Terrorists and Nuclear Technology
ERIC Educational Resources Information Center
Krieger, David
1975-01-01
This essay explores the ways terrorist groups may gain possession of nuclear materials; the way in which they may use nuclear weapons and other nuclear technologies to their benefit; and various courses of action designed to minimize the possibilities of terrorists utilizing nuclear technology to their benefit and society's detriment. (BT)
Preparedness and response to terrorism: a framework for public health action.
Gofin, Rosa
2005-02-01
Political group violence in the form of terrorist actions has become a reality worldwide, affecting the health and economies of populations. As a consequence, preparedness and response are becoming an integral part of public health action. Risk appraisal, preservation of human and civil rights and communications within and between countries are all issues to be considered in the process. The combination of the natural history of terrorist actions and the epidemiological triangle model has been adapted in this paper and suggested as a comprehensive approach for preparedness and action. It covers preparedness (pre-event), response (event) and the consequences (post-event) of a terrorist attack. It takes into account the human factor, vectors and environment involved in each one of the phases. Terrorism is a global reality with varying underlying causes, manifestations and impact on the health of the public. Preparedness, response and rehabilitation are an integral part of public health action. Consideration of the pre-event, event and post-event phases in terrorist actions, together with the human factor, vector/agent and environment in each of these phases, offers a framework for public health preparedness, response and rehabilitation. Planning should consider risk assessment, risk communication, inter-sectorial cooperation, enactment of laws and regulations which consider protection of the public's health and civil liberties. Allocation of resources would need to make allowance for maintenance and development of ongoing public health activities.
Federal Register 2010, 2011, 2012, 2013, 2014
2011-07-06
... Terrorist Screening Database System of Records AGENCY: Privacy Office, DHS. ACTION: Notice of proposed... Use of the Terrorist Screening Database System of Records'' and this proposed rulemaking. In this... Use of the Terrorist Screening Database (TSDB) System of Records.'' DHS is maintaining a mirror copy...
Identifying and structuring the objectives of terrorists.
Keeney, Gregory L; Von Winterfeldt, Detlof
2010-12-01
The risk of terrorism is of great concern to many countries and significant resources are spent to counter this threat. A better understanding of the motivation of terrorists and their reasons for selecting certain modes and targets of attack can help improve the decisions to allocate resources in the fight against terrorism. The fundamental question addressed in this article is: "What do terrorists want?" We take the view that terrorists' preferences for actions are based on their values and beliefs. An important missing piece in our knowledge of terrorists' preferences is an understanding of their values. This article uses a novel approach to determine these values and state them as objectives, using principles from decision analysis and value-focused thinking. Instead of interviewing decisionmakers and stakeholders, as would be normal in decision analysis, we extract the values of terrorists by examining their own writings and verbal statements. To illustrate the approach, we extract the values of Al-Qaeda and structure them in terms of strategic, fundamental, and means objectives. These objectives are interrelated through a means-ends network. This information is useful for understanding terrorists' motivations, intent, and likely actions, as well as for developing policies to counter terrorism at its root causes. © 2010 Society for Risk Analysis.
Inferring cognition from action: does martyrdom imply its motive?
Weiss, David J; Weiss, Jie
2014-08-01
Drawing inferences about the decision utilities of suicide terrorists from their final action is tempting, but hazardous. Direct elicitation of those utilities would be more informative, but is infeasible. Substituting examination of archival materials for elicitation makes the assumption that leaders and bombers have similar utilities. Insight regarding the beliefs of terrorist leaders might be available from observations of recruitment strategies.
American hospitals react to terrorist attacks with determination.
Rees, T
2001-01-01
In this timely special section, editor Tom Rees recounts some of the swift, supportive actions health care providers took in response to the Sept. 11 terrorist attacks on the World Trade Center and the Pentagon.
Combatting the Terrorist Threat.
1985-05-22
tomorrow. Today terrorist actions carried out against US interests occur primarily in Guatemala, Honduras, El Salvador, Nicaragua, Colombia, Peru , and Chile...provided arms, financial support, and safehavens for revolutionary groups from El Salvador and Honduras. 9 In Peru the Maoist guerrilla group Sendero...I DTIC TAB U --anoinced El Justificatio By Distributi-,n/ WtI3ATIN THE TERRORIST THREAT Availability CodesAvail and/or A GRUP SIJDY PPOEC Dist Special
A European Solution to Islamic Extremism in Western Europe
2006-04-14
Physically destroying terrorist organizations (“direct action”) is an effective tool. Where freedom of action and freedom of movement exist, there... effectiveness and sometimes duplicate effort. This paper will explain the growing Islamic extremist threat in Western Europe and present a case for why that...native-born youth franchise al-Qa’ida and execute a terrorist attack that effects a change in government. Terrorists executed a planned and deliberate
Preparing Schools for Terrorist Attacks.
ERIC Educational Resources Information Center
School Safety, 1991
1991-01-01
Outlines 21 actions, both immediate and over the long term, that administrators can take to protect students and schools from terrorist activities. Includes establishing a chain of command, a command post, a crisis response team, a communications staff, and inservice training. (four references) (MLF)
DOE Office of Scientific and Technical Information (OSTI.GOV)
Medina, Richard M; Siebeneck, Laura K.; Hepner, George F.
2011-01-01
As terrorism on all scales continues, it is necessary to improve understanding of terrorist and insurgent activities. This article takes a Geographic Information Systems (GIS) approach to advance the understanding of spatial, social, political, and cultural triggers that influence terrorism incidents. Spatial, temporal, and spatiotemporal patterns of terrorist attacks are examined to improve knowledge about terrorist systems of training, planning, and actions. The results of this study aim to provide a foundation for understanding attack patterns and tactics in emerging havens as well as inform the creation and implementation of various counterterrorism measures.
The adaptive safety analysis and monitoring system
NASA Astrophysics Data System (ADS)
Tu, Haiying; Allanach, Jeffrey; Singh, Satnam; Pattipati, Krishna R.; Willett, Peter
2004-09-01
The Adaptive Safety Analysis and Monitoring (ASAM) system is a hybrid model-based software tool for assisting intelligence analysts to identify terrorist threats, to predict possible evolution of the terrorist activities, and to suggest strategies for countering terrorism. The ASAM system provides a distributed processing structure for gathering, sharing, understanding, and using information to assess and predict terrorist network states. In combination with counter-terrorist network models, it can also suggest feasible actions to inhibit potential terrorist threats. In this paper, we will introduce the architecture of the ASAM system, and discuss the hybrid modeling approach embedded in it, viz., Hidden Markov Models (HMMs) to detect and provide soft evidence on the states of terrorist network nodes based on partial and imperfect observations, and Bayesian networks (BNs) to integrate soft evidence from multiple HMMs. The functionality of the ASAM system is illustrated by way of application to the Indian Airlines Hijacking, as modeled from open sources.
Chemical plants remain vulnerable to terrorists: a call to action.
