculty In Partial Fulfillment of the...4. TITLE AND SUBTITLE Connecting the Spots: Combating Transnational Terrorist Groups Through Leveraging Indigenous Security Forces 5a. CONTRACT
2013-09-01
control GCE ground combat element LCE logistics combat element MAGTF Marine Air Ground Task Force MWCS Marine Wing Communications Squadron NPS Naval...elements: command element (CE), ground combat el- ement ( GCE ), aviation combat element (ACE), and logistics combat element (LCE). Each ele- ment...This layer provides unimpeded high-speed connectivity between remote sites and the Internet. Limited security policies are applied at this level to
Review of Security Cooperation Mechanisms Combatant Commands Utilize to Build Partner Capacity
2013-01-01
and Counter- terrorism at the Office of the Secretary of Defense (OSD), and the Joint Staff. Financial resources for Section 1206 programs come from...military education and training, and excess defense articles are examples of Title 22–authorized programs. The Patchwork Approach: How It All Comes...Assistant Secretary of the Army, research and technology/ Chief Scientist Forums Conferences, workshops research and Development Defense
2018-01-01
REPORT TR-MSG-098 Urban Combat Advanced Training Technology Architecture (Architecture de technologie avancée pour l’entraînement au combat urbain...REPORT TR-MSG-098 Urban Combat Advanced Training Technology Architecture (Architecture de technologie avancée pour l’entraînement au combat...3 1-2 1.3 Illustration of the Need for UCATT by Contemporary Example Situations 1-3 1.3.1 RNLA: Connection of NLD Mobile Combat Training Centre to
Federal Register 2010, 2011, 2012, 2013, 2014
2011-08-11
...] Private Security Contractors (PSCs) Operating in Contingency Operations, Combat Operations or Other..., ``Contractor Personnel Authorized to Accompany the U.S. Armed Forces,'' which provides guidance for all DoD contractors operating in contingency operations. This Rule was published as an Interim Final Rule on July 17...
The Just War Theory and the ethical governance of research.
Malsch, Ineke
2013-06-01
This article analyses current trends in and future expectations of nanotechnology and other key enabling technologies for security as well as dual use nanotechnology from the perspective of the ethical Just War Theory (JWT), interpreted as an instrument to increase the threshold for using armed force for solving conflicts. The aim is to investigate the relevance of the JWT to the ethical governance of research. The analysis gives rise to the following results. From the perspective of the JWT, military research should be evaluated with different criteria than research for civil or civil security applications. From a technological perspective, the boundaries between technologies for civil and military applications are fuzzy. Therefore the JWT offers theoretical grounds for making clear distinctions between research for military, civil security and other applications that are not obvious from a purely technological perspective. Different actors bear responsibility for development of the technology than for resorting to armed force for solving conflicts or for use of weapons and military technologies in combat. Different criteria should be used for moral judgment of decisions made by each type of actor in each context. In addition to evaluation of potential consequences of future use of the weapons or military technologies under development, the JWT also prescribes ethical evaluation of the inherent intent and other foreseeable consequences of the development itself of new military technologies.
Strategic Shift: Appraising Recent Changes in U.S. Defense Plans and Priorities
2013-04-29
NDU Press, 2012). 9 Neyla Arnas and Warren Fishbein, Actionable Foresight Project, Center for Technology and National Security Policy, in...management, At the same time, leaders had to account for changes in warfare. This included changes across the range of combat bred by the...into account the ongoing stability operations in Iraq and Afghanistan. In it, U.S. forces would be sized in order to: a. Conduct a major
Theater Security Cooperation in Oceania for the 21st Century
2012-05-04
nations of the Pacific struggle to meet the demands of their societies, they combat rampant overfishing and transnational crime. These countries are...Systems model” will be able to guide the implementation of future UAV technologies through the support of an established community . 13 While the P...space to operate UAVs because the air space is not governed by FAA regulations. This space offers the UAV community an superb opportunity to hone their
A Fresh Look at Internet Protocol Version 6 (IPv6) for Department of Defense (DoD) Networks
2010-08-01
since system administration practices (such as the use of security appliances) depend heavily on tools for network management, diagnosis and protection...are mobile ad hoc networks (MANETs) and yet there is limited practical experience with MANETs and their performance. Further, the interaction between...Systems FCS Future Combat System IETF Internet Engineering Task Force ISAT Information Science and Technology BAST Board on Army Science and
Africom at 5 years: The Maturation of a New U.S. Combatant Command
2013-08-01
security coopera- tion in 54 of 55 nations on the African continent, its island nations, and surrounding waters .47 The single exception has been...as a source of oil and gas for Washington. The use of new technologies such as hydraulic fracking and horizontal drilling have contributed to a...better control their own territorial waters and exclusive economic zones; and, 2) occasional in- nocent passage by U.S. naval vessels whose presence
Stakeholder Analysis of Integrating Women Into Ground Combat Units
2014-06-01
article posted on SaukValley.com titled “Sources: Pentagon Rules Shift on Women in Combat,” Lolita C. Baldor cites Bhagwati regarding news about plans...Jan-13 AP Sources: Pentagon Open Combat Roles to Women Lolita C. Baldor Associated Press 17-Jan-14 Military Women in Combat Nancy Carol Squidoo...Security Journal 9-Feb-12 Sources: Pentagon rules shift on women in combat Lolita C. Baldor SaukValley.com 24-Oct-13 A Voice for Men None named
Combating Terrorism: U.S. Government Strategies and Efforts to Deny Terrorists Safe Haven
2011-06-03
havens—such as activities funded through State’s Peacekeeping Operations and State-funded DHS training to combat money laundering and bulk cash...Management, Committee on Homeland Security House of Representatives COMBATING TERRORISM U.S. Government Strategies and Efforts to Deny Terrorists... Combating Terrorism: U.S. Government Strategies and Efforts to Deny Terrorists Safe Haven 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT
Littoral Combat Ship Manpower, an Overview of Officer Characteristics and Placement
2013-03-01
15. NUMBER OF PAGES 103 16. PRICE CODE 17. SECURITY CLASSIFICATION OF REPORT Unclassified 18. SECURITY CLASSIFICATION OF THIS PAGE...maritime force: 1.) Networks should be the central organizing principle of the fleet, and its sensing and fighting power should be distributed across...assured access” force; and 4.) Numbers of hulls count (quantity had its own quality) and consequently the fleet’s combat power should be
Applying Science and Technology to Combat WMD Terrorism
DOE Office of Scientific and Technical Information (OSTI.GOV)
Wuest, C R; Werne, R W; Colston, B W
2006-05-04
Lawrence Livermore National Laboratory (LLNL) is developing and fielding advanced strategies that dramatically improve the nation's capabilities to prevent, prepare for, detect, and respond to terrorist use of chemical, biological, radiological, nuclear, and explosive (CBRNE) weapons. The science, technology, and integrated systems we provide are informed by and developed with key partners and end users. LLNL's long-standing role as one of the two principle U.S. nuclear weapons design laboratories has led to significant resident expertise for health effects of exposure to radiation, radiation detection technologies, characterization of radioisotopes, and assessment and response capabilities for terrorist nuclear weapons use. This papermore » provides brief overviews of a number of technologies developed at LLNL that are being used to address national security needs to confront the growing threats of CBRNE terrorism.« less
Applying science and technology to combat WMD terrorism
NASA Astrophysics Data System (ADS)
Wuest, Craig R.; Werne, Roger W.; Colston, Billy W.; Hartmann-Siantar, Christine L.
2006-05-01
Lawrence Livermore National Laboratory (LLNL) is developing and fielding advanced strategies that dramatically improve the nation's capabilities to prevent, prepare for, detect, and respond to terrorist use of chemical, biological, radiological, nuclear, and explosive (CBRNE) weapons. The science, technology, and integrated systems we provide are informed by and developed with key partners and end users. LLNL's long-standing role as one of the two principle U.S. nuclear weapons design laboratories has led to significant resident expertise for health effects of exposure to radiation, radiation detection technologies, characterization of radioisotopes, and assessment and response capabilities for terrorist nuclear weapons use. This paper provides brief overviews of a number of technologies developed at LLNL that are being used to address national security needs to confront the growing threats of CBRNE terrorism.
Combating terrorism : linking threats to strategies and resources testimony
DOT National Transportation Integrated Search
2000-07-26
This is the statement of Norman J. Rabkin, Director, National Security Preparedness Issues, National Security and International Affairs division before the Subcommittee on National Security, Veterans Affairs, and International Relations, Committee on...
Gone to Fiddler’s Green: Reconnaissance and Security for the Corps
2011-05-01
based reconnaissance and security organization. A U.S. corps in major combat operations must contend with an enemy’s armored advance guard or...screen, guard, and cover. Andrew D. Goldin, “ Ruminations on Modular Cavalry,” Armor Magazine, (September-October 2006): 14. 22 Goldin, “ Ruminations ...on Modular Cavalry,” 15. 23 Goldin, “ Ruminations on Modular Cavalry,” 16. 10 capabilities compared to modular force brigade combat teams in support
Federal Register 2010, 2011, 2012, 2013, 2014
2011-08-19
... 0750-AH28 Defense Federal Acquisition Regulation Supplement; Contractors Performing Private Security..., entitled ``Contractors Performing Private Security Functions in Areas of Combat Operations or Other... of DoD and other Governmental private security contractors. A clause to cover the interagency...
2016-06-01
of technology and near-global Internet accessibility, a web -based program incorporating interactive maps to record personal combat experiences does...not exist. The Combat Stories Map addresses this deficiency. The Combat Stories Map is a web -based Geographic Information System specifically designed...iv THIS PAGE INTENTIONALLY LEFT BLANK v ABSTRACT Despite the proliferation of technology and near-global Internet accessibility, a web
Bethune, Shirley; Schachtschneider, Klaudia
2004-12-01
The Spitzkoppe Community Campsite in western Namibia lies in an area with very limited water resources. Water scarcity places a constraint on community income generation and development opportunities. The existing water resources are overexploited and to ensure future water security, the community must take sustainable water management into consideration in their daily lives and business ventures, including tourism. This has been successfully achieved at the Spitzkoppe Community Campsite through a combination of high community motivation, organisation and action, the involvement of researchers and trainers in water resource management and support from developers. The most appropriate water management solutions were found through ongoing practical testing of different strategies and technologies over two years. This paper presents a case study of a community-based tourist camp at Spitzkoppe and traces the community's progress towards developing an alternative way to combat desertification and a potentially lucrative tourist business.
Combat Stress and Substance Abuse Intervention
2015-10-01
SUBTITLE Combat Stress and Substance Abuse Intervention 5a. CONTRACT NUMBER W81XWH-11-2-0197 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S...SUBJECT TERMS Combat stress, substance abuse , alcohol, brief intervention, military personnel 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF...reduce stress reactions and substance abuse . These data are vital to understanding additional steps the military might take in addressing issues of
Littoral Combat Ship: Is it a Blue-Green Asset?
2010-04-02
to Mission Package Inventories , Homeports, and Installation Sites, by Brien Alkire, John ·Birkler, Lisa Dolan, James Dryden, Bryce Mason, Gordon T...Littoral Combat Ship Concept of Operations, V3.1 (February 2003), http:/ /www.global security .org/m ilitary /Library /report/2003/LCSCONO PS. htm# Operatio ...www.proquest.com/. US Navy. Littoral Combat Ships: Relating Performance to Mission Package Inventories , Homeports, and Installation Sites, by Brien Alkire
Unintended Relevance: The Role of the Stryker Brigade Combat Team in the Decisive Action Environment
2017-05-25
Systems , 30MM 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT 18. NUMBER OF PAGES 19a. NAME OF RESPONSIBLE PERSON Walter C. Gray II...Facilities- Policy FCS Future Combat System FM Field Manual FMTV Family of Medium Tactical Vehicles GCV Ground Combat Vehicle GWOT...Vehicle MGS Mobile Gun System MPF Mobile Protected Firepower NATO North Atlantic Treaty Organization ONS Operational Needs Statement RPG
Examining Cyber Command Structures
2015-03-01
domains, cyber, command and control, USCYBERCOM, combatant command, cyber force PAGES 65 16. PRICE CODE 17. SECURITY 18. SECURITY 19. SECURITY 20...USCYBERCOM, argue for the creation of a stand-alone cyber force.11 They claim that the military’s tradition-oriented and inelastic nature make the
The Continuing Evolution of Effective IT Security Practices
ERIC Educational Resources Information Center
Voloudakis, John
2006-01-01
In the past three years, higher education institutions have made a number of moves to secure their critical systems and protect their users, resulting in a marked change in the techniques used to combat security threats. Today, continued progress may depend on the development of an enterprise IT security program. (Contains 10 notes.)
Combating terrorism : observations on growth in federal programs
DOT National Transportation Integrated Search
1999-01-01
This is the statement of Mark E. Gebicke, Director, National Security Preparedness Issues, National Security and International Affairs Division before the Subcommittee on Oversight, Investigations, and Emergency Management, Committee on Transportatio...
1990-12-27
reconnaissance force back to a heavy ele ,._.it capable of security missions and limited 10 reconnaissance. Vletnam continued the platoon’s emphasis on...College, Fort Leavenworth, KS, 30 November 1988 (CARL Ref. AOR215860). JouroaI ~ el Bacevich, LTC A. J. "Training Scouts." Armor, September 1987, pp. 37...Swanson, Major Steven G. " Bronco Nine Speaks His Mind." MIlitaryInteigence, April-June 1990, pp. 8- 10, 12. "The Bustle Rack." Armo,; March-April 1990
75 FR 63695 - Designation of Biobased Items for Federal Procurement
Federal Register 2010, 2011, 2012, 2013, 2014
2010-10-18
... manufacturing in rural communities; and to enhance the Nation's energy security by substituting biobased... items used in products or systems designed or procured for combat or combat-related missions, which will... least part of its environmental information responsibilities. The BEES tool is designed to evaluate...
Some thoughts concerning large load-carrying vehicles
NASA Technical Reports Server (NTRS)
Spearman, M. L.
1983-01-01
Some implications relative to combat operations and force sustainability into the twenty-first century are discussed. The basic conjecture is that, sometime in the future, secure overseas basing may be denied to the United States by the Soviet Union or by unfriendly, unstable governments. In that event, the support of future battle itself, may be conducted from the continental U.S. and would introduce requirements for large, long-range, efficient, and sometimes, fast air vehicles. Some unusual design concepts and the technology requirements for such vehicles are suggested. It is concluded that, while much of the required technology is already being pursued, further advanced should be expected and sought in improved aerodynamics, propulsion, structures, and avionics with a view toward increased efficiency, utility, and affordability.
Outdoor Education: A Neglected Resource for Combating Internal Pollution
ERIC Educational Resources Information Center
Gemake, Josephine Stahl; Patti, Anthony V.
1978-01-01
Defining internal pollution as "the contamination and abuse of the human body through the habitual use of substances taken to relieve anxieties and tensions", this article asserts that outdoor education experiences can combat internal pollution through active physical, social, and intellectual involvement, promoting the security of belonging,…
Combatives for Alienated Youth: Problems and Prospects.
ERIC Educational Resources Information Center
Hellison, Don
Combative activities (boxing, wrestling, kung fu, etc.) are seen as having a positive influence on alienated inner city youth. Potential contributions of such activities in a school curriculum or recreation program include involvement, security, self-concept, and self-realization. Participants may be able to free themselves from such stereotype…
32 CFR 64.2 - Applicability and scope.
Code of Federal Regulations, 2014 CFR
2014-07-01
... Homeland Security), the Chairman of the Joint Chiefs of Staff, the Combatant Commands, the Office of the... Military Departments and the Secretary of Homeland Security for the Coast Guard when it is not operating as..., such as the Department of Homeland Security and the Selective Service System, and non-DoD organizations...
32 CFR 64.2 - Applicability and scope.
Code of Federal Regulations, 2010 CFR
2010-07-01
... Homeland Security), the Chairman of the Joint Chiefs of Staff, the Combatant Commands, the Office of the... Military Departments and the Secretary of Homeland Security for the Coast Guard when it is not operating as..., such as the Department of Homeland Security and the Selective Service System, and non-DoD organizations...
32 CFR 64.2 - Applicability and scope.
Code of Federal Regulations, 2012 CFR
2012-07-01
... Homeland Security), the Chairman of the Joint Chiefs of Staff, the Combatant Commands, the Office of the... Military Departments and the Secretary of Homeland Security for the Coast Guard when it is not operating as..., such as the Department of Homeland Security and the Selective Service System, and non-DoD organizations...
32 CFR 64.2 - Applicability and scope.
Code of Federal Regulations, 2013 CFR
2013-07-01
... Homeland Security), the Chairman of the Joint Chiefs of Staff, the Combatant Commands, the Office of the... Military Departments and the Secretary of Homeland Security for the Coast Guard when it is not operating as..., such as the Department of Homeland Security and the Selective Service System, and non-DoD organizations...
32 CFR 64.2 - Applicability and scope.
Code of Federal Regulations, 2011 CFR
2011-07-01
... Homeland Security), the Chairman of the Joint Chiefs of Staff, the Combatant Commands, the Office of the... Military Departments and the Secretary of Homeland Security for the Coast Guard when it is not operating as..., such as the Department of Homeland Security and the Selective Service System, and non-DoD organizations...
Ergonomics issues in national identity card for homeland security.
Yeow, Paul H P; Yuen, Y Y; Loo, W H
2013-09-01
Ever since the 9/11 terrorist attack, many countries are considering the use of smart national identity card (SNIC) which has the ability to identify terrorists due to its biometric verification function. However, there are many ergonomics issues in the use of SNIC, e.g. card credibility. This research presents a case study survey of Malaysian users. Although most citizens (>96%) own MyKad (Malaysia SNIC), many do not carry it around and use its applications. This defeats one of its main purposes, i.e. combating terrorism. Thus, the research investigates ergonomics issues affecting the citizens' Intention to Use (ITU) MyKad for homeland security by using an extended technology acceptance model. Five hundred questionnaires were collected and analysed using structural equation modelling. Results show that perceived credibility and performance expectancy are the key issues. The findings provide many countries with insights into methods of addressing ergonomics issues and increasing adoption of SNIC for homeland security. Copyright © 2012 Elsevier Ltd and The Ergonomics Society. All rights reserved.
Mechanical, physical, and physiological analysis of symmetrical and asymmetrical combat.
Clemente-Suárez, Vicente J; Robles-Pérez, José J
2013-09-01
In current theaters of operation, soldiers had to face a different situation as symmetrical (defined battlefield) and asymmetrical combat (non-defined battlefield), especially in urban areas. The mechanical and organic responses of soldiers in these combats are poorly studied in specific literature. This research aimed to analyze physical, mechanical, and physiological parameters during symmetrical and asymmetrical combat simulations. We analyzed 20 soldiers from the Spanish Army and Spanish Forces and Security Corps (34.5 ± 4.2 years; 176.4 ± 8.4 cm; 74.6 ± 8.7 kg; 63.3 ± 8.0 kg muscular mass; 7.6 ± 3.2 kg fat mass) during a symmetric combat (traditional combat simulation) and during an asymmetrical combat (urban combat simulation). Heart rate (HR), speed, sprints, distances, impact, and body load parameters were measured by a GPS system and a HR belt. Results showed many differences between symmetrical and asymmetrical combat. Asymmetrical combat presented higher maximum velocity movement, number of sprints, sprint distance, and average HR. By contrary, symmetric combat presented higher number of impact and body load. This information could be used to improve specific training programs for each type of combat.
Pelton, Dan; Wangelin, Bethany; Tuerk, Peter
2015-05-01
Posttraumatic stress disorder (PTSD) and acute stress disorder are prevalent mental health diagnoses associated with the military operations in Iraq and Afghanistan and are especially significant in service members returning from combat. Prolonged exposure (PE) therapy is a highly effective behavioral treatment for these symptoms, and providing this treatment as soon as possible, even in the midst of a soldier's combat deployment, has strong potential benefits. In the current case study, telehealth technology was used to support the delivery of PE therapy to treat a service member diagnosed with acute stress disorder in a war zone. PE was conducted face-to-face on the relatively secure Forward Operating Base for the first half of therapy and via clinical videoconferencing (CV) to the service member's remote combat outpost during the later stages of therapy. The service member exhibited marked improvements in symptoms over 10 sessions. Results are consistent with previous empirical findings and highlight the potential benefits of using telehealth to deliver evidenced-based treatment for traumatic stress disorders in a war zone. This case study provides a preliminary working model for delivering PE in a combat environment using multiple delivery systems. Benefits and clinical utility of CV-delivered exposure therapy are discussed, particularly for providers pending future operational deployments (e.g., including members of the military, independent government agencies, and first responders) and for those treating patients in remote locations.
2014-06-13
Squadron ( BFV /HMMWV, Current) .................................................. 93 Description...Evaluation Criteria ........................................................ 106 Comparison to Validation Criteria: ABCT Cavalry Squadron ( BFV /HMMWV...Brigade Combat Team BFV Bradley Fighting Vehicle BRT Brigade Reconnaissance Troop CAB Combined Arms Battalion CFV Cavalry Fighting Vehicle FM
Analysis of the Strategy to Combat Maritime Piracy
2009-12-11
26 Contemporary Maritime Piracy: Causative Factors...NSC National Security Council PUC Persons Under Control viii SLOC Sea lines of communication SSA Ships Security Assessment SSP Ships Security Plan...UNCLOS United Nations Convention on the Law of the Sea USD United States Dollar U.S. United States ix ILLUSTRATIONS Page Figure 1. Factors
Asia-Pacific Center for Security Studies Annual Report 2010
2010-01-01
focused symposium in the Maldives on combating terrorism involving officials from five South Asia nations; • A series of discussion periods in China on U.S...priorities and best practices among high-level security officials from the Republic of the Philippines, Sri Lanka, the Maldives and Mongolia; • A...international security featured as prominently in 2010 in so wide a range of security-related discussions: whether traditional security ( sinking of the
NASA Astrophysics Data System (ADS)
Hamid, Nasri A.; Mujaini, Madihah; Mohamed, Abdul Aziz
2017-01-01
The Center for Nuclear Energy (CNE), College of Engineering, Universiti Tenaga Nasional (UNITEN) has a great responsibility to undertake educational activities that promote developing human capital in the area of nuclear engineering and technology. Developing human capital in nuclear through education programs is necessary to support the implementation of nuclear power projects in Malaysia in the near future. In addition, the educational program must also meet the nuclear power industry needs and requirements. In developing a certain curriculum, the contents must comply with the university's Outcomes Based Education (OBE) philosophy. One of the important courses in the nuclear curriculum is in the area of nuclear security. Basically the nuclear security course covers the current issues of law, politics, military strategy, and technology with regard to weapons of mass destruction and related topics in international security, and review legal regulations and political relationship that determine the state of nuclear security at the moment. In addition, the course looks into all aspects of the nuclear safeguards, builds basic knowledge and understanding of nuclear non-proliferation, nuclear forensics and nuclear safeguards in general. The course also discusses tools used to combat nuclear proliferation such as treaties, institutions, multilateral arrangements and technology controls. In this paper, we elaborate the development of undergraduate nuclear security course at the College of Engineering, Universiti Tenaga Nasional. Since the course is categorized as mechanical engineering subject, it must be developed in tandem with the program educational objectives (PEO) of the Bachelor of Mechanical Engineering program. The course outcomes (CO) and transferrable skills are also identified. Furthermore, in aligning the CO with program outcomes (PO), the PO elements need to be emphasized through the CO-PO mapping. As such, all assessments and distribution of Bloom Taxonomy levels are assigned in accordance with the CO-PO mapping. Finally, the course has to fulfill the International Engineering Alliance (IEA) Graduate Attributes of the Washington Accord.
Defense Strategy for the Next Decade: Joint Security Cooperation and AirSea Battle Operations
2012-05-07
10 April 2012). 36 Lolita C. Baldor, “Army restructuring includes cuts to combat brigades,” The Associated Press, 26 January 2012, http://www.post... Lolita C. “Army Restructuring Includes Cuts To Combat Brigades.” The Associated Press, 26 January 2012. http://www.postgazette.com/pg/12026/1206081-84
Bioinspired polarization navigation sensor for autonomous munitions systems
NASA Astrophysics Data System (ADS)
Giakos, G. C.; Quang, T.; Farrahi, T.; Deshpande, A.; Narayan, C.; Shrestha, S.; Li, Y.; Agarwal, M.
2013-05-01
Small unmanned aerial vehicles UAVs (SUAVs), micro air vehicles (MAVs), Automated Target Recognition (ATR), and munitions guidance, require extreme operational agility and robustness which can be partially offset by efficient bioinspired imaging sensor designs capable to provide enhanced guidance, navigation and control capabilities (GNC). Bioinspired-based imaging technology can be proved useful either for long-distance surveillance of targets in a cluttered environment, or at close distances limited by space surroundings and obstructions. The purpose of this study is to explore the phenomenology of image formation by different insect eye architectures, which would directly benefit the areas of defense and security, on the following four distinct areas: a) fabrication of the bioinspired sensor b) optical architecture, c) topology, and d) artificial intelligence. The outcome of this study indicates that bioinspired imaging can impact the areas of defense and security significantly by dedicated designs fitting into different combat scenarios and applications.
U.S. Combat Commands’ Participation in the Proliferation Security Initiative: A Training Manual
2009-01-01
cadmium-zinc- tellurium DHS Department of Homeland Security DoD Department of Defense EAA Export Administration Act EAR Export Administration Regulations EU...Pulsed fast neutron analysis PSI Proliferation Security Initiative Pu Plutonium SCO Shanghai Cooperation Organization SFI Security Freight Initiative...resolution) sodium iodide (NaI) and (intermediate-resolution) cadmium-zinc- tellurium (CZT) detectors may not have the energy resolution and/or sensitivity
Technologies to Combat Aedes Mosquitoes: A Model Based on Smart City.
de Souza Silva, Geovanna Cristine; Peltonen, Laura-Maria; Pruinelli, Lisiane; Yoshikazu Shishido, Henrique; Jacklin Eler, Gabrielle
2018-01-01
Aedes aegypti and Aedes albopictus mosquitoes are responsible for the transmission of diseases such as dengue fever, yellow fever, chikungunya fever, zika virus fever, some of which can cause irreversible central nervous system problems and death. This study investigates what technologies are being used for combatting and monitoring the Aedes mosquitoes and to propose joining these technologies into a single and complete solution using the Smart Cities concept. A search for newscasts on Google and mobile apps in app stores were performed to identify technological solutions for combat to Aedes mosquitoes. Also, a model for joint technology was proposed. Results identified the following technologies: 170 software, two sensors, two drones, one electronic device, ten mosquito traps/lures, seven biological tools, six biotechnologies, and eight chemical formulations. Technological resources and adoption of preventive measures by the population could be a useful method for the mosquito control. Examples include a georeferenced model for identification and examination of larvae, application of chemical/biological products, real-time mapping, sending of educational materials via email or social media for the population, and alerts to health professionals in the zones of combat/risk. In combination, these technologies may indicate a better solution to the current problem.
Saudi Arabia’s Counterterrorism Methods: A Case Study on Homeland Security
2017-06-01
laws to safeguard the homeland and its borders, Saudi Arabia has enacted laws that impose stiff penalties aimed at money laundering and other illicit...safeguard the homeland and its borders, Saudi Arabia has enacted laws that impose stiff penalties aimed at money laundering and other illicit activities...34 1. Combating Financing Terrorist Organizations ............... 34 2. Combating Money Laundering by
Enabling Theater Security Cooperation Through Regionally Aligned Forces
2013-03-01
combatant commanders in successfully implementing this initiative, the Service and the Department of Defense will have to overcome several significant...commanders in successfully implementing this initiative, the Service and the Department of Defense will have to overcome several significant challenges...combatant commands, but several significant challenges must be overcome for the RAF to become a viable force employment concept. Analyzing the Army’s
Inherent secure communications using lattice based waveform design
DOE Office of Scientific and Technical Information (OSTI.GOV)
Pugh, Matthew Owen
2013-12-01
The wireless communications channel is innately insecure due to the broadcast nature of the electromagnetic medium. Many techniques have been developed and implemented in order to combat insecurities and ensure the privacy of transmitted messages. Traditional methods include encrypting the data via cryptographic methods, hiding the data in the noise floor as in wideband communications, or nulling the signal in the spatial direction of the adversary using array processing techniques. This work analyzes the design of signaling constellations, i.e. modulation formats, to combat eavesdroppers from correctly decoding transmitted messages. It has been shown that in certain channel models the abilitymore » of an adversary to decode the transmitted messages can be degraded by a clever signaling constellation based on lattice theory. This work attempts to optimize certain lattice parameters in order to maximize the security of the data transmission. These techniques are of interest because they are orthogonal to, and can be used in conjunction with, traditional security techniques to create a more secure communication channel.« less
Advances in analytical technologies for environmental protection and public safety.
Sadik, O A; Wanekaya, A K; Andreescu, S
2004-06-01
Due to the increased threats of chemical and biological agents of injury by terrorist organizations, a significant effort is underway to develop tools that can be used to detect and effectively combat chemical and biochemical toxins. In addition to the right mix of policies and training of medical personnel on how to recognize symptoms of biochemical warfare agents, the major success in combating terrorism still lies in the prevention, early detection and the efficient and timely response using reliable analytical technologies and powerful therapies for minimizing the effects in the event of an attack. The public and regulatory agencies expect reliable methodologies and devices for public security. Today's systems are too bulky or slow to meet the "detect-to-warn" needs for first responders such as soldiers and medical personnel. This paper presents the challenges in monitoring technologies for warfare agents and other toxins. It provides an overview of how advances in environmental analytical methodologies could be adapted to design reliable sensors for public safety and environmental surveillance. The paths to designing sensors that meet the needs of today's measurement challenges are analyzed using examples of novel sensors, autonomous cell-based toxicity monitoring, 'Lab-on-a-Chip' devices and conventional environmental analytical techniques. Finally, in order to ensure that the public and legal authorities are provided with quality data to make informed decisions, guidelines are provided for assessing data quality and quality assurance using the United States Environmental Protection Agency (US-EPA) methodologies.
Explaining weapons proliferation: Going beyond the security dilemma
DOE Office of Scientific and Technical Information (OSTI.GOV)
Rattray, G.J.
1994-07-01
Most analyses addressing the subject of why states choose to proliferate focus on external motivations, particularly the security dilemma, facing a country`s leaders. This paper concludes that, other factors, such as prestige, regime type and stability, and economic status, can have impact in determining proliferation outcomes. In the case of Newly Independent States of the former Soviet Union (NIS), the domestic problems generated by internal conflicts, arms remaining from the Cold War, excess defense industrial capacity, economic difficulties and the breakdown of central authority resulting in a loss of border control and corruption have all made the NIS an extremelymore » fertile ground for weapons proliferation. A more positive `rollback` situation has emerged in Latin America where both Argentina and Brazil have seemingly decided to forgo the acquisition of nuclear weapons and ballistic missiles. The US must understand the `strategic personality` of each potential proliferation. Not all state behavior can be explained in terms of the security dilemma. One must also keep in mind the complexity of possible motivations. Economic and technological assistance and cooperative efforts at institution-building hold great potential to combating proliferation.« less
3 CFR - Blue Ribbon Commission on America's Nuclear Future
Code of Federal Regulations, 2011 CFR
2011-01-01
... America's Nuclear Future Memorandum for the Secretary of Energy Expanding our Nation's capacity to generate clean nuclear energy is crucial to our ability to combat climate change, enhance energy security... safe, secure, and responsible use of nuclear energy. These efforts are critical to accomplishing many...