Lippin, Tobi Mae; McQuiston, Thomas H; Bradley-Bull, Kristin; Burns-Johnson, Toshiba; Cook, Linda; Gill, Michael L; Howard, Donna; Seymour, Thomas A; Stephens, Doug; Williams, Brian K
2006-09-01
U.S. chemical plants currently have potentially catastrophic vulnerabilities as terrorist targets. The possible consequences of these vulnerabilities echo from the tragedies of the Bhopal incident in 1984 to the terrorist attacks on 11 September 2001 and, most recently, Hurricanes Katrina and Rita. Findings from a 2004 nationwide participatory research study of 125 local union leaders at sites with very large volumes of highly hazardous chemicals suggest that voluntary efforts to achieve chemical plant security are not succeeding. Study respondents reported that companies had only infrequently taken actions that are most effective in preventing or in preparing to respond to a terrorist threat. In addition, companies reportedly often failed to involve key stakeholders, including workers, local unions, and the surrounding communities, in these efforts. The environmental health community thus has an opportunity to play a key role in advocating for and supporting improvements in prevention of and preparation for terrorist attacks. Policy-level recommendations to redress chemical site vulnerabilities and the related ongoing threats to the nation's security are as follows: a) specify detailed requirements for chemical site assessment and security ; b) mandate audit inspections supported by significant penalties for cases of noncompliance ; c) require progress toward achieving inherently safer processes, including the minimizing of storage of highly hazardous chemicals ; d) examine and require additional effective actions in prevention, emergency preparedness, and response and remediation ; e) mandate and fund the upgrading of emergency communication systems ; and f) involve workers and community members in plan creation and equip and prepare them to prevent and respond effectively to an incident.
Chemical Plants Remain Vulnerable to Terrorists: A Call to Action
Lippin, Tobi Mae; McQuiston, Thomas H.; Bradley-Bull, Kristin; Burns-Johnson, Toshiba; Cook, Linda; Gill, Michael L.; Howard, Donna; Seymour, Thomas A.; Stephens, Doug; Williams, Brian K.
2006-01-01
U.S. chemical plants currently have potentially catastrophic vulnerabilities as terrorist targets. The possible consequences of these vulnerabilities echo from the tragedies of the Bhopal incident in 1984 to the terrorist attacks on 11 September 2001 and, most recently, Hurricanes Katrina and Rita. Findings from a 2004 nationwide participatory research study of 125 local union leaders at sites with very large volumes of highly hazardous chemicals suggest that voluntary efforts to achieve chemical plant security are not succeeding. Study respondents reported that companies had only infrequently taken actions that are most effective in preventing or in preparing to respond to a terrorist threat. In addition, companies reportedly often failed to involve key stakeholders, including workers, local unions, and the surrounding communities, in these efforts. The environmental health community thus has an opportunity to play a key role in advocating for and supporting improvements in prevention of and preparation for terrorist attacks. Policy-level recommendations to redress chemical site vulnerabilities and the related ongoing threats to the nation’s security are as follows: a) specify detailed requirements for chemical site assessment and security; b) mandate audit inspections supported by significant penalties for cases of noncompliance; c) require progress toward achieving inherently safer processes, including the minimizing of storage of highly hazardous chemicals; d) examine and require additional effective actions in prevention, emergency preparedness, and response and remediation; e) mandate and fund the upgrading of emergency communication systems; and f) involve workers and community members in plan creation and equip and prepare them to prevent and respond effectively to an incident. PMID:16966080
Behavioral Modeling of Adversaries with Multiple Objectives in Counterterrorism.
Mazicioglu, Dogucan; Merrick, Jason R W
2018-05-01
Attacker/defender models have primarily assumed that each decisionmaker optimizes the cost of the damage inflicted and its economic repercussions from their own perspective. Two streams of recent research have sought to extend such models. One stream suggests that it is more realistic to consider attackers with multiple objectives, but this research has not included the adaption of the terrorist with multiple objectives to defender actions. The other stream builds off experimental studies that show that decisionmakers deviate from optimal rational behavior. In this article, we extend attacker/defender models to incorporate multiple objectives that a terrorist might consider in planning an attack. This includes the tradeoffs that a terrorist might consider and their adaption to defender actions. However, we must also consider experimental evidence of deviations from the rationality assumed in the commonly used expected utility model in determining such adaption. Thus, we model the attacker's behavior using multiattribute prospect theory to account for the attacker's multiple objectives and deviations from rationality. We evaluate our approach by considering an attacker with multiple objectives who wishes to smuggle radioactive material into the United States and a defender who has the option to implement a screening process to hinder the attacker. We discuss the problems with implementing such an approach, but argue that research in this area must continue to avoid misrepresenting terrorist behavior in determining optimal defensive actions. © 2017 Society for Risk Analysis.
The Terrorist War against Islam: Clarifying Academic Confusions
ERIC Educational Resources Information Center
Schwartz, Stephen
2011-01-01
Since the terrorist atrocities of September 11, 2001, Westerners have been challenged to understand the ideological and theological concepts, derived from Islam, that motivated the actions of Al-Qaida on that day and in other attacks before and since. Differences in taxonomy have proven to be a major issue. In the author's view, it is insufficient…
ERIC Educational Resources Information Center
Py, Bernard, Ed.
1994-01-01
This collection of articles on second language learning includes: "Action, langage et discours. Les fondements d'une psychologie du langage" ("Action, Language, and Discourse. Foundations of a Psychology of Language") (Jean-Paul Bronckart); "Contextes socio-culturels et appropriation des languages secondes: l'apprentissage en milieu social et la…
Siah, S.; Hatimi, E.M.; Ihrai, H.; Drissi Kamili, N.
2012-01-01
Summary La brûlure est l’une des lésions les plus fréquemment rencontrées lors de catastrophes naturelles ou lors de catastrophes d’origine humaine (incendies de lieux publics d’origine accidentelle, ou en temps de guerre ou encore lors d’attentats terroristes). La prise en charge et le triage de brûlés en nombre reste un problème difficile; ceci souligne la nécessité d’une réflexion et de prévisions de ces crises en insistant sur la formation des médecins et des soignants. Les défis à relever sont multiples: les soins aux brûlés requièrent un nombre important de personnel qualifié; les évacuations doivent être planifiées en fonction de la gravité de la brûlure et des lésions associées; les stocks et lots de dotation (en particulier en topiques anti-infectieux et en cristalloïdes) doivent être suffisants et adéquats. Les services hospitaliers de l’Hôpital Militaire d’Instruction Mohammed V de Rabat doivent pouvoir être rapidement adaptés pour accueillir et surtout isoler ces patients. L’hypothèse d’une catastrophe par incendie avec afflux massif de brûlés à l’hôpital militaire d’instruction Mohammed V de Rabat ne doit laisser place à aucune improvisation. PMID:23467075
DefenseLink Special: Iraq Parliamentary Election, December 2005
terrorist action. Story Pentagon Channel Videos * Iraqis Vote, Dec. 15, 2005 * Iraq Parliamentary Election Preparations * Bush: Democracy in Action Photo, caption follows VOTER - An Iraqi woman flashes her finger which
Tokyo terror and chemical arms control
DOE Office of Scientific and Technical Information (OSTI.GOV)
Keeny, S.M. Jr.
The nerve gas attack in the Tokyo subway underscores the extreme vulnerability of urban society to terrorist attacks. The best defense is improved intelligence of potential terrorists and domestic laws permitting pre-emptive action when there is probable cause. If the 1993 Chemical Weapons Convention (CWC) were in force, all 159 signatories would be required to have such laws. The author examies the threat and provides some political insights.
Suicide Bombers: Profiles, Methods and Techniques
2007-01-01
in the makeup of suicide terrorists is “just a myth” and that religious convictions, political sentiments, and social conditions are of secondary...most terrorists are young and that their actions and psychological makeup vary according to social and cultural conditions.22 Professor Ian Ross...of the University of Baltimore provides an alternate view and believes that profiling is possible by combining social factors and psychological
DOE Office of Scientific and Technical Information (OSTI.GOV)
Sanfilippo, Antonio P.; McGrath, Liam R.; Whitney, Paul D.
2011-11-17
We present a computational approach to radical rhetoric that leverages the co-expression of rhetoric and action features in discourse to identify violent intent. The approach combines text mining and machine learning techniques with insights from Frame Analysis and theories that explain the emergence of violence in terms of moral disengagement, the violation of sacred values and social isolation in order to build computational models that identify messages from terrorist sources and estimate their proximity to an attack. We discuss a specific application of this approach to a body of documents from and about radical and terrorist groups in the Middlemore » East and present the results achieved.« less
Sri Bhashyam, Sumitra; Montibeller, Gilberto
2016-04-01
A key objective for policymakers and analysts dealing with terrorist threats is trying to predict the actions that malicious agents may take. A recent trend in counterterrorism risk analysis is to model the terrorists' judgments, as these will guide their choices of such actions. The standard assumptions in most of these models are that terrorists are fully rational, following all the normative desiderata required for rational choices, such as having a set of constant and ordered preferences, being able to perform a cost-benefit analysis of their alternatives, among many others. However, are such assumptions reasonable from a behavioral perspective? In this article, we analyze the types of assumptions made across various counterterrorism analytical models that represent malicious agents' judgments and discuss their suitability from a descriptive point of view. We then suggest how some of these assumptions could be modified to describe terrorists' preferences more accurately, by drawing knowledge from the fields of behavioral decision research, politics, philosophy of choice, public choice, and conflict management in terrorism. Such insight, we hope, might help make the assumptions of these models more behaviorally valid for counterterrorism risk analysis. © 2016 The Authors Wound Repair and Regeneration published by Wiley Periodicals, Inc. on behalf of The Wound Healing Society.
Adaptive management: a paradigm for remediation of public facilities
DOE Office of Scientific and Technical Information (OSTI.GOV)
Janecky, David R; Whicker, Jeffrey J; Doerr, Ted B
2009-01-01
Public facility restoration planning traditionally focused on response to natural disasters and hazardous materials accidental releases. These plans now need to integrate response to terrorist actions. Therefore, plans must address a wide range of potential vulnerabilities. Similar types of broad remediation planning are needed for restoration of waste and hazardous material handling areas and facilities. There are strong similarities in damage results and remediation activities between unintentional and terrorist actions; however, the uncertainties associated with terrorist actions result in a re-evaluation of approaches to planning. Restoration of public facilities following a release of a hazardous material is inherently far moremore » complex than in confined industrial settings and has many unique technical, economic, social, and political challenges. Therefore, they arguably involve a superset of drivers, concerns and public agencies compared to other restoration efforts. This superset of conditions increases complexity of interactions, reduces our knowledge of the initial conditions, and even condenses the timeline for restoration response. Therefore, evaluations of alternative restoration management approaches developed for responding to terrorist actions provide useful knowledge for large, complex waste management projects. Whereas present planning documents have substantial linearity in their organization, the 'adaptive management' paradigm provides a constructive parallel operations paradigm for restoration of facilities that anticipates and plans for uncertainty, multiple/simUltaneous public agency actions, and stakeholder participation. Adaptive management grew out of the need to manage and restore natural resources in highly complex and changing environments with limited knowledge about causal relationships and responses to restoration actions. Similarities between natural resource management and restoration of a facility and surrounding area(s) after a disruptive event suggest numerous advantages over preset linearly-structured plans by incorporating the flexibility and overlap of processes inherent in effective facility restoration. We discuss three restoration case studies (e.g., the Hart Senate Office Building anthrax restoration, Rocky Flats actinide remediation, and hurricane destruction restoration), that implement aspects of adaptive management but not a formal approach. We propose that more formal adoption of adaptive management principles could be a basis for more flexible standards to improve site-specific remediation plans under conditions of high uncertainty.« less
A Brinkmanship Game Theory Model of Terrorism
NASA Astrophysics Data System (ADS)
Melese, Francois
This study reveals conditions under which a world leader might credibly issue a brinkmanship threat of preemptive action to deter sovereign states or transnational terrorist organizations from acquiring weapons of mass destruction (WMD). The model consists of two players: the United Nations (UN) “Principal,” and a terrorist organization “Agent.” The challenge in issuing a brinkmanship threat is that it needs to be sufficiently unpleasant to deter terrorists from acquiring WMD, while not being so repugnant to those that must carry it out that they would refuse to do so. Two “credibility constraints” are derived. The first relates to the unknown terrorist type (Hard or Soft), and the second to acceptable risks (“blowback”) to the World community. Graphing the incentive-compatible Nash equilibrium solutions reveals when a brinkmanship threat is credible, and when it is not - either too weak to be effective, or unacceptably dangerous to the World community.
Private Security Infrastructure Abroad: Criminal-Terrorist Agendas and the Operational Environment
2007-11-01
and conflict. He received his B.A. in Foreign Languages from Southern Illi- nois University, M.A. in Russian Studies from George Washington...cover and reduced risks. In 2005-2006, Spanish security personnel charged with investi- gating potential Islamic terrorism became interested in a...publications.asp. JSOU Report 07-9 terrorist actions. The famous Costa del Sol and a few other Spanish areas had for some time been major
NASA Astrophysics Data System (ADS)
Wang, Shuliang; Zhang, Jianhua; Zhao, Mingwei; Min, Xu
2017-05-01
This paper takes central China power grid (CCPG) as an example, and analyzes the vulnerability of the power systems under terrorist attacks. To simulate the intelligence of terrorist attacks, a method of critical attack area identification according to community structures is introduced. Meanwhile, three types of vulnerability models and the corresponding vulnerability metrics are given for comparative analysis. On this basis, influence of terrorist attacks on different critical areas is studied. Identifying the vulnerability of different critical areas will be conducted. At the same time, vulnerabilities of critical areas under different tolerance parameters and different vulnerability models are acquired and compared. Results show that only a few number of vertex disruptions may cause some critical areas collapse completely, they can generate great performance losses the whole systems. Further more, the variation of vulnerability values under different scenarios is very large. Critical areas which can cause greater damage under terrorist attacks should be given priority of protection to reduce vulnerability. The proposed method can be applied to analyze the vulnerability of other infrastructure systems, they can help decision makers search mitigation action and optimum protection strategy.