2009-09-01
NAS Lemoore; Yolk Field ANGB; Alpena 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF 18. NUMBER 19a. NAME OF RESPONSIBLE PERSON a. REPORT...Currently identified preferred locations for conducting deployment demonstrations are Alpena Combat Readiness Training Center (CRTC), Michigan; Edwards...3-5 3.1.3 Deployment Demonstration Locations .............................................................3-5 3.1.3.1 Alpena Combat Range Test
2017-06-01
NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS Approved for public release. Distribution is unlimited. COMBATING DRUG...Postgraduate School Monterey, CA 93943-5000 8. PERFORMING ORGANIZATION REPORT NUMBER 9. SPONSORING /MONITORING AGENCY NAME(S) AND ADDRESS(ES) N/A 10...degree of MASTER OF ARTS IN SECURITY STUDIES (WESTERN HEMISPHERE) from the NAVAL POSTGRADUATE SCHOOL June 2017 Approved by: Diego
1988-04-01
and Cons . Major Thomas H. Cecil 88-0490 "--"insights into tomorrou,"’ ..v- A A 0 PtY-i f(.> i’I,-:::x:’~ --pcr~ j.~ ~~* --. -- iiV • DISCLAIMER The...k. r- r,’ I’. REPORT NUMBER 88-0490 TITLE WOMEN IN COMBAT-PROS AND CONS AUTHOR(S) MAJOR THOMAS H. CEC-IL, USAF -% FACULTY ADVISOR CH, LT COL DAVID W...NUMBERS 11 TITLE (include Security Classification) WOMEN IN COMBAT--PROS AND CONS 12. PERSON4AL AUTHOR(S) Cecil, Thomas H1., Major, USAF 9a YýOF REPORT
1990-12-01
34 Reflections, Winter 1989, 13. Matthews, William. "Commanders Downplay Women In Combat," Army Times, February 26, 1990, 9. Maze, Rick . "Byron: No Women in...Combat," Army Times, March 26, 1990. 18. Maze, Rick . "Women Need To Learn Infantry Skills, Warner Says," Arm7y Times, February 5, 1990, 10. McCarthy...January 4, 1990, 3. Yancey , Matt. "Women-Combat," Associated Press, January 14, 1990. Yarbrough, Jean. "The Feminist Mistake," Policy Review, 1983, 48
Women Warriors: Why the Robotics Revolution Changes the Combat Equation
2016-03-01
combat. U.S. Army RDECOM PRISM 6, no. 1 FEATURES | 91 Women Warriors Why the Robotics Revolution Changes the Combat Equation1 BY LINELL A. LETENDRE...underappreciated—fac- tor is poised to alter the women in combat debate: the revolution in robotics and autonomous systems. The technology leap afforded by...developing robotic and autonomous systems and their potential impact on the future of combat. Revolution in Robotics: A Changing Battlefield20 The
Ultra Wideband (UWB) communication vulnerability for security applications.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Cooley, H. Timothy
2010-07-01
RF toxicity and Information Warfare (IW) are becoming omnipresent posing threats to the protection of nuclear assets, and within theatres of hostility or combat where tactical operation of wireless communication without detection and interception is important and sometimes critical for survival. As a result, a requirement for deployment of many security systems is a highly secure wireless technology manifesting stealth or covert operation suitable for either permanent or tactical deployment where operation without detection or interruption is important The possible use of ultra wideband (UWB) spectrum technology as an alternative physical medium for wireless network communication offers many advantages overmore » conventional narrowband and spread spectrum wireless communication. UWB also known as fast-frequency chirp is nonsinusoidal and sends information directly by transmitting sub-nanosecond pulses without the use of mixing baseband information upon a sinusoidal carrier. Thus UWB sends information using radar-like impulses by spreading its energy thinly over a vast spectrum and can operate at extremely low-power transmission within the noise floor where other forms of RF find it difficult or impossible to operate. As a result UWB offers low probability of detection (LPD), low probability of interception (LPI) as well as anti-jamming (AJ) properties in signal space. This paper analyzes and compares the vulnerability of UWB to narrowband and spread spectrum wireless network communication.« less
2015-12-01
concerning the role of ground forces in achieving national security objectives. The Strategic Studies Institute publishes national security and...international audience, and honor soldiers—past and present. STRATEGIC STUDIES INSTITUTE The Strategic Studies Institute (SSI) is part of the U.S...Army War College and is the strategic-level study agent for issues related to national security and military strategy with emphasis on geostrategic
Impact of emerging technologies on future combat aircraft agility
NASA Technical Reports Server (NTRS)
Nguyen, Luat T.; Gilert, William P.
1990-01-01
The foreseeable character of future within-visual-range air combat entails a degree of agility which calls for the integration of high-alpha aerodynamics, thrust vectoring, intimate pilot/vehicle interfaces, and advanced weapons/avionics suites, in prospective configurations. The primary technology-development programs currently contributing to these goals are presently discussed; they encompass the F-15 Short Takeoff and Landing/Maneuver Technology Demonstrator Program, the Enhanced Fighter Maneuverability Program, the High Angle-of-Attack Technology Program, and the X-29 Technology Demonstrator Program.
2003-05-19
www.bbc.co.uk/cgi-bin/history/renderplain.pl?file=history/war/wwtwo/spying/sis_0/> [27 March 2003]. 37 Ibid. 38 “Operation Overlord,” Saving Private Ryan Online...Security, (Washington, DC: 2002), 17; National Strategy for Combating Terrorism. Washington, DC: 2003. “Operation Overlord,” Saving Private Ryan Online
Navy Irregular Warfare and Counterterrorism Operations: Background and Issues for Congress
2016-05-27
ordnance disposal (counter- IED), combat construction engineering , cargo handling, combat logistics, maritime security, detainee operations, customs...Rutherford, “Navy’s Maritime Domain Awareness System ‘Up And Running’,” Defense Daily, September 4, 2008; and Dan Taylor , “New Network Allows Navy To...with twin diesel engines and water jets. It has a range of 600 nautical miles. 34 Other Organizational Initiatives Other Navy initiatives in recent
Applying Neuroscience to Enhance Tactical Leader Cognitive Performance in Combat
2011-12-16
to respond emotionally, (2) stress degrades the form of conscious attention know as “working memory ,” and (3) certain brain areas can be...Combat, Prefrontal Cortex, Tactical, Army, Working Memory 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT 18. NUMBER OF PAGES 19a...sacrifices cognitive resources to respond emotionally, (2) stress degrades the form of conscious attention know as “working memory ,” and (3) certain
U.S.-China Counterterrorism Cooperation: Issues for U.S. Policy
2008-10-08
detained Uighurs at Guantanamo Bay prison; weapons nonproliferation; port security; security for the Olympics in Beijing in August 2008; sanctions...the others for Resolution 1368 (to combat terrorism). On September 20, Beijing said that it offered “unconditional support” in fighting terrorism...transform — the closer bilateral relationship pursued by President Bush since late 2001. In the short-term, U.S. security policy toward Beijing sought
Measuring Transnational Organized Crime Threats to US National Security
2016-05-26
typology is not designed to score TOC networks, so it is not an obvious choice, but it could be easily modified by the TMWG to rank-order TOC networks...States Strategy to Combat Transnational Organized Crime (SCTOC). The strategy identified Transnational Organized Crime ( TOC ) as a national security...identify the TOC groups that present the national security threat defined in the SCTOC? A literature review of existing organized crime assessments
1988-03-31
MARCI 1988 iAm U m WI 4EUnclT CLSIIAION OF THIS PAGE REPORT DOCUMENTATION PAGE is REPORT SECURITY CLASSIFICATION lb. RESTRICTIVE MARKINGS 2.. SECUR ...logistics system of the future more capable of supporting the full spectrumn of war 20 OISTRIaSUTION.’AVAILAeILiTY 0" ABSTRACT 21 ABSTRACT SECURITY ... SECURITY CLASSIFICATION OT: THIS PAGF Unclas ’SCUFUTY Cý= I!FICATION OF THIS PAGE 1,Qwcont.) scenarios. Today’s logistics processes assume wartime
Private Security Contractors: A Way of Combating Piracy in the Horn of Africa
2014-05-22
September 2011. 79Financial Action Task Force, “Financial Action Task Force Annual Report, 2010-2011,” FATF /OECD, 2011, 10. 80Andrew J. Shapiro...Report, 2010-2011.” FATF /OECD. Paris, 2011. Fox News. “Private Security Firms Join Battle Against Somali Pirates,” October 26, 2008. http
A book chapter published in a 3-volume textbook series by the U. S. Military Academy at West Point, Combating Terrorism Center. Book title: Homeland Security: Protecting America's Targets. The chapter is a review of background of water systems, impact of September 11, 2001, a...
2014-05-22
capacity of several Oil Coast nations through building accountable institutions, 56William Brownfield , Assistant Security of State for International...Maturation of a New U.S. Combatant Command. Carlisle, PA: Strategic Studies Institute, 2013. Brownfield , William. Assistant Security of State for
Code of Federal Regulations, 2014 CFR
2014-10-01
... on the workforce through increased productivity and efficiency; and (e) Ensures item level traceability throughout lifecycle to strengthen supply chain integrity, enhance cyber security, and combat...
DOE Office of Scientific and Technical Information (OSTI.GOV)
Althouse, Paris
In the fast-paced field of biotechnology where innovation has such far-reaching impacts on human health and the environment, dealing with the implications of possible illicit activities, accidents or unintended research consequences with potential detrimental societal impacts tends to remain in the background. While controls may be inevitable for the biotech industry, workshop attendees agreed that the way in which controls are implemented will play a major role in the agility and innovation of the biotechnology industry. There is little desire to slow down the pace of the gains while dealing with the security issues that arise. As was seen frommore » the brief examinations of the Nuclear, Chemical, and Information Technology sectors explored in this workshop, establishing a regulatory regime needs to be a partnership between the public, corporate interests, scientists, and the government. Regulation is often written to combat perceived risk rather than actual risk—the public’s perceptions (occasionally even fictional portrayals) can spur regulatory efforts. This leads to the need for a thorough and continuing assessment of the risks posed by modern biotechnology. Inadequate or minimal risk assessment might expedite development in the short term but has potential negative long-term security and economic consequences. Industry and the technical community also often have a large role in setting regulatory policy, especially when well-crafted incentives are incorporated into the regulations. Such incentives might actually lead to enhanced innovation while poorly designed incentives can actually reduce safety and security. Any regulations should be as agile and flexible as the technology they regulate and when applied to biotechnologies they will need a new framework for thinking and implementing. The new framework should consider biotechnology as a technology and not simply a science since it is an extremely complex and adaptive system. This suggests the need to invest in social and political systems, rather than exclusively in technology, as a part of maintaining not only robust, but agile regulation. Modeling and simulations to illustrate how the biotech ecosystem might respond to new policies may be a promising approach to crafting regulations.« less
Shumeta, Zekarias; D'Haese, Marijke
2018-06-01
Most coffee in Ethiopia is produced by smallholder farmers who face a daily struggle to get sufficient income but also to feed their families. At the same time, many smallholder coffee producers are members of cooperatives. Yet, literature has paid little attention to the effect of cooperatives on combating food insecurity among cash crop producers including coffee farmers. The objective of the study was to investigate how coffee cooperative membership may affect food security among coffee farm households in Southwest Ethiopia. The study used cross-sectional household data on income, expenditure on food, staple food production (maize and teff), and utilization of improved inputs (fertilizer and improved seed) collected from 256 randomly selected farm households (132 cooperative members and 124 nonmembers) and applied an inverse probability weighting (IPW) estimation to assess the impact of cooperative membership on food security. The result revealed that cooperative membership has a positive and significant effect on staple food production (maize and teff) and facilitated technological transformation via increased utilization of fertilizer and improved seeds. Nonetheless, the effect on food expenditure and income could not be confirmed. Findings suggest a trade-off between coffee marketing and input supply functions of the cooperatives, impairing their true food security impact from the pooled income and production effect.
2014-02-01
Chamber construction has been completed and swine experiments have been initiated. The NMRC Center for Hypobaric Experimentation, Simulation and...Aeromedical evacuation, en-route care, hypobaric conditions, hypobaric chamber, swine model 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF...diminished morbidity and mortality among combat casualties. However, not much is known about the effects of long range aero-medical evacuation in hypobaric
Women in Combat: The Operational Impact of Meeting A National Security Necessity
1991-02-11
of physical strength and emotional stamina and impai.red male -bonding: United States public opinion; and the perceptions of America’s allies and...on the main thesis p6ints of demographics and noncombatants in the changing scenario of combat, and provides the arguments on both sides of the three...9 Unit Cohesion and Male -Bonding .................. 11 United States Public Opinion ......................... 12 Perceptions or Friend and Foe
From Beirut to Khobar Towers: Improving the Combating Terrorism Program
1998-04-01
of Defense’s Force Protection problems ? Hadn’t we learned our “lessons” following the catastrophic loss of 241 Marines in the 1983 Beirut bombing...and formulated 79 recommendations to improve DOD efforts to combat terrorism. In response to the Task Force’s report, US Air Force leadership directed...Prince Sultan Air Base, Saudi Arabia, would resolve several security vulnerabilities, but this action would create additional problems because US assets
Annual Science and Engineering Technology Conference Presentations (8th)
2007-04-19
Technology 11:30 am Wrap Up & Adjourn 12:00 pm BUFFET LUNCHEON Session III: Army Future Combat System (Brigade Combat Team) (FCS(BCT)) Program The Future...acquisitions by firms from other nations. Non UK/Canada transactions accounted for 58% of all CFIUS filings. 19 Outline • Industrial Policy • Emerging...requirements are accounted for Document and model the component Minimize inter-component dependencies Support rapid, affordable technology
1992-10-09
PROGRAM CATALOG OF WAR GAMES 92-30805 U *3fl91\\k~o 9 2 SECURITY CLASSIFICATION OF THIS PAGE I ,i REPORT DOCUMENTATION PAGE la. REPORT SECURITY...4401 Ford Ave ELEMENT NO. NO. NO. ACCESSION NO. AIyxndriA. VA 229i2-14O1 --. 11. TITLE (Include Security Classification) Catalog of War Games 12...SCURITY CLASSIFICATiON OF THIS PAGE DECLARATION OF ACCORD 1. PURPOSE This catalog provides information on the primary war games , combat simulations
2009-01-01
country in order to establish a physically and psychologically secured environment conducive to national development."g Challenges to Inter.naI Security...be accommodated under the present Constitution and laws particularly the powers conceded by the MOA-AD to the 5 Bangsamoro Juridical Entity (BJE, an...AFP under Magsaysay underwent organizational changes with the introduction of psychological warfare activities that .complemented the usual combat
Combating Terrorism in the Philippines to Improve U.S. Homeland Security
2010-12-01
IMPROVE U.S. HOMELAND SECURITY William E. Lowery Major, United States Air Force B.A., University of Missouri at Kansas City, 1996 M.S., Troy...departing from Manila.1 They also planned to crash an airliner into CIA headquarters. These acts directly threatened U.S. homeland security. The...in Southeast Asia, known as Jemaah Islamiyah (JI), have also been discovered since 9/11. In 2002, Philippine military forces repeatedly uncovered
76 FR 21373 - Privacy Act of 1974; Report of a New System of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2011-04-15
... Information Security Management Act of 2002; the Computer Fraud and Abuse Act of 1986; the Health Insurance... 1974; the Federal Information Security Management Act of 2002; the Computer Fraud and Abuse Act of 1986... established by State law; (3) support litigation involving the Agency; (4) combat fraud, waste, and abuse in...
Air Force’s Combat Aircraft: A Future Holding into the Past
2010-04-07
Global Security, “9M111 / SA-19 GRISON ,” Globalsecurity.org, http://www.globalsecurity.org/military/world/ russia/sa-19.htm (accessed March 13, 2010...world/russia/9k338.htm (assessed March 13, 2010). Global Security. “9M111 / SA-19 GRISON .” Globalsecurity.org. http://www.globalsecurity. org
360 PORT MDA - A Strategy to Improve Port Security
2006-09-01
Participating Agencies (After: Executive Briefing..........................27 Table 6. Designated Joint Operations Center Participants (From: SAFE...Investigations CGIP Coast Guard Intelligence Program CHOC Charleston Harbor Operations Center CIO Command Intelligence Officer CMT Combating Maritime... EXECUTIVE SUMMARY Ports are critical to our economy and national security. Key hubs in the international trade network, U.S. ports accounted for more than
Optoelectronics applications in multimedia shooting training systems: SPARTAN
NASA Astrophysics Data System (ADS)
Glogowski, Tomasz; Hlosta, Pawel; Stepniak, Slawomir; Swiderski, Waldemar
2017-10-01
Multimedia shooting training systems are increasingly being used in the training of security staff and uniformed services. An advanced practicing-training system SPARTAN for simulation of small arms shooting has been designed and manufactured by Autocomp Management Ltd. and Military Institute of Armament Technology for the Polish Ministry of National Defence. SPARTAN is a stationary device designed to teach, monitor and evaluate the targeting of small arms and to prepare soldiers for: • firing the live ammunition at open ranges for combat targets and silhouettes • detection, classification and engagement of real targets upon different terrains, weather conditions and periods during the day • team work as a squad during the mission by using different types of arms • suitable reactions in untypical scenarios. Placed in any room the training set consists of: • the projection system that generates realistic 3D imaging of the battlefield (such as combat shooting range) in high-resolution • system that tracks weapons aiming points • sound system which delivers realistic mapping of acoustic surroundings • operator station with which the training is conducted and controlled • central processing unit based on PC computers equipped with specialist software realizing individual system functions • units of smart weapons equipped with radio communication modules, injection laser diodes and pneumatic reloading system. The system make possible training by firing in dynamic scenarios, using combat weapons and live ammunition against visible targets moving on a screen. The use of infrared camera for detecting the position of impact of a projectile.
Cyber Security: Assessing Our Vulnerabilities and Developing an Effective Defense
NASA Astrophysics Data System (ADS)
Spafford, Eugene H.
The number and sophistication of cyberattacks continues to increase, but no national policy is in place to confront them. Critical systems need to be built on secure foundations, rather than the cheapest general-purpose platform. A program that combines education in cyber security, increasing resources for law enforcement, development of reliable systems for critical applications, and expanding research support in multiple areas of security and reliability is essential to combat risks that are far beyond the nuisances of spam email and viruses, and involve widespread espionage, theft, and attacks on essential services.
Organizational Culture and Safety
NASA Technical Reports Server (NTRS)
Adams, Catherine A.
2003-01-01
'..only a fool perseveres in error.' Cicero. Humans will break the most advanced technological devices and override safety and security systems if they are given the latitude. Within the workplace, the operator may be just one of several factors in causing accidents or making risky decisions. Other variables considered for their involvement in the negative and often catastrophic outcomes include the organizational context and culture. Many organizations have constructed and implemented safety programs to be assimilated into their culture to assure employee commitment and understanding of the importance of everyday safety. The purpose of this paper is to examine literature on organizational safety cultures and programs that attempt to combat vulnerability, risk taking behavior and decisions and identify the role of training in attempting to mitigate unsafe acts.
SIGAR Special Inspector General for Afghanistan Reconstruction
2017-10-30
Daniel Fisher, Economic and Social Development Subject Matter Expert Emmett Schneider, Funding Subject Matter Expert Clark Irwin, Lead Writer/Editor...governance, economic development, peace and reconciliation, and security issues. Each working group has a matrix of benchmarks—subject to change—to chart...the U.S. efforts to build the Afghan security forces, improve governance, facilitate economic and social development, and combat the sale and
Army Logistician. Volume 41, Issue 3, May-June 2009
2009-06-01
analyzing, and executing multifunc- tional logistics, including transportation, food service, and acquisition, receipt, issue, and recovery of Govern...internal gun truck security for presence patrols, com- bat replenishment operations, recovery operations for damaged vehicles, or escort operations for...the next mission. During our 14-month deployment, the gun truck pla- toon provided security for 208 combat replenishment operations, 27 recovery
The Concept of C2 Communication and Information Support
2004-06-01
communication and information literacy , • Sensors: technology and systematic development as a branch, • Military prognosis research (combat models...intelligence, • Visualization of actions, suitable forms of information presentation, • Techniques of learning CIS users communication and information ... literacy , • Sensors: technology and systematic development as a branch, • Military prognosis research (combat models), • Man - machine interface. CISu
Communications for unattended sensor networks
NASA Astrophysics Data System (ADS)
Nemeroff, Jay L.; Angelini, Paul; Orpilla, Mont; Garcia, Luis; DiPierro, Stefano
2004-07-01
The future model of the US Army's Future Combat Systems (FCS) and the Future Force reflects a combat force that utilizes lighter armor protection than the current standard. Survival on the future battlefield will be increased by the use of advanced situational awareness provided by unattended tactical and urban sensors that detect, identify, and track enemy targets and threats. Successful implementation of these critical sensor fields requires the development of advanced sensors, sensor and data-fusion processors, and a specialized communications network. To ensure warfighter and asset survivability, the communications must be capable of near real-time dissemination of the sensor data using robust, secure, stealthy, and jam resistant links so that the proper and decisive action can be taken. Communications will be provided to a wide-array of mission-specific sensors that are capable of processing data from acoustic, magnetic, seismic, and/or Chemical, Biological, Radiological, and Nuclear (CBRN) sensors. Other, more powerful, sensor node configurations will be capable of fusing sensor data and intelligently collect and process data images from infrared or visual imaging cameras. The radio waveform and networking protocols being developed under the Soldier Level Integrated Communications Environment (SLICE) Soldier Radio Waveform (SRW) and the Networked Sensors for the Future Force Advanced Technology Demonstration are part of an effort to develop a common waveform family which will operate across multiple tactical domains including dismounted soldiers, ground sensor, munitions, missiles and robotics. These waveform technologies will ultimately be transitioned to the JTRS library, specifically the Cluster 5 requirement.
2016-04-01
Award Number: W81XWH-12-1-0090 TITLE: Relationship Factors Contributing to the Progression of Combat Related PTSD and Suicidality over Time...PTSD and Suicidality Over Time. 5b. GRANT NUMBER 12348001 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) Elizabeth S. Allen, PhD 5d. PROJECT NUMBER 5e...PTSD), couples adaptation and stress processes, suicide risk 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT 18. NUMBER OF PAGES 19a
2005-02-14
hour per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining the data needed , and...the national level, the National Security Act of 1947 (NSA 47) mandates the need for interagency cooperation.6 In this regard, the National Security...within DoD, it lacks a central body or mechanism to provide the overarching, truly ’global’ oversight and guidance needed to ensure adequate interagency
Enhancing US-Japan Cooperation to Combat Antimicrobial Resistance
2014-01-01
The Global Health Security Agenda (GHSA) is aimed at preventing, detecting, and responding to infectious disease threats. To move toward these goals, the United States has committed to partner with at least 30 countries around the world. One of the objectives of the GHSA includes “[p]reventing the emergence and spread of antimicrobial drug resistant organisms.” Antimicrobial resistance (AMR) has become a growing global health security problem, with inappropriate use of antimicrobial medications in humans and animals and a lack of new antimicrobial medications contributing to this problem. While AMR is a growing global concern, working on it regionally can make this multifaceted problem more manageable. The United States and Japan, both world leaders in the life sciences, are close allies that have established cooperative programs in medical research and global health that can be used to work on combating AMR and advance the GHSA. Although the United States and Japan have cooperated on health issues in the past, their cooperation on the growing problem of AMR has been limited. Their existing networks, cooperative programs, and close relationships can and should be used to work on combating this expanding problem. PMID:25470465
A Joint Force Medical Command is Required to Fix Combat Casualty Care
2017-10-05
that poses an operations security risk. Author: ☒ PA: ☒ 13. SUPPLEMENTARY NOTES Word Count: 10,665 14. ABSTRACT The Military Health System...15. SUBJECT TERMS Military Health System, Joint Trauma System, Defense Health Agency, PROFIS 16. SECURITY CLASSIFICATION OF: 17...The Military Health System (MHS) is required to provide medical operational forces for military and contingency operations while also providing
A Mature Maritime Strategy for Africa to Meet National Security Goals
2011-06-17
by corrupt governments, poverty, piracy, poaching in territorial waters, terrorist cells, militant youth activities, environmental violations, illegal...regions with maritime distress that are, or have the potential to impact vital U.S. national interests. Good national strategy that informs combatant and...environmental violations and many other debilitating maritime activities get conveyed ashore and directly impact the security and well-being of the
Developing Soft Power Using Afloat Medical Capability
2009-03-02
the National Security Strategy. Depending on its program employment , it has the capability to effectively combine the other elements of national power...Strategy through the employment of combatant commanders’ Theater Security Cooperation (TSC) Program in their area of responsibility. The TSC program is...In the final phases of Pacific campaign during World War II, tactical doctrine for employment of Navy hospital vessels changed, allowing them to
Between Heroes and Guardians: General Lyman L. Lemnitzer and General Charles H. Bonesteel III
2015-05-21
16 David S. Patterson , Paul Claussen, Evan M. Duncan, Jeffrey A. Soukup, eds., Foreign Relations...Korea, 1966-1969, Leavenworth Papers no 19 (Fort Leavenworth: Combat Studies Institute, 1991); Amos A. Jordan, Jr ., Issues of National Security in...Representative in Europe, Mutual Security Program, Paris, France, 1952-53. 20 Allan R. Millett, Peter Maslowski, and William B. Feis, For the Common
Advanced protection technology for ground combat vehicles.
Bosse, Timothy G
2012-01-01
Just as highway drivers use radar detectors to attempt to stay ahead of police armed with the latest radar technology, the Armed Forces are locked in a spiral to protect combat vehicles and their crews against the latest threats in both the contemporary operating environment and the anticipated operating environment (ie, beyond 2020). In response to bigger, heavier, or better-protected vehicles, adversaries build and deploy larger explosive devices or bombs. However, making improvements to combat vehicles is much more expensive than deploying larger explosives. In addition, demand is increasing for lighter-weight vehicles capable of rapid deployment. Together, these two facts give the threat a clear advantage in the future. To protect vehicles and crews, technologies focusing on detection and hit avoidance, denial of penetration, and crew survivability must be combined synergistically to provide the best chance of survival on the modern battlefield.
Draft Environmental Impact Statement (DEIS)
2000-07-01
MCB Marine Corps Base MCCDC Marine Corps Combat Development Center MCHC Marine Corps Heritage Center MCHMD Marine Corps History and Museum...other federal agencies. In addition to the MCU, the base is the site of the Marine Corps Officer Candidate School (OCS), the Marine Corps Combat ...at the Air-Ground Museum to support instruction and research on combat doctrine, tactics, and technology. The Air-Ground Museum also loans items to
76 FR 58487 - Notice of Intent To Grant Partially Exclusive License; American Innovations, Inc.
Federal Register 2010, 2011, 2012, 2013, 2014
2011-09-21
... clearance, patrolling, site exploitation, cache finds, area surveillance, joint security stations/combat... invention, U.S. Patent Application Serial Number 13/137521, filed August 24, 2011, entitled ``Bulk Homemade...
McLay, Robert; Spira, James; Reeves, Dennis
2010-12-01
Nowhere is it more important to maintain peek mental functioning than in a combat zone. Conditions ranging from pain to head injury to post-traumatic stress disorder can cause impairments in neuropsychological function and place service members at risk. Medications can sometimes help alleviate these problems, but also have the risk of further slowing cognitive function or impairing reaction time. Standard methods of neuropsychological testing are often not available in a combat environment. New technologies are being advanced that can allow portable, computerized neuropsychological testing to be performed at almost any location. We present a case that demonstrates how the use of such handheld technology can assist a military physician in assessing the influence of medication on reaction time and in determining if and when a service member is ready to return to combat.
Advanced helmet mounted display (AHMD)
NASA Astrophysics Data System (ADS)
Sisodia, Ashok; Bayer, Michael; Townley-Smith, Paul; Nash, Brian; Little, Jay; Cassarly, William; Gupta, Anurag
2007-04-01
Due to significantly increased U.S. military involvement in deterrent, observer, security, peacekeeping and combat roles around the world, the military expects significant future growth in the demand for deployable virtual reality trainers with networked simulation capability of the battle space visualization process. The use of HMD technology in simulated virtual environments has been initiated by the demand for more effective training tools. The AHMD overlays computer-generated data (symbology, synthetic imagery, enhanced imagery) augmented with actual and simulated visible environment. The AHMD can be used to support deployable reconfigurable training solutions as well as traditional simulation requirements, UAV augmented reality, air traffic control and Command, Control, Communications, Computers, Intelligence, Surveillance, and Reconnaissance (C4ISR) applications. This paper will describe the design improvements implemented for production of the AHMD System.
Economics of National Security: Unfunding Terror
2011-07-01
that it cost [al-Qa’ida] about $30 million per year to sustain its activities before 9/11, an amount raised almost entirely through donations .”27...connection between the two threats does imply that efforts to combat transnational criminal enterprises will have an ancillary dampening effect on terror...National Security Strategy 2010, (Washington, D.C.: The White House, May 2010), http://www.whitehouse.gov/ sites/ default /files/rss_viewer
A State Partnership Program (SPP) for Afghanistan
2009-03-01
former eastern bloc countries (Estonia, Latvia, Lithuania ) that emerged from the Cold War independent, but potentially precarious following the fall of the...asserts the necessity to “engage and involve the private sector in reconstruction” and also “to secure and protect the natural resources, energy production ...military working dogs , and combat lifesaver training amongst many38 15 An increasingly important country in terms of CENTCOM’s security cooperation
Combat Trains Command Post (CTCP) Operations
2016-10-28
organization inclusive of logistical, administrative, and maintenance functions. The squadron’s ability to conduct sustained reconnaissance and security...evolving problem as the troop 1SG had the responsibility to tie in all disabled vehicles awaiting parts into the security plan. The crews of those...sand bags. Once the task organization with inclusion of the UMCP was finalized, a standard Class IV package needed to be identified prior to line of
Enhancing Security and Stability in Afghanistan
2016-06-01
and complicated by the Taliban’s April 19, 2016, HPA in Kabul, the Afghan government’s subsequent response imploring Pakistan to take more direct ...USFOR-A contributes to both the RS mission and to the U.S. counterterrorism mission. Preceding OFS, U.S. forces had a direct combat role under...to support the development of the capacity and capability of foreign security forces and their supporting institutions” (Joint Publication 3-22
US Africa Command: Paradigm Change for the Combatant Command
2009-01-01
information operations. 5 The ability to attempt the successfully manage all these elements has been referred to as the DIME Ballet , characterizing...3 U.S. National Security Counsel, National Security Strategy 2006, pp 43. 4Austin Bay, "The DIME Ballet " strategypage. com May 24,2005. http...DIME Ballet " May 24,2005. http://www.strategypage.comlon--point/2005524.aspx. (accessed on February 19, 2009). Eisenhower, Dwight. Presidential
1998-08-07
DISTRIBUTION CODE 13. ABSTRACT (Maximum 200 words) 14 . SUBJECT TERMS 15. NUMBER OF PAGES 77 16. PRICE CODE 17. SECURITY CLASSIFICATION OF...IN A COMBAT ZONE . 14 3 GOING AFTER CACCIATO ...... 25 4 THE THINGS THEY CARRIED 44 5 CONCLUSION ..... 63 NOTES 70 WORKS CONSULTED 72 ill...with the war in varying degrees. O’Brien was born in Austin, Minnesota, in 194 6, but lived his adolescent and teenage years in Worthington
Developments in Science and Technology
1984-01-01
University of Maryland) A New Sutureless Method for the Anastomosis of Blood Vessels 142 J. J. Wozniak Arterial Response to Hemodynamic Siear Stress 145...structure of shipboard combat systems such as the Ae- gis Combat System, Terrier and Tartar New Threat Upgrades, and the multimis- sion DDG-51 Combat...ships and their aircraft are coordinated at the battle group lev- el to achieve new levels of antiair-warfare etfectiveness. The development of long-range
2012-04-01
and Section 1230 of the National Defense Authorization Act for Fiscal...has personally taken ownership of anti-corruption reforms within the Ministry of Defense and is fighting to make the MoD an example for the rest of...progress, the ANA is expected to lack combat enablers and logistics support for the foreseeable future . AFGHAN AIR FORCE The Afghan Air Force’s
Translations on Eastern Europe Political, Sociological, and Military Affairs No. 1311
1976-10-27
Security Class (This Report) UNCLASSIFIED 20. Security Class (This Page UNCLASSIFIED 21. No. of Pages 48 22. Price FORM NTIS-35 (REV...the matter is no longer possible, it is distorted so that the thesis is not disturbed. To combat the right of the Romanians to Transylvania—a right ...of right - wing forces who took refuge in non-communist parties. They gradually be- came active, obstructed the implementation of the government
2013-06-01
Executive Branch report on research , development, and acquisition (RDA) programs to Combat Weapons of Mass Destruction (WMD). Other interagency committees...characterize, secure, disable , and/or destroy a state or non-state actor’s WMD programs and related capabilities in hostile or uncertain environments. Threat...special operations, and security operations to defend against conventionally and unconventionally delivered WMD. WMD Consequence Management. Actions
East Europe Report, Political, Sociological and Military Affairs
1984-10-09
those of a probing attack. The object of this article was to call attention to the many opportunities of the Warsaw Pact ground forces to form combat... attention has been paid to middle-aged men, the group most vulnerable to health problems, their mortality rate has risen. Infant mortality, while lower than...up areas: The unit was divided into reconnaissance, attack, and security troops. The security group took up a position, a couple of reconnaissance
ERIC Educational Resources Information Center
Larence, Eileen R.
2010-01-01
Thousands of gang members in the United States belong to gangs such as MS-13 and 18th Street that are also active in Central American countries. Federal entities with responsibilities for addressing Central American gangs include the National Security Council (NSC); the Departments of Homeland Security (DHS), Justice (DOJ), and State; and the U.S.…
Seizing the Initiative by Establishing the Rule of Law During Combat Operations
2013-02-01
deliberate or crisis action planning. Without security, the conditions necessary to fulfill the other hierarchy of needs in Maslow’s pyramid will...established. The situation that occurred in the streets of Egypt and various locations throughout the Middle East in early 2011 are prime examples... Egypt , a place war had not ravished, provided the population a sense of security through the Egyptian military and police. The rule of law in Egypt
2003-01-01
OPSEC), military deception, psychological operations (PSYOPS), special information operations (IO), information assurance, physical security...nonlethal effects, such as operational 8 Network Centric Warfare Case Study security (OPSEC), military deception, psychological operations (PSYOP...Support Operations Group ASR Alternate Supply Route; or, Ammunition Supply Rate ATACMS Army Tactical Missile System ATARS Advanced
[Endovascular surgery in the war].