The Persistence of Islamist Terrorism Since 1979
2017-12-01
the world like Libyan bombing in 1986 as a reaction to terrorist incident in Berlin discotheque, the bombing of Afghanistan in 1998 as retaliation...U.S.S Cole bombing in Yemen, all happened before 9/11.66 The logic of foreign occupation of Islamic countries (Afghanistan and Iraq) leading to...terrorist actions against U.S. may not hold good on these events. World Trade Center bombing in 1993 being the only Islamist terrorism act on U.S. soil
How Do the Instruments of Power Define the Terrorist Organization Al-Shabaab
2017-04-06
growing headlines.1 However, over 8,000 miles away in the Horn of Africa, acts of terrorism seem to only garner a raised brow, as they have become...action brought increased attention from anti- terrorism efforts, it also provided the organization the international legitimacy sought by some of its...religious ideology in terrorism is largely a mistake. He concludes, “terrorists are predominantly driven by social bonds, and that “cliques” should be
Strategic Analysis of Terrorism
NASA Astrophysics Data System (ADS)
Arce, Daniel G.; Sandler, Todd
Two areas that are increasingly studied in the game-theoretic literature on terrorism and counterterrorism are collective action and asymmetric information. One contribution of this chapter is a survey and extension of continuous policy models with differentiable payoff functions. In this way, policies can be characterized as strategic substitutes (e. g., proactive measures), or strategic complements (e. g., defensive measures). Mixed substitute-complement models are also introduced. We show that the efficiency of counterterror policy depends upon (i) the strategic substitutes-complements characterization, and (ii) who initiates the action. Surprisingly, in mixed-models the dichotomy between individual and collective action may disappear. A second contribution is the consideration of a signaling model where indiscriminant spectacular terrorist attacks may erode terrorists’ support among its constituency, and proactive government responses can create a backlash effect in favor of terrorists. A novel equilibrium of this model reflects the well-documented ineffectiveness of terrorism in achieving its stated goals.
Haqqani Network Terrorist Designation Act of 2012
Rep. Rogers, Mike J. [R-MI-8
2012-06-27
House - 07/11/2012 Referred to the Subcommittee on Crime, Terrorism, and Homeland Security. (All Actions) Notes: For further action, see S.1959, which became Public Law 112-168 on 8/10/2012. Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
Sen. Lieberman, Joseph I. [ID-CT
2012-12-11
Senate - 12/21/2012 Resolution agreed to in Senate without amendment and with a preamble by Voice. (All Actions) Tracker: This bill has the status Agreed to in SenateHere are the steps for Status of Legislation:
Radiological threat assessment and the Federal Response Plan--a gap analysis.
Conklin, W Craig; Liotta, Philip L
2005-11-01
The ability of the federal government to effectively and efficiently respond to nuclear or radiological terrorist attacks has been the subject of intense discussion and analysis for many years. Because of recent terrorist activities and intelligence information, there is strong sentiment that it is not a question of if, but when, a radiological or nuclear terrorist attack will occur. As a result, there is considerable concern that the federal government may not be adequately prepared to respond to an attack involving a radiological dispersal device or improvised nuclear device. In response to these concerns, federal departments and agencies have initiated actions to develop a better understanding of the magnitude of the radiological/nuclear terrorist threat, assess the ability of the federal government to support state and local responses to such attacks, and improve the Nation's ability to prepare for, respond to, and recover from these types of attacks. In an era of limited fiscal growth and competing priorities, the federal government will have to enhance its collaboration with state and local governments, the private sector, and academia to ensure that the Nation is capable of responding to a terrorist attack involving radioactive or nuclear material.
To designate the Haqqani network as a foreign terrorist organization.
Rep. Poe, Ted [R-TX-2
2011-09-29
House - 10/12/2011 Referred to the Subcommittee on Immigration Policy and Enforcement. (All Actions) Notes: For further action, see S.1959, which became Public Law 112-168 on 8/10/2012. Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
DOT National Transportation Integrated Search
2010-04-21
Terrorist attacks on surface transportation facilities in Moscow, Mumbai, London, and Madrid caused casualties and highlighted the vulnerability of such systems. The Transportation Security Administration (TSA), within the Department of Homeland Secu...
Terrorist Notification Act of 2010
Rep. Rooney, Thomas J. [R-FL-16
2010-03-04
House - 04/23/2010 Referred to the Subcommittee on Terrorism, Unconventional Threats and Capabilities. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
Rep. Bilirakis, Gus M. [R-FL-9
2009-01-28
10/23/2009 For Further Action See H.R.3619. (All Actions) Notes: For further action, see H.R.3619, which became Public Law 111-281 on 10/15/2010. Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
Rep. Altmire, Jason [D-PA-4
2010-05-06
House - 06/15/2010 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
Reticulation des fibres lignocellulosiques
NASA Astrophysics Data System (ADS)
Landrevy, Christel
Pour faire face à la crise économique la conception de papier à valeur ajoutée est développée par les industries papetières. Le but de se projet est l'amélioration des techniques actuelles de réticulation des fibres lignocellulosiques de la pâte à papier visant à produire un papier plus résistant. En effet, lors des réactions de réticulation traditionnelles, de nombreuses liaisons intra-fibres se forment ce qui affecte négativement l'amélioration anticipée des propriétés physiques du papier ou du matériau produit. Pour éviter la formation de ces liaisons intra-fibres, un greffage sur les fibres de groupements ne pouvant pas réagir entre eux est nécessaire. La réticulation des fibres par une réaction de « click chemistry » appelée cycloaddition de Huisgen entre un azide et un alcyne vrai, catalysée par du cuivre (CuAAC) a été l'une des solutions trouvée pour remédier à ce problème. De plus, une adaptation de cette réaction en milieux aqueux pourrait favoriser son utilisation en milieu industriel. L'étude que nous désirons entreprendre lors de ce projet vise à optimiser la réaction de CuAAC et les réactions intermédiaires (propargylation, tosylation et azidation) sur la pâte kraft, en milieu aqueux. Pour cela, les réactions ont été adaptées en milieu aqueux sur la cellulose microcristalline afin de vérifier sa faisabilité, puis transférée à la pâte kraft et l'influence de différents paramètres comme le temps de réaction ou la quantité de réactifs utilisée a été étudiée. Dans un second temps, une étude des différentes propriétés conférées au papier par les réactions a été réalisée à partir d'une série de tests papetiers optiques et physiques. Mots Clés Click chemistry, Huisgen, CuAAC, propargylation, tosylation, azidation, cellulose, pâte kraft, milieu aqueux, papier.
Homeland Security and the Private Sector : a CBO Paper
2004-12-01
private sector and the nation as a whole that would underlie the expected costs of terrorist attacks and, hence, the broader benefits of security. This paper focuses on those industries for which the expected human and economic losses from a terrorist attack would be highest -- the country’s critical infrastructure. The analysis more narrowly focuses on those industries that reside largely in the private sector and for which an attack could lead to a direct loss of life. The paper also reviews the incentives for private actions to limit
Fisogni, Primavera
2010-01-01
Are islamic terrorists insane? International scholars generally concede that Al Qaeda members are not mentally ill. But, until now, there has not been a shared consensus and a strong argument that can prove it. This paper intends to throw light on the specific dehumanization of terrorists and to show that they are always responsible for their acts, unlike those who are affected by mental diseases. The members of Al Qaeda deny the world of life and take the distance from its sense and value: in their perspective only subversive action makes sense. However they always maintain a transcendent relation with the world (I-you; I-it). Persons with serious mental diseases have generally lost the sense of their self and the transcendence with the world. Terrorists and people with mental illness share a common separation from the world of life: one is voluntary, the other is the consequence of a number of factors (biological, social, etc.). Terrorists and psychotics have nevertheless something in common: the deprivation of the self. A loss of being that--I argue--is at the origin of the ordinariness of terrorists and the experience of void in psychotics. Two symptoms that reveal the condition of an intimate dryness, from a phenomenological and a metaphysical point of view as a consequence of a distorted relation with the world of life. I shall discuss how ordinariness is strictly related with the blurring definition of terrorism.
Military Tribunals for Terrorists Act of 2013
Rep. Buchanan, Vern [R-FL-16
2013-03-12
House - 04/08/2013 Referred to the Subcommittee on Crime, Terrorism, Homeland Security, And Investigations. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
Sen. Cruz, Ted [R-TX
2014-09-08
Senate - 09/09/2014 Read the second time. Placed on Senate Legislative Calendar under General Orders. Calendar No. 554. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
Terrorist Detainees Procedures Act of 2009
Rep. Schiff, Adam B. [D-CA-29
2009-03-04
House - 03/16/2009 Referred to the Subcommittee on the Constitution, Civil Rights, and Civil Liberties. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
The Funding Of Boko Haram And Nigerias Actions To Stop It
2016-12-01
Group against Money Laundering in West Africa GSCF Global Security Contingency Fund ISIS Islamic State of Iraq and Syria JTF joint task force...78. 5 Inter-Governmental Action Group against Money Laundering in West Africa (GIABA) and the Financial Action Task Force (FATF) believed that...has failed to address deficiencies such as money laundering and terrorist financing within its banks.96 Having a financial intelligence unit within a
Stop Terrorist Entry Program Act of 2010
Rep. Barrett, J. Gresham [R-SC-3
2010-01-13
House - 03/01/2010 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
Keep Terrorists at Bay Act of 2010
Rep. Smith, Lamar [R-TX-21
2010-02-23
House - 04/26/2010 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
Ansar al-Sharia Terrorist Designation Act of 2013
Rep. Poe, Ted [R-TX-2
2013-09-11
House - 10/15/2013 Referred to the Subcommittee on Crime, Terrorism, Homeland Security, and Investigations. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
Military Tribunals for Terrorists Act of 2010
Rep. Buchanan, Vern [R-FL-13
2010-01-19
House - 03/01/2010 Referred to the Subcommittee on the Constitution, Civil Rights, and Civil Liberties. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
A Call to Action for National Foreign Language Capabilities
ERIC Educational Resources Information Center
US Department of Defense, 2005
2005-01-01
The terrorist attacks of September 11th, the Global War on Terrorism, and the continued threat to the Homeland have defined the critical need to take action to improve the foreign language and cultural capabilities of the Nation. The government must act now to improve the gathering and analysis of information, advance international diplomacy, and…
Nuclear Terrorism: The Possibilities, Probable Consequences, and Preventive Strategies.
ERIC Educational Resources Information Center
Totten, Michael
1986-01-01
This article explores the possibility of terrorist acts against nuclear power stations. It includes information on reactor security, public policy, and alternative courses of action deemed to increase public safety and cost efficiency. (JDH)
Denying Firearms and Explosives to Dangerous Terrorists Act of 2013
Rep. King, Peter T. [R-NY-2
2013-02-14
House - 04/08/2013 Referred to the Subcommittee on Crime, Terrorism, Homeland Security, And Investigations. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
2009-03-01
and state constitutions designed to maintain freedom from coercive governmental actions .3 Research shows that when a government constrains liberties... actions including all habeas corpus petitions made pursuant to the United States Constitution. Author unknown, “Comparing Federal and State Court...Terrorist Information (Master’s Thesis, Naval Postgraduate School, Monterey, CA, March 2006), 12. 5 enforcement and intelligence actions taken
Repenser ensemble le concept d'autonomie alimentaire.
Bélisle, Micheline; Labarthe, Jenni; Moreau, Cynthia; Landry, Elise; Adam, Gracia; Bourque Bouliane, Mijanou; Dupéré, Sophie
2017-03-01
C'est au cœur du projet de recherche-action participative « Vers une autonomie alimentaire pour tou-te-s : agir et vivre ensemble le changement » (VAATAVEC) que s'est élaborée une définition nouvelle et évolutive de l'autonomie alimentaire. De ce projet regroupant des personnes en situation de pauvreté, chercheurs et intervenants, a émergé une conceptualisation résultant à la fois d'une méthode de réflexion collective et d'un processus d'analyse collective, inspiré de la théorisation ancrée et de l'analyse conceptualisante de Paillé et Mucchielli (2003). Le recours à l'expertise des personnes en situation de pauvreté, expertes du vécu de l'insécurité alimentaire, a contribué à ancrer cette définition dans les causes structurelles de l'insécurité alimentaire dans une perspective de développement d'un pouvoir d'agir collectif, de toutes les personnes concernées. Il en résulte une définition de l'autonomie alimentaire d'où ressort une contribution surtout méthodologique et théorique.
Terrorist Material Support: A Sketch of 18 U.S.C. 2339A and 2339B
2010-07-19
the challenge before it were not unconstitutionally vague nor was their proscription inconsistent with the First Amendment’s freedom of speech and...creates a civil cause of action for victims, treble damages and attorneys fees may be available for some victims under 18 U.S.C. 2333. Section 2339B...Extraterritorial Jurisdiction....................................................................................................4 Civil Actions
2007-08-01
example, the topic of massively multiplayer online role playing games ( MMORPGs ). (A related class of first person multiplayer shooters includes...key and measurable indicators that require immediate action. They develop plans of action for these trigger points to avoid premature commitment of...recognize that the cause of the incident may be an accident or act of nature, or it may be either criminal or terrorist activity. They avoid the
Terrorist Attacks Put Academic Freedom to the Test.
ERIC Educational Resources Information Center
Wilson, Robin; Cox, Ana Marie
2001-01-01
Explores how, in the aftermath of the airplane hijackings and deaths at New York's World Trade Center and the Pentagon, academic freedom may be under threat. Provides examples of student or administrative action against professors offering different viewpoints. (EV)
Homeland Security Strategic Research Action Plan 2012 - 2016
EPA’s Homeland Security research plan outline and how it will address science and technological gaps and improve the Agency’s ability to carry out its responsibilities associated with preparing for and responding to, terrorist attacks, and other disasters.