Reva, V A; Samokhvalov, I M
2015-01-01
Rapid growth of medical technologies has led to implementation of endovascular methods of diagnosis and treatment into rapidly developing battlefield surgery. This work based on analysing all available current publications generalizes the data on using endovascular surgery in combat vascular injury. During the Korean war (1950-1953) American surgeons for the first time performed endovascular balloon occlusion of the aorta - the first intravascular intervention carried out in a zone of combat operations. Half a century thereafter, with the beginning of the war in Afghanistan (2001) and in Iraq (2003) surgeons of central hospitals of the USA Armed Forces began performing delayed endovascular operations to the wounded. The development of technologies, advent of mobile angiographs made it possible to later on implement high-tech endovascular interventions in a zone of combat operations. At first, more often they performed implantation of cava filters, somewhat afterward - angioembolization of damaged accessory vessels, stenting and endovascular repair of major arteries. The first in the theatre of war endovascular prosthetic repair of the thoracic aorta for severe closed injury was performed in 2008. Russian experience of using endovascular surgery in combat injuries is limited to diagnostic angiography and regional intraarterial perfusion. Despite the advent of stationary angiographs in large hospitals of the RF Ministry of Defence in the early 1990s, endovascular operations for combat vascular injury are casuistic. Foreign experience in active implementation of endovascular technologies to treatment of war-time injuries has substantiated feasibility of using intravascular interventions in tertiary care military hospitals. Carrying out basic training courses on endovascular surgery should become an organic part of preparing multimodality general battlefield surgeons rendering care on the theatre of combat operations.
Combating Terrorism Technology Support Office 2007 Review
2007-01-01
George W. Bush May 23, 2007 It’s a movie cliché: the hero disarms the bomb at the last second, saving the city, averting the crisis, and embracing...Forces warrior who is hunting al Qaeda, and the law-enforcement offi cer or fi rst Preface Combating Terrorism Technology Support Office 2007 Review ...No. 0704-0188 Public reporting burden for the collection of information is estimated to average 1 hour per response, including the time for reviewing
Network Security Validation Using Game Theory
NASA Astrophysics Data System (ADS)
Papadopoulou, Vicky; Gregoriades, Andreas
Non-functional requirements (NFR) such as network security recently gained widespread attention in distributed information systems. Despite their importance however, there is no systematic approach to validate these requirements given the complexity and uncertainty characterizing modern networks. Traditionally, network security requirements specification has been the results of a reactive process. This however, limited the immunity property of the distributed systems that depended on these networks. Security requirements specification need a proactive approach. Networks' infrastructure is constantly under attack by hackers and malicious software that aim to break into computers. To combat these threats, network designers need sophisticated security validation techniques that will guarantee the minimum level of security for their future networks. This paper presents a game-theoretic approach to security requirements validation. An introduction to game theory is presented along with an example that demonstrates the application of the approach.
Maritime Security and the Strait of Malacca: A Strategic Analysis
2006-06-16
Combating Terrorism MAA Monitoring and Action Agencies MCA Malaysian Chinese Association MFG Manila Framework Group MIC Malaysian Indian...of racial tensions that inhibited successful unification. Malaysian Prime Minister Abdul Rahman, and his next three successors were all politically...
2015-09-09
guidance and procedures for testing the performance characteristics of runflat tires as equipped on ground vehicles. 15. SUBJECT TERMS runflat... tire assembly tread life combat flat central tire inflation system (CTIS) 16. SECURITY CLASSIFICATION OF: 17. LIMITATION...3 3.4 Tire Assemblies ..................................................................... 3 3.5 Environmental
Report on the Second KIMS-CNA Conference: The PLA Navys Build-Up and ROK-USN Cooperation
2009-02-01
known as the “Military Combat Preparations” (junshi douzheng zhunbei; 军事斗 争 准备) 4) Strategic missions and objectives (zhanlue renwu he mubiao; 战 略任务和目标...junshi douzheng zhunbei; 军事斗 争 准备) 2) “Net-centric warfare” (wangluo zhongxin zhan; 网络中心 战 ), rather than combat platforms (zuozhan pingtai; 作 战 平台...Military Science Warfare Theory and Strategic Studies Department (zhanzheng lilun he zhanlue yanjiu bu; 战 争 理论和 战 略研究部). 20 security and MOOTW.66 The
2010-01-28
Considerations – Position categories: • Hard • Generic or “ soft ” • Advanced Training – Language requirements – Need for • military, combat and/or field...Analysis (DGMPRA) Presentation to MORS WG Personnel and National Security: A Quantitative Approach 25-28 January 2010 Defence Research and...SUPPLEMENTARY NOTES Personnel and National Security: A Quantitative Approach (Unclass), 25-28 January 2010, Johns Hopkins University Applied Physics
The Challenge of Adaptation: The US Army in the Aftermath of Conflict, 1953-2000
2008-03-01
on U.S. National Security Strategy, 21 June 2001, pp.4-5. Chaired by Senator Carl Levin (D-MI). Retrieved from LexisNexis Congressional Search...and Scott D. Sagan , Moving Targets: Nuclear Strategy and National Security (Princeton: Princeton University Press, 1989). 4. Boyd L. Dastrup, The...KS: Combat Studies Institute, July 1980), available at: http://www. cgsc.army.mil/ carl /resources/csi/heller2/heller2.asp. 13. Condit, HOSD, v.II: The
Soviet Military Intentions in the German Democratic Republic
1977-06-01
Designated Elements of East European Armed Forces Groups of Soviet Forces in the GDR, Poland... Comparativ ~ Data on Soviet and East European Military Capabilities, 19~:-19 lnt·t>rnal :’liumber Total Security Tota l of Sov iet Regular Combat
E-Cheating: Combating a 21st Century Challenge.
ERIC Educational Resources Information Center
McMurtry, Kim
2001-01-01
Discusses electronic cheating in higher education made possible by new technologies. Highlights include statistics on plagiarism; using Web search engines and paper mills; and ways to combat cheating, including academic honesty policies, designing writing assignments with specific goals and instructions, being aware of what is available on the…
Five-Finger Discount: A Look at Shoplifting and Retail Security.
ERIC Educational Resources Information Center
Brown, M. Lindsay
1984-01-01
Shoplifting is as American as income tax fraud and motorists ignoring the 55 m.p.h. speed limit. It knows no age, economic, social, racial, or religious barriers. Shoplifters' motives and methods are examined and ways of combating shoplifting are discussed. (RM)
Security Implications of Human-Trafficking Networks
2007-06-15
57 Analysis of Typologies in Kosovo...Organizations.............................51 Table 6. Two Typologies of Organized Crime/Human Trafficking Networks..............58 1 CHAPTER 1 INTRODUCTION...human trafficking is particularly difficult to combat because, in many countries, the sex industry fuels the expansion of the tourist industry and is
Qatar: Governance, Security, and U.S. Policy
2016-09-07
MENAFATF), a regional financial action task force that coordinates efforts combatting money laundering and terrorism financing. In 2014, the Amir...21 Mark Mazzetti and Matt Apuzzo. “U.S. Relies Heavily on Saudi Money to Support Syrian Rebels.” New York Times, January 23, 2016. http...
MARSnet: Mission-aware Autonomous Radar Sensor Network for Future Combat Systems
2007-05-03
34Parameter estimation for 3-parameter log-logistic distribution (LLD3) by Porne ", Parameter estimation for 3-parameter log-logistic distribu- tion...section V we physical security, air traffic control, traffic monitoring, andvidefaconu s cribedy. video surveillance, industrial automation etc. Each
Perceived demands during modern military operations.
Boermans, Sylvie M; Kamphuis, Wim; Kamhuis, Wim; Delahaij, Roos; Korteling, J E Hans; Euwema, Martin C
2013-07-01
Using a cross-sectional design, this study explored operational demands during the International Security Assistance Force for Afghanistan (2009-2010) across distinct military units. A total of 1,413 Dutch soldiers, nested within four types of units (i.e., combat, combat support, service support, and command support units) filled out a 23-item self-survey in which they were asked to evaluate the extent to which they experienced operational characteristics as demanding. Exploratory factor analysis identified six underlying dimensions of demands. Multivariate analysis of variance revealed that distinct units are characterized by their own unique constellation of perceived demands, even after controlling for previous deployment experience. Most notable findings were found when comparing combat units to other types of units. These insights can be used to better prepare different types of military units for deployment, and support them in the specific demands they face during deployment. Reprint & Copyright © 2013 Association of Military Surgeons of the U.S.
Naval Expeditionary Logistics. Enabling Operational Maneuver From the Sea
1999-01-01
of the core objectives of the President’s national security strategy is to "enhance our [the nation’s] security with effective diplomacy and with... effect on logistics requirements, and some interpretations of OMFTS assume that the concept applies to a future force much lighter than today’s. Others...addition to, or in lieu of, today’s capabilities? The answer has a profound effect on the future combat service support structure of both the Marine
2013-04-08
are the ultimate response authority in their particular city, county , or state. Therefore, a suggestion that the active duty military should “certify...Security, 2010. Pg vii. 5 Steven Bowman . Homeland Security: The Department of Defense’s Role. Congressional Research Service, Washington: The...Library of Congress, 2003. Bowman XX. 6 9/11 Commission. "National Commission on the Terrorist Attacks Upon the United States." 2004. Pg 395 7 DHS, U.S
1981-01-31
Intelligence and Security Command (INSCOM), the US Army Communications Command (USACC), and the US Army Computer Systems Command (USACSC). (3...responsibilities of the US-Army Intelligence and Security Command (INSCOM), the US Army Communications Command (USACC), and the US Army Computer Systems...necessary to sustain, modify, and improve a deployed system’s computer software, as defined by the User or his representative. It includes evaluation
NASA Astrophysics Data System (ADS)
Ignat, V.
2016-08-01
Advanced industrial countries are affected by technology theft. German industry annually loses more than 50 billion euros. The main causes are industrial espionage and fraudulent copying patents and industrial products. Many Asian countries are profiteering saving up to 65% of production costs. Most affected are small medium enterprises, who do not have sufficient economic power to assert themselves against some powerful countries. International organizations, such as Interpol and World Customs Organization - WCO - work together to combat international economic crime. Several methods of protection can be achieved by registering patents or specific technical methods for recognition of product originality. They have developed more suitable protection, like Hologram, magnetic stripe, barcode, CE marking, digital watermarks, DNA or Nano-technologies, security labels, radio frequency identification, micro color codes, matrix code, cryptographic encodings. The automotive industry has developed the method “Manufactures against Product Piracy”. A sticker on the package features original products and it uses a Data Matrix verifiable barcode. The code can be recorded with a smartphone camera. The smartphone is connected via Internet to a database, where the identification numbers of the original parts are stored.
Advanced uncooled infrared system electronics
NASA Astrophysics Data System (ADS)
Neal, Henry W.
1998-07-01
Over the past two decades, Raytheon Systems Company (RSC), formerly Texas Instruments Defense Systems & Electronics Group, developed a robust family of products based on a low- cost, hybrid ferroelectric (FE) uncooled focal-plane array (FPA) aimed at meeting the needs for thermal imaging products across both military and commercial markets. Over the years, RSC supplied uncooled infrared (IR) sensors for applications such as in combat vehicles, man-portable weaponry, personnel helmets, and installation security. Also, various commercial IR systems for use in automobiles, boats, law enforcement, hand-held applications, building/site security, and fire fighting have been developed. These products resulted in a high degree of success where cooled IR platforms are too bulky and costly, and other uncooled implementations are less reliable or lack significant cost advantage. Proof of this great success is found in the large price reductions, the unprecedented monthly production rates, and the wide diversity of products and customers realized in recent years. The ever- changing needs of these existing and potential customers continue to fuel the advancement of both the primary technologies and the production capabilities of uncooled IR systems at RSC. This paper will describe a development project intended to further advance the system electronics capabilities of future uncooled IR products.
Wearable Biomedical Measurement Systems for Assessment of Mental Stress of Combatants in Real Time
Seoane, Fernando; Mohino-Herranz, Inmaculada; Ferreira, Javier; Alvarez, Lorena; Buendia, Ruben; Ayllón, David; Llerena, Cosme; Gil-Pita, Roberto
2014-01-01
The Spanish Ministry of Defense, through its Future Combatant program, has sought to develop technology aids with the aim of extending combatants' operational capabilities. Within this framework the ATREC project funded by the “Coincidente” program aims at analyzing diverse biometrics to assess by real time monitoring the stress levels of combatants. This project combines multidisciplinary disciplines and fields, including wearable instrumentation, textile technology, signal processing, pattern recognition and psychological analysis of the obtained information. In this work the ATREC project is described, including the different execution phases, the wearable biomedical measurement systems, the experimental setup, the biomedical signal analysis and speech processing performed. The preliminary results obtained from the data analysis collected during the first phase of the project are presented, indicating the good classification performance exhibited when using features obtained from electrocardiographic recordings and electrical bioimpedance measurements from the thorax. These results suggest that cardiac and respiration activity offer better biomarkers for assessment of stress than speech, galvanic skin response or skin temperature when recorded with wearable biomedical measurement systems. PMID:24759113
Wearable biomedical measurement systems for assessment of mental stress of combatants in real time.
Seoane, Fernando; Mohino-Herranz, Inmaculada; Ferreira, Javier; Alvarez, Lorena; Buendia, Ruben; Ayllón, David; Llerena, Cosme; Gil-Pita, Roberto
2014-04-22
The Spanish Ministry of Defense, through its Future Combatant program, has sought to develop technology aids with the aim of extending combatants' operational capabilities. Within this framework the ATREC project funded by the "Coincidente" program aims at analyzing diverse biometrics to assess by real time monitoring the stress levels of combatants. This project combines multidisciplinary disciplines and fields, including wearable instrumentation, textile technology, signal processing, pattern recognition and psychological analysis of the obtained information. In this work the ATREC project is described, including the different execution phases, the wearable biomedical measurement systems, the experimental setup, the biomedical signal analysis and speech processing performed. The preliminary results obtained from the data analysis collected during the first phase of the project are presented, indicating the good classification performance exhibited when using features obtained from electrocardiographic recordings and electrical bioimpedance measurements from the thorax. These results suggest that cardiac and respiration activity offer better biomarkers for assessment of stress than speech, galvanic skin response or skin temperature when recorded with wearable biomedical measurement systems.
Chapter 2 evolution of burn management in the u.s. Military: impact on nursing.
Schmidt, Patricia; Mann-Salinas, Elizabeth A
2014-01-01
As the only burn center in the Department of Defense, the U.S. Army Institute of Surgical Research is the primary location for care of service members with burn injuries. The combat operations in Iraq and Afghanistan during the past decade have caused an increase in burn patients. As a result of this increased need, advancements in care were developed. The speed and precision of transporting patients from the battlefield to the burn center has improved over previous conflicts. Technological advancements to support treating complications of burn wound healing were leveraged and are now integrated into daily practice. Clinical decision support systems were developed and deployed at the burn center as well as to combat support hospitals in combat zones. Technology advancements in rehabilitation have allowed more service members to return to active duty or live productive civilian lives. All of these advancements were developed in a patient-centered, interdisciplinary environment where the nurses are integrated throughout the research process and clinical practice with the end goal of healing combat burns in mind.
Hearing Protection Evaluation for the Combat Arms Earplug at Idaho National Laboratory
DOE Office of Scientific and Technical Information (OSTI.GOV)
James Lovejoy
2007-03-01
The Idaho National Laboratory (INL) is managed by Battelle Energy Alliance, LLC (BEA) for the Department of Energy. The INL Protective Security Forces (Pro Force) are involved in training exercises that generate impulse noise by small arms fire. Force-on-force (FOF) training exercises that simulate real world scenarios require the Pro Force to engage the opposition force (OPFOR) while maintaining situational awareness through verbal communications. The Combat Arms earplug was studied to determine if it provides adequate hearing protection in accordance with the requirements of MIL-STD-1474C/D. The Combat Arms earplug uses a design that allows continuous noise through a critical orificemore » while effectively attenuating high-energy impulse noise. The earplug attenuates noise on a non linear scale, as the sound increases the attenuation increases. The INL studied the effectiveness of the Combat Arms earplug with a Bruel & Kjaer (B&K) head and torso simulator used with a selection of small arms to create impulse sound pressures. The Combat Arms earplugs were inserted into the B&K head and torso ears, and small arms were then discharged to generate the impulse noise. The INL analysis of the data indicates that the Combat Arms earplug does provide adequate protection, in accordance with MIL-STD-1474C/D, when used to protect against impulse noise generated by small arms fire using blank ammunition. Impulse noise generated by small arms fire ranged from 135–160 dB range unfiltered un-weighted. The Combat Arms earplug attenuated the sound pressure 10–25 dB depending on the impulse noise pressure. This assessment is consistent with the results of previously published studies on the Combat Arms earplug (see Section 5, “References”). Based upon these result, the INL intends to use the Combat Arms earplug for FOF training exercises.« less
Combating Terrorism: Research Priorities in the Social, Behavioral and Economic Sciences
2006-02-10
the psychological aspects of traumatic stress reactions to the many neurobio - logic systems activated under stress that allow individuals to assess...Agriculture Carl Shapiro U.S. Geological Survey Marc Shepanek NASA Joshua Sinai Department of Homeland Security Marvin Singer Department of Energy Neal
Unlawful Combatants at the Controls: The CIA, Armed RPAS and LOAC
2011-02-16
career judge advocate, beginning military service with the Judge Advocate General’s Corps, United States Navy . After a brief stint in private...of Xe Services, formerly known as Blackwater , the private security firm that has been at the forefront of other allegations concerning civilians
Statistical Observations of Positioning, Navigation, and Timing in a Combat Simulation
2015-03-26
GPS spoofing attacks," in Proceedings of the 18th ACM Conference on Computer and Communications Security, Chicago , 2011. 63 [10] A. Pinker and...D. Shepard , "Characterization of receiver response to spoofing attacks," University of Texas at Austin, Austin, Texas, 2011. 65
Security in MANETs using reputation-adjusted routing
NASA Astrophysics Data System (ADS)
Ondi, Attila; Hoffman, Katherine; Perez, Carlos; Ford, Richard; Carvalho, Marco; Allen, William
2009-04-01
Mobile Ad-Hoc Networks enable communication in various dynamic environments, including military combat operations. Their open and shared communication medium enables new forms of attack that are not applicable for traditional wired networks. Traditional security mechanisms and defense techniques are not prepared to cope with the new attacks and the lack of central authorities make identity verifications difficult. This work extends our previous work in the Biologically Inspired Tactical Security Infrastructure to provide a reputation-based weighing mechanism for linkstate routing protocols to protect the network from attackers that are corrupting legitimate network traffic. Our results indicate that the approach is successful in routing network traffic around compromised computers.
Artificial intelligence and its impact on combat aircraft
NASA Technical Reports Server (NTRS)
Ott, Lawrence M.; Abbot, Kathy; Kleider, Alfred; Moon, D.; Retelle, John
1987-01-01
As the threat becomes more sophisticated and weapon systems more complex to meet the threat, the need for machines to assist the pilot in the assessment of information becomes paramount. This is particularly true in real-time, high stress situations. The advent of artificial intelligence (AI) technology offers the opportunity to make quantum advances in the application of machine technology. However, if AI systems are to find their way into combat aircraft, they must meet certain criteria. The systems must be responsive, reliable, easy to use, flexible, and understandable. These criteria are compared with the current status used in a combat airborne application. Current AI systems deal with nonreal time applications and require significant user interaction. On the other hand, aircraft applications require real time, minimum human interaction systems. In order to fill the gap between where technology is now and where it must be for aircraft applications, considerable government research is ongoing in NASA, DARPA, and three services. The ongoing research is briefly summarized. Finally, recognizing that AI technology is in its embryonic stage, and the aircraft needs are very demanding, a number of issues arise. These issues are delineated and findings are provided where appropriate.
China’s Aircraft Carrier Dilemma
2006-01-01
Indian Ocean Tsunami], 当代海军 [Modern Navy], No. 3, 2005, pp. 44-45. For “non-combat,” “让’‘非 战 争 军事行动’阳光起来” [Letting ‘Non Combat Military Operations...国周边安全环境—决定性因素和趋势展” [China’s Peripheral Security Environment in 2010–2015: Decisive Factors, Trends, and Prospects], 战 略与管理 [Strategy & Manage- ment...no. 4 (2001), p. 37, Foreign Broadcast Information Service (FBIS) CPP20021017000169. See also 唐世平 [Tang Shiping], “再论中国的 大 战 略” [Reconsidering
Abramowitz, Eitan G; Lichtenberg, Pesach
2009-04-01
The authors developed a technique, which they call hypnotherapeutic olfactory conditioning (HOC), for exploiting the ability of scents to arouse potent emotional reactions. During hypnosis, the patient learns to associate pleasant scents with a sense of security and self-control. The patient can subsequently use this newfound association to overcome phobias and prevent panic attacks. This may be especially effective for posttraumatic stress disorder (PTSD) with episodes of anxiety, flashbacks, and dissociation triggered by smells. The authors present 3 cases, patients with needle phobia, panic disorder, and combat-induced PTSD who were successfully treated with the HOC technique.
Composite armored vehicle advanced technology demonstator
DOE Office of Scientific and Technical Information (OSTI.GOV)
Ostberg, D.T.; Dunfee, R.S.; Thomas, G.E.
1996-12-31
Composite structures are a key technology needed to develop future lightweight combat vehicles that are both deployable and survivable. The Composite Armored Vehicle Advanced Technology Demonstrator Program that started in fiscal year 1994 will continue through 1998 to verily that composite structures are a viable solution for ground combat vehicles. Testing thus far includes material characterization, structural component tests and full scale quarter section tests. Material and manufacturing considerations, tests, results and changes, and the status of the program will be described. The structural component tests have been completed successfully, and quarter section testing is in progress. Upon completion ofmore » the critical design review, the vehicle demonstrator will be Fabricated and undergo government testing.« less
Combat Methamphetamine Enhancement Act of 2009
Sen. Feinstein, Dianne [D-CA
2009-01-15
House - 08/19/2009 Referred to the Subcommittee on Crime, Terrorism, and Homeland Security. (All Actions) Notes: For further action, see H.R.2923, which became Public Law 111-268 on 10/12/2010. Tracker: This bill has the status Passed SenateHere are the steps for Status of Legislation:
2010-03-01
allows the programmer to use the English language in an expressive manor while still maintaining the logical structure of a programming language ( Pressman ...and Choudhury Tanzeem. 2000. Face Recognition for Smart Environments, IEEE Computer, pp. 50–55. Pressman , Roger. 2010. Software Engineering A
76 FR 11279 - Agency Information Collection Activities: Extension of a Currently Approved Collection
Federal Register 2010, 2011, 2012, 2013, 2014
2011-03-01
... (institutions of higher education) of the Grants to Reduce Violent Crimes Against Women on Campus Program whose... of higher education to develop and strengthen effective security and investigation strategies to combat violent crimes against women on campuses, including domestic violence, dating violence, sexual...
78 FR 75209 - Federal Leadership on Energy Management
Federal Register 2010, 2011, 2012, 2013, 2014
2013-12-10
... Leadership on Energy Management Memorandum for the Heads of Executive Departments and Agencies In order to create a clean energy economy that will increase our Nation's prosperity, promote energy security, combat... removing 1.5 million cars from the road. Today I am establishing new goals for renewable energy as well as...
The Brigade Combat Team - Stability and Security Force Assistance Operations
2010-02-22
it makes absolute sense to embed these transition teams within the brigade, assigned within the brigade. The beauty of this is that it allows the...accessed October 19, 2009). 22 COL Peter Newell, “Department of Defense Bloggers Roundtable with COL Peter Newell, Subject: Completion of Advise and
Combating Fear and Restoring Safety in Schools. Juvenile Justice Bulletin.
ERIC Educational Resources Information Center
Arnette, June L.; Walsleben, Marjorie C.
This bulletin examines manifestations of street violence (bullying, gangs, weapons possession and use, substance abuse, and community violence) threatening schools and describes steps that concerned citizens are taking to restore security and calm. Schoolyard bullying can be mitigated by widely publicized rules, buddy systems, parent education…
Friendly Combat Casualties and Operational Narratives
2015-06-21
turn for the worse on March 31, 2004. On that date, insurgents ambushed a convoy operated by the private security firm Blackwater in the center of the...2011), IV-6. 95 Ibid., III-17 34 Despite its name, the term operational risk management (ORM) as used by the United States Navy reflects
2016-04-01
Sanitation, and Hygiene WFP World Food Programme WHO World Health Organization Unclassified Unclassified xii This page intentionally left blank...Insurgency Natural Disaster Contamination Visibility Disposition Distribution Sourcing Prioritization Security Financial U.S. Military Services Combatant...supply; restrictions on sourcing; contamination concerns (IV solutions) Small in size; multiple variants with limited interchangeability; requires
78 FR 14625 - National Consumer Protection Week, 2013
Federal Register 2010, 2011, 2012, 2013, 2014
2013-03-06
... Security Proclamation 8939--100th Anniversary of the United States Department of Labor Order of March 1..., we established a new unit to combat fraud and investigate the abusive lending and mortgage packaging... across the Federal Government joined with consumer advocates to launch www.NCPW.gov , an online resource...
75 FR 5485 - Blue Ribbon Commission on America's Nuclear Future
Federal Register 2010, 2011, 2012, 2013, 2014
2010-02-03
... Commission on America's Nuclear Future Memorandum for the Secretary of Energy Expanding our Nation's capacity to generate clean nuclear energy is crucial to our ability to combat climate change, enhance energy... the safe, secure, and responsible use of nuclear energy. These efforts are critical to accomplishing...
A Decisive Point in the War on Terrorism
2007-04-05
in their embryos .”4 The vision articulated in The National Security Strategy for Combating Terrorism requires winning not only the close battles...common set of ideas about the nature and destiny of the world, and a common goal of ushering in totalitarian rule. What unites the movement is the
1986-02-12
for combatting diseases and pests , a precise technology when supplying it with technical resources, effective forms of labor organization and first... combat waste and to decrease the range of grades. Our branch has many collectives which constantly manufacture good products such as the Kolomna...foxtail, wild buckwheats [razvesistaya and vyunkovaya grechishka], goosefoot, stickseed, hemp nettle , field morning glory, knapweed, thistles), which
DOE Office of Scientific and Technical Information (OSTI.GOV)
None
Argonne National Laboratory researchers have invented a technology for recovering oil and refined petroleum products from bodies of water. Oleo Sponge offers several key advantages over the technologies and techniques that are currently used to combat this problem.
Designing Opportunities for Transformation with Emerging Technologies
ERIC Educational Resources Information Center
Veletsianos, George
2011-01-01
In this article, the author argues that technology use in education has focused on combating instructional problems and inefficiencies. While technology use for such purposes is viable and important, the author proposes that practitioners and researchers in this field utilize emerging technologies as a means to provide opportunities for personally…
1993-04-01
Homme /Machine) Aocesion For ; 1 [ NTIS ’ D:i: Ü J-H CRA& l TAB 3...I’utilisateur. - Enfm, utilise avec le bouton droit de la souris, le poten- tiom&tre de temps 6coul6 permet de charger une alterna- tive dans le syst&me...a a a a rn£Q £ OB E o 15 l | I? ^©J&Mß) NATO ^ OTAN 7 RUE ANCELLE • 92200 NEUILLY-SÜR-SEINE DIFFUSION DES PUBLICATIONS FRANCE AGARD
Defense Science Board 2003 Summer Study on DoD Roles and Missions in Homeland Security. Volume 1
2003-11-01
were used to develop a web-based "deployment picture." (A little money -a few million dollars-can go a long way in the combatant commands). OSD critical...AND MISSIONS f1 HOMELAND SECURJTY 91 APP8VD&XH Dr. Mark Harper U.S. Naval Academy Mr. Art Money Private Consultant Mr. Walter Morrow, Jr. MIT Lincoln...Protection BrigGen Irv Halter Discussion Mr. John Lauder Overview of NRO support to Homeland Security Mr. Brian Hack and Mr. Alan NRO Comms - NRO backbone
Analysis of the Proposed Use of Minuteman Missile Combat Crew Members as Maintenance Extenders.
1984-09-01
which was actually closed and secured after duty hours by a large bank vault-type door. D022. Acronym for the Plans and Intelligence Division, a DO...was secured with a bank vault-type door. 12 p I I I Maintenance I I----lt --u ----ty I -- -- I Training I I Mantenance I I I OHMS I FMMS...adding more duties? Are you crazy? -. OHMS Shop Chiefs .. every time I go down to the LCC the MCCMs are sitting around in their pajamas reading dirty
UAS Detection Classification and Neutralization: Market Survey 2015
DOE Office of Scientific and Technical Information (OSTI.GOV)
Birch, Gabriel Carisle; Griffin, John Clark; Erdman, Matthew Kelly
The purpose of this document is to briefly frame the challenges of detecting low, slow, and small (LSS) unmanned aerial systems (UAS). The conclusion drawn from internal discussions and external reports is the following; detection of LSS UAS is a challenging problem that can- not be achieved with a single detection modality for all potential targets. Classification of LSS UAS, especially classification in the presence of background clutter (e.g., urban environment) or other non-threating targets (e.g., birds), is under-explored. Though information of avail- able technologies is sparse, many of the existing options for UAS detection appear to be in theirmore » infancy (when compared to more established ground-based air defense systems for larger and/or faster threats). Companies currently providing or developing technologies to combat the UAS safety and security problem are certainly worth investigating, however, no company has provided the statistical evidence necessary to support robust detection, identification, and/or neutralization of LSS UAS targets. The results of a market survey are included that highlights potential commercial entities that could contribute some technology that assists in the detection, classification, and neutral- ization of a LSS UAS. This survey found no clear and obvious commercial solution, though recommendations are given for further investigation of several potential systems.« less
Urban Combat Advanced Training Technology (Technologie Avancee d’Entrainement au Combat Urbain)
2010-04-01
JRTC Joint Readiness Training Center JRTC-MOUT-IS Joint Readiness Training Center Military Operations in Urbanised Terrain Instrumentation System...did not support or identify joint or multi-national requirements for conducting effective military operations in an urbanised environment. Very few...Requirements Document (ORD) for the Joint Readiness Training Center (JRTC) Military Operations on Urbanised Terrain (MOUT) Instrumentation System
Display integration for ground combat vehicles
NASA Astrophysics Data System (ADS)
Busse, David J.
1998-09-01
The United States Army's requirement to employ high resolution target acquisition sensors and information warfare to increase its dominance over enemy forces has led to the need to integrate advanced display devices into ground combat vehicle crew stations. The Army's force structure require the integration of advanced displays on both existing and emerging ground combat vehicle systems. The fielding of second generation target acquisition sensors, color digital terrain maps and high volume digital command and control information networks on these platforms define display performance requirements. The greatest challenge facing the system integrator is the development and integration of advanced displays that meet operational, vehicle and human computer interface performance requirements for the ground combat vehicle fleet. The subject of this paper is to address those challenges: operational and vehicle performance, non-soldier centric crew station configurations, display performance limitations related to human computer interfaces and vehicle physical environments, display technology limitations and the Department of Defense (DOD) acquisition reform initiatives. How the ground combat vehicle Program Manager and system integrator are addressing these challenges are discussed through the integration of displays on fielded, current and future close combat vehicle applications.
2014-07-01
likely yielded higher operational tempo, greater security concerns, more hazardous environ mental exposures, exaggerated daily operational stressors,43...Burmeister M: PER3 polymorphism and insomnia severity in alcohol dependence. Sleep 2012; 35(4): 571-7. 10. Pigeon WR. Pinquart M, Conner K: Meta
DefenseLink Feature: Travels with Gates
who return from combat with post traumatic stress syndrome. FORT BLISS, Texas, May 1, 2008 - The Defense Department is working to reduce stress on the force and improve quality of life for the troops stress will no longer be seen as an obstacle to getting a government security clearance, Defense
Analysis of Security Contractors in Deployed Environments
2006-12-01
35 2. Proper Training and Education .......................................................36 3. Improve Overall Contract Visibility...like to acknowledge the work of P. W. Singer , author of the book titled “Corporate Warriors,” whose dedicated research and thorough analysis on the...skills, including combat operations, strategic planning, intelligence, risk assessment, operational support, training , and technical skills.”3 CPFF
The USA PATRIOT Act: Archival Implications
ERIC Educational Resources Information Center
Trinkaus-Randall, Gregor
2005-01-01
In October 2001, Congress passed the USA PATRIOT Act to strengthen the ability of the U.S. government to combat terrorism. Unfortunately, some sections of the Act strike at core values and practices of libraries and archives, especially in the areas of record keeping, privacy, confidentiality, security, and access to the collections. This article…
The Effects of Combat Exposure on Reenlistment and Attrition
2011-03-01
confounded with the job assignment, but the amount of bias should be minimal given that most people would stay within their trained specialty. C...SECURITY CLASSIFICATION OF ABSTRACT Unclassified 20. LIMITATION OF ABSTRACT UU NSN 7540-01-280-5500 Standard Form 298 (Rev. 2-89) Prescribed...CONCLUSIONS ............................................................................................87 B. STUDY LIMITATIONS
Rapid Assessment of Individual Soldier Operational Readiness Final Report CRADA No. TC02104.0
DOE Office of Scientific and Technical Information (OSTI.GOV)
Turteltaub, K.; Mapes, J.