Modeles numeriques de la stimulation optique de neurones assistee par nanoparticules plasmoniques
NASA Astrophysics Data System (ADS)
Le Hir, Nicolas
La stimulation de neurones par laser emerge depuis plusieurs annees comme une alternative aux techniques plus traditionnelles de stimulation artificielle. Contrairement a celles-ci, la stimulation lumineuse ne necessite pas d'interagir directement avec le tissu organique, comme c'est le cas pour une stimulation par electrodes, et ne necessite pas de manipulation genetique comme c'est le cas pour les methodes optogenetiques. Plus recemment, la stimulation lumineuse de neurones assistee par nanoparticules a emerge comme un complement a la stimulation simplement lumineuse. L'utilisation de nanoparticules complementaires permet d'augmenter la precision spatiale du procede et de diminuer la fluence necessaire pour observer le phenomene. Ceci vient des proprietes d'interaction entre les nanoparticules et le faisceau laser, comme par exemple les proprietes d'absorption des nanoparticules. Deux phenomenes princpaux sont observes. Dans certains cas, il s'agit d'une depolarisation de la membrane, ou d'un potentiel d'action. Dans d'autres experiences, un influx de calcium vers l'interieur du neurone est detecte par une augmentation de la fluorescence d'une proteine sensible a la concentration calcique. Certaines stimulations sont globales, c'est a dire qu'une perturbation se propage a l'ensemble du neurone : c'est le cas d'un potentiel d'action. D'autres sont, au contraire, locales et ne se propagent pas a l'ensemble de la cellule. Si une stimulation lumineuse globale est rendue possible par des techniques relativement bien maitrisees a l'heure actuelle, comme l'optogenetique, une stimulation uniquement locale est plus difficile a realiser. Or, il semblerait que les methodes de stimulation lumineuse assistees par nanoparticules puissent, dans certaines conditions, offrir cette possibilite. Cela serait d'une grande aide pour conduire de nouvelles etudes sur le fonctionnement des neurones, en offrant de nouvelles possibilites experimentales en complement des possibilites actuelles. Cependant, le mecanisme physique a l'origine de la stimulation lumineuse de neurones, ainsi que celui a l'orgine de la stimulation lumineuse assistee par nanoparticules, n'est a ce jour pas totalement compris. Des hypotheses ont ete formulees concernant ce mecanisme : il pourrait etre photothermique, photomecanique, ou encore photochimique. Il se pourrait egalement que plusieurs mecanismes soient a l'oeuvre conjointement, etant donne la variete des observations. La litterature ne converge pas a ce sujet et l'existence d'un mecanisme commun aux differentes situations n'a pas ete demontree.
Urging the Secretary of State to designate the Caucasus Emirate as a foreign terrorist organization.
Rep. Hastings, Alcee L. [D-FL-23
2010-04-29
House - 06/15/2010 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
Technology and the hydra of terrorism?
DOE Office of Scientific and Technical Information (OSTI.GOV)
LePoire, D. J.; Glenn, J. C.; Environmental Assessment
2007-02-01
In the application of new technologies that address the terrorism problem, an objective is to ensure that the technology does not cause more problems than it solves. Potential new technologies, including convergences of genomics, robotics, information technology, and nanotechnology, might rapidly develop. As with any technological advance, each of these offers a mixture of benefits and risks. At first, a direct approach is reviewed by looking at how these technologies might deter the motive, means, and opportunity for terrorist activities. While there are many potential deterrence applications, other issues are identified that might cause unintended problems in the system. Somemore » of these problems include the possible contribution to terrorist motives by increasing stresses toward divisiveness in society, terrorist means through the development of dual-use technologies, or terrorist opportunities by further developing technological vulnerabilities. Next, a more systemic approach is taken by reviewing a wider range of issues, such as resource availability, management of science and technology, and general societal trends. The balance between technological change and social response is important in realizing benefits while mitigating unintended consequences such as harmful uses through terrorist actions. To explore issues concerning this balance, possible technological development scenarios are reviewed, including the possibility of accelerating or slowing technological development. Some recent recommendations are considered within this context. The need for a balance between technological and social response in this asymmetric situation suggests that the benefits of a rapid technological response against terrorism might not be as large as those observed during World War II.« less
Diffraction de rayons X sur les plaquettes de fer durcies par cyanuration
NASA Astrophysics Data System (ADS)
Popescu, M.; Hoyer, W.; Stegarescu, M.; Cornet, A.; Broll, N.
2004-11-01
Une méthode de cyanuration a été developpée pour les surfaces des plaquettes de fer, basée sur une réaction thermochimique qui conduit à la formation des couches dures sur le métal. Les échantillons ont été analysés, pour de temps différents de traitement, par diffraction de rayons X et par mesures de dureté.
Red gaming in support of the war on terrorism : Sandia Red Game report.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Moore, Judy Hennessey; Whitley, John B.; Craft, Richard Layne, II
2004-02-01
The Advanced Concepts Group (ACG) at Sandia National Laboratories is exploring the use of Red Teaming to help intelligence analysts with two key processes: determining what a piece or pieces of information might imply and deciding what other pieces of information need to be found to support or refute hypotheses about what actions a suspected terrorist organization might be pursuing. In support of this effort, the ACG hosted a terrorism red gaming event in Albuquerque on July 22-24, 2003. The game involved two 'red teams' playing the roles of two terrorist cells - one focused on implementing an RDD attackmore » on the DC subway system and one focused on a bio attack against the same target - and two 'black teams' playing the role of the intelligence collection system and of intelligence analysts trying to decide what plans the red teams might be pursuing. This exercise successfully engaged human experts to seed a proposed compute engine with detailed operational plans for hypothetical terrorist scenarios.« less
Rogers, M Brooke; Amlôt, Richard; Rubin, G James; Wessely, Simon; Krieger, Kristian
2007-06-01
The public's understanding of chemical, biological, radiological and nuclear (CBRN) related issues and their likely actions following a CBRN incident is an issue of great concern, as public psychological and behavioural responses will help determine subsequent morbidity and mortality rates. This paper explores the role of effective government communication with the public and its role in mediating the social and psychological impact of terrorist attacks. We examine the importance of effective communication in reducing morbidity and mortality in the event of a terrorist attack and explore the impact of risk perceptions in determining the success or failure of risk communication strategies. This includes the examination of the role of fear as a health risk, and the identification of factors relevant to public trust in risk communication. Finally, an investigation of the type of information desired by members of the public leads the authors to make risk communication recommendations targeted at the promotion of more adaptive behaviours in response to CBRN attacks.
Rep. Ros-Lehtinen, Ileana [R-FL-27
2014-07-16
House - 12/10/2014 Motion to reconsider laid on the table Agreed to without objection. (All Actions) Tracker: This bill has the status Resolving DifferencesHere are the steps for Status of Legislation:
The New NATO Policy Guidelines on Counterterrorism: Analysis, Assessments, and Actions
2013-02-01
Policy Guidelines on Counter-terrorism— Aware, Capable and Engaged for a Safer Future (May 21, 2012) ...............27 Appendix B. Overview of...operations are increasingly dependent on local “ franchises ,” such as in Yemen, Somalia, the Middle East, and North Africa.4 While potentially...attacks. Conversely, one of the destabilizing aims of terrorist actions is to un- dermine national sovereignty, seen as the government’s ability to
Keep Terrorists Out of America Act
Rep. Boehner, John A. [R-OH-8
2009-05-07
House - 11/18/2009 Motion to Discharge Committee filed by Mr. Hoekstra. Petition No: 111-7. (All Actions) Notes: On 11/18/2009, a motion was filed to discharge the Committee on Armed Services from consideration of H.R.2294. A discharge petition requires 218 signatures for further action. (Discharge Petition No. 111-7: text with signatures.) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
28 CFR 104.21 - Filing for compensation.
Code of Federal Regulations, 2010 CFR
2010-07-01
... or she has dismissed any pending lawsuit seeking damages as a result of the terrorist-related..., but not limited to, the spouse, former spouses, children, other dependents, and parents), to the... reasonably be expected to assert an interest in an award or to have a cause of action to recover damages...
28 CFR 104.21 - Filing for compensation.
Code of Federal Regulations, 2011 CFR
2011-07-01
... or she has dismissed any pending lawsuit seeking damages as a result of the terrorist-related..., but not limited to, the spouse, former spouses, children, other dependents, and parents), to the... reasonably be expected to assert an interest in an award or to have a cause of action to recover damages...
DOT National Transportation Integrated Search
2002-04-01
This report documents the actions taken by transportation agencies in response to the terrorist attack in New York City on September 11, and is part of a larger effort to examine the impacts of catastrophic events on transportation system facilities ...
NASA Astrophysics Data System (ADS)
Galitsky, Boris; Kovalerchuk, Boris
2006-04-01
We develop a software system Text Scanner for Emotional Distress (TSED) for helping to detect email messages which are suspicious of coming from people under strong emotional distress. It has been confirmed by multiple studies that terrorist attackers have experienced a substantial emotional distress at some points before committing a terrorist attack. Therefore, if an individual in emotional distress can be detected on the basis of email texts, some preventive measures can be taken. The proposed detection machinery is based on extraction and classification of emotional profiles from emails. An emotional profile is a formal representation of a sequence of emotional states through a textual discourse where communicative actions are attached to these emotional states. The issues of extraction of emotional profiles from text and reasoning about it are discussed and illustrated. We then develop an inductive machine learning and reasoning framework to relate an emotional profile to the class "Emotional distress" or "No emotional distress", given a training dataset where the class is assigned by an expert. TSED's machine learning is evaluated using the database of structured customer complaints.
NASA Astrophysics Data System (ADS)
Hemeda, D.; Tilloca, G.
1988-05-01
Le phénome`ne de nucléation initiépar un agent nucléant (HfSe) dans le verre de chalcogénure As 10 Ge 30Se 60 aétéétudiépar microscopieélectronique. La nucléation se caractérise par une période de latence dont la variation suit la solution analytique proposée par Kaschiev. Plusieurs parame`tres ontétéévalués: σ, l'énergie interfaciale; A, le facteur pré-exponentiel de l'équation générale de nucléation; ΔG D, la barrie`re cinétique de nucléation. Les résultats ontétéanalysés par la méthode basée sur les données de la viscositéet l'équation générale de nucléation. Une hypothe`se sur le mécanisme de la nucléation fondée sur l'action de l'agent nucléant aétéenvisagée. Les résultats relatifs au phénome`ne de croissance indiquent que la variation du taux de croissance réduit est analoguea`celle de matériaux ayant une entropie de fusionélevée et pour lesquels le mécanisme de croissance est régi par une nucléation de surface. L'énergie d'activation de croissance calculée est différente de la valeur estimée pour le verre non nucléédans le cas de l'écoulement visqueux. Une hypothe`se aétéenvisagée pour expliquer cetécart. L'évolution avec le temps de traitement thermique de la fraction cristallisée dans les matériaux aétésuivie par la technique de diffraction X quantitative. On observe une variation de type sigmoi¨dale avec une période de latence pour les différentes températuresétudiées. La cinétique de cristallisation suit l'équation de Johnson-Mehl-Avrami. La variation du taux de réaction avec la température est décrite par une expression de type Arrhénius.
Rep. Lamborn, Doug [R-CO-5
2014-04-01
House - 04/16/2014 Referred to the Subcommittee on Immigration and Border Security. (All Actions) Notes: For further action, see S.2195, which became Public Law 113-100 on 4/18/2014. Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
A Small War: The Development of the Russian-Chechen Conflict, 1994-2010
2011-04-01
joined America and other nations as a member of the Financial Action Task Force ( FATF ./36 By 2004, a Central Asian FATF regional body formed to focus...assisting or working with FATF labeled terrorist groups. Althotlgh Chechnya remains a high criine area, 139 the combination of high profile worldwide
The Tragedy of Terrorism: Perspective, Reflection, and Action in the Aftermath.
ERIC Educational Resources Information Center
Macias, Jose
2002-01-01
Public reactions to the September 11 terrorist attacks have ranged from shock, fear, and anger to group profiling and acts of violent retribution. Suggests that the cycle of terrorism requires perspective and reflection so that educational anthropologists can facilitate, through education, more useful understandings of the phenomenon of terrorism.…
DOT National Transportation Integrated Search
2002-04-01
The report documents the actions taken by transportation agencies in response to the terrorist attack on the Pentagon in Arlington, Va. on September 11, and is part of a larger effort to examine the impacts of catastrophic events on transportation sy...
Moral Education between Hope and Hopelessness: The Legacy of Janusz Korczak
ERIC Educational Resources Information Center
Efron, Sara Efrat
2008-01-01
The responsibility for addressing morality and moral education in the current moral climate is a daunting task for conscientious educators. What educational response can extricate us from the debilitating feelings of hopelessness and helplessness as we are confronted by horrific terrorist actions, controversial use of military might, displays of…
Using immersive simulation for training first responders for mass casualty incidents.
Wilkerson, William; Avstreih, Dan; Gruppen, Larry; Beier, Klaus-Peter; Woolliscroft, James
2008-11-01
A descriptive study was performed to better understand the possible utility of immersive virtual reality simulation for training first responders in a mass casualty event. Utilizing a virtual reality cave automatic virtual environment (CAVE) and high-fidelity human patient simulator (HPS), a group of experts modeled a football stadium that experienced a terrorist explosion during a football game. Avatars (virtual patients) were developed by expert consensus that demonstrated a spectrum of injuries ranging from death to minor lacerations. A group of paramedics was assessed by observation for decisions made and action taken. A critical action checklist was created and used for direct observation and viewing videotaped recordings. Of the 12 participants, only 35.7% identified the type of incident they encountered. None identified a secondary device that was easily visible. All participants were enthusiastic about the simulation and provided valuable comments and insights. Learner feedback and expert performance review suggests that immersive training in a virtual environment has the potential to be a powerful tool to train first responders for high-acuity, low-frequency events, such as a terrorist attack.