This was a collaborative effort between Lawrence Livermore National Security (LLNS) (formerly The Regents of the University of California), Lawrence Livermore National Laboratory (LLNL) and Rules Based Medicine, Inc. {RBM), to identify markers in blood that would be candidates for determining the combat readiness of troops.
Maintaining the All Volunteer Army to Meet Future Land Force Challenges
2009-03-25
NIC ) Global Trends report5, or the source documents for the Army’s most recently published strategy forecast the future security environment and how the...Forces and others conducting combat operations against Al Qaeda.”32 Tom Ricks later quotes Stephen Biddle , an occasional advisor to General Petreaus – he
Security of the Homeland (A National Guard Perspective)
2008-03-13
other than typical war fight missions. Since the Guard had non- deployed combat arms or maneuver structure, “in lieu” missions became a norm . A New...Page 4. 14 Beverly Bell, NEMA Sr Policy Analyst, “The Future of EMAC,” available at http://www.emacweb.org, Internet accessed January 2008, Page
RxPATROL: a Web-based tool for combating pharmacy theft.
Smith, Meredith Y; Graham, J Aaron; Haddox, J David; Steffey, Amy
2009-01-01
To report the incidence of pharmacy-related burglaries and robberies and characteristics of pharmacies where such crimes have occurred using recent data from Rx Pattern Analysis Tracking Robberies & Other Losses (RxPATROL), a national Web-based information clearinghouse on pharmacy-related theft of prescription medications and over-the-counter products. Descriptive, nonexperimental study. United States between 2005 and 2006. Not applicable. Not applicable. Number of pharmacy theft reports received; incident type, date, and location; point of entry; and pharmacy security features. Between 2005 and 2006, 202 pharmacy burglary and 299 pharmacy robbery reports from 45 different states were filed with RxPATROL. More than 70% of pharmacies reporting such crimes lacked a security camera. Among those reporting a burglary, 60% lacked dead bolt locks, a solid exterior door, a motion detector device, or a safe or vault for storage of controlled substances. Burglars most often obtained access to the pharmacy via the front door. RxPATROL is a Web-based tool that can assist pharmacies and law enforcement in collaborating more effectively to combat and prevent pharmacy-related crimes.
Elliott, Luther; Golub, Andrew; Price, Matthew; Bennett, Alexander
2015-08-01
This article examines recent combat veterans' experiences of "first-person shooter" (FPS) gaming and its relationship to posttraumatic stress disorder (PTSD). Current PTSD treatment approaches increasingly use virtual reality (VR) technologies, which have many similarities with FPS games. To explore these similarities, this article presents six case studies from recently separated veterans in New York City who reported both current PTSD symptoms and regular use of combat-themed FPS games. In open-ended interviews, participants discussed a range of benefits as well as the importance of regulating use and avoiding particular contextual dimensions of gaming to maintain healthy gaming habits. Findings demonstrate the need for more comprehensive study and dissemination of best-practices information about FPS gaming in the context of combat-related PTSD symptomatology.
Floros, Georgios D; Siomos, Konstantinos E; Fisoun, Virginia; Dafouli, Evaggelia; Geroukalis, Dimitrios
2013-06-01
The introduction of new technological media worldwide has had a number of unfortunate side effects for some adolescents, including cases of bullying others through the new media (cyberbullying) and over-involvement to the point of addiction. We examine the epidemiology of cyberbullying in a Greek setting, compare it with earlier data, determine the impact of any related psychosocial factors, and propose measures to combat the phenomenon. A cross-sectional study of the entire adolescent high-school student population of the island of Kos examined the relationship between their experiences of Internet cyberbullying and respective parental characteristics, including aspects of psychological bonding and online security measures. The sample consisted of 2017 students (51.8% boys, 48.2% girls). Comparisons are made with results obtained from an earlier survey in the same setting, 2 years earlier. There was a significant rise in reported experiences of Internet cyberbullying over the 2-year period. Security practices exercised by parents had a protective role with regards to whether a child had been cyberbullied, yet failed to prevent the perpetration of online victimization. A regression model indicated that impulsive use of the Internet and related online activities were predictive of whether an adolescent victimized others online. Cyberbullying frequency with regards to both victims and victimizers was high and associated with online impulsiveness, pointing to the possible existence of some commonalities. Further research is necessary to ascertain common underlying psychological factors and neurobiology. © 2013, American School Health Association.
Filkins, Barbara L; Kim, Ju Young; Roberts, Bruce; Armstrong, Winston; Miller, Mark A; Hultner, Michael L; Castillo, Anthony P; Ducom, Jean-Christophe; Topol, Eric J; Steinhubl, Steven R
2016-01-01
The rapid growth in the availability and incorporation of digital technologies in almost every aspect of our lives creates extraordinary opportunities but brings with it unique challenges. This is especially true for the translational researcher, whose work has been markedly enhanced through the capabilities of big data aggregation and analytics, wireless sensors, online study enrollment, mobile engagement, and much more. At the same time each of these tools brings distinctive security and privacy issues that most translational researchers are inadequately prepared to deal with despite accepting overall responsibility for them. For the researcher, the solution for addressing these challenges is both simple and complex. Cyber-situational awareness is no longer a luxury-it is fundamental in combating both the elite and highly organized adversaries on the Internet as well as taking proactive steps to avoid a careless turn down the wrong digital dark alley. The researcher, now responsible for elements that may/may not be beyond his or her direct control, needs an additional level of cyber literacy to understand the responsibilities imposed on them as data owner. Responsibility lies with knowing what you can do about the things you can control and those you can’t. The objective of this paper is to describe the data privacy and security concerns that translational researchers need to be aware of, and discuss the tools and techniques available to them to help minimize that risk. PMID:27186282
Filkins, Barbara L; Kim, Ju Young; Roberts, Bruce; Armstrong, Winston; Miller, Mark A; Hultner, Michael L; Castillo, Anthony P; Ducom, Jean-Christophe; Topol, Eric J; Steinhubl, Steven R
2016-01-01
The rapid growth in the availability and incorporation of digital technologies in almost every aspect of our lives creates extraordinary opportunities but brings with it unique challenges. This is especially true for the translational researcher, whose work has been markedly enhanced through the capabilities of big data aggregation and analytics, wireless sensors, online study enrollment, mobile engagement, and much more. At the same time each of these tools brings distinctive security and privacy issues that most translational researchers are inadequately prepared to deal with despite accepting overall responsibility for them. For the researcher, the solution for addressing these challenges is both simple and complex. Cyber-situational awareness is no longer a luxury-it is fundamental in combating both the elite and highly organized adversaries on the Internet as well as taking proactive steps to avoid a careless turn down the wrong digital dark alley. The researcher, now responsible for elements that may/may not be beyond his or her direct control, needs an additional level of cyber literacy to understand the responsibilities imposed on them as data owner. Responsibility lies with knowing what you can do about the things you can control and those you can't. The objective of this paper is to describe the data privacy and security concerns that translational researchers need to be aware of, and discuss the tools and techniques available to them to help minimize that risk.
Somebody Help...Techno-Stress is Here!
ERIC Educational Resources Information Center
Rich, Michelle N.
1998-01-01
Discusses how to combat techno-stress, based on experiences of Archbishop Wood High School, Philadelphia, Pennsylvania. Addresses faculty training; selecting and purchasing technology; students as sources of technology maintenance; and senior citizen volunteers as lab supervisors. (AEF)
Women Warriors: Why the Robotics Revolution Changes the Combat Equation
2015-01-01
combat fight due in large part to advances in robotics and autonomous systems. From exoskeletons to robotic mules, technology is reducing the...kick-started innovation in this area in 2001 by funding labs, industry, and universities under the Exoskeletons for Human Performance Augmentation...and fledgling programs of record. The Human Load Carrier (HULC), for example, is a hydraulic- powered exoskeleton made of titanium that allows
Effectiveness Testing and Evaluation of Non-Lethal Weapons for Crowd Management
2014-06-01
and Combat Service Support• Program Executive Office Ground Combat Systems • Program Executive Office Soldier TACOM LCMC MG Michael J. Terry Assigned...technologies and explosive ordnance disposal Fire Control: Battlefield digitization; embedded system software; aero ballistics and telemetry ARDEC...influence predictive variables Introduction Crowd Behavior Research at TBRL UNCLASSIFIED 7 Data Measurement • Vicon V8i system • 24 cameras • 120 fps
Ravindra, Vijay M; Wallace, Scott A; Vaidya, Rahul; Fox, W Christopher; Klugh, Arnett R; Puskas, David; Park, Min S
2016-02-01
The Role III, Multinational Medical Unit at Kandahar Air Field, Afghanistan, was established to provide combat casualty care in theater for International Security Assistance Forces, Afghanistan National Security Forces, and local nationals during Operation Enduring Freedom-Afghanistan. The authors describe their experience of treating unstable lumbar spine fractures with orthopedic extremity instrumentation sets from January 2007 to January 2008 and November 2010 to May 2011. During the study periods, 15 patients comprising Afghanistan National Security Forces and local nationals presented to the medical facility for treatment of unstable lumbar spine fractures. The patients underwent surgery for either anterior corpectomy and instrumented fusion (n = 5) or posterior instrumented fusion (n = 10). Because of periodic scarcity of spinal instrumentation sets, orthopedic extremity instrumentation sets were used (Synthes Large Fragment LCP Instrument and Implant Set) for spinal stabilization. Immediate postoperative standing and sitting plain radiographs demonstrated no evidence of fracture progression or immediate hardware failure. One patient was seen in follow-up at 4 weeks and demonstrated construct stability on follow-up radiographs. In the combat environment with sparse resources, unstable spine fractures may potentially be treated using instrumentation not specifically designed for spinal implantation. This is an off-label use, and the authors do not recommend the use of these techniques as standard treatment in most medical environments. Copyright © 2016 Elsevier Inc. All rights reserved.
Security Informatics Research Challenges for Mitigating Cyber Friendly Fire
DOE Office of Scientific and Technical Information (OSTI.GOV)
Carroll, Thomas E.; Greitzer, Frank L.; Roberts, Adam D.
This paper addresses cognitive implications and research needs surrounding the problem of cyber friendly re (FF). We dene cyber FF as intentional o*ensive or defensive cyber/electronic actions intended to protect cyber systems against enemy forces or to attack enemy cyber systems, which unintentionally harms the mission e*ectiveness of friendly or neutral forces. We describe examples of cyber FF and discuss how it ts within a general conceptual framework for cyber security failures. Because it involves human failure, cyber FF may be considered to belong to a sub-class of cyber security failures characterized as unintentional insider threats. Cyber FF is closelymore » related to combat friendly re in that maintaining situation awareness (SA) is paramount to avoiding unintended consequences. Cyber SA concerns knowledge of a system's topology (connectedness and relationships of the nodes in a system), and critical knowledge elements such as the characteristics and vulnerabilities of the components that comprise the system and its nodes, the nature of the activities or work performed, and the available defensive and o*ensive countermeasures that may be applied to thwart network attacks. We describe a test bed designed to support empirical research on factors a*ecting cyber FF. Finally, we discuss mitigation strategies to combat cyber FF, including both training concepts and suggestions for decision aids and visualization approaches.« less
NASA Technical Reports Server (NTRS)
1973-01-01
Applications of aerospace technology to biomedical science are described. Recent research and development of specific techniques, services, and equipment adopted by physicians to help combat disease and disability are reviewed.
2002-12-19
The first X-45A Unmanned Combat Air Vehicle (UCAV) technology demonstrator completed its sixth flight on Dec. 19, 2002, raising its landing gear in flight for the first time. The X-45A flew for 40 minutes and reached an airspeed of 195 knots and an altitude of 7,500 feet. Dryden is supporting the DARPA/Boeing team in the design, development, integration, and demonstration of the critical technologies, processes, and system attributes leading to an operational UCAV system. Dryden support of the X-45A demonstrator system includes analysis, component development, simulations, ground and flight tests.
NASA Astrophysics Data System (ADS)
Choudhary, Piyush; Srivastava, Rakesh K.; Nath Mahendra, Som; Motahhir, Saad
2017-08-01
In today’s scenario to combat with climate change effects, there are a lot of reasons why we all should use renewable energy sources instead of fossil fuels. Solar energy is one of the best options based on features like good for the environment, independent of electricity prices, underutilized land, grid security, sustainable growth, etc. This concept paper is oriented primarily focused on the use of Solar Energy for the crude oil heating purpose besides other many prospective industrial applications to reduce cost, carbon footprint and moving towards a sustainable and ecologically friendly Oil & Gas Industry. Concentrated Solar Power technology based prototype system is proposed to substitute the presently used system based on natural gas burning method. The hybrid system which utilizes the solar energy in the oil and gas industry would strengthen the overall field working conditions, safety measures and environmental ecology. 40% reduction on natural gas with this hybrid system is estimated. A positive implication for an environment, working conditions and safety precautions is the additive advantage. There could also decrease air venting of CO2, CH4 and N2O by an average of 30-35%.
More than Just a Game? Combat-Themed Gaming Among Recent Veterans with Posttraumatic Stress Disorder
Golub, Andrew; Price, Matthew; Bennett, Alexander
2015-01-01
Abstract This article examines recent combat veterans' experiences of “first-person shooter” (FPS) gaming and its relationship to posttraumatic stress disorder (PTSD). Current PTSD treatment approaches increasingly use virtual reality (VR) technologies, which have many similarities with FPS games. To explore these similarities, this article presents six case studies from recently separated veterans in New York City who reported both current PTSD symptoms and regular use of combat-themed FPS games. In open-ended interviews, participants discussed a range of benefits as well as the importance of regulating use and avoiding particular contextual dimensions of gaming to maintain healthy gaming habits. Findings demonstrate the need for more comprehensive study and dissemination of best-practices information about FPS gaming in the context of combat-related PTSD symptomatology. PMID:26182214
2017-06-09
89 1 CHAPTER 1 INTRODUCTION Maritime partnerships and maritime security and safety are...largely depends on the victims’ safety . They rarely killed crewmembers under normal circumstances.52...Korea, Kuwait, Malaysia , The Netherlands, New Zealand, Norway, Pakistan, The Philippines, Portugal, Saudi Arabia, Seychelles, Singapore, Spain, Thailand
Web-PE: Internet-Delivered Prolonged Exposure Therapy for PTSD
2015-10-01
order to meet the growing demand for effective and efficient treatment for posttraumatic stress disorder ( PTSD ) in a timely manner. Web-treatments...posttraumatic stress disorder ( PTSD ) in a timely manner. Effective EBTs for PTSD are available, but barriers to accessing care can deter military...Exposure, combat, psychological treatment, military, psychotherapy, trauma, posttraumatic stress , posttraumatic stress disorder 16. SECURITY
Adaptive Disclosure: A Combat-Specific PTSD Treatment
2015-10-01
operational stressors develop posttraumatic stress disorder ( PTSD ). Evidence-based interventions for treating PTSD , however, were not developed for military...experience deployment-related psychological health problems, such as posttraumatic stress disorder ( PTSD ; e.g., Hoge et al., 2004; see Litz & Schlenger...used to determine treatment efficacy. 15. SUBJECT TERMS Active-duty, Marine Corps, Posttraumatic stress disorder , Cognitive Therapy 16. SECURITY
National Strategy for Combating Terrorism: Prospects and Implications
2003-12-01
America’s security, to bolster America’s economic prosperity, and to promote democracy and human rights...their canine explosives detection programs. Customs increased searches of passengers, baggage, and cargo leaving the US. Finally, the ATF was...The Bush strategy is built around three goals: political and economic freedom, peaceful relations with other states, and respect for human dignity
U.S. Department of Defense deems climate change a national security threat
NASA Astrophysics Data System (ADS)
Wendel, JoAnna
2014-10-01
Climate change is a "threat multiplier," according to a new report by the U.S. Department of Defense (DOD). The report, entitled 2014 Climate Change Adaptation Roadmap and released on 13 October, lays out ways in which DOD will work with other nations to combat the challenges associated with, adapt to, and mitigate climate change.
Planning Combat Outposts to Maximize Population Security
2010-06-01
Abraham Maslow defined incremental layers of needs that require fulfillment and that can explain people’s motivations in life [12]. The needs at a lower...Hildebrant I ,e Certified by: The Charles Stark Draper Laboratory, Inc. Technical Supervisor Stephen C. Graves Professor, Abraham J. Siegel...22 Figure 2-4: Maslow Hierarchy of Needs ................................................................................. 27 Figure 3-1
An Exploratory [Silver] Path to Interagency Reconstruction
2011-05-31
problem is different, even if there are similarities with previous experiences , so planners use lessons learned from previous experiences at their...Department of State, especially the US Agency for International Development, has extensive development experience , while the Department of Defense...development experience , while the Department of Defense knows combat and security operations. Integration comes in the middle ground, where we
Rep. Johnson, Eddie Bernice [D-TX-30
2014-05-21
House - 07/21/2014 Referred to the Subcommittee on Crime, Terrorism, Homeland Security, and Investigations. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
2009-05-04
inconvenience and denial of Internet service, CNAs pose a threat to national security, if the right computer is hacked , to every day operations, if baking...expert J3: Current Operations Rep Private Sector/Civilian: cyber/CNA SME J5 Future Operations Rep Private Sector/Civilian: cyber/CND SME Table 2
Digital control of highly augmented combat rotorcraft
NASA Technical Reports Server (NTRS)
Tischler, Mark B.
1987-01-01
Proposed concepts for the next generation of combat helicopters are to be embodied in a complex, highly maneuverable, multiroled vehicle with avionics systems. Single pilot and nap-of-the-Earth operations require handling qualities which minimize the involvement of the pilot in basic stabilization tasks. To meet these requirements will demand a full authority, high-gain, multimode, multiply-redundant, digital flight-control system. The gap between these requirements and current low-authority, low-bandwidth operational rotorcraft flight-control technology is considerable. This research aims at smoothing the transition between current technology and advanced concept requirements. The state of the art of high-bandwidth digital flight-control systems are reviewed; areas of specific concern for flight-control systems of modern combat are exposed; and the important concepts are illustrated in design and analysis of high-gain, digital systems with a detailed case study involving a current rotorcraft system. Approximate and exact methods are explained and illustrated for treating the important concerns which are unique to digital systems.
Emerging Technologies and MOUT
DOE Office of Scientific and Technical Information (OSTI.GOV)
YONAS,GEROLD; MOY,TIMOTHY DAVID
Operating in a potentially hostile city is every soldier's nightmare. The staggering complexity of the urban environment means that deadly threats--or non-combatants-may lurk behind every corner, doorway, or window. Urban operations present an almost unparalleled challenge to the modern professional military. The complexity of urban operations is further amplified by the diversity of missions that the military will be called upon to conduct in urban terrain. Peace-making and peace-keeping missions, urban raids to seize airports or WMD sites or to rescue hostages, and extended urban combat operations all present different sorts of challenges for planners and troops on the ground.more » Technology almost never serves as a magic bullet, and past predictions of technological miracles pile high on the ash heap of history. At the same time, it is a vital element of planning in the modern age to consider and, if possible, take advantage of emerging technologies. We believe that technologies can assist military operations in urbanized terrain (MOUT) in three primary areas, which are discussed.« less
Medical Technology Base Master Plan
1990-03-01
methodologes to evaluate off ectiveness of current and new Integrated protectivb equxipment systems. The failure of the system designer to adequately consider...With animal studies to use fewer than one-tenth the nu~r~e of aniimals used In standard factorial experimental designs , and "* Preliminary development of...research and developmnent have Produced Cost savings as well as sustained and augmented combat and non -combat rniss~on effectiveness. Examples 0f the Armys
2002-01-01
systems many key automation and robotic technologies necessary for the autonomous operations desired of future systems. GDLS is in charge of the AAAV...TITLE AND SUBTITLE 2002 Industry Studies: Land Combat Systems 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6 . AUTHOR(S) 5d...PROJECT NUMBER 5e. TASK NUMBER 5f. WORK UNIT NUMBER 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) The Industrial College of the Armed Forces
Operation Noble Eagle and the Use of Combat Air Patrols for Homeland Defense
2008-12-01
aviation security , together with the absence of terrorist attacks on the homeland and of no actionable intelligence indicating an imminent air threat in America. The following sub-areas were researched to help evaluate and recommend changes to the current ONE CAP policy: the history of air defense in America; U.S. air defense mistakes on 9/11 and the evolution of ONE; improvements in the intelligence community and aviation security since 9/11; specific threats to aviation and the risk of another 9/11-style attack in the United States; and the cost and
Winds of War: Enhancing Civilian and Military Partnerships to Assure Readiness: White Paper.
Schwab, C William
2015-08-01
This White Paper summarizes the state of readiness of combat surgeons and provides action recommendations that address the problems of how to train, sustain, and retain them for future armed conflicts. As the basis for the 2014 Scudder Oration, I explored how to secure an improved partnership between military and civilian surgery, which would optimize learning platforms and embed military trauma personnel at America's academic medical universities for trauma combat casualty care (TCCC). To craft and validate these recommendations, I conducted an integrative and iterative process of literature reviews, interviews of military and civilian leaders, and a survey of military-affiliated surgeons. The recommended action points advance the training of combat surgeons and their trauma teams by creating an expanded network of TCCC training sites and sourcing the cadre of combat-seasoned surgeons currently populating our civilian and military teaching hospitals and universities. The recommendation for the establishment of a TCCC readiness center or command within the Medical Health System of the Department of Defense includes a military and civilian advisory board, with the reformation of a think tank of content experts to address high-level solutions for military medicine, readiness, and TCCC. Copyright © 2015 American College of Surgeons. Published by Elsevier Inc. All rights reserved.
History of the development of rocket technology and astronautics in Poland
NASA Technical Reports Server (NTRS)
Geisler, W.
1977-01-01
The development of rocket technology in Poland is outlined. The history cites 13th century use of war rockets in combating Tartars as well as 20th century studies of the future and reality of space flights.
48 CFR 552.239-70 - Information Technology Security Plan and Security Authorization.
Code of Federal Regulations, 2011 CFR
2011-10-01
... 48 Federal Acquisition Regulations System 4 2011-10-01 2011-10-01 false Information Technology... Text of Provisions and Clauses 552.239-70 Information Technology Security Plan and Security Authorization. As prescribed in 539.7002(a), insert the following provision: Information Technology Security...
48 CFR 552.239-70 - Information Technology Security Plan and Security Authorization.
Code of Federal Regulations, 2014 CFR
2014-10-01
... 48 Federal Acquisition Regulations System 4 2014-10-01 2014-10-01 false Information Technology... Text of Provisions and Clauses 552.239-70 Information Technology Security Plan and Security Authorization. As prescribed in 539.7002(a), insert the following provision: Information Technology Security...
48 CFR 552.239-70 - Information Technology Security Plan and Security Authorization.
Code of Federal Regulations, 2012 CFR
2012-10-01
... 48 Federal Acquisition Regulations System 4 2012-10-01 2012-10-01 false Information Technology... Text of Provisions and Clauses 552.239-70 Information Technology Security Plan and Security Authorization. As prescribed in 539.7002(a), insert the following provision: Information Technology Security...
48 CFR 552.239-70 - Information Technology Security Plan and Security Authorization.
Code of Federal Regulations, 2013 CFR
2013-10-01
... 48 Federal Acquisition Regulations System 4 2013-10-01 2013-10-01 false Information Technology... Text of Provisions and Clauses 552.239-70 Information Technology Security Plan and Security Authorization. As prescribed in 539.7002(a), insert the following provision: Information Technology Security...
ERIC Educational Resources Information Center
Hovland, Jana A.
2016-01-01
Stakeholders are interested in using technology to integrate nutrition education into the regular school curriculum as one strategy, among many, to combat the childhood obesity epidemic. The primary purposes of this study were to: (a) gain a better understanding of elementary teachers' perceptions concerning technology integration in nutrition…
Requirements for AMLCDs in U.S. military applications
NASA Astrophysics Data System (ADS)
Hopper, Darrel G.; Desjardins, Daniel D.
1995-06-01
Flat panel displays are fast becoming a significant source of more defense for less money. Military instruments have begun to use color active matrix liquid crystal displays (AMLCDs). This is the beginning of a significant transition from electromechanical, CRT. dichroic LCD, and electroluminescent display designs to the AMLCD designs. We have the opportunity with this new technology to establish common products capable of meeting user requirements for sunlight-readable, color and grayscale capable, high-sharpness high-pixel count, flat panel displays for military applications. The Wright Laboratory is leading the development of recommended best practice, draft guidance standard, and performance specifications for this new generation, the flat panel cockpit display generation, of display modules based on requirements for U.S. military aircraft and ground combat human system interfaces. These requirements are similar in many regards to those in both the civil aviation and automotive industries; accordingly, commonality with these civil applications is incorporated where possible, against the requirements for military combat applications. The performance requirement may be achieved by two approaches: militarization of displays made to low requirements of a large volume civil products manufacturer like Sharp or integration of displays made to high requirements by a niche market commercial vendor, like Optical Imaging Systems, Litton Systems Limited, ImageQuest Inc., and Planar Advanced Inc. teamed with Xerox PARC and Standish Industries. [Note that the niche market companies listed are commercial off-the shelf vendors, albeit for high requirement low volume customers.] Given that the performance specifications can be met for a particular military product by either approach, the choice is based on life cycle cost and a thin analysis based on initial costs alone is not acceptable as it ignores the fact that military product life cycles and procurements are 20-60 years compared to 1.5 years for civil products. Thus far there is no convincing evidence that the large volume commercial product approach for combat systems will meet the combat performance specification or be cheaper from a life cycle cost perspective. National and economic security requirements require some military/avionic-grade AMLCD production domestically (i.e. in the U.S. and/or Canada). Examples of AMLCD demand and performance requirements in U.S. military systems are provided.
[Management of war orthopaedic injuries in recent armed conflicts].
Frank, M; Mathieu, L
2013-01-01
The extremities continue to be the most frequent sites of wounding during armed conflicts despite the change of combat tactics, soldier armour and battlefield medical support. Due to the advances in prehospital care and timely transport to the hospital, orthopaedic surgeons deal with severe and challenging injuries of the limbs. In contrast to civilian extremity trauma, the most combat-related injuries are open wounds that often have infection-related complications. Data from two recent large armed conflicts (Iraq, Afghanistan) show that extremity injuries are associated with a high complication rate, morbidity and healthcare utilization. A systematic approach that consists of sequential surgical care and good transport capabilities can reduce the complication rate of these injuries. New medical technologies have been implemented in the treatment strategy during the last decade. This article reviews the published scientific data and current opinions on combat-related extremity injuries. Key words: extremity, combat, trauma, medical support system.
Combating immunosuppression in glioma
Vega, Eleanor A; Graner, Michael W; Sampson, John H
2012-01-01
Despite maximal therapy, malignant gliomas have a very poor prognosis. Patients with glioma express significant immune defects, including CD4 lymphopenia, increased fractions of regulatory T cells in peripheral blood and shifts in cytokine profiles from Th1 to Th2. Recent studies have focused on ways to combat immunosuppression in patients with glioma as well as in animal models for glioma. We concentrate on two specific ways to combat immunosuppression: inhibition of TGF-β signaling and modulation of regulatory T cells. TGF-β signaling can be interrupted by antisense oligonucleotide technology, TGF-β receptor I kinase inhibitors, soluble TGF-β receptors and antibodies against TGF-β. Regulatory T cells have been targeted with antibodies against T-cell markers, such as CD25, CTLA-4 and GITR. In addition, vaccination against Foxp3 has been explored. The results of these studies have been encouraging; combating immunosuppression may be one key to improving prognosis in malignant glioma. PMID:18518768
FELIN: tailored optronics and systems solutions for dismounted combat
NASA Astrophysics Data System (ADS)
Milcent, A. M.
2009-05-01
The FELIN French modernization program for dismounted combat provides the Armies with info-centric systems which dramatically enhance the performances of the soldier and the platoon. Sagem now has available a portfolio of various equipments, providing C4I, data and voice digital communication, and enhanced vision for day and night operations, through compact high performance electro-optics. The FELIN system provides the infantryman with a high-tech integrated and modular system which increases significantly their detection, recognition, identification capabilities, their situation awareness and information sharing, and this in any dismounted close combat situation. Among the key technologies used in this system, infrared and intensified vision provide a significant improvement in capability, observation performance and protection of the ground soldiers. This paper presents in detail the developed equipments, with an emphasis on lessons learned from the technical and operational feedback from dismounted close combat field tests.
Improved characterization of combat injury.
Champion, Howard R; Holcomb, John B; Lawnick, Mary M; Kelliher, Timothy; Spott, Mary Ann; Galarneau, Michael R; Jenkins, Donald H; West, Susan A; Dye, Judy; Wade, Charles E; Eastridge, Brian J; Blackbourne, Lorne H; Shair, Ellen Kalin
2010-05-01
Combat injury patterns differ from civilian trauma in that the former are largely explosion-related, comprising multiple mechanistic and fragment injuries and high-kinetic-energy bullets. Further, unlike civilians, U.S. armed forces combatants are usually heavily protected with helmets and Kevlar body armor with ceramic plate inserts. Searchable databases providing actionable, statistically valid knowledge of body surface entry wounds and resulting organ injury severity are essential to understanding combat trauma. Two tools were developed to address these unique aspects of combat injury: (1) the Surface Wound Mapping (SWM) database and Surface Wound Analysis Tool (SWAT) software that were developed to generate 3D density maps of point-of-surface wound entry and resultant anatomic injury severity; and (2) the Abbreviated Injury Scale (AIS) 2005-Military that was developed by a panel of military trauma surgeons to account for multiple injury etiology from explosions and other high-kinetic- energy weapons. Combined data from the Joint Theater Trauma Registry, Navy/Marine Combat Trauma Registry, and the Armed Forces Medical Examiner System Mortality Trauma Registry were coded in AIS 2005-Military, entered into the SWM database, and analyzed for entrance site and wounding path. When data on 1,151 patients, who had a total of 3,500 surface wounds and 12,889 injuries, were entered into SWM, surface wounds averaged 3.0 per casualty and injuries averaged 11.2 per casualty. Of the 3,500 surface wounds, 2,496 (71%) were entrance wounds with 6,631 (51%) associated internal injuries, with 2.2 entrance wounds and 5.8 associated injuries per casualty (some details cannot be given because of operational security). Crude deaths rates were calculated using Maximum AIS-Military. These new tools have been successfully implemented to describe combat injury, mortality, and distribution of wounds and associated injuries. AIS 2005-Military is a more precise assignment of severity to military injuries. SWM has brought data from all three combat registries together into one analyzable database. SWM and SWAT allow visualization of wounds and associated injuries by region on a 3D model of the body.
NASA Astrophysics Data System (ADS)
Talyansky, Vitaly
2010-03-01
During the industrious 90s both government agencies and brand owners faced a growing threat: rapid advances in the computer graphics technology allowed criminal syndicates to reach high sophistication levels in forging documents and branded products resulting in global losses of billions of dollars. Having studied various means to combat counterfeiting, we recognized the promise of IR luminescent ceramics and founded Stardust Materials. With little start-up capital, as novice entrepreneurs we truly believed that IR luminescence would stem the flow of fakes and ``save the world''. Within two years after inception we won a coveted contract to provide security to US tobacco tax stamps. A group of investors became interested in our initial success and suggested forming a new entity. Lacking business experience, we made costly mistakes starting with drafting a technology licensing agreement. Pitching our technology, the new corporation managed to raise 12 million in the investment-averse climate of post 9-11. However, its fortunes went downhill from then on. Soon we were forced to resign from the corporation leaving behind our technology, equipment, and high salaries. From scratch we commenced development of a new range of products. It would be surprising, if we did not get chased with an expensive IP law suit. Having successfully defended our new portfolio, we expanded the field of applications and began a steady growth. The story of Stardust sheds light on some of the tricky turns a scientist-entrepreneur may need to take to start and operate a company of his dreams.
New Technologies for Treating Severe Bleeding in Far-Forward Combat Areas
2010-04-01
Kheirabadi US Army Institute of Surgical Research 3400 Rawley East Chambers Avenue San Antonio, TX 78234-6315 USA michael.dubick@amedd.army.mil...inadequate to control a more severe hemorrhage and is often diminished after traumatic injuries. Therefore, the use of blood clotting drugs/devices is...threatening hemorrhage relevant to battlefield injury, have been one of the main focuses of the Combat Casualty Care Research program in the US Army
The radar eye blinded: The USAF and electronic warfare, 1945-1955
NASA Astrophysics Data System (ADS)
Kuehl, Daniel T.
This study concentrates on the doctrinal and operational elements of the Air Force's use of ECM to support offensive combat operations. It does not directly address such factors as intelligence gathering or technology development except as they pertain to the primary topic. As a result, the study focuses closely on the activities of the Air Force's two primary combat commands, the Strategic Air Command (SAC), and Tactical Air Command (TAC).
Tradition, Technology, and the Changing Roles of Women in the Navy
1993-11-01
and among utilization, opportunity, and cost. Forces for change Gender issues in the military gained visibility through women’s participation in the...to combat aviation and had authorized a commission to study the matter.10 Subsequently, many Americans were further sensitized to issues of gender ...discussion of this issue (pp. 268-270). 6 Before discussing the relevance of traditional arguments against women in combat to gender integration of
Balancing Agile Combat Support Manpower to Better Meet the Future Security Environment
2014-01-01
for a 3,000-person deployment package. 6 Figure 1.1 Postured Manpower Included in This Analysis NOTE: Spc = space, Avn = aviation, MX...an po w er , 1 00 0s USAF postured manpower Spc, Avn , Mx, Intel Other ACS Our scope 7 • In Chapter Four, we discuss several
2007-11-01
insurgencies are ameliorated through a radical new calculus of effort: 80 percent political, diplomatic, developmental, and informational; and 20...to Hunt al-Qaeda in Africa,” p. A1. 69 167. Anton Menning, “CJTF HOA: Long Term Solutions to Combating Terrorism,” The Leavenworth Times, August
Civilian Surge: Key to Complex Operations
2008-12-01
Division, the unit’s combat operations were reduced by 60 percent over a period of 8 months, enabling Soldiers to focus on improving security, health ... improving the usefulness of existing conflict early warning tools and integrating them with the analysis, prevention, and response components of S /CRS...force protection procedures. Integrated Stabilization Assistance Programs Since 2005, S /CRS has provided technical assistance consultations to
Combat Oak Shortage Problems Using Fortified Stringers
Philip A. Araman
1993-01-01
Oak pallet material supplies from sawmills have been and may continue to be difficult to secure in quantities by the pallet industry. Other oak using markets such as the furniture, cabinet, tie and flooring markets need more oak and are paying much higher prices than pallet manufacturers and recyclers wish to or can pay. These other markets are also willing to take...
Afghanistan: Another American Tragedy of Strategic Miscalculations
2014-04-09
relationships, defines security objectives, processes information, organizes force structures, develops new theories , and creates doctrine.9...Afghanistan’s political and strategic culture, the United States will need to profoundly change the American view of time, combat, success, and victory as...operations in 2001, but in the aftermath of 9-11, the emotional need for retaliation overrode rational thoughts of long-term consequences.31 Advisors
2009-10-23
language and culture of the battle space is critical to effective operational design. Analysis of steps taken by the U.S. military to provide the...advocacy. 15. SUBJECT TERMS Foreign Language, Culture , Linguists, Interpreters, Translators, Training, Situational Awareness 16. SECURITY...DIRECTION 10 CHANGING THE CULTURE 12 CONCLUSIONS AND RECOMMENDATIONS 16 NOTES 18 BIBLIOGRAPHY
Performance-Based Occupational Strength Testing for Candidate Navy Pilots/Naval Flight Officers.
1995-08-15
Classification in accordance with U.S. Security Regulations (i.e., UNCLASSIFIED). If form contains classified information, stamp classification on the top...34Developing job-related preplacement medical examinations." Journal of Occupational Medicine. 23(7): 469-476. 1981. Federal regulations ...transition training for already qualified aviators. Analysis included a review of: current Army Regulations governing prerequisites for combat
The Dilemma of Porous Borders: Uganda’s Experience in Combating Terrorism
2017-01-10
34 c. The Anti- money Laundering Act, 2013 ............................36 d. Anti-terrorism Amendment Bill, 2015...ALIR Liberation Army of Rwanda AMISOM African Mission to Somalia AMLA Anti- Money Laundering Act AU Africa Union AUPSC African Union Peace Security...of transnational crimes, including proliferation of weapons, money laundering , corruption and drug trafficking, all of which have reinforced the
Power and Energy Strategy White Paper
2010-04-01
and cooling. In recent years, several factors have emerged which further complicate the engineering and logistics challenges associated with power and...equation to maintain US military dominance in support of national security. II. INTRODUCTION Energy was a critical factor during many of the...non-combat platforms, especially for auxiliary power, and the compelling quest for compact, high capacity power sources for our overburdened Soldiers
Combating Tobacco Use in the United States Army
2010-04-01
videogame , tobacco use, military. 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT 18. NUMBER OF PAGES 19a. NAME OF RESPONSIBLE... videogame is theory-guided and uses animations, videos and interactive activities to provide facts about smoking and tobacco use, as well as provides...prevention and cessation interactive multimedia tool ( videogame ) among active Army personnel stationed at Fort Hood, Texas. Body Throughout the
Combatting Inherent Vulnerabilities of CFAR Algorithms and a New Robust CFAR Design
1993-09-01
elements of any automatic radar system. Unfortunately, CFAR systems are inherently vulnerable to degradation caused by large clutter edges, multiple ...edges, multiple targets, and electronic countermeasures (ECM) environments. 20 Distribution, Availability of Abstract 21 Abstract Security...inherently vulnerable to degradation caused by large clutter edges, multiple targets and jamming environments. This thesis presents eight popular and studied
Applications for Navy Unmanned Aircraft Systems
2010-01-01
ABUSE TERRORISM AND HOMELAND SECURITY TRANSPORTATION AND INFRASTRUCTURE WORKFORCE AND WORKPLACE The RAND Corporation is a nonprofit institution that... comunication intelligence (COMINT) collection, and airborne electronic attack applications. If the UCAS-D program is successful in addressing many of the...SATCOM availability to global war on terrorism and major combat operations in regions where SATCOM is denied by noise jamming or kinetic threats. As
Korzeniewski, Krzysztof; Gregulski, Robert
2014-01-01
The article presents the results of a research study into the reasons for medical evacuations of Polish military personnel taking part in the International Security Assistance Force (ISAF) operation in Afghanistan from 2007 to 2013. The authors have analysed medical records of 485 soldiers who were medically evacuated out of a combat zone in Afghanistan for battle injuries, non-battle injuries and diseases. Each medically evacuated Polish soldier was subjected to statistical analysis. The study population comprised 25,974 soldiers assigned to the Polish Military Contingent Afghanistan in the given period. From 2007 to 2013, 1.9% of the Polish military personnel (n = 485) participating in the ISAF operation in Afghanistan were evacuated for medical reasons before the scheduled termination of their contract. 40.6% of all medical evacuations were due to battle injuries, 32.4% due to non-battle injuries, and 27.0% due to diseases. ISAF is an example of a combat operation, in which battle injuries remain the leading health problem in mission participants. 3 of 4 Polish soldiers who were medically evacuated from Afghanistan were no longer fit for military service in the area of operations due to the traumas they had suffered.
Secure Multicast Tree Structure Generation Method for Directed Diffusion Using A* Algorithms
NASA Astrophysics Data System (ADS)
Kim, Jin Myoung; Lee, Hae Young; Cho, Tae Ho
The application of wireless sensor networks to areas such as combat field surveillance, terrorist tracking, and highway traffic monitoring requires secure communication among the sensor nodes within the networks. Logical key hierarchy (LKH) is a tree based key management model which provides secure group communication. When a sensor node is added or evicted from the communication group, LKH updates the group key in order to ensure the security of the communications. In order to efficiently update the group key in directed diffusion, we propose a method for secure multicast tree structure generation, an extension to LKH that reduces the number of re-keying messages by considering the addition and eviction ratios of the history data. For the generation of the proposed key tree structure the A* algorithm is applied, in which the branching factor at each level can take on different value. The experiment results demonstrate the efficiency of the proposed key tree structure against the existing key tree structures of fixed branching factors.
Barriers to Implementing a Single Joint Combat Camouflage Uniform
2017-12-01
opportunities, threats (SWOT), and political, economic , social, and technological (PEST) analyses; examines the requirements and role of each of the...methodology applies strengths, weaknesses, opportunities, threats (SWOT), and political, economic , social, and technological (PEST) analyses...27 1. Political Factors ............................................................................27 2. Economic
ERIC Educational Resources Information Center
Williams, Cheryl Scott
2012-01-01
Generation Y teachers--those under 30 years of age--have higher expectations for technology than their colleagues from earlier generations--for good reason. Improved instructional and networking technology is one important aspect of a modern high-performing workplace. This generational difference is important, since a majority of seasoned…
The cyber threat, trophy information and the fortress mentality.
Scully, Tim
2011-10-01
'It won't happen to me' is a prevalent mindset among senior executives in the private and public sectors when considering targeted cyber intrusions. This is exacerbated by the long-term adoption of a 'fortress mentality' towards cyber security, and by the attitude of many of our cyber-security professionals, who speak a different language when it comes to communicating cyber-security events to senior executives. The prevailing approaches to cyber security have clearly failed. Almost every week another serious, targeted cyber intrusion is reported, but reported intrusions are only the tip of the iceberg. Why have we got it so wrong? It must be acknowledged that cyber security is no longer the domain of cyber-security experts alone. Many more of us at various levels of leadership must understand, and be more deeply engaged in, the cyber-security challenge if we are to deal with the threat holistically and effectively. Governments cannot combat the cyber threat alone, particularly the so-called advanced persistent threat; they must work closely with industry as trusted partners. Industry will be the 'boots on the ground' in cyber security, but there are challenges to building this relationship, which must be based on sound principles.
76 FR 78009 - Information Collection; Implementation of Information Technology Security Provision
Federal Register 2010, 2011, 2012, 2013, 2014
2011-12-15
...] Information Collection; Implementation of Information Technology Security Provision AGENCY: General Services... collection requirement regarding Implementation of Information Technology Security Provision. Public comments... Information Collection 3090- 0294, Implementation of Information Technology Security Provision, by any of the...
Towards a Research Agenda for Cyber Friendly Fire
DOE Office of Scientific and Technical Information (OSTI.GOV)
Greitzer, Frank L.; Clements, Samuel L.; Carroll, Thomas E.
Historical assessments of combat fratricide reveal principal contributing factors in the effects of stress, degradation of skills due to continuous operations or sleep deprivation, poor situation awareness, and lack of training and discipline in offensive/defense response selection. While these problems are typically addressed in R&D focusing on traditional ground-based combat, there is also an emerging need for improving situation awareness and decision making on defensive/offensive response options in the cyber defense arena, where a mistaken response to an actual or perceived cyber attack could lead to destruction or compromise of friendly cyber assets. The purpose of this report is tomore » examine cognitive factors that may affect cyber situation awareness and describe possible research needs to reduce the likelihood and effects of "friendly cyber fire" on cyber defenses, information infrastructures, and data. The approach is to examine concepts and methods that have been described in research applied to the more traditional problem of mitigating the occurrence of combat identification and fratricide. Application domains of interest include cyber security defense against external or internal (insider) threats.« less
Grommon, Eric
2018-02-01
Cell phones in correctional facilities have emerged as one of the most pervasive forms of modern contraband. This issue has been identified as a top priority for many correctional administrators in the United States. Managed access, a technology that utilizes cellular signals to capture transmissions from contraband phones, has received notable attention as a promising tool to combat this problem. However, this technology has received little evaluative attention. The present study offers a foundational process evaluation and draws upon output measures and stakeholder interviews to identify salient operational challenges and subsequent lessons learned about implementing and maintaining a managed access system. Findings suggest that while managed access captures large volumes of contraband cellular transmissions, the technology requires significant implementation planning, personnel support, and complex partnerships with commercial cellular carriers. Lessons learned provide guidance for practitioners to navigate these challenges and for scholars to improve future evaluations of managed access. Copyright © 2017 Elsevier Ltd. All rights reserved.
1983-03-01
BUREAU OF STANDARDS-1963-A ,,...:-. .-. -.’" :.- --. . 4 Iq " USAAVRADCOM-TR-82-D-37 COMBAT MAINTENANCE CONCEPTS AND REPAIR TECHNIQUES USING SHAPE MEMORY...O APPLIED TECHNOLOGY LABORATORY POSITION STATEMENT The results of this effort determined the feasibility of using the full-ring shape memory alloy...specifications, or other data are used for any purpose other than in connection with a definitely related Government procurement operation, the United
2013-06-01
realistically representing the world in a simulation environment. A screenshot of the combat model used for this research is shown below. There are six...changes in use of technology (Ryan & Jons, 1992). Cost effectiveness and operational effectiveness are important, and it is extremely hard to achieve...effectiveness of ships using simulation and analytical models, to create a ship synthesis model, and most importantly, to develop decision making tools
2010-04-01
for predicting central blood volume changes to focus on the development of software algorithms and systems to provide a capability to track, and...which creatively fills this Critical Care gap. Technology in this sense means hardware and software systems which incorporate sensors, processors...devices for use in forward surgical and combat areas. Mil Med 170: 76-82, 2005. [10] Gaylord KM, Cooper DB, Mercado JM, Kennedy JE, Yoder LH, and
The Political Economy of the United States Military Market: 1963-2005
2006-06-01
military’s core activity is combat, the traditional military culture can be described in terms of a combat, masculine warrior (CMW) paradigm . Since...Contribution Although the American military’s sophisticated weapons technologies have changed the nature of battle to a large degree, the role of the foot...States that occurred on September 116’, 2001. The strains on active duty units following the attacks resulted in an increasing use of Guard forces
[Disintegration of the prison system, public security and social exclusion].
Freixo, Marcelo
2016-06-01
The defense of human rights, namely one of the most important duties of the legislature, is a considerable challenge in the day-to-day business of parliament. The opinions and practices of elected representatives reflect the security concerns and fears of society that engender a vast process of social exclusion. In this context, the defense of the right to health of persons deprived of liberty seems an especially difficult task, as shown in the interview of State Congressman Marcelo Freixo, the Coordinator of the Human Rights Commission of the Legislative Assembly in Rio de Janeiro and creator of the State Mechanism for Preventing and Combating Torture.
Composite structural armor for combat vehicle applications
NASA Technical Reports Server (NTRS)
Haskell, William E., III; Alesi, A. L.; Parsons, G. R.
1990-01-01
Several projects that have demonstrated the advantages of using thick composite armor technology for structural applications in armored combat vehicles are discussed. The first involved composite cargo doors for the Marine Corps LVTP-7 amphibious landing vehicle. Another was a demonstration composite turret that offered a weight reduction of 15.5 percent. The advantages of this composite armor compared to metallic armors used for combat vehicle hull and turret applications are reduced weight at equal ballistic protection; reduced back armor spall; excellent corrosion resistance; reduced production costs by parts consolidation; and inherent thermal and acoustic insulative properties. Based on the encouraging results of these past programs, the Demonstration Composite Hull Program was started in September 1986. To demonstrate this composite armor technology, the Army's newest infantry fighting vehicle, the Bradley Fighting Vehicle (BFV), was selected as a model. A composite infantry fighting vehicle, designated the CIFV for this program, has been designed and fabricated and is currently undergoing a 6000 mile field endurance test. The CIFV demonstration vehicle uses the BFV engine, transmission, suspension, track and other equipment.
2002-11-21
The second X-45A Unmanned Combat Air Vehicle (UCAV) technology demonstrator completed its first flight on November 21, 2002, after taking off from a dry lakebed at NASA's Dryden Flight Research Center, Edwards Air Force Base, California. X-45A vehicle two flew for approximately 30 minutes and reached an airspeed of 195 knots and an altitude of 7500 feet. This flight validated the functionality of the UCAV flight software on the second air vehicle. Dryden is supporting the DARPA/Boeing team in the design, development, integration, and demonstration of the critical technologies, processes, and system attributes leading to an operational UCAV system. Dryden support of the X-45A demonstrator system includes analysis, component development, simulations, ground and flight tests.
78 FR 17219 - Homeland Security Science and Technology Advisory Committee Meeting Cancellation
Federal Register 2010, 2011, 2012, 2013, 2014
2013-03-20
... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2013-0014] Homeland Security Science and...: Notice of Cancellation of the Federal Advisory Committee Meeting for Homeland Security Science and Technology Advisory Committee (HSSTAC). SUMMARY: The meeting of the Homeland Security Science and Technology...
Effect of Uniform Design on the Speed of Combat Tourniquet Application: A Simulation Study.
Higgs, Andrew R; Maughon, Michael J; Ruland, Robert T; Reade, Michael C
2016-08-01
Tourniquets are issued to deployed members of both the United States (U.S. military and the Australian Defence Force (ADF). The ease of removing the tourniquet from the pocket of the combat uniform may influence its time to application. The ADF uniform uses buttons to secure the pocket, whereas the U.S. uniform uses a hook and loop fastener system. National differences in training may influence the time to and effectiveness of tourniquet application. To compare the time taken to retrieve and apply a tourniquet from the pocket of the Australian and the U.S. combat uniform and compare the effectiveness of tourniquet application. Twenty participants from both nations were randomly selected. Participants were timed on their ability to remove a tourniquet from their pockets and then apply it effectively. The U.S. personnel removed their tourniquets in shorter time (median 2.5 seconds) than Australians (median 5.72 seconds, p < 0.0001). ADF members (mean 41.36 seconds vs. 58.87 seconds, p < 0.037) applied the tourniquet more rapidly once removed from the pocket and trended to apply it more effectively (p = 0.1). The closure system of pockets on the combat uniform might influence the time taken to apply a tourniquet. Regular training might also reduce the time taken to apply a tourniquet effectively. Reprint & Copyright © 2016 Association of Military Surgeons of the U.S.
Selecting Security Technology Providers
ERIC Educational Resources Information Center
Schneider, Tod
2009-01-01
The world of security technology holds great promise, but it is fraught with opportunities for expensive missteps and misapplications. The quality of the security technology consultants and system integrators one uses will have a direct bearing on how well his school masters this complex subject. Security technology consultants help determine…
Enhancement by Enlargement: The Proliferation Security Initiative
2008-01-01
Minister Mahathir Mohammad. In any event, Malaysia’s expressions of common interest with the United States in cooperative efforts to combat terrorism...instances 10 The sharp change in the current Malaysian government’s stance toward cooperation with the United States from that of the preceding, Mahathir ...preceding prime minister, Mahathir , Malaysia was implicated in the proliferation network of Pakistan’s A. Q. Khan. As part of that network
Fires. A Joint Publication for U.S. Artillery Professionals. March - April 2011
2011-03-01
of joint training that the Fires Center of Excellence teaches and supports. (Photo by Lance Cpl. Seth Maggard, U.S. Marine Corps) 19 sill...provides security with U.S Army Soldiers from the 4th Brigade Combat Team, 10th Mountain Division in the Logar province of Afghanistan on Nov. 27, 2010. (Photo by PFC Donald Watkins , U.S. Army)
From National to Theater: Developing Strategy
2013-01-01
operational planning as it guides the development of the Theater Campaign Plan ( TCP ). Theater strategy, and the TCP that operationalizes it, should offer...doctrine or other guidance on developing it. Perhaps this is a contributing factor in Charles Bouchat’s observation that “No two combatant commands...approach to TCPs and country-level planning that considers ongoing security cooperation efforts, current operations, the Phase 0 component of con
Advances in the Acquisition of Secure Systems Based on Open Architectures
2011-04-30
2011 11:15 a.m. – 12:45 p.m. Chair: Christopher Deegan , Executive Director, Program Executive Office for Integrated Warfare Systems Delivering...Systems Based on Open Architectures Walt Scacchi and Thomas Alspaugh, Institute for Software Research Christopher Deegan —Executive Director, Program...Executive Officer, Integrated Warfare Systems (PEO IWS). Mr. Deegan directs the development, acquisition, and fleet support of 150 combat weapon system
U.S. Army War College Guide to National Security Issues. Volume 1. Theory of War and Strategy
2012-06-01
273 Tami Davis Biddle 21. John Warden’s Five Ring Model and the Indirect Approach to War ..........................295 Clayton K. S. Chun...266 Chapter 21 Figure 21-1. John Warden’s Five Ring Model...strategy from the battlefield to the civilian rear, thus blur- ring the difference between combatant and noncombatant.22 At the same time, the military
Final Report: Continuation Study: A Systems Approach to Understanding Post-Traumatic Stress Disorder
2017-01-31
Research Office P.O. Box 12211 Research Triangle Park, NC 27709-2211 Post Traumatic Stress Disorder, HPA-Circadian-metabolic pathway, methylation...17150 remaining probes were located in coding regions. Linear additive models were used to test the interactions among the quantitative loci and...SECURITY CLASSIFICATION OF: Post -Traumatic Stress Disorder (PTSD) is a complex anxiety disorder affecting many combat-exposed soldiers. Current
Company Command: The Bottom Line
1990-11-20
who engage in original research on national security issues. NDU Press publishes the best of this research . In addition, the Press publishes other...79 Stan dard Inslallation/Division Person-. nel Systems jSIDPERS)-SIDPEiIS Be- p orts- Non coinmmission ed Officer Evaluation fleports (NO-ERs--Offtcer... Non - combatant Evacuation Operation (NEO) xii and Prenaration for Overseas Moveizent (PO.MW-Finance The Bottom Line for Personnel and Administration
Combating Terrorism in a Globalized World
2002-05-01
warhead is detonated in London or a smallpox outbreak in Tokyo or a nerve agent is introduced into the Washington, DC, subway system. An initiative...and convey a more positive image of the Western world. Furthermore, the civilized world should work together to provide disen- franchised youth...59 Economic growth in developing countries leads to reduced poverty, increased food security, and higher standards of living, including better health
Fighting Corruption in Mexico: Lessons from Colombia
2011-06-01
combat the growing threat. The strategy presented by President Alvaro Uribe in 2003, albeit not perfect, made important strides towards the reform...Edivision Compania Editorial, 1987), 119–120; Andres Lopez- Restrepo and Alvaro Camacho-Guizado, ―From Smugglers to Drug-Lords to ‗Traquetos...of President Uribe in 2002, the GOC viewed the security threat posed by drug trafficking organizations, the FARC and the paramilitaries, as a
2010-08-22
Commission (IEC). “Information technology — Security techniques — Code of practice for information security management ( ISO /IEC 27002 ...Information technology — Security techniques — Information security management systems —Requirements ( ISO /IEC 27002 ),”, “Information technology — Security...was a draft ISO standard on Systems and software engineering, Systems and software assurance [18]. Created by systems engineers for systems
Effectiveness of battlefield-ethics training during combat deployment: a programme assessment.
Warner, Christopher H; Appenzeller, George N; Mobbs, Angela; Parker, Jessica R; Warner, Carolynn M; Grieger, Thomas; Hoge, Charles W
2011-09-03
Breakdowns in the ethical conduct of soldiers towards non-combatants on the battlefield are of grave concern in war. Evidence-based training approaches to prevent unethical conduct are scarce. We assessed the effectiveness of battlefield-ethics training and factors associated with unethical battlefield conduct. The training package, based on movie vignettes and leader-led discussions, was administered 7 to 8 months into a 15-month high-intensity combat deployment in Iraq, between Dec 11, 2007, and Jan 30, 2008. Soldiers from an infantry brigade combat team (total population about 3500) were randomly selected, on the basis of company and the last four digits of each soldier's social security number, and invited to complete an anonymous survey 3 months after completion of the training. Reports of unethical behaviour and attitudes in this sample were compared with a randomly selected pre-training sample from the same brigade. The response patterns for ethical behaviour and reporting of ethical violations were analysed with chi-square analyses. We developed two logistic regression models using self-reported unethical behaviours as dependent variables. Factors associated with unethical conduct, including combat experiences and post-traumatic stress disorder (PTSD), were assessed with validated scales. Of 500 randomly selected soldiers 421 agreed to participate in the anonymous post-training survey. A total of 397 soldiers of the same brigade completed the pre-training survey. Training was associated with significantly lower rates of unethical conduct of soldiers and greater willingness to report and address misconduct than in those before training. For example, reports of unnecessary damage or destruction of private property decreased from 13·6% (54 of 397; 95% CI 10·2-17·0) before training to 5·0% (21 of 421; 2·9-7·1) after training (percent difference -63·2%; p<0·0001), and willingness to report a unit member for mistreatment of a non-combatant increased from 36·0% (143 of 397; 31·3-40·7) to 58·9% (248 of 421; 54·2-63·6; percent difference 63·6; p<0·0001). Nearly all participants (410 [97%]) reported that training made it clear how to respond towards non-combatants. Combat frequency and intensity was the strongest predictor of unethical behaviour; PTSD was not a significant predictor of unethical behaviour after controlling for combat experiences. Leader-led battlefield ethics training positively influenced soldiers' understanding of how to interact with and treat non-combatants, and reduced reports of ethical misconduct. Unethical battlefield conduct was associated with high-intensity combat but not with PTSD. None. Copyright © 2011 Elsevier Ltd. All rights reserved.
Forensic Analysis of Terrorist Counter-Financing to Combat Nuclear Proliferation
DOE Office of Scientific and Technical Information (OSTI.GOV)
Drame, B.; Toler, L.; Bachner, Katherine
The single greatest threat to U.S. homeland security remains the proliferation of nuclear weapons, especially among terrorists and other non-state actors who are not governed by the Non-Proliferation Treaty. One of the most important tools for combating terrorism among such rogue actors is counter-financing. Without funding, terrorists cannot acquire, maintain, or deploy nuclear weapons. According to the official report of the 9/11 Commission, counter-financing could have prevented the attacks of September 11, 2001. Unfortunately, no single country can defeat global terrorism. Successful counter-financing requires significant international cooperation. Since 2001, the United States and the European Union, despite vastly different approachesmore » to intelligence gathering, have shared information through the Terrorist Finance Tracking Program (TFTP). That shared information allows authorities to trace suspicious transactions, identify culprits, and map out global terrorist networks. The TFTP successfully thwarted a 2011 plot to assassinate the Saudi Arabian Ambassador to the U.S. and multiple threats during the 2012 Summer Olympics in London; it also aided in the investigation of the 2013 Boston Marathon bombing. That program is necessary but not sufficient. To strengthen our ability to detect and disrupt terrorist plotting and prevent nuclear proliferation, we must expand and coordinate two additional transnational measures: (1) the Society for Worldwide Interbank Financial Telecommunications (SWIFT), a standardized global messaging network for financial institutions to quickly, accurately, and securely send and receive money transfer instructions, and (2) International Bank Account Numbers (IBAN) to identify individual accounts involved in international transactions. Both initiatives were incompletely adopted in the wake of 9/11, but most global banks use one or neither. More fully implementing and coordinating these two systems would allow for coherent information sharing, an essential tool for combating money laundering and terrorist financing, verifying sanctions against rogue nations and non-state actors, tracking nuclear proliferation networks, and protecting dual-use materials. These steps can save lives without interfering with state sovereignty or individual rights. The specter of nuclear threat is real and constant. This paper will provide forensic analysis of the most effective financial tools and policies to combat that threat, placing special emphasis on multinational and public-private cooperation.« less
Healthcare Information Technology (HIT) in an Anti-Access (A2) and Area Denial (AD) Environment
2014-03-01
OFFICE OF THE COMMAND SURGEON, AIR COMBAT COMMAND FELLOWSHIP PAPER HEALTHCARE INFORMATION TECHNOLOGY (HIT) IN AN ANTI-ACCESS (A2) AND AREA...expeditionary responses. A light and lean medical response that utilizes emerging technology , specifically HIT, enhances the AFMS’ readiness posture and...expeditionary medical capability. The new USAF reality in an A2/AD environment is impeded access, very little if any technological dominance
Federal Register 2010, 2011, 2012, 2013, 2014
2013-09-12
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] HydroGen Corp., QueryObject Systems Corp., Security Intelligence Technologies, Inc., Skins, Inc., SLM Holdings, Inc., Spring Creek Healthcare Systems... securities of Security Intelligence Technologies, Inc. because it has not filed any periodic reports since...
The research of network database security technology based on web service
NASA Astrophysics Data System (ADS)
Meng, Fanxing; Wen, Xiumei; Gao, Liting; Pang, Hui; Wang, Qinglin
2013-03-01
Database technology is one of the most widely applied computer technologies, its security is becoming more and more important. This paper introduced the database security, network database security level, studies the security technology of the network database, analyzes emphatically sub-key encryption algorithm, applies this algorithm into the campus-one-card system successfully. The realization process of the encryption algorithm is discussed, this method is widely used as reference in many fields, particularly in management information system security and e-commerce.
Flight dynamics research for highly agile aircraft
NASA Technical Reports Server (NTRS)
Nguyen, Luat T.
1989-01-01
This paper highlights recent results of research conducted at the NASA Langley Research Center as part of a broad flight dynamics program aimed at developing technology that will enable future combat aircraft to achieve greatly enhanced agility capability at subsonic combat conditions. Studies of advanced control concepts encompassing both propulsive and aerodynamic approaches are reviewed. Dynamic stall phenomena and their potential impact on maneuvering performance and stability are summarized. Finally, issues of mathematical modeling of complex aerodynamics occurring during rapid, large amplitude maneuvers are discussed.
Marine data security based on blockchain technology
NASA Astrophysics Data System (ADS)
Yang, Zhao; Xie, Weiwei; Huang, Lei; Wei, Zhiqiang
2018-03-01
With the development of marine observation technology and network technology, the volume of marine data growing rapidly. This brings new challenges for data storage and transmission. How to protect data security of marine big data has become an urgent problem. The traditional information security methods’ characteristic is centralization. These technologies cannot provide whole process protection, e.g., data storage, data management and application of data. The blockchain technology is a novel technology, which can keep the data security and reliability by using decentralized methodology. It has aroused wide interest in the financial field. In this paper, we describe the concept, characteristics and key technologies of blockchain technology and introduce it into the field of marine data security.
Performing the Union: the Prüm Decision and the European dream.
Prainsack, Barbara; Toom, Victor
2013-03-01
In 2005, seven European countries signed the so-called Prüm Treaty to increase transnational collaboration in combating international crime, terrorism and illegal immigration. Three years later, the Treaty was adopted into EU law. EU member countries were now obliged to have systems in place to allow authorities of other member states access to nationally held data on DNA, fingerprints, and vehicles by August 2011. In this paper, we discuss the conditions of possibility for the Prüm network to emerge, and argue that rather than a linear ascent towards technological and political convergence and harmonisation, the (hi)story of Prüm is heterogeneous and halting. This is reflected also in the early stages of implementing the Prüm Decision which has proven to be more challenging than it was hoped by the drivers of the Prüm process. In this sense, the Prüm network sits uncomfortably with success stories of forensic science (many of which served the goal of justifying the expansion of technological and surveillance systems). Instead of telling a story of heroic science, the story of Prüm articulates the European dream: one in which goods, services, and people live and travel freely and securely. Copyright © 2012. Published by Elsevier Ltd.
Federal Register 2010, 2011, 2012, 2013, 2014
2013-07-12
... Business Technology Solutions Central Security Services Iselin, New Jersey; TA-W-82,634B, Prudential Global Business Technology Solutions Central Security Services Plymouth, Minnesota; TA- W-82,634C, Prudential Global Business Technology Solutions Central Security Services Scottsdale, Arizona; TA-W-82,634D...
Advanced technology development for remote triage applications in bleeding combat casualties.
Ryan, Kathy L; Rickards, Caroline A; Hinojosa-Laborde, Carmen; Gerhardt, Robert T; Cain, Jeffrey; Convertino, Victor A
2011-01-01
Combat developers within the Army have envisioned development of a "wear-and-forget" physiological status monitor (PSM) that will enhance far forward capabilities for assessment of Warrior readiness for battle, as well as for remote triage, diagnosis and decision-making once Soldiers are injured. This paper will review recent work testing remote triage system prototypes in both the laboratory and during field exercises. Current PSM prototypes measure the electrocardiogram and respiration, but we have shown that information derived from these measurements alone will not be suited for specific, accurate triage of combat injuries. Because of this, we have suggested that development of a capability to provide a metric of circulating blood volume status is required for remote triage. Recently, volume status has been successfully modeled using low-level physiological signals obtained from wearable devices as input to machine-learning algorithms; these algorithms are already able to discriminate between a state of physical activity (common in combat) and that of central hypovolemia, and thus show promise for use in wearable remote triage devices.
Digital security technology simplified.
Scaglione, Bernard J
2007-01-01
Digital security technology is making great strides in replacing analog and other traditional security systems including CCTV card access, personal identification and alarm monitoring applications. Like any new technology, the author says, it is important to understand its benefits and limitations before purchasing and installing, to ensure its proper operation and effectiveness. This article is a primer for security directors on how digital technology works. It provides an understanding of the key components which make up the foundation for digital security systems, focusing on three key aspects of the digital security world: the security network, IP cameras and IP recorders.
Castro, Carl Andrew
2014-01-01
This paper reviews the psychological health research conducted in the United States in support of combat veterans from Iraq and Afghanistan, using the Military Psychological Health Research Continuum, which includes foundational science, epidemiology, etiology, prevention and screening, treatment, follow-up care, and services research. The review is limited to those studies involving combat veterans and military families. This review discusses perplexing issues regarding the impact of combat on the mental health of service members such as risk and resilience factors of mental health, biomarkers of posttraumatic stress syndrome (PTSD), mental health training, psychological screening, psychological debriefing, third location decompression, combat and suicide, the usefulness of psychotherapy and drug therapy for treating PTSD, role of advanced technology, telemedicine and virtual reality, methods to reduce stigma and barriers to care, and best approaches to the dissemination of evidence-based interventions. The mental health research of special populations such as women, National Guardsmen and reservists, and military families is also presented. The review concludes by identifying future areas of research. PMID:25206943
HI-STAR. Health Improvements through Space Technologies and Resources: Executive Summary
NASA Technical Reports Server (NTRS)
Finarelli, Margaret G.
2002-01-01
Our mission is to develop and promote a global strategy to help combat malaria using space technology. Like the tiny yet powerful mosquito, HI-STAR (Health Improvements Through Space Technologies and Resources) is a small program that aspires to make a difference. Timely detection of malaria danger zones is essential to help health authorities and policy makers make decisions about how to manage limited resources for combating malaria. In 2001, the technical support network for prevention and control of malaria epidemics published a study. HI-STAR focuses on malaria because it is the most common and deadly of the vector-borne diseases. Malaria also shares many commonalities with other diseases, which means the global strategy developed here may also be applicable to other parasitic diseases. HI-STAR would like to contribute to the many malaria groups already making great strides in the fight against malaria. Some examples include: Roll Back Malaria, The Special Program for Research and Training in Tropical Diseases (TDR) and the Multilateral Initiative on Malaria (MIM). Other important groups that are among the first to include space technologies in their model include: The Center for Health Application of Aerospace Related Technologies (CHAART) and Mapping Malaria Risk in Africa (MARA). Malaria is a complex and multi-faceted disease. Combating it must therefore be equally versatile. HI-STAR incorporates an interdisciplinary, international, intercultural approach.called 'Malaria Early Warning Systems; Concepts, Indicators and Partners.' This study, funded by Roll Back Malaria, a World Health Organization initiative, offers a framework for a monitoring and early warning system. HI-STAR seeks to build on this proposal and enhance the space elements of the suggested framework. It is the work of fifty-three professionals and students from the International Space University's 2002 Summer Session Program held in California, USA.
2016-10-01
workshop, and use case development for automated and autonomous systems for CSS. The scoping study covers key concepts and trends, a technology scan, and...requirements and delimiters for the selected technologies. The report goes on to present detailed use cases for two technologies of interest: semi...selected use cases . As a result of the workshop, the large list of technologies and applications from the scoping study was narrowed down to the top
Affordable multisensor digital video architecture for 360° situational awareness displays
NASA Astrophysics Data System (ADS)
Scheiner, Steven P.; Khan, Dina A.; Marecki, Alexander L.; Berman, David A.; Carberry, Dana
2011-06-01
One of the major challenges facing today's military ground combat vehicle operations is the ability to achieve and maintain full-spectrum situational awareness while under armor (i.e. closed hatch). Thus, the ability to perform basic tasks such as driving, maintaining local situational awareness, surveillance, and targeting will require a high-density array of real time information be processed, distributed, and presented to the vehicle operators and crew in near real time (i.e. low latency). Advances in display and sensor technologies are providing never before seen opportunities to supply large amounts of high fidelity imagery and video to the vehicle operators and crew in real time. To fully realize the advantages of these emerging display and sensor technologies, an underlying digital architecture must be developed that is capable of processing these large amounts of video and data from separate sensor systems and distributing it simultaneously within the vehicle to multiple vehicle operators and crew. This paper will examine the systems and software engineering efforts required to overcome these challenges and will address development of an affordable, integrated digital video architecture. The approaches evaluated will enable both current and future ground combat vehicle systems the flexibility to readily adopt emerging display and sensor technologies, while optimizing the Warfighter Machine Interface (WMI), minimizing lifecycle costs, and improve the survivability of the vehicle crew working in closed-hatch systems during complex ground combat operations.
32 CFR 2400.42 - Security Officer.
Code of Federal Regulations, 2011 CFR
2011-07-01
... National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.42 Security...
32 CFR 2400.42 - Security Officer.
Code of Federal Regulations, 2010 CFR
2010-07-01
... National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.42 Security...
32 CFR 2400.42 - Security Officer.
Code of Federal Regulations, 2014 CFR
2014-07-01
... National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.42 Security...
32 CFR 2400.42 - Security Officer.
Code of Federal Regulations, 2013 CFR
2013-07-01
... National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.42 Security...
32 CFR 2400.42 - Security Officer.
Code of Federal Regulations, 2012 CFR
2012-07-01
... National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.42 Security...
75 FR 18516 - Homeland Security Science and Technology Advisory Committee
Federal Register 2010, 2011, 2012, 2013, 2014
2010-04-12
... Technology Advisory Committee AGENCY: Science and Technology Directorate, DHS. ACTION: Committee Management; notice of closed Federal Advisory Committee meeting SUMMARY: The Homeland Security Science and Technology.... DATES: The Homeland Security Science and Technology Advisory Committee will meet April 20, 2010 from 8...
42 CFR 495.368 - Combating fraud and abuse.
Code of Federal Regulations, 2014 CFR
2014-10-01
... (CONTINUED) STANDARDS AND CERTIFICATION STANDARDS FOR THE ELECTRONIC HEALTH RECORD TECHNOLOGY INCENTIVE... laws and regulations designed to prevent fraud, waste, and abuse, including, but not limited to...
42 CFR 495.368 - Combating fraud and abuse.
Code of Federal Regulations, 2012 CFR
2012-10-01
... (CONTINUED) STANDARDS AND CERTIFICATION STANDARDS FOR THE ELECTRONIC HEALTH RECORD TECHNOLOGY INCENTIVE... laws and regulations designed to prevent fraud, waste, and abuse, including, but not limited to...
42 CFR 495.368 - Combating fraud and abuse.
Code of Federal Regulations, 2011 CFR
2011-10-01
... (CONTINUED) STANDARDS AND CERTIFICATION STANDARDS FOR THE ELECTRONIC HEALTH RECORD TECHNOLOGY INCENTIVE... laws and regulations designed to prevent fraud, waste, and abuse, including, but not limited to...
42 CFR 495.368 - Combating fraud and abuse.
Code of Federal Regulations, 2013 CFR
2013-10-01
... (CONTINUED) STANDARDS AND CERTIFICATION STANDARDS FOR THE ELECTRONIC HEALTH RECORD TECHNOLOGY INCENTIVE... laws and regulations designed to prevent fraud, waste, and abuse, including, but not limited to...
Economic Assessment: Stability, Security, Transition and Reconstruction Operations
2007-03-13
strategy has incorporated economic stability as a central part of post-combat operations and nation building. A viable, growing economy has also been a...and prosperity. Economic stability served as a tool for reconstruction as well as the catalyst for integration as outlined in the Marshall Plan...for future SSTR operations as it relates to economic stability is “Privatization can be a prerequisite for economic growth, especially where
Bio-Inspired Innovation and National Security
2010-01-01
legal and illegal, to enhance athlete performance. While legality is not a critical issue for combat soldiers, safety is. Current strength...Operating critical infrastructure? How do we operate when the families of our Servicepeople are exposed to the same threat? Clearly, we are unprepared to...against their will because of the belief that Iraq would use weapons of mass destruction against American forces. After the war, it was discovered that
Combating ISIS and Securing the Peace in Libya
2017-04-01
West agree that Libya has become fertile ground for ISIS or similar organizations to thrive. Historically, the US has prioritized stability in the Arab...U.S. military personnel, using names and publicly available information, particularly those who have spoken critically of the organization or offered...public suggestions of how to defeat the terror organization . As such, the author’s last name has been redacted. DISTRIBUTION A. Approved for public
U.S.-China Counterterrorism Cooperation: Issues for U.S. Policy
2008-10-29
Resolution 1368 (to combat terrorism). On September 20, Beijing said that it offered “unconditional support” in fighting terrorism. On September 20-21...bilateral relationship pursued by President Bush since late 2001. In the short-term, U.S. security policy toward Beijing sought counterterrorism...attacks), and its image as a responsible world power helped explain China’s supportive stance. However, Beijing also worried about U.S. military action
Ignoring the Obvious: The Influence of Islamism in America
2008-06-13
footing in America, but they philosophically differed in the ways and means undertaken to secure the strategic vision. The BPP , regardless of strategic ...terroristic causes. CIST is an integral part of the strategic success in combating terrorism. CIST erodes the appeal to extremist ideology, an adversary’s...perceived strategic center of gravity. An examination of the proliferation of radical Muslim doctrine indicates that the goal of its strategy is
Combating Drug Abuse by Targeting Toll-Like Receptor 4 (TLR4)
2013-10-01
dosing with the TLR4 signaling inhibitor (+)- naltrexone ? If so, is Fig 3: Study was conducted as previously described in...inhibited by systemic dosing with the TLR4 signaling inhibitor (+)- naltrexone ? If so, is morphine reinforcement inhibited by microinjecting LPS-RS into... naltrexone ; drug abuse; glial activation; therapeutic approach to treating drug abuse; opioids; cocaine 16. SECURITY CLASSIFICATION OF: 17
India-United States Security Cooperation: Past, Present, and Future
2011-12-16
IOR Indian Ocean Region ISI Inter-Services Intelligence JeM Jaish-e-Mohammad ix JTG Joint Technical Group LCA Light Combat Aircraft LeT...community’s senior expert who has written and consulted on issues ranging from terrorism to nuclear policy, political stability, and foreign relations... resulted in the happy situation of simultaneous expansion of relations with all the major powers, growing weight in Asia and the Indian Ocean regions
2011-05-01
Energy and water security/ independence; sustain leadership • Compliance and environmental stewardship (cannot impact training mission...reduction, with efforts underway and cogeneration opportunities 18.3% of energy consumed by facilities is produced or procured from renewable...payback timeframes of ɠ years on existing cogeneration plant and ɛ years on new cogeneration plant Renewable Energy • In FY2010, approximately 6.2% of
Environmental Assessment for a Security Forces Armory/Combat Arms Facility
2005-03-21
tener), Contra Costa goldfields (Lasthenia conjugens), and the San Joaquin spearscale (Atriplex joaquiniana) – that are listed by the California Native...Plant Society as rare. The akali milkvetch and the San Joaquin spearscale are also listed as federal species of concern (Travis AFB, 2002a). The...following federally listed species have been identified at Travis AFB: • Contra Costa goldfields (Lasthenia conjugens), a federally endangered plant
2016-01-01
to envi- ronmental rehabilitation. Policies have been directed to clean the country’s water, air, and soil, all of which remain heavily contaminated ...quality and safety of food and products. However, as with many policies, implementation remains problematic.14 Recent Developments Under Xi...Southeast Asian nations’ military bases, includ- ing those of Thailand, the Philippines, Singapore, Malaysia , and Indonesia. Japan is also men- tioned
Report Task Force on Women in the Military
1988-01-01
Education, Training, Equal Opportunity, Assignments. SECURITY CLASSIFICATION OF THIS PAGE ODEPARTMENT OF DEFENSE REPORT TASK FORCE4I ON WOMEN LN THE...ensure that instruction occurs at all levels of the organization; and, DoD review equal opportu- nity lessons learned for use in combating bixual...Servicewomen becoming full and equal members of their units. Each Service should be required to report the results of these evalua- tions and corrective
Yemen: Background and U.S. Relations
2014-02-06
socio-economic problems. Congress and U.S. policymakers may be concerned with prospects for stabilizing Yemen and establishing strong bilateral...watchers suggest that security problems emanating from Yemen may persist in spite of increased U.S. or international efforts to combat them. Overall, the...by this Act for assistance for Yemen may be made available for the Armed Forces of Yemen if such forces are controlled by a foreign terrorist
The U.S. Combat and Tactical Wheeled Vehicle Fleets: Issues and Suggestions for Congress
2011-01-01
nonlinear, irregular distribution of brigade and battalion formations means that there is no longer a relatively more secure rear area, an...enhancement package, according to civilian sources, included depleted- uranium armor, digital command- and-control architecture, digital color terrain maps...system robustness and flexibility, and (3) more often than not, the preparation of the analysis (e.g., terrain formatting , laydown of forces, timing of
A New Method for Determining Permethrin Level on Military Uniform Fabrics
2017-06-01
new desorption- gas chromatography–mass spectrometry based screening tool for permethrin content in military fabrics was developed. The method allows...SUBJECT TERMS permethrin, Army Combat Uniform, ACU, camouflage, desorption- gas chromatography-mass spectrometry, D-GC-MS 16. SECURITY CLASSIFICATION OF...and the permethrin contained in the specimens is extracted with solvent with a recovery rate of at least 95%. Samples are analyzed using a gas
Is the Narco-violence in Mexico an Insurgency?
2011-05-19
Alvaro . The Uribe Administration’s Democratic Security and Defense Policy, Embassy of Colombia, Washington, D.C. US Department of Justice, “Combat...generating about 20 percent of its income from illicit drugs. 138 After the election of President Álvaro Uribe in 2002, the Colombian government...2002 presidential election, candidate Álvaro Uribe ran on a platform vowing to crush guerrilla movements with unyielding force. Uribe was a
The Advancement of Women in Post-Conflict Nepal
2017-04-01
DANIEL K. INOUYE ASIA PACIFIC CENTER FOR SECURITY STUDIES OCCASIONAL PAPER, APRIL 2017 The Advancement of Women in Post -Conflict Nepal Lily Thapa1...in the lack of access to appropriate services and compensation, and in the way that female ex -combatants are treated and reintegrated...5,912 2,985 The Advancement of Women in Post -Conflict Nepal 2 reparation of victims of armed conflict and the provision of mechanisms for
Advancement of Women in Post-Conflict Nepal
2017-04-01
DANIEL K. INOUYE ASIA PACIFIC CENTER FOR SECURITY STUDIES OCCASIONAL PAPER, APRIL 2017 The Advancement of Women in Post -Conflict Nepal Lily Thapa1...in the lack of access to appropriate services and compensation, and in the way that female ex -combatants are treated and reintegrated...5,912 2,985 The Advancement of Women in Post -Conflict Nepal 2 reparation of victims of armed conflict and the provision of mechanisms for
2001 Industry Studies: Land Combat Systems
2001-01-01
invest in human capital, to allocate resources to R&D, to take advantage of information technology , to expand their markets beyond traditional...their efforts to broaden their markets and services. This means greater efforts to exploit information technology in order to control worldwide...three essays of foremost importance to the industry supplement the study’s depth and utility: the US Army’s transformation, information technology
The Evolution of Medical Training Simulation in the U.S. Military.
Linde, Amber S; Kunkler, Kevin
2016-01-01
The United States has been at war since 2003. During that time, training using Medical Simulation technology has been developed and integrated into military medical training for combat medics, nurses and surgeons. Efforts stemming from the Joint Programmatic Committee-1 (JPC-1) Medical Simulation and Training Portfolio has allowed for the improvement and advancement in military medical training by focusing on research in simulation training technology in order to achieve this. Based upon lessons learned capability gaps have been identified concerning the necessity to validate and enhance combat medial training simulators. These capability gaps include 1) Open Source/Open Architecture; 2) Modularity and Interoperability; and 3) Material and Virtual Reality (VR) Models. Using the capability gaps, JPC-1 has identified important research endeavors that need to be explored.
Current radar-responsive tag development activities at Sandia National Laboratories
NASA Astrophysics Data System (ADS)
Ormesher, Richard C.; Plummer, Kenneth W.; Wells, Lars M.
2004-08-01
Over the past ten years, Sandia has developed RF radar responsive tag systems and supporting technologies for various government agencies and industry partners. RF tags can function as RF transmitters or radar transponders that enable tagging, tracking, and location determination functions. Expertise in tag architecture, microwave and radar design, signal analysis and processing techniques, digital design, modeling and simulation, and testing have been directly applicable to these tag programs. In general, the radar responsive tag designs have emphasized low power, small package size, and the ability to be detected by the radar at long ranges. Recently, there has been an interest in using radar responsive tags for Blue Force tracking and Combat ID (CID). The main reason for this interest is to allow airborne surveillance radars to easily distinguish U.S. assets from those of opposing forces. A Blue Force tracking capability would add materially to situational awareness. Combat ID is also an issue, as evidenced by the fact that approximately one-quarter of all U.S. casualties in the Gulf War took the form of ground troops killed by friendly fire. Because the evolution of warfare in the intervening decade has made asymmetric warfare the norm rather than the exception, swarming engagements in which U.S. forces will be freely intermixed with opposing forces is a situation that must be anticipated. Increasing utilization of precision munitions can be expected to drive fires progressively closer to engaged allied troops at times when visual de-confliction is not an option. In view of these trends, it becomes increasingly important that U.S. ground forces have a widely proliferated all-weather radar responsive tag that communicates to all-weather surveillance. The purpose of this paper is to provide an overview of the recent, current, and future radar responsive research and development activities at Sandia National Laboratories that support both the Blue Force Tracking and Combat ID application. Sandia is a multiprogram laboratory operated by Sandia Corporation, a Lockheed Martin Company for the United States Departments of Energy's National Nuclear Security Administration under contract DE-AC04-94AL85000.
Federal Register 2010, 2011, 2012, 2013, 2014
2011-06-15
... Acquisition Regulation; Implementation of Information Technology Security Provision AGENCY: Office of... information technology (IT) supplies, services and systems with security requirements. DATES: Effective Date... effective date that include information technology (IT) supplies, services and systems with security...
76 FR 4079 - Information Technology (IT) Security
Federal Register 2010, 2011, 2012, 2013, 2014
2011-01-24
... Technology (IT) Security AGENCY: National Aeronautics and Space Administration. ACTION: Final rule. SUMMARY: NASA is revising the NASA FAR Supplement (NFS) to update requirements related to Information Technology... Security clause. However, due to the critical importance of protecting the Agency's Information Technology...
Rhetoric and the Death of a Top Gun: Technology, Gender, and the Military.
ERIC Educational Resources Information Center
Sadler, Tori
1999-01-01
Discusses the author's ongoing research analyzing several sites of discourse related to a military training accident that resulted in the death of the first female military pilot assigned to a combat position. Contributes to scholarship discussing interactions of technology, gender, and military culture. Explores how language influences…
Combat Vehicle Technology Report
1992-05-01
to stay within the lines to meet optical scanning requirements. Block 1. Agency Use Only (Leave blank). Block 12a. Distribution/Availability Statement...Optronics ( Optical Energy Circuits)...-,..................... 465.3o Fiber Optics ....... ............ o..........o................... 46 5.4. Flat...Technology Objective Remarks Survivability o Protected Vision Enhanced Crew Function The application of filters and other optical (Directed Energy Through
Abbreviated Military Decision Making for Brigade Combat Teams
2001-06-01
manual, The Enlighted Eye. The current study is field focused, includes self as an instrument, is essentially interpretive in scope, focuses on details...decision making performance deteriorated when more rather than less information was provided.”51 Even under normal circumstances, current technology ...Direct Military Support (10) / Chapter 3 / 12 Critical Technology (3
64.1: Display Technologies for Therapeutic Applications of Virtual Reality
Hoffman, Hunter G.; Schowengerdt, Brian T.; Lee, Cameron M.; Magula, Jeff; Seibel, Eric J.
2015-01-01
A paradigm shift in image source technology for VR helmets is needed. Using scanning fiber displays to replace LCD displays creates lightweight, safe, low cost, wide field of view, portable VR goggles ideal for reducing pain during severe burn wound care in hospitals and possibly in austere combat-transport environments. PMID:26146424
Technology-Enabled Crime, Policing and Security
ERIC Educational Resources Information Center
McQuade, Sam
2006-01-01
Crime, policing and security are enabled by and co-evolve with technologies that make them possible. As criminals compete with security and policing officials for technological advantage perpetually complex crime, policing and security results in relatively confusing and therefore unmanageable threats to society. New, adaptive and ordinary crimes…
42 CFR 495.368 - Combating fraud and abuse.
Code of Federal Regulations, 2010 CFR
2010-10-01
... (CONTINUED) STANDARDS AND CERTIFICATION STANDARDS FOR THE ELECTRONIC HEALTH RECORD TECHNOLOGY INCENTIVE... identified as an overpayment regardless of recoupment from such providers, within 60 days of discovery of the...
14 CFR 1274.937 - Security requirements for unclassified information technology resources.
Code of Federal Regulations, 2012 CFR
2012-01-01
... information technology resources. 1274.937 Section 1274.937 Aeronautics and Space NATIONAL AERONAUTICS AND... Conditions § 1274.937 Security requirements for unclassified information technology resources. Security Requirements for Unclassified Information Technology Resources July 2002 (a) The Recipient shall be responsible...
14 CFR 1274.937 - Security requirements for unclassified information technology resources.
Code of Federal Regulations, 2013 CFR
2013-01-01
... information technology resources. 1274.937 Section 1274.937 Aeronautics and Space NATIONAL AERONAUTICS AND... Conditions § 1274.937 Security requirements for unclassified information technology resources. Security Requirements for Unclassified Information Technology Resources July 2002 (a) The Recipient shall be responsible...
14 CFR 1274.937 - Security requirements for unclassified information technology resources.
Code of Federal Regulations, 2011 CFR
2011-01-01
... information technology resources. 1274.937 Section 1274.937 Aeronautics and Space NATIONAL AERONAUTICS AND... Conditions § 1274.937 Security requirements for unclassified information technology resources. Security Requirements for Unclassified Information Technology Resources July 2002 (a) The Recipient shall be responsible...
14 CFR 1274.937 - Security requirements for unclassified information technology resources.
Code of Federal Regulations, 2010 CFR
2010-01-01
... information technology resources. 1274.937 Section 1274.937 Aeronautics and Space NATIONAL AERONAUTICS AND... Conditions § 1274.937 Security requirements for unclassified information technology resources. Security Requirements for Unclassified Information Technology Resources July 2002 (a) The Recipient shall be responsible...
48 CFR 1352.239-72 - Security requirements for information technology resources.
Code of Federal Regulations, 2011 CFR
2011-10-01
... information technology resources. 1352.239-72 Section 1352.239-72 Federal Acquisition Regulations System... Clauses 1352.239-72 Security requirements for information technology resources. As prescribed in 48 CFR 1339.270(b), insert the following clause: Security Requirements for Information Technology Resources...
48 CFR 1352.239-72 - Security requirements for information technology resources.
Code of Federal Regulations, 2013 CFR
2013-10-01
... information technology resources. 1352.239-72 Section 1352.239-72 Federal Acquisition Regulations System... Clauses 1352.239-72 Security requirements for information technology resources. As prescribed in 48 CFR 1339.270(b), insert the following clause: Security Requirements for Information Technology Resources...
48 CFR 1352.239-72 - Security requirements for information technology resources.
Code of Federal Regulations, 2012 CFR
2012-10-01
... information technology resources. 1352.239-72 Section 1352.239-72 Federal Acquisition Regulations System... Clauses 1352.239-72 Security requirements for information technology resources. As prescribed in 48 CFR 1339.270(b), insert the following clause: Security Requirements for Information Technology Resources...
48 CFR 1352.239-72 - Security requirements for information technology resources.
Code of Federal Regulations, 2014 CFR
2014-10-01
... information technology resources. 1352.239-72 Section 1352.239-72 Federal Acquisition Regulations System... Clauses 1352.239-72 Security requirements for information technology resources. As prescribed in 48 CFR 1339.270(b), insert the following clause: Security Requirements for Information Technology Resources...
48 CFR 1352.239-72 - Security requirements for information technology resources.
Code of Federal Regulations, 2010 CFR
2010-10-01
... information technology resources. 1352.239-72 Section 1352.239-72 Federal Acquisition Regulations System... Clauses 1352.239-72 Security requirements for information technology resources. As prescribed in 48 CFR 1339.270(b), insert the following clause: Security Requirements for Information Technology Resources...
1996-01-01
failure as due to an adhesive layer between the foil and inner polypropylene layers. "* Under subcontract, NFPA provided HACCP draft manuals for the...parameters of the production process and to ensure that they are within their target values. In addition, a HACCP program was used to assure product...played an important part in implementing Hazard Analysis Critical Control Points ( HACCP ) as part of the Process and Quality Control manual. The National
Urban Combat Advanced Training Technology (Technologie avancee d’entrainement au combat urbain)
2015-07-01
Environmental Issues 2-1 2.6 Annex E – Effects Representation on Targets 2-2 2.7 Annex F – How to Create Vulnerability Models for Buildings and Vehicles 2-2...Modifications of the Standard Information Models 3-10 3.3.5 Why the RPR FOM 2 Might Not be Suitable for All Types of Integration 3-10 3.4 Implementation ...urban areas are the most likely battlefield in the 21st century. The problems and limitations associated with developing the first generation of
IVTS-CEV (Interactive Video Tape System-Combat Engineer Vehicle) Gunnery Trainer.
1981-07-01
video game technology developed for and marketed in consumer video games. The IVTS/CEV is a conceptual/breadboard-level classroom interactive training system designed to train Combat Engineer Vehicle (CEV) gunners in target acquisition and engagement with the main gun. The concept demonstration consists of two units: a gunner station and a display module. The gunner station has optics and gun controls replicating those of the CEV gunner station. The display module contains a standard large-screen color video monitor and a video tape player. The gunner’s sight
2011-04-29
lett for en kompanisjef a m ~tte forholde seg til s ~ mye at kjernefunksjonen hans scm era lede kompaniet forsvinner eller blir sekundcert. Operasjoner p...the personal relationship that existed between the officers within the Annored brigade (Appendix A ~ S ). 13 Mission command is based upon personal...A208 Norway Colonel CO Telemark Muligheten til a snake med underlagte s ]efer. Man ma ha Push to talk samband Norwegian Battalion sam gj(llr det
Securing Information Technology in Healthcare
Anthony, Denise; Campbell, Andrew T.; Candon, Thomas; Gettinger, Andrew; Kotz, David; Marsch, Lisa A.; Molina-Markham, Andrés; Page, Karen; Smith, Sean W.; Gunter, Carl A.; Johnson, M. Eric
2014-01-01
Dartmouth College’s Institute for Security, Technology, and Society conducted three workshops on securing information technology in healthcare, attended by a diverse range of experts in the field. This article summarizes the three workshops. PMID:25379030
A review of security of electronic health records.
Win, Khin Than
The objective of this study is to answer the research question, "Are current information security technologies adequate for electronic health records (EHRs)?" In order to achieve this, the following matters have been addressed in this article: (i) What is information security in the context of EHRs? (ii) Why is information security important for EHRs? and (iii) What are the current technologies for information security available to EHRs? It is concluded that current EHR security technologies are inadequate and urgently require improvement. Further study regarding information security of EHRs is indicated.
The Virtual Combat Air Staff. The Promise of Information Technologies,
1996-08-07
development of specialists . The need for advance planning and orchestration of a growing variety of sup- port functions has required the commander to... ability for almost unlim- ited access to command authorities and fielded forces via worldwide communications, increased situational awareness, and the...mercially developed systems that incorporate the latest technologies, training programs will have to adapt to the rapid pace at which such technologies are
Management of the Defense Technology Security Administration Year 2000 Program
1998-11-03
caller is fully protected Acronyms DTSA Defense Technology Security Administration Y2K Year 2000 INSPECTOR GENERAL DEPARTMENT OF DEFENSE 400 ARMY NAVY...accordance with the DoD Management Plan Defense Technology Security Administration. The Defense Technology Security Administration ( DTSA ) was established...in 1985 as a field activity of the Office of the Secretary of Defense By establishing DTSA , the DoD role in export controls was centralized and
Secure and Resilient Cloud Computing for the Department of Defense
2015-07-21
that addresses that threat model, and (3) integrate the technology into a usable, secure, resilient cloud test bed. Underpinning this work is the...risks for the DoD’s acquisition of secure, resilient cloud technology by providing proofs of concept, technology maturity, integration demonstrations...we need a strategy for integrating LLSRC technology with the cloud services and applications that need to be secured. The LLSRC integration
48 CFR 2452.239-71 - Information Technology Virus Security.
Code of Federal Regulations, 2014 CFR
2014-10-01
... 48 Federal Acquisition Regulations System 6 2014-10-01 2014-10-01 false Information Technology... Provisions and Clauses 2452.239-71 Information Technology Virus Security. As prescribed in 2439.107(b), insert the following clause: Information Technology Virus Security (FEB 2006) (a) The contractor hereby...
48 CFR 2452.239-71 - Information Technology Virus Security.
Code of Federal Regulations, 2013 CFR
2013-10-01
... 48 Federal Acquisition Regulations System 6 2013-10-01 2013-10-01 false Information Technology... Provisions and Clauses 2452.239-71 Information Technology Virus Security. As prescribed in 2439.107(b), insert the following clause: Information Technology Virus Security (FEB 2006) (a) The contractor hereby...
48 CFR 2452.239-71 - Information Technology Virus Security.
Code of Federal Regulations, 2012 CFR
2012-10-01
... 48 Federal Acquisition Regulations System 6 2012-10-01 2012-10-01 false Information Technology... Provisions and Clauses 2452.239-71 Information Technology Virus Security. As prescribed in 2439.107(b), insert the following clause: Information Technology Virus Security (FEB 2006) (a) The contractor hereby...
48 CFR 1252.239-71 - Information technology security plan and accreditation.
Code of Federal Regulations, 2014 CFR
2014-10-01
... 48 Federal Acquisition Regulations System 5 2014-10-01 2014-10-01 false Information technology... Provisions and Clauses 1252.239-71 Information technology security plan and accreditation. As prescribed in (TAR) 48 CFR 1239.70, insert the following provision: Information Technology Security Plan and...
48 CFR 1252.239-71 - Information technology security plan and accreditation.
Code of Federal Regulations, 2013 CFR
2013-10-01
... 48 Federal Acquisition Regulations System 5 2013-10-01 2013-10-01 false Information technology... Provisions and Clauses 1252.239-71 Information technology security plan and accreditation. As prescribed in (TAR) 48 CFR 1239.70, insert the following provision: Information Technology Security Plan and...
48 CFR 1252.239-71 - Information technology security plan and accreditation.
Code of Federal Regulations, 2011 CFR
2011-10-01
... 48 Federal Acquisition Regulations System 5 2011-10-01 2011-10-01 false Information technology... Provisions and Clauses 1252.239-71 Information technology security plan and accreditation. As prescribed in (TAR) 48 CFR 1239.70, insert the following provision: Information Technology Security Plan and...
48 CFR 2452.239-71 - Information Technology Virus Security.
Code of Federal Regulations, 2011 CFR
2011-10-01
... 48 Federal Acquisition Regulations System 6 2011-10-01 2011-10-01 false Information Technology... Provisions and Clauses 2452.239-71 Information Technology Virus Security. As prescribed in 2439.107(b), insert the following clause: Information Technology Virus Security (FEB 2006) (a) The contractor hereby...
48 CFR 1252.239-71 - Information technology security plan and accreditation.
Code of Federal Regulations, 2012 CFR
2012-10-01
... 48 Federal Acquisition Regulations System 5 2012-10-01 2012-10-01 false Information technology... Provisions and Clauses 1252.239-71 Information technology security plan and accreditation. As prescribed in (TAR) 48 CFR 1239.70, insert the following provision: Information Technology Security Plan and...
48 CFR 1252.239-71 - Information technology security plan and accreditation.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 48 Federal Acquisition Regulations System 5 2010-10-01 2010-10-01 false Information technology... Provisions and Clauses 1252.239-71 Information technology security plan and accreditation. As prescribed in (TAR) 48 CFR 1239.70, insert the following provision: Information Technology Security Plan and...
48 CFR 2452.239-71 - Information Technology Virus Security.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 48 Federal Acquisition Regulations System 6 2010-10-01 2010-10-01 true Information Technology... Provisions and Clauses 2452.239-71 Information Technology Virus Security. As prescribed in 2439.107(b), insert the following clause: Information Technology Virus Security (FEB 2006) (a) The contractor hereby...
A Program for Clinical Care in Physical Trauma--Combat Surgery and Bioengineering.
and energy exchange; Bone composition and fractures; Computer technology in intensive care; Manitol toxicity; Liver blood flow transplantation; Infections and immunology--Candida infection and Pseudomonas immunity. (Author)
The Chain-Link Fence Model: A Framework for Creating Security Procedures
ERIC Educational Resources Information Center
Houghton, Robert F.
2013-01-01
A long standing problem in information technology security is how to help reduce the security footprint. Many specific proposals exist to address specific problems in information technology security. Most information technology solutions need to be repeatable throughout the course of an information systems lifecycle. The Chain-Link Fence Model is…
Collins Center Update. Volume 14, Issue 4, July-September 2012
2012-09-01
Strategic Leader Staff Ride Program 2012 • Initiation of “Quick-Turn” Wargame Concept • Combating Terrorism Seminar at the Romanian National Defense...ians, and resident students aid in communicating cur- rent Army issues to these prominent leaders in Amer- ica. Tufts University’s Fletcher School...of Law and Diplo- macy kicked off the 2012 season in early April with 22 partici- pating graduate students enrolled in the International Security
A Metrics-Based Approach to Intrusion Detection System Evaluation for Distributed Real-Time Systems
2002-04-01
Based Approach to Intrusion Detection System Evaluation for Distributed Real - Time Systems Authors: G. A. Fink, B. L. Chappell, T. G. Turner, and...Distributed, Security. 1 Introduction Processing and cost requirements are driving future naval combat platforms to use distributed, real - time systems of...distributed, real - time systems . As these systems grow more complex, the timing requirements do not diminish; indeed, they may become more constrained
Impunity: Countering Illicit Power in War and Transition
2016-05-01
Post -Conflict: The Lessons from Timor-Leste..........347 Deniz Kocak CHAPTER 17 A Granular Approach to Combating Corruption and Illicit Power Structures...transregional security,” and central to our task “is strengthening our global network of allies and partners.”4 In the current post -“Big Footprint” era...after the post -2001 political settlement, which was built on the distribution of political power between factions formed during the country’s civil war
Annual Report to the President and the Congress
2004-01-01
planning process has determined is needed to meet the military tasks as- signed to the Department by the President in his national security strategy...Commands" document, which formally as- signs forces to combatant commanders. The Global Force Management Process subsumes two developmen- tal measures...www.t2net.org), which was signed by Deputy Secretary of Defense Paul Wolfowitz on June 10, 2003, is a road map to developing and fielding dynamic
Blue Print to India’s Amphibious Forces
2009-01-01
Commando Force Humanitarian Assistance and Disaster Relief Non-combatant Eva~uationOperations Indian Ocean Region Sea Lanes of Communication Indian P ~ace...security policy - all buttress each other." u This strategic outlook of India, in consonance with her economic, foreign and defense policies, guid~s...between 17,000 tons - 24,000 tons.51 The LPD can carry 720 troops and have a 24 bed medical facility with two operating rooms52 whilst ------ ------ 16
U.S.-China Counterterrorism Cooperation: Issues for U.S. Policy
2009-05-07
the others for Resolution 1368 (to combat terrorism). On September 20, Beijing said that it offered “unconditional support” in fighting terrorism...Bush since late 2001. In the short-term, U.S. security policy toward Beijing sought counterterrorism cooperation, shifting from issues about weapons...supportive stance. However, Beijing also worried about U.S. military action near China, U.S.-led alliances, Japan’s active role in the war on terrorism
Type II Forward Storage Site Facilities: POMCUS System. Volume 2.
1980-09-01
shall be PROVIDED. (2) b. 4.14.2 Gas-tight,solid, non- combustible partitions will be used to separate oxygen and other combustion supporting gases from...buildings responsive to POMCUS activities; especially, 1) adequate insulation for temperature controlled buildings, 2) structural adequacy for lift...4.6.1 A building for storage of rations will be PROVIDED for a secured ready supply of meals for combat ( MCI ). This allows MCI replenishment as needed
Can EDA Combat the Rise of Electronic Counterfeiting?
2012-06-01
Categories and Subject Descriptors B .7 [Hardware]: Integrated Circuits General Terms Design, Security Keywords Counterfeiting; Reliability; Device and...1199-1/12/06 ...$10.00. SIA at $7.5 B . Very recently, EE Times estimated that IC counterfeiting losses are as high as $ 169 B annually. There- fore, the...PERSON a. REPORT unclassified b . ABSTRACT unclassified c. THIS PAGE unclassified Standard Form 298 (Rev. 8-98) Prescribed by ANSI Std Z39-18
Human Trafficking in Southeast Asia and U.S. National Security
2015-03-01
beneficial to combat the problems at their source in order to have a lasting effect. Criminal organizations use money from drug trafficking rings...trafficking is often paired with other crimes such as drug trafficking, document forgery, money laundering , and human smuggling—all of which yield large... criminal and terrorist organizations to engage in, or launder the proceeds of illegal activity.”169 The report that new strategic focus for the United
2016-09-01
results are hypothesis-generating and provide the foundation for future studies that will 1) validate the role for newly identified mediators of obesity ...and insulin resistance in animal models and 2) examine novel targets against which we can design therapies to combat obesity and its related...complications. 15. SUBJECT TERMS Obesity , Type 2 Diabetes Mellitus, Insulin resistance, Adipose, Stromal vascular fraction 16. SECURITY CLASSIFICATION OF
Byting Back. Regaining Information Superiority Against 21st-Century Insurgents
2007-01-01
representation of RAND intellectual property is provided for non-commercial use only. Unauthorized posting of RAND PDFs to a non-RAND Web site is...thus, denoting safe or unsafe areas for urban combat, ingress/ egress, or convoy operations. It also offers clues as to where insur- gents might plant...on security authorities. Victims may, themselves, be reluctant to come forward if they feel their efforts are futile, or worse, can put them in
Sino-American Military Relations: Determinants of Policy and Corresponding Military Responsiveness
2007-03-01
military medicine, administration, and a host of non -combat related areas10 Similar priorities and methods can be seen in official documents such as the...with the national foreign policy, the PLA conducts military cooperation that is non -aligned, non -confrontational and not directed against any third...benefit. It takes part in bilateral or multilateral joint military exercises in non -traditional security fields so as to enhance the joint
Performance Assessment of the 3M Combat Arms Generation 4.0 Tactical Military Shooter’s Ear Plug
2016-06-24
blast , impulsive noise attenuation, REAT, IPIL 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT 18. NUMBER OF PAGES 19a. NAME OF...fire could eventually result in permanent hearing loss. Noise exposures from larger weapons and blasts could instantly cause permanent hearing loss... noise . The general approach for this assessment was to use American National Standards Institute (ANSI) measurement procedures for continuous
Conference room 211, adjacent to commander's quarters, with vault door ...
Conference room 211, adjacent to commander's quarters, with vault door at right. Projection area at center is equipped with automatic security drapes. Projection room uses a 45 degree mirror to reflect the image onto the frosted glass screen. Door on far left leads to display area senior battle staff viewing bridge, and the commander's quarters - March Air Force Base, Strategic Air Command, Combat Operations Center, 5220 Riverside Drive, Moreno Valley, Riverside County, CA
Cloth Ballistic Vest Alters Response to Blast
1988-01-01
Detrick, Frederick, MD 21701-501 ELEMENT NO. NO. NO. jACCESSION NO. 11. TITLE (include Security Classification) CLOTH BALLSISTIC VEST ALTERS RESPONSE...Suppl. ’rintd in USA Cloth Ballistic Vest Alters Response to Blast YANCY Y. PHILLIPS, M.D., THOMAS G. MUNDIE, PH.D., JOHN T. YELVERTON, M.S., AND DONALD R...RICHMOND, PH.D. Ballistic wounds have been and will remain the principal cause of casualties in combat. Cloth ballistic vests (CBV) play an
Establishing a Suitable Tactical Design Model for Clear-Hold-Build Counterinsurgency Operations
2009-06-12
Vietnam capitol of Saigon. Cedar Falls was tactically designed to achieve this result through two measures . First, U.S. Army forces would separate...provide a higher force ratio for the operation. This tethering would mitigate risk for the Soldiers themselves. Because risk management is so integrated...Vietnam) BCT Brigade Combat Team BCTP Battle Command Training Program BN Battalion BSP Baghdad Security Plan CF Coalition Forces C-H-B Clear-Hold
The Role of Regional Organizations in US Security Strategy: An Opportunity to Lead Among Partners
2014-06-01
the latest collaboration between ASEAN and Australia to prevent human trafficking .37 This partnership has matured since 2003, and AAPTIP is just...its Strategy to Combat Transnational Organized Crime include drug trafficking , human smuggling, trafficking in persons, weapons trafficking ...of the world’s population lives on less than a dollar a day.8 It is this population that provides the many human trafficking victims, cheap labor
Irksome and Unpopular Duties: Pakistan’s Frontier Corps, Local Security Forces and Counterinsurgency
2012-05-01
the Karakorum mountain range in North West Frontier Province (now Khyber Pakhtunkhwa) to the Makran coast in Balochistan . I he Khan <>l Lalpura and...the corps along geographical lines, creating Frontier Corps-North West Frontier Province and Frontier Corps- Balochistan . Pakistan also created...major combat operations, including the Indo-Pakistani wars of 1948, 1965, and 1971. The Frontier Corps fought against separatists in Balochistan in the
Proposals for Codaer (Combat Data Exchange Relay)
1949-04-22
Target Reporting 6 CODAER INDICATORS 7 SHAFT POSITION TRANSMISSION AND CODING 9 OPERATIONS CONTROL 10 AA FIRE COORDINATION 10 INTERSHIP PLOTS 12 RELAY...of providing tactical data on at least 500 different targets or friends. The link should be insensitive to jamming and have a high degree of security...gyrations of high speed air targets. This sets the minimum data repetition rate at about 5 reports per second. Better results, particularly in view of
Employment of the El Salvador Armed Forces for Internal Security
2011-02-02
and in which the familiar life develops undressed of the fear; a country where a climate exists that favors the investment and the opportunities of...armed forces the experience and familiarize them with the roots of the problems, causes, and conditions that generate the violence in the country...police, military and fiscal members, and members of other institutions involved in the combating of crime have to be familiar with the legal procedures
ERIC Educational Resources Information Center
Lum, Lydia
2005-01-01
When Jackson State University officials and their collaborators assembled a proposal for a $12 million social and behavioral research center to combat terrorism, they hoped Federal officials would give a nod of approval to what they believed was a high-value concept. The proposal, Featuring the predominantly White Mississippi State University as…
Operationalizing Cyberspace for Today’s Combat Air Force
2010-04-01
rootkit techniques to run inside common Windows services (sometimes bundled with fake antivirus software ) or in Windows safe mode, and it can hide...has shifted to downloading other malware, with its main focus on fake alerts and rogue antivirus software . 5. TR/Dldr.Agent.JKH - Compromised U.S...patch, software update, or security breech away from failure. In short, what works AU/ACSC/SIMMONS/AY10 5 today, may not work tomorrow; this fact
MIT Lincoln Laboratory Annual Report 2007: Technology in Support of National Security
2007-01-01
technical innovation and scientific discoveries. MISSION: TechnoLogy In SupporT of naTIonaL SecurITy 2007 Dr. Claude R. Canizares Vice president for...problems. The Lincoln Laboratory New Technology Initiatives Program is one of several internal technology innovation mechanisms. Technologies emerging...externships. LIFT2, an innovative professional learning program for science, technology , and math teachers, serves Massachusetts metro south/west region
National policy and military doctrine: development of a nuclear concept of land warfare, 1949-1964
DOE Office of Scientific and Technical Information (OSTI.GOV)
Bockar, D.
In the thirty years that battle field nuclear weapons have been available, no one has originated an idea of how they might be used as an entirely new weapon. New weapons are routinely introduced into existing combat organizations before an appropriate tactical concept has been invented. But never before in history has a new weapon been deployed on so massive a scale without a tactical concept that exploited the radical implications of its novel technology for traditional warfare. This study is an attempt to understand the problem of developing a persuasive tactical concept for nuclear weapons. The process of assimilationmore » by which military organizations integrate new weapons with existing weapons in novel tactical and organizational concepts has an intellectual, and institutional, and a political dimension. The principle of civilian control, however, makes the process by which weapons are assimilated part of the process by which national security policies are made. In peacetime the military's formulation of doctrine is almost entirely consequent upon the world view, the methodological and managerial assumptions, and the domestic policy concerns of political authority.« less
Emerging Nanomedicine Therapies to Counter the Rise of Methicillin-Resistant Staphylococcus aureus
2018-01-01
In a recent report, the World Health Organisation (WHO) classified antibiotic resistance as one of the greatest threats to global health, food security, and development. Methicillin-resistant Staphylococcus aureus (MRSA) remains at the core of this threat, with persistent and resilient strains detectable in up to 90% of S. aureus infections. Unfortunately, there is a lack of novel antibiotics reaching the clinic to address the significant morbidity and mortality that MRSA is responsible for. Recently, nanomedicine strategies have emerged as a promising therapy to combat the rise of MRSA. However, these approaches have been wide-ranging in design, with few attempts to compare studies across scientific and clinical disciplines. This review seeks to reconcile this discrepancy in the literature, with specific focus on the mechanisms of MRSA infection and how they can be exploited by bioactive molecules that are delivered by nanomedicines, in addition to utilisation of the nanomaterials themselves as antibacterial agents. Finally, we discuss targeting MRSA biofilms using nano-patterning technologies and comment on future opportunities and challenges for MRSA treatment using nanomedicine. PMID:29473883
Cyber Friendly Fire: Research Challenges for Security Informatics
DOE Office of Scientific and Technical Information (OSTI.GOV)
Greitzer, Frank L.; Carroll, Thomas E.; Roberts, Adam D.
This paper addresses cognitive implications and research needs surrounding the problem of cyber friendly fire (FF). We define cyber FF as intentional offensive or defensive cyber/electronic actions intended to protect cyber systems against enemy forces or to attack enemy cyber systems, which unintention-ally harms the mission effectiveness of friendly or neutral forces. Just as with combat friendly fire, maintaining situation awareness (SA) is paramount to avoiding cyber FF incidents. Cyber SA concerns knowledge of a system’s topology (connectedness and relationships of the nodes in a system), and critical knowledge elements such as the characteristics and vulnerabilities of the components thatmore » comprise the system and its nodes, the nature of the activities or work performed, and the available defensive and offensive countermeasures that may be applied to thwart network attacks. Mitigation strategies to combat cyber FF— including both training concepts and suggestions for decision aids and visualization approaches—are discussed.« less
Feng, Qianmei
2007-10-01
Federal law mandates that every checked bag at all commercial airports be screened by explosive detection systems (EDS), explosive trace detection systems (ETD), or alternative technologies. These technologies serve as critical components of airport security systems that strive to reduce security risks at both national and global levels. To improve the operational efficiency and airport security, emerging image-based technologies have been developed, such as dual-energy X-ray (DX), backscatter X-ray (BX), and multiview tomography (MVT). These technologies differ widely in purchasing cost, maintenance cost, operating cost, processing rate, and accuracy. Based on a mathematical framework that takes into account all these factors, this article investigates two critical issues for operating screening devices: setting specifications for continuous security responses by different technologies; and selecting technology or combination of technologies for efficient 100% baggage screening. For continuous security responses, specifications or thresholds are used for classifying threat items from nonthreat items. By investigating the setting of specifications on system security responses, this article assesses the risk and cost effectiveness of various technologies for both single-device and two-device systems. The findings provide the best selection of image-based technologies for both single-device and two-device systems. Our study suggests that two-device systems outperform single-device systems in terms of both cost effectiveness and accuracy. The model can be readily extended to evaluate risk and cost effectiveness of multiple-device systems for airport checked-baggage security screening.
48 CFR 652.239-70 - Information Technology Security Plan and Accreditation.
Code of Federal Regulations, 2014 CFR
2014-10-01
... 48 Federal Acquisition Regulations System 4 2014-10-01 2014-10-01 false Information Technology... Clauses 652.239-70 Information Technology Security Plan and Accreditation. As prescribed in 639.107-70(a), insert the following provision: Information Technology Security Plan and Accreditation (SEP 2007) All...
48 CFR 652.239-70 - Information Technology Security Plan and Accreditation.
Code of Federal Regulations, 2012 CFR
2012-10-01
... 48 Federal Acquisition Regulations System 4 2012-10-01 2012-10-01 false Information Technology... Clauses 652.239-70 Information Technology Security Plan and Accreditation. As prescribed in 639.107-70(a), insert the following provision: Information Technology Security Plan and Accreditation (SEP 2007) All...
17 CFR 200.26a - Office of Information Technology.
Code of Federal Regulations, 2011 CFR
2011-04-01
... Organization § 200.26a Office of Information Technology. The Office of Information Technology is responsible... 17 Commodity and Securities Exchanges 2 2011-04-01 2011-04-01 false Office of Information Technology. 200.26a Section 200.26a Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION...
48 CFR 652.239-70 - Information Technology Security Plan and Accreditation.
Code of Federal Regulations, 2011 CFR
2011-10-01
... 48 Federal Acquisition Regulations System 4 2011-10-01 2011-10-01 false Information Technology... Clauses 652.239-70 Information Technology Security Plan and Accreditation. As prescribed in 639.107-70(a), insert the following provision: Information Technology Security Plan and Accreditation (SEP 2007) All...
48 CFR 652.239-70 - Information Technology Security Plan and Accreditation.
Code of Federal Regulations, 2013 CFR
2013-10-01
... 48 Federal Acquisition Regulations System 4 2013-10-01 2013-10-01 false Information Technology... Clauses 652.239-70 Information Technology Security Plan and Accreditation. As prescribed in 639.107-70(a), insert the following provision: Information Technology Security Plan and Accreditation (SEP 2007) All...
17 CFR 200.26a - Office of Information Technology.
Code of Federal Regulations, 2014 CFR
2014-04-01
... Organization § 200.26a Office of Information Technology. The Office of Information Technology is responsible... 17 Commodity and Securities Exchanges 3 2014-04-01 2014-04-01 false Office of Information Technology. 200.26a Section 200.26a Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION...
17 CFR 200.26a - Office of Information Technology.
Code of Federal Regulations, 2013 CFR
2013-04-01
... Organization § 200.26a Office of Information Technology. The Office of Information Technology is responsible... 17 Commodity and Securities Exchanges 2 2013-04-01 2013-04-01 false Office of Information Technology. 200.26a Section 200.26a Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION...
14 CFR § 1274.937 - Security requirements for unclassified information technology resources.
Code of Federal Regulations, 2014 CFR
2014-01-01
... information technology resources. § 1274.937 Section § 1274.937 Aeronautics and Space NATIONAL AERONAUTICS... Conditions § 1274.937 Security requirements for unclassified information technology resources. Security Requirements for Unclassified Information Technology Resources July 2002 (a) The Recipient shall be responsible...
17 CFR 200.26a - Office of Information Technology.
Code of Federal Regulations, 2012 CFR
2012-04-01
... Organization § 200.26a Office of Information Technology. The Office of Information Technology is responsible... 17 Commodity and Securities Exchanges 2 2012-04-01 2012-04-01 false Office of Information Technology. 200.26a Section 200.26a Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION...
17 CFR 200.26a - Office of Information Technology.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Office of Information Technology. 200.26a Section 200.26a Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION... Organization § 200.26a Office of Information Technology. The Office of Information Technology is responsible...
48 CFR 652.239-70 - Information Technology Security Plan and Accreditation.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 48 Federal Acquisition Regulations System 4 2010-10-01 2010-10-01 false Information Technology... Clauses 652.239-70 Information Technology Security Plan and Accreditation. As prescribed in 639.107-70(a), insert the following provision: Information Technology Security Plan and Accreditation (SEP 2007) All...
2011-09-30
centers (e.g. cochlear implant – a first-generation technology). Given the rate of technological development, it seems possible, even likely, that...communities and utilization to support combat operations therein. Facilities Facility requirements will flow from the chosen course of action. Should
Using Technology To Combat Truancy. Number 10 in a Series of CTC Trust Publications.
ERIC Educational Resources Information Center
Haigh, Gerald
The 14 City Technology Colleges (CTCs) opened so far in Great Britain are achieving an average attendance rate of between 90 percent and 97 percent. This high level of attendance has been assisted by the use of electronic registration (role taking) devices, including smart cards, portable computers, and optical readers. This report compares…
The Municipal Environmental Research Laboratory is EPA's research component for the development of technology, systems and processes to combat environmental pollutants that trouble our communities and municipalities. The report discusses the development and demonstration of cost-...
The application of data encryption technology in computer network communication security
NASA Astrophysics Data System (ADS)
Gong, Lina; Zhang, Li; Zhang, Wei; Li, Xuhong; Wang, Xia; Pan, Wenwen
2017-04-01
With the rapid development of Intemet and the extensive application of computer technology, the security of information becomes more and more serious, and the information security technology with data encryption technology as the core has also been developed greatly. Data encryption technology not only can encrypt and decrypt data, but also can realize digital signature, authentication and authentication and other functions, thus ensuring the confidentiality, integrity and confirmation of data transmission over the network. In order to improve the security of data in network communication, in this paper, a hybrid encryption system is used to encrypt and decrypt the triple DES algorithm with high security, and the two keys are encrypted with RSA algorithm, thus ensuring the security of the triple DES key and solving the problem of key management; At the same time to realize digital signature using Java security software, to ensure data integrity and non-repudiation. Finally, the data encryption system is developed by Java language. The data encryption system is simple and effective, with good security and practicality.
A decision support system for managing forest fire casualties.
Bonazountas, Marc; Kallidromitou, Despina; Kassomenos, Pavlos; Passas, Nikos
2007-09-01
Southern Europe is exposed to anthropogenic and natural forest fires. These result in loss of lives, goods and infrastructure, but also deteriorate the natural environment and degrade ecosystems. The early detection and combating of such catastrophes requires the use of a decision support system (DSS) for emergency management. The current literature reports on a series of efforts aimed to deliver DSSs for the management of the forest fires by utilising technologies like remote sensing and geographical information systems (GIS), yet no integrated system exists. This manuscript presents the results of scientific research aiming to the development of a DSS for managing forest fires. The system provides a series of software tools for the assessment of the propagation and combating of forest fires based on Arc/Info, ArcView, Arc Spatial Analyst, Arc Avenue, and Visual C++ technologies. The system integrates GIS technologies under the same data environment and utilises a common user interface to produce an integrated computer system based on semi-automatic satellite image processing (fuel maps), socio-economic risk modelling and probabilistic models that would serve as a useful tool for forest fire prevention, planning and management. Its performance has been demonstrated via real time up-to-date accurate information on the position and evolution of the fire. The system can assist emergency assessment, management and combating of the incident. A site demonstration and validation has been accomplished for the island of Evoia, Greece, an area particularly vulnerable to forest fires due to its ecological characteristics and prevailing wind patterns.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Rhodie, K B; Mailhiot, C; Eaglesham, D
Lawrence Livermore National Laboratory's mission is as clear today as it was in 1952 when the Laboratory was founded--to ensure our country's national security and the safety and reliability of its nuclear deterrent. As a laboratory pursuing applied science in the national interest, we strive to accomplish our mission through excellence in science and technology. We do this while developing and implementing sound and robust business practices in an environment that emphasizes security and ensures our safety and the safety of the community around us. Our mission as a directorate derives directly from the Laboratory's charter. When I accepted themore » assignment of Associate Director for Chemistry and Materials Science (CMS), I talked to you about the need for strategic balance and excellence in all our endeavors. We also discussed how to take the directorate to the next level. The long-range CMS strategic plan presented here was developed with this purpose in mind. It also aligns with the Lab's institutional long-range science and technology plan and its 10-year facilities and infrastructure site plan. The plan is aimed at ensuring that we fulfill our directorate's two governing principles: (1) delivering on our commitments to Laboratory programs and sponsors, and (2) anticipating change and capitalizing on opportunities through innovation in science and technology. This will require us to attain a new level of creativity, agility, and flexibility as we move forward. Moreover, a new level of engagement in partnerships with other directorates across the Laboratory as well as with universities and other national labs will also be required. The group of managers and staff that I chartered to build a strategic plan identified four organizing themes that define our directorate's work and unite our staff with a set of common goals. The plan presented here explains how we will proceed in each of these four theme areas: (1) Materials properties and performance under extreme conditions--Fundamental investigations of the properties and performance of states of matter under extreme dynamic, environmental, and nanoscale conditions, with an emphasis on materials of interest to Laboratory programs and mission needs. (2) Chemistry under extreme conditions and chemical engineering to support national security programs--Insights into the chemical reactions of energetic materials in the nuclear stockpile through models of molecular response to extreme conditions of temperature and pressure, advancing a new technique for processing energetic materials by using sol-gel chemistry, providing materials for NIF optics, and furthering developments to enhance other high-power lasers. (3) Science supporting national objectives at the intersection of chemistry, materials science, and biology--Multidisciplinary research for developing new technologies to combat chemical and biological terrorism, to monitor changes in the nation's nuclear stockpile, and to enable the development and application of new physical-science-based methodologies and tools for fundamental biology studies and human health applications. (4) Applied nuclear science for human health and national security: Nuclear science research that is used to develop new methods and technologies for detecting and attributing nuclear materials, assisting Laboratory programs that require nuclear and radiochemical expertise in carrying out their missions, discovering new elements in the periodic table, and finding ways of detecting and understanding cellular response to radiation.« less
The Threat of Security: Hindering Technology Integration in the Classroom
ERIC Educational Resources Information Center
Robinson, LeAnne K.; Brown, Abbie; Green, Tim
2007-01-01
For the last year the authors have been gathering examples of how perceived "threats of security" are hampering the integration of technology in teaching and learning. They hope that educators will examine both the challenges of increased security demands and ways in which security might enhance, rather than detract from, the use of technology for…
Nuclear security policy in the context of counter-terrorism in Cambodia
NASA Astrophysics Data System (ADS)
Khun, Vuthy; Wongsawaeng, Doonyapong
2016-01-01
The risk of nuclear or dirty bomb attack by terrorists is one of the most urgent and threatening danger. The Cambodian national strategy to combat weapons of mass destruction (WMD) depicts a layered system of preventive measures ranging from securing materials at foreign sources to interdicting weapons or nuclear or other radioactive materials at ports, border crossings, and within the Cambodian institutions dealing with the nuclear security to manage the preventive programs. The aim of this study is to formulate guidance, to identify scenario of threat and risk, and to pinpoint necessary legal frameworks on nuclear security in the context of counterterrorism based on the International Atomic Energy Agency nuclear security series. The analysis of this study is guided by theoretical review, the review of international laws and politics, by identifying and interpreting applicable rules and norms establishing the nuclear security regime and how well enforcement of the regime is carried out and, what is the likelihood of the future reform might be. This study will examine the existing national legal frameworks of Cambodia in the context of counterterrorism to prevent acts of nuclear terrorism and the threat of a terrorist nuclear attack within the Cambodia territory. It will shed light on departmental lanes of national nuclear security responsibility, and provide a holistic perspective on the needs of additional resources and emphasis regarding nuclear security policy in the context of counterterrorism in Cambodia.
Information technology security system engineering methodology
NASA Technical Reports Server (NTRS)
Childs, D.
2003-01-01
A methodology is described for system engineering security into large information technology systems under development. The methodology is an integration of a risk management process and a generic system development life cycle process. The methodology is to be used by Security System Engineers to effectively engineer and integrate information technology security into a target system as it progresses through the development life cycle. The methodology can also be used to re-engineer security into a legacy system.
Fuel Cycle Technologies 2014 Achievement Report
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hong, Bonnie C.
2015-01-01
The Fuel Cycle Technologies (FCT) program supports the Department of Energy’s (DOE’s) mission to: “Enhance U.S. security and economic growth through transformative science, technology innovation, and market solutions to meet our energy, nuclear security, and environmental challenges.” Goal 1 of DOE’s Strategic Plan is to innovate energy technologies that enhance U.S. economic growth and job creation, energy security, and environmental quality. FCT does this by investing in advanced technologies that could transform the nuclear fuel cycle in the decades to come. Goal 2 of DOE’s Strategic Plan is to strengthen national security by strengthening key science, technology, and engineering capabilities.more » FCT does this by working closely with the National Nuclear Security Administration and the U.S Department of State to develop advanced technologies that support the Nation’s nuclear nonproliferation goals.« less
Peterson, P Gabriel; Pak, Sung K; Nguyen, Binh; Jacobs, Genevieve; Folio, Les
2012-12-01
This study aims to evaluate the utility of compressed computed tomography (CT) studies (to expedite transmission) using Motion Pictures Experts Group, Layer 4 (MPEG-4) movie formatting in combat hospitals when guiding major treatment regimens. This retrospective analysis was approved by Walter Reed Army Medical Center institutional review board with a waiver for the informed consent requirement. Twenty-five CT chest, abdomen, and pelvis exams were converted from Digital Imaging and Communications in Medicine to MPEG-4 movie format at various compression ratios. Three board-certified radiologists reviewed various levels of compression on emergent CT findings on 25 combat casualties and compared with the interpretation of the original series. A Universal Trauma Window was selected at -200 HU level and 1,500 HU width, then compressed at three lossy levels. Sensitivities and specificities for each reviewer were calculated along with 95 % confidence intervals using the method of general estimating equations. The compression ratios compared were 171:1, 86:1, and 41:1 with combined sensitivities of 90 % (95 % confidence interval, 79-95), 94 % (87-97), and 100 % (93-100), respectively. Combined specificities were 100 % (85-100), 100 % (85-100), and 96 % (78-99), respectively. The introduction of CT in combat hospitals with increasing detectors and image data in recent military operations has increased the need for effective teleradiology; mandating compression technology. Image compression is currently used to transmit images from combat hospital to tertiary care centers with subspecialists and our study demonstrates MPEG-4 technology as a reasonable means of achieving such compression.
Code of Federal Regulations, 2010 CFR
2010-10-01
... ADMINISTRATIVE MATTERS Safeguarding Classified Information Within Industry 1804.470-2 Policy. NASA IT security...) 2810, Security of Information Technology; NASA Procedural Requirements (NPR) 2810, Security of Information Technology; and interim policy updates in the form of NASA Information Technology Requirements...
DOE Office of Scientific and Technical Information (OSTI.GOV)
Raymond, Kenneth N.
2011-04-08
Early career scientist were provided support to attend and participate in the Actinides 2009 (AN2009) International Conference held in San Francisco, California from 12-17 July 2011. This is the premier conference in the field of actinide chemistry, physics, and materials science of the actinide elements. Participation in the preeminent scientific meeting in actinide science keeps the U.S at the forefront of developments in this key field. The specific involvement of early career scientists combats the loss of expertise in the aforementioned critical areas related to f-element chemistry such as energy, homeland, and environmental security. Without these trained scientists, the U.S.more » will not be able to properly exploit nuclear technology to its fullest and will not be able to address its energy needs in either an environmentally safe or cost–effective manner nor will it be able to provide for its national defense. Furthermore, the early career scientists added greatly to the scientific content of the meeting and stimulates early career scientists to remain in the filed of actinide science. Providing support for participation in the AN2009 Conference via registration fee waivers, hotel cost support, and travel cost support, was extremely effective in securing the participation of early career scientists that would have not otherwise been able to attend.« less
Code of Federal Regulations, 2012 CFR
2012-10-01
..., including consideration of security of resources, protection of privacy, national security and emergency... information technology, agencies shall include the appropriate information technology security policies and requirements, including use of common security configurations available from the National Institute of...
Code of Federal Regulations, 2014 CFR
2014-10-01
..., including consideration of security of resources, protection of privacy, national security and emergency... information technology, agencies shall include the appropriate information technology security policies and requirements, including use of common security configurations available from the National Institute of...
Code of Federal Regulations, 2013 CFR
2013-10-01
..., including consideration of security of resources, protection of privacy, national security and emergency... information technology, agencies shall include the appropriate information technology security policies and requirements, including use of common security configurations available from the National Institute of...
Code of Federal Regulations, 2011 CFR
2011-10-01
..., including consideration of security of resources, protection of privacy, national security and emergency... information technology, agencies shall include the appropriate information technology security policies and requirements, including use of common security configurations available from the National Institute of...
2010-09-01
of Defense DTSA Defense Technology Security Administration FMS Foreign Military Sales GSD Gulf Security Dialogue LOA Letter of Offer and...may refer license applications to the Defense Technology Security Administration ( DTSA ) to determine if the United States should release the...requested technology to the requesting foreign government. Specifically, DTSA assesses the sale’s impact on preserving critical U.S. military technological
National Security Technology Incubator Business Plan
DOE Office of Scientific and Technical Information (OSTI.GOV)
None, None
This document contains a business plan for the National Security Technology Incubator (NSTI), developed as part of the National Security Preparedness Project (NSPP) and performed under a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This business plan describes key features of the NSTI, including the vision and mission, organizational structure and staffing, services, evaluation criteria, marketing strategies, client processes, a budget, incubator evaluation criteria, and a development schedule. The purpose of the NSPP is to promote national security technologies through business incubation, technology demonstration and validation, and workforce development. The NSTI will focus on serving businesses with nationalmore » security technology applications by nurturing them through critical stages of early development. The vision of the NSTI is to be a successful incubator of technologies and private enterprise that assist the NNSA in meeting new challenges in national safety, security, and protection of the homeland. The NSTI is operated and managed by the Arrowhead Center, responsible for leading the economic development mission of New Mexico State University (NMSU). The Arrowhead Center will recruit business with applications for national security technologies recruited for the NSTI program. The Arrowhead Center and its strategic partners will provide business incubation services, including hands-on mentoring in general business matters, marketing, proposal writing, management, accounting, and finance. Additionally, networking opportunities and technology development assistance will be provided.« less
21 CFR 1311.08 - Incorporation by reference.
Code of Federal Regulations, 2010 CFR
2010-04-01
... of Standards and Technology, Computer Security Division, Information Technology Laboratory, National... standards are available from the National Institute of Standards and Technology, Computer Security Division... 140-2, Security Requirements for Cryptographic Modules, May 25, 2001, as amended by Change Notices 2...
Restricted access processor - An application of computer security technology
NASA Technical Reports Server (NTRS)
Mcmahon, E. M.
1985-01-01
This paper describes a security guard device that is currently being developed by Computer Sciences Corporation (CSC). The methods used to provide assurance that the system meets its security requirements include the system architecture, a system security evaluation, and the application of formal and informal verification techniques. The combination of state-of-the-art technology and the incorporation of new verification procedures results in a demonstration of the feasibility of computer security technology for operational applications.
75 FR 28275 - Homeland Security Science and Technology Advisory Committee
Federal Register 2010, 2011, 2012, 2013, 2014
2010-05-20
... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2010-0020] Homeland Security Science and...; Notice of Closed Federal Advisory Committee Meeting. SUMMARY: On April 12, 2010, the Homeland Security...: The Homeland Security Science and Technology Advisory Committee met on April 20, 2010 from 8:30 a.m...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-07-29
...: Technology Security/Clearance Plans, Screening Records, and Non-Disclosure Agreements ACTION: Notice of... Information Collection: Technology Security/ Clearance Plans, Screening Records, and Non-Disclosure Agreements...: None. Respondents: Business and Nonprofit Organizations, Foreign Governments. Estimated Number of...
32 CFR 2400.46 - Suggestions or complaints.
Code of Federal Regulations, 2014 CFR
2014-07-01
... POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.46... Science and Technology Policy Information Security Program should do so in writing. This correspondence...
32 CFR 2400.46 - Suggestions or complaints.
Code of Federal Regulations, 2012 CFR
2012-07-01
... POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.46... Science and Technology Policy Information Security Program should do so in writing. This correspondence...
32 CFR 2400.46 - Suggestions or complaints.
Code of Federal Regulations, 2010 CFR
2010-07-01
... POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.46... Science and Technology Policy Information Security Program should do so in writing. This correspondence...
32 CFR 2400.46 - Suggestions or complaints.
Code of Federal Regulations, 2011 CFR
2011-07-01
... POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.46... Science and Technology Policy Information Security Program should do so in writing. This correspondence...
32 CFR 2400.46 - Suggestions or complaints.
Code of Federal Regulations, 2013 CFR
2013-07-01
... POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.46... Science and Technology Policy Information Security Program should do so in writing. This correspondence...
76 FR 41274 - Committee Name: Homeland Security Science and Technology Advisory Committee (HSSTAC)
Federal Register 2010, 2011, 2012, 2013, 2014
2011-07-13
..., cyber-security, knowledge management and how best to leverage related technologies funded by other... Science and Technology Advisory Committee (HSSTAC) ACTION: Committee Management; Notice of Federal... Committee Management Secretariat, General Services Administration. Name of Committee: Homeland Security...
ERIC Educational Resources Information Center
Schneider, Tod
2010-01-01
Over the past decade electronic security technology has evolved from an exotic possibility into an essential safety consideration. Before resorting to high-tech security solutions, school officials should think carefully about the potential for unintended consequences. Technological fixes may be mismatched to the problems being addressed. They can…
Input from Key Stakeholders in the National Security Technology Incubator
DOE Office of Scientific and Technical Information (OSTI.GOV)
None
This report documents the input from key stakeholders of the National Security Technology Incubator (NSTI) in developing a new technology incubator and related programs for southern New Mexico. The technology incubator is being developed as part of the National Security Preparedness Project (NSPP), funded by a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This report includes identification of key stakeholders as well as a description and analysis of their input for the development of an incubator.
Australia’s Efforts to Improve Food Security for Aboriginal and Torres Strait Islander Peoples
2016-01-01
Abstract Australia is a wealthy country; however, available evidence suggests that food security among Aboriginal and Torres Strait Islander peoples has not yet been achieved. Aboriginal and Torres Strait Islander peoples living in remote, regional, and urban parts of Australia experience food insecurity for a number of reasons that usually include low income and a lack of access to affordable and healthy food. The much higher rate of illness and disease that this population experiences compared to non-indigenous Australians is directly related to food insecurity. This paper examines the food insecurity among Aboriginal and Torres Strait Islander peoples and recent Australian government efforts to combat this problem. The paper first considers what constitutes a human rights-based approach to achieving food security. Second, it describes the food insecurity that currently exists among Aboriginal and Torres Strait Islander peoples across the three pillars of food access, food availability, and food use. Third, the paper critically examines recent and current Australian government policy aimed at improving food security. The paper concludes with some reflections regarding how the Australian government can improve its efforts to achieve food security for Aboriginal and Torres Strait Islander peoples. PMID:28559687
2013-02-14
the NGB and Combatant Commanders seek to formalize increased funding for SPP engagements via the Future Years Defense Program...shoulder a larger portion of their security burden in the future . The challenge for American diplomats, in and out of uniform, is to reassure our...rebalance? The National Guard’s State Partnership Program (SPP) has a 20-year history of cementing alliances between America and partner nations for
2014-05-22
referred to here as North Korea, which claimed “ jurisdiction over all Korea.”56 By November 1948, only the 7,500 troops of the Fifth Regimental Combat Team...military budgets throughout the fall and winter of 1950 could not readily overcome the inertia of a dormant industrial base and provide immediate...stocks of the Far East and stateside inventories as General Larkin predicted three weeks before the
2017-06-09
were processed. This program was designed to target a wide variety of combatants, with special emphasis placed on child soldiers. With these...Brzoska, SSR has its origin in the development of donor debate, where there has been ongoing discussion among different groups of theoreticians on how...human rights, humanitarian relief, and electoral reform. This document describes the framework on how post -war Liberia should implement the peace
Trans-American Security: What’s Missing? Strategic Forum, Number 228, September 2007
2007-09-01
at abuses of the rights of suspects. The Inter-American Committee against Ter- rorism (Comité Interamericano Contra el Terrorismo [CICTE]) provides a...differences between Argentina and Chile were resolved with the help of Papal mediation. In 1995, the Upper Cenepa war pitted Ecuador against Peru in sudden...dor- Peru (MOMEP).7 MOMEP’s forces were coordinated by a Brazilian general and suc- ceeded first in separating 5,000 intertwined combatant forces
Improved and Cost Effective Machining Techniques for Tracked Combat Vehicle Parts
1983-10-01
steel is shown in Figure 7-7 and consists of tempered marten- site. Three of the alloys which are used in the gas turbine engine are cast 17 - 4PH ...stainless steel, Inconel 718 and Inconel 713. The 17 - 4PH stainless steel was machined in the solution treated and aged condition. The microstructure as shown...SECURITY CLASS. (of thia report) ISa. DECLASSIFICATION/DOWNGRADING SCHEDULE 16. DISTRIBUTION STATEMENT (of thie Report) 17 . DISTRIBUTION STATEMENT (of
Risking NATO: Testing the Limits of the Alliance in Afghanistan
2010-01-01
Boston Globe, September 12, 2002; Glenn Kessler , “Diplomatic Gap Between U.S., Its Allies Widens,” Washington Post, September 1, 2002. 10 Secretary...partnership with Afghanistan 14 See Seth G. Jones, “The State of the Afghan Insurgency,” testimony presented before the Canadian Senate National Security...concerns about merging the NATO peacekeep- ing and U.S. combat missions in Afghanistan. See Seth G. Jones, In the Graveyard of Empires: America’s War in
National Security Crisis Decision-Making: The Role of Regional Combatant Commander
2007-05-03
Schwarzkopf, 331. 63 GEN Schwarzkopf testified that “the greatest threat US interests in the [USCENTCOM] area is the spillover of a regional conflict...Military and U.S. Foreign Policy, 1std ed. (New York: Palgrave Macmillan, 2004), 106. 89 Ibid., 95-97. 33 form of genocide against the Kosovar...and Rwanda , Africa. As J5 he was involved in policy discussions and negotiations on the continuing problems in Bosnia and North Korea, and writing
2015-04-07
ships, equipped with advanced anti-ship, anti- air, and anti-submarine weapons and sensors . Whereas “near seas” defense remains the PLA Navy’s...that “destroying or capturing satellites and other sensors … will deprive an opponent of initiative on the battlefield and [make it difficult] for...aircraft are modern avionics and sensors that offer more timely situational awareness for operations in network-centric combat environments, radars
2014-04-24
other sensors … will deprive an opponent of initiative on the battlefield and [make it difficult] for them to bring their precision guided weapons...features include modern avionics and sensors that offer more timely situational awareness for operations in network-centric combat environments...JF12 hypersonic wind tunnel, reportedly the largest in the world, capable of replicating flying conditions at mach 5 to 9. This project was one of
Future U.S. Security Relationships with Iraq and Afghanistan: U.S. Air Force Roles
2008-01-01
and Review Process PERSTEMPO personnel tempo PIJ Palestinian Islamic Jihad PKK Kurdistan Workers Party PSYOPS psychological operations RDT&E research...sustained insurgency with popular support. 7 For more on Hizballah’s use of combat footage as a psychological warfare instrument, see Frederic M. Wehrey, “A...Clash of Wills: Hizballah’s Psychological Campaign in South Lebanon,” Small Wars and Insurgencies, Vol. 13, No. 3, Autumn 2002, pp. 53–74. 8 Author
The C2 Workstation and Data Replication over Disadvantaged Tactical Communication Links
2007-09-01
person shall be subject to a penalty for failing to comply with a collection of information if it does not display a currently valid OMB control number...SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT UU 18. NUMBER OF PAGES 14 19a. NAME OF RESPONSIBLE PERSON a. REPORT unclassified b...PUBLIC RELEASE C2WS Physical Environment Zodiac Network Radio Network Combat Level Node (Vehicle) Radio Local Store Local Store Local Store To Other
Advising Foreign Security Forces: Implications of Korea and Vietnam
2010-12-02
advisors worked to train and retrain a quarter of a million French and Italian troops for combat in France following the North Africa landings, and...navigating sensitive political or diplomatic waters . Today, as in Korea and Vietnam, other than the Special Warfare School at Fort Bragg or the 162nd...of Korea: America’s First Committment in the Cold War, 1946-1950." In Military Advising and Assistance: From Mercenaries to Privitization , 1815-2007
Management of the Severely Mentally Ill and Its Effects on Homeland Security
2011-09-01
system to the criminal justice system as it relates to its effect on prison overcrowding and attempts at combating prison and jail radicalization...alcohol and/or illegal drugs ; failure to stay on prescribed medications or failure to find effective treatment; also inability to stay employed due...or 30 years ago. Meth related Psychosis. Increased drug use. In ability for family’s to deal with the mental health person and put the burden on
2010-05-01
textiles include “soft” body armor; spall liners for combat vehicles; flame protection garments; and protective braided sleeves for hoses and cable...summarizes the results of an Interim Base Case analysis of those materials as well. Chapter Four offers IDA’s initial ideas regarding opportunities that...process in the requirements analysis process by which the department determines the NDS goals, or stockpile requirements, it will recommend to the
Radical Islam in West Africa and Effects on Security in the West Africa Sub-Region
2010-12-10
financing networks involved in the sale of diamonds coupled with the migration of the Al Qaida-linked Salafist Group for Preaching and Combat (GSPC) from...others, that the availability of finance is very influential and substantially increases conflict risk. Secondly, male secondary education enrollment...Muhammad and other prophets is a religious value worthy of pursuit in terms of life goals, finances , and personal sacrifice in the cause of Allah
2011-01-01
economy to freer trade, and helped liberate controls over business, the press, and civil society. The deterioration of the political system also led to a...munici- pal population to identify and allocate funds to eligible municipalities ( Estados Unidos Mexicanos, 2008). The two munici- palities with the...Mexico City, Mexico, “Merida Initiative at a Glance: Combating Violence in Juárez, September 2010. Bibliography 61 Estados Unidos Mexicanos, Diario
Honduras’ National Security Strategy To Combat Terrorism
2006-12-01
ENVIRONMENT Culture in “ancient” America was based in two major locations. In Mexico and Central America were the Aztecs and the Mayas, and in Peru were the...Colombia), the drugs transit via the West Indies, Central America and Mexico (fig. 2), which are the trafficking centers of the international mafia...by migrants.42 Some of the factors that contribute to the increase of gang activities in Central America, Mexico , and the U.S. are: income
Defense Logistical Support Contracts in Iraq and Afghanistan: Issues for Congress
2010-09-20
Services Committee on April 14, 2010. The bill was amended by the HASC on April 21, 2010, discharged by the House Oversight and Government Reform Committee...Afghanistan; • Section 852 calls for the Army Audit Agency, the Navy Audit Services, and the Air Force Audit Agency to each conduct a comprehensive audit of...security functions in areas of combat operations and are involved in the discharge of a weapon or other active, non-lethal countermeasures; and
Defense Contracting in Iraq and Afghanistan: Issues and Options for Congress
2009-02-19
Afghanistan; • Section 852 calls for the Army Audit Agency, the Navy Audit Services, and the Air Force Audit Agency to each conduct a comprehensive audit of...perform security functions in areas of combat operations and are involved in the discharge of a weapon or other active, non-lethal countermeasures; and...strengthen the government’s hand in dealing with industry. As an example, Secretary of the Navy Donald C. Winter and Chief of Naval Operations Adm
Defense Logistical Support Contracts in Iraq and Afghanistan: Issues for Congress
2009-06-24
on Wartime Contracting in Iraq and Afghanistan; • Section 852 calls for the Army Audit Agency, the Navy Audit Services, and the Air Force Audit...reporting requirements for contractors that perform security functions in areas of combat operations and are involved in the discharge of a weapon or other...hand in dealing with industry. As an example, Secretary of the Navy Donald C. Winter and Chief of Naval Operations Adm. Michael G. Mullen have reported
Convergence: Illicit Networks and National Security in the Age of Globalization
2013-01-01
four decades of combat. 52 “The FARC Files: Venezuela, Ecuador and the Secret Archives of ‘Raúl Reyes.’” The Colombian government gave the International...Why Guatemala?” Hubs versus Havens “There are so many forgotten places, out of government control, too scary for investors and tourists ,” Antonio Maria...represent the views of the Defense Department or any other agency of the Federal Government . Cleared for public release; distribution unlimited
2016-06-10
reserve force. One of the many innovative opportunities for soldiers, leaders, and units is the USAR’s Private Public Partnership Program (P3). This...opportunities for the reserve force. One of the many innovative opportunities for soldiers, leaders, and units is the USAR’s Private Public Partnership...21 National Strategic Direction
U.S. Navy Bloodhounds: Establishing A New Maritime Security Combatant
2016-06-01
did=787381. 85 Source: USCG Public Affairs Office, “Coast Guard Interdicts 2 Pangas, 12,000 Pounds of Marijuana ,” United States Coast Guard Newsroom...available-Coast-Guard-interdicts-2-pangas-12-000-pounds-of- marijuana . 24 contributing to over 335,000 drug-related deaths in the same 10-year span.86...91 This advocacy is important because TCOs evade traditional land based borders, smuggling metric tons of marijuana and cocaine via maritime routes
Potential application of LIBS to NNSA next generation safeguards initiative (NGSI)
DOE Office of Scientific and Technical Information (OSTI.GOV)
Barefield Ii, James E; Clegg, Samuel M; Veirs, Douglas K
2009-01-01
In a climate in which states and nations have been and perhaps currently are involved in the prol iferation of nuclear materials and technologies, advanced methodologies and improvements in current measurement techniques are needed to combat new threats and increased levels of sophistication. The Department of Energy through the National Nuclear Security Administration (NNSA) has undertaken a broad review of International Safeguards. The conclusion from that review was that a comprehensive initiative to revitalize international safeguards technology and the human resource base was urgently needed to keep pace with demands and increasingly sophisticated emerging safeguards challenges. To address these challenges,more » NNSA launched the Next Generation Safeguards Initiative (NGSI) to develop policies, concepts, technologies, expertise, and infrastructure necessary to sustain the international safeguards system as its mission evolves for the next 25 years. NGSI is designed to revitalize and strengthen the U.S. safeguards technical base, recognizing that without a robust program the United States of America will not be in a position to exercise leadership or provide the necessary support to the IAEA (International Atomic Energy Agency). International safeguards as administrated by the IAEA are the primary vehicle for verifying compliance with the peaceful use and nonproliferation of nuclear materials and technologies. Laser Induced Breakdown Spectroscopy or LIBS has the potential to support the goals of NGSI as follows: by providing (1) automated analysis in complex nuclear processing or reprocessing facilities in real-time or near real-time without sample preparation or removal, (2) isotopic and important elemental ratio (Cm/Pu, Cm/U, ... etc) analysis, and (3) centralized remote control, process monitoring, and analysis of nuclear materials in nuclear facilities at multiple locations within the facility. Potential application of LIBS to international safeguards as outlined in the NGSI will be discussed.« less
1994-06-03
transport , the effects of technology, terrain and weather, and physical conditioning. Load, Soidier’s Load, Rucksack, Physical Conditioning, Combat Load...Fighting Load, Sustainment Load, Approach March Load, Fear, Fatigue, Risk, Training, Transport , Techn-logy UNCLASSIFIED UNCLASSIFIED UNCLASSIFIED I .1 THE...standards, myths of peacetime training, the nature of the soldier, lack of transport , the effects of technology, terrain and weather, and physical
The Need for Non-Lethal Weapons in Major Combat Operations
2008-04-23
and sent out a shock wave similar to a sonic boom that in theory could have downed a B-17 bomber. Its effects 4 were disabling, rather than...malodorants and toxic incapacitating agents) Mechanical technologies (including nets and barriers) Acoustic technologies (such as infra - and...oxide AUDIBLE INFRASONIC ULTRASONIC BARRIERS Caltrops Tire spikes and strips ENTANGLEMENTS Portable vehicle arresting barrier Running
NASA Technical Reports Server (NTRS)
Swanson, David J.
1990-01-01
The electromagnetic interference prediction problem is characteristically ill-defined and complicated. Severe EMI problems are prevalent throughout the U.S. Navy, causing both expected and unexpected impacts on the operational performance of electronic combat systems onboard ships. This paper focuses on applying artificial intelligence (AI) technology to the prediction of ship related electromagnetic interference (EMI) problems.
Marketing Plan for Demonstration and Validation Assets
DOE Office of Scientific and Technical Information (OSTI.GOV)
None, None
The National Security Preparedness Project (NSPP), is to be sustained by various programs, including technology demonstration and evaluation (DEMVAL). This project assists companies in developing technologies under the National Security Technology Incubator program (NSTI) through demonstration and validation of technologies applicable to national security created by incubators and other sources. The NSPP also will support the creation of an integrated demonstration and validation environment. This report documents the DEMVAL marketing and visibility plan, which will focus on collecting information about, and expanding the visibility of, DEMVAL assets serving businesses with national security technology applications in southern New Mexico.
Intelligent Processing Equipment Projects at DLA
NASA Technical Reports Server (NTRS)
Obrien, Donald F.
1992-01-01
The Defense Logistics Agency is successfully incorporating Intelligent Processing Equipment (IPE) into each of its Manufacturing Technology thrust areas. Several IPE applications are addressed in the manufacturing of two 'soldier support' items: combat rations and military apparel. In combat rations, in-line sensors for food processing are being developed or modified from other industries. In addition, many process controls are being automated to achieve better quality and to gain higher use (soldier) acceptance. IPE applications in military apparel include: in-process quality controls for identification of sewing defects, use of robots in the manufacture of shirt collars, and automated handling of garments for pressing.
Chapter 3 innovations in the en route care of combat casualties.
Hatzfeld, Jennifer J; Dukes, Susan; Bridges, Elizabeth
2014-01-01
The en route care environment is dynamic and requires constant innovation to ensure appropriate nursing care for combat casualties. Building on experiences in Iraq and Afghanistan, there have been tremendous innovations in the process of transporting patients, including the movement of patients with spinal injuries. Advances have also been made in pain management and noninvasive monitoring, particularly for trauma and surgical patients requiring close monitoring of their hemodynamic and perfusion status. In addition to institutionalizing these innovations, future efforts are needed to eliminate secondary insults to patients with traumatic brain injuries and technologies to provide closed-loop sedation and ventilation.
Intelligent processing equipment projects at DLA
NASA Astrophysics Data System (ADS)
Obrien, Donald F.
1992-04-01
The Defense Logistics Agency is successfully incorporating Intelligent Processing Equipment (IPE) into each of its Manufacturing Technology thrust areas. Several IPE applications are addressed in the manufacturing of two 'soldier support' items: combat rations and military apparel. In combat rations, in-line sensors for food processing are being developed or modified from other industries. In addition, many process controls are being automated to achieve better quality and to gain higher use (soldier) acceptance. IPE applications in military apparel include: in-process quality controls for identification of sewing defects, use of robots in the manufacture of shirt collars, and automated handling of garments for pressing.
TARDEC's Intelligent Ground Systems overview
NASA Astrophysics Data System (ADS)
Jaster, Jeffrey F.
2009-05-01
The mission of the Intelligent Ground Systems (IGS) Area at the Tank Automotive Research, Development and Engineering Center (TARDEC) is to conduct technology maturation and integration to increase Soldier robot control/interface intuitiveness and robotic ground system robustness, functionality and overall system effectiveness for the Future Combat System Brigade Combat Team, Robotics Systems Joint Project Office and game changing capabilities to be fielded beyond the current force. This is accomplished through technology component development focused on increasing unmanned ground vehicle autonomy, optimizing crew interfaces and mission planners that capture commanders' intent, integrating payloads that provide 360 degree local situational awareness and expanding current UGV tactical behavior, learning and adaptation capabilities. The integration of these technology components into ground vehicle demonstrators permits engineering evaluation, User assessment and performance characterization in increasingly complex, dynamic and relevant environments to include high speed on road or cross country operations, all weather/visibility conditions and military operations in urban terrain (MOUT). Focused testing and experimentation is directed at reducing PM risk areas (safe operations, autonomous maneuver, manned-unmanned collaboration) and transitioning technology in the form of hardware, software algorithms, test and performance data, as well as User feedback and lessons learned.
Marketing and reputation aspects of neonatal safeguards and hospital-security systems.
Smith, Alan D
2009-01-01
Technological advancements have migrated from personal-use electronics into the healthcare setting for security enhancements. Within maternity wards and nurseries, technology was seen as one of best way to protect newborns from abduction. The present study is a focus on what systems and methods are used in neonatal security, the security arrangements, staff training, and impacts outside the control of the hospital, customer satisfaction and customer relations management. Through hypothesis-testing and exploratory analysis, gender biases and extremely high levels of security were found within a web-enabled and professional sample of 200 respondents. The factor-based constructs were found to be, in order of the greatest explained variance: security concerns, personal technology usage, work technology applications, and demographic maturity concerns, resulting in four factor-based scores with significant combined variance of 61.5%. It was found that through a better understanding on the importance and vital need for hospitals to continue to improve on their technology-based security policies significantly enhanced their reputation in the highly competitive local healthcare industry.
2010-08-22
practice for information security management ( ISO /IEC 27002 ),” “Information technology — Security techniques — Information security management...systems —Requirements ( ISO /IEC 27002 ),”, “Information technology — Security techniques — Information security risk management ( ISO /IEC 27005).” from...associated practice aids. Perhaps the most germane discovery from this effort was a draft ISO standard on Systems and software engineering, Systems and
48 CFR 1804.470 - Security requirements for unclassified information technology (IT) resources.
Code of Federal Regulations, 2013 CFR
2013-10-01
... 48 Federal Acquisition Regulations System 6 2013-10-01 2013-10-01 false Security requirements for unclassified information technology (IT) resources. 1804.470 Section 1804.470 Federal Acquisition Regulations... Classified Information Within Industry 1804.470 Security requirements for unclassified information technology...
48 CFR 1804.470 - Security requirements for unclassified information technology (IT) resources.
Code of Federal Regulations, 2011 CFR
2011-10-01
... 48 Federal Acquisition Regulations System 6 2011-10-01 2011-10-01 false Security requirements for unclassified information technology (IT) resources. 1804.470 Section 1804.470 Federal Acquisition Regulations... Classified Information Within Industry 1804.470 Security requirements for unclassified information technology...
48 CFR 1804.470 - Security requirements for unclassified information technology (IT) resources.
Code of Federal Regulations, 2014 CFR
2014-10-01
... 48 Federal Acquisition Regulations System 6 2014-10-01 2014-10-01 false Security requirements for unclassified information technology (IT) resources. 1804.470 Section 1804.470 Federal Acquisition Regulations... Classified Information Within Industry 1804.470 Security requirements for unclassified information technology...
48 CFR 1804.470 - Security requirements for unclassified information technology (IT) resources.
Code of Federal Regulations, 2012 CFR
2012-10-01
... 48 Federal Acquisition Regulations System 6 2012-10-01 2012-10-01 false Security requirements for unclassified information technology (IT) resources. 1804.470 Section 1804.470 Federal Acquisition Regulations... Classified Information Within Industry 1804.470 Security requirements for unclassified information technology...
48 CFR 1804.470 - Security requirements for unclassified information technology (IT) resources.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 48 Federal Acquisition Regulations System 6 2010-10-01 2010-10-01 true Security requirements for unclassified information technology (IT) resources. 1804.470 Section 1804.470 Federal Acquisition Regulations... Classified Information Within Industry 1804.470 Security requirements for unclassified information technology...
32 CFR 2400.45 - Information Security Program Review.
Code of Federal Regulations, 2011 CFR
2011-07-01
... Section 2400.45 National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.45...
32 CFR 2400.45 - Information Security Program Review.
Code of Federal Regulations, 2010 CFR
2010-07-01
... Section 2400.45 National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.45...
32 CFR 2400.45 - Information Security Program Review.
Code of Federal Regulations, 2012 CFR
2012-07-01
... Section 2400.45 National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.45...
32 CFR 2400.45 - Information Security Program Review.
Code of Federal Regulations, 2014 CFR
2014-07-01
... Section 2400.45 National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.45...
32 CFR 2400.45 - Information Security Program Review.
Code of Federal Regulations, 2013 CFR
2013-07-01
... Section 2400.45 National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.45...
Small Technology Business Incubation Needs
DOE Office of Scientific and Technical Information (OSTI.GOV)
None, None
2007-12-31
This report contains a summary of typical business incubation needs of small technology companies. This document will serve as a guide in the design and implementation of services offered by the National Security Technology Incubator (NSTI), an incubator program being designed and developed as part of the National Security Preparedness Project (NSPP), performed under a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This report includes a brief description of the methodology used to perform the needs assessment and services proposed to meet the needs of client companies. The purpose of the NSPP is to promote national security technologiesmore » through business incubation, technology demonstration and validation, and workforce development. The NSTI will focus on serving businesses with national security technology applications by nurturing them through critical stages of early development. The vision of the NSTI is to be a successful incubator of technologies and private enterprise that assist the NNSA in meeting new challenges in national safety, security, and protection of the homeland.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
Davis, Scott J.; Edwards, Shatiel B.; Teper, Gerald E.
We report that recent budget reductions have posed tremendous challenges to the U.S. Army in managing its portfolio of ground combat systems (tanks and other fighting vehicles), thus placing many important programs at risk. To address these challenges, the Army and a supporting team developed and applied the Capability Portfolio Analysis Tool (CPAT) to optimally invest in ground combat modernization over the next 25–35 years. CPAT provides the Army with the analytical rigor needed to help senior Army decision makers allocate scarce modernization dollars to protect soldiers and maintain capability overmatch. CPAT delivers unparalleled insight into multiple-decade modernization planning usingmore » a novel multiphase mixed-integer linear programming technique and illustrates a cultural shift toward analytics in the Army’s acquisition thinking and processes. CPAT analysis helped shape decisions to continue modernization of the $10 billion Stryker family of vehicles (originally slated for cancellation) and to strategically reallocate over $20 billion to existing modernization programs by not pursuing the Ground Combat Vehicle program as originally envisioned. Ultimately, more than 40 studies have been completed using CPAT, applying operations research methods to optimally prioritize billions of taxpayer dollars and allowing Army acquisition executives to base investment decisions on analytically rigorous evaluations of portfolio trade-offs.« less
Davis, Scott J.; Edwards, Shatiel B.; Teper, Gerald E.; ...
2016-02-01
We report that recent budget reductions have posed tremendous challenges to the U.S. Army in managing its portfolio of ground combat systems (tanks and other fighting vehicles), thus placing many important programs at risk. To address these challenges, the Army and a supporting team developed and applied the Capability Portfolio Analysis Tool (CPAT) to optimally invest in ground combat modernization over the next 25–35 years. CPAT provides the Army with the analytical rigor needed to help senior Army decision makers allocate scarce modernization dollars to protect soldiers and maintain capability overmatch. CPAT delivers unparalleled insight into multiple-decade modernization planning usingmore » a novel multiphase mixed-integer linear programming technique and illustrates a cultural shift toward analytics in the Army’s acquisition thinking and processes. CPAT analysis helped shape decisions to continue modernization of the $10 billion Stryker family of vehicles (originally slated for cancellation) and to strategically reallocate over $20 billion to existing modernization programs by not pursuing the Ground Combat Vehicle program as originally envisioned. Ultimately, more than 40 studies have been completed using CPAT, applying operations research methods to optimally prioritize billions of taxpayer dollars and allowing Army acquisition executives to base investment decisions on analytically rigorous evaluations of portfolio trade-offs.« less
Ben-Shalom, Uzi
2015-01-01
Accidents with small arms and munitions during deployment is a significant safety concern for leaders and safety specialists in combat units. Operational stress may lead to forms of unacceptable risk taking with small arms that may underlie some of these accidents. The present research studied the correlation between two dimensions of operational stress, two forms of risk taking with small arms among combat unit soldiers and possible mediators. The dimensions of operational threat, negative affect and personality profile from the EPQ-R-S were predictors; "exaggerated preparedness" and "risky games with small arms and munitions" were dependent variables; safety climate of the platoon served as a mediator variable. The participants were 461 compulsory service combat soldiers in 31 companies. This field study was conducted during period of top security alert. The results reveal that perceived threat is indeed correlated with exaggerated operational preparedness whereas general emotional state was correlated with risky games with small arms. Safety climate mediated only the correlation between general emotional state and risky games with small arms and munitions. Preparedness and risky games were predicted by the interaction of Psychoticism and the Lie Scale from the EPQ-R-S. The results may enhance the efforts in reducing risk taking and prevention of accidents with small arms and munitions during and following deployment.
Technology Requirements and Selection for Securely Partitioning OBSW
NASA Astrophysics Data System (ADS)
Mendham, Peter; Windsor, James; Eckstein, Knut
2010-08-01
The Securely Partitioning Spacecraft Computing Resources project is a current ESA TRP activity investigating the application of secure time and space partitioning (TSP) technologies to enable multi-use missions from a single platform. Secure TSP technologies are used in a number of application areas outside the space domain and an opportunity exists to 'spin-in' a suitable solution. The selection of a technology for use within space the European space industry relies on an understanding of the requirements for the application of secure TSP, of which this paper presents a summary. Further, the paper outlines the selection process taken by the project and highlights promising solutions for use today.
National Security Technology Incubator Evaluation Process
DOE Office of Scientific and Technical Information (OSTI.GOV)
None, None
This report describes the process by which the National Security Technology Incubator (NSTI) will be evaluated. The technology incubator is being developed as part of the National Security Preparedness Project (NSPP), funded by a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This report includes a brief description of the components, steps, and measures of the proposed evaluation process. The purpose of the NSPP is to promote national security technologies through business incubation, technology demonstration and validation, and workforce development. The NSTI will focus on serving businesses with national security technology applications by nurturing them through critical stages ofmore » early development. An effective evaluation process of the NSTI is an important step as it can provide qualitative and quantitative information on incubator performance over a given period. The vision of the NSTI is to be a successful incubator of technologies and private enterprise that assist the NNSA in meeting new challenges in national safety and security. The mission of the NSTI is to identify, incubate, and accelerate technologies with national security applications at various stages of development by providing hands-on mentoring and business assistance to small businesses and emerging or growing companies. To achieve success for both incubator businesses and the NSTI program, an evaluation process is essential to effectively measure results and implement corrective processes in the incubation design if needed. The evaluation process design will collect and analyze qualitative and quantitative data through performance evaluation system.« less