Maiga, Djibo Douma; Seyni, Houdou; Sidikou, Amadou; Azouma, Alfazazi
2012-01-01
Nous rapportons Huit cas de crises convulsives diagnostiquées comme maladie épileptique après ingestion de Tramadol et d'autres substances psychotropes dont la Caféine dans une région ou maladie épileptique et addiction au café sont fréquentes. L'objectif de ce travail était d'informer les praticiens sur le risque de convulsion lié à la consommation du Tramadol seul ou en association avec d'autres psychotropes en s'appuyant sur les données de la littérature. Il s'agissait d'une étude rétrospective et exhaustive de patients vus en consultation ambulatoire pour crise convulsive et consommation de Tramadol et de caféine de janvier à mai 2012. Les données collectées étaient les caractéristiques sociodémographiques et de la consommation de Tramadol. Le diagnostic de crise convulsive a été posé sur les renseignements obtenus à l'anamnèse. Tous les patients ont été soumis à un examen neurologique et aux critères de dépendance du Diagnostic and Statistical Manual of Mental Disorders (DSMIV)-R par rapport à leur consommation de Tramadol. Nous n'avons pas trouvé dans la littérature médicale de cas de consommation concomitante de Tramadol et de Caféine. Les données expérimentales suggèrent une action synergique du Tramadol et de la Caféine sur la douleur et le seuil épileptogène. Nos observations plaident également en faveur d'une synergie d'action de ces deux molécules dans la survenue des crises convulsives. La fréquence des crises convulsives suite à une intoxication par le Tramadol et la caféine est susceptible d'augmenter en Afrique en raison du mésusage croissant de ces substances. Une étude comparative usagers de Tramadol associé à la Caféine et usagers du Tramadol seul devrait permettre d’évaluer le risque. PMID:23308329
Satellite Power System (SPS) military implications
NASA Technical Reports Server (NTRS)
Bain, C. N.
1978-01-01
The military implications of the reference satellite power system (SPS) were examined is well as important military related study tasks. Primary areas of investigation were the potential of the SPS as a weapon, for supporting U.S. military preparedness, and for affecting international relations. In addition, the SPS's relative vulnerability to overt military action, terrorist attacks, and sabotage was considered.
Islamophobia: What Teachers Can Do to Reduce It in the Classroom
ERIC Educational Resources Information Center
Hossain, Kazi
2017-01-01
The year 2017 marked the sixteenth year anniversary of the destruction of the World Trade Center, the worst domestic attack in U.S. history. The global environment has been very different since September 11, 2001. Prior to that date, terms such as terrorism, terroristic actions, and Islamophobia were not commonly heard. The world environment has…
Sen. Donnelly, Joe [D-IN
2014-12-10
Senate - 12/10/2014 Submitted in the Senate, considered, and agreed to without amendment and with a preamble by Unanimous Consent. (All Actions) Tracker: This bill has the status Agreed to in SenateHere are the steps for Status of Legislation:
DOT National Transportation Integrated Search
2004-03-23
Passenger and freight rail services are important links in the nation's transportation system. Terrorist attacks on passenger and/or freight rail services have the potential to cause widespread injury, loss of life, and economic disruption. The recen...
ERIC Educational Resources Information Center
Jackson, Robert W. B.
This second interim report on declining enrollment in Ontario identifies the major implications of the several factors associated with declining enrollments and makes recommendations for immediate action to contribute to the stability of the system while preparing and initiating long-term policies. The first part of the report deals with…
[Terrorism and human behavior].
Leistedt, S J
2018-04-01
Theories of religion are essential for understanding current trends in terrorist activities. The aim of this work is to clarify religion's role in facilitating terror and outline in parallel with recent theoretical developments on terrorism and human behaviour. Several databases were used such as PubCentral, Scopus, Medline and Science Direct. The search terms "terrorism", "social psychology", "religion", "evolution", and "cognition" were used to identify relevant studies in the databases. This work examines, in a multidimensional way, how terrorists employ these features of religion to achieve their goals. In the same way, it describes how terrorists use rituals to conditionally associate emotions with sanctified symbols that are emotionally evocative and motivationally powerful, fostering group solidarity, trust, and cooperation. Religious beliefs, including promised rewards in the afterlife, further serve to facilitate cooperation by altering the perceived payoffs of costly actions, including suicide bombing. The adolescent pattern of brain development is unique, and young adulthood presents an ideal developmental stage to attract recruits and enlist them in high-risk behaviors. This work offers insights, based on this translational analysis, concerning the links between religion, terrorism and human behavior. Copyright © 2017 L'Encéphale, Paris. Published by Elsevier Masson SAS. All rights reserved.
A decision framework for managing risk to airports from terrorist attack.
Shafieezadeh, Abdollah; Cha, Eun J; Ellingwood, Bruce R
2015-02-01
This article presents an asset-level security risk management framework to assist stakeholders of critical assets with allocating limited budgets for enhancing their safety and security against terrorist attack. The proposed framework models the security system of an asset, considers various threat scenarios, and models the sequential decision framework of attackers during the attack. Its novel contributions are the introduction of the notion of partial neutralization of attackers by defenders, estimation of total loss from successful, partially successful, and unsuccessful actions of attackers at various stages of an attack, and inclusion of the effects of these losses on the choices made by terrorists at various stages of the attack. The application of the proposed method is demonstrated in an example dealing with security risk management of a U.S. commercial airport, in which a set of plausible threat scenarios and risk mitigation options are considered. It is found that a combination of providing blast-resistant cargo containers and a video surveillance system on the airport perimeter fence is the best option based on minimum expected life-cycle cost considering a 10-year service period. © 2014 Society for Risk Analysis.
Pyélonéphrite xanthogranulomateuse bilatérale focale : à propos d’un cas
El Yacoubi, Souhail; Ziouziou, Imad; Zizi, Mohamed; Jahid, Ahmed; Karmouni, Tariq; El Khader, Khalid; Koutani, Abdellatif; Andaloussi, Ahmed Iben Attya
2014-01-01
Résumé Nous présentons l’observation clinique d’un cas rare de pyélonéphrite xanthogranulomateuse (PXG) bilatérale chez un jeune patient âgé de 17 ans. La découverte progressive de l’infection a débuté par l’apparition de lombalgies bilatérales évoluant depuis un mois, sans autre signe associé. L’urotomodensitométrie penchait en faveur de deux masses rénales bilatérales, soit une masse polaire inférieure droite et une masse polaire supérieure gauche, toutes deux de densité tissulaire. Une biopsie échoguidée a suggéré la présence d’une réaction inflammatoire non spécifique. Une néphrectomie partielle polaire inférieure droite a été effectuée devant la forte présomption de tumeurs rénales malignes. Finalement, l’histologie a orienté le diagnostic vers une PXG. Il s’agit, à notre connaissance, du sixième cas de PXG focale bilatérale rapporté dans la littérature. Notre patient a reçu un traitement antibiotique à base de fluoroquinolone pendant un mois. L’évolution clinique s’est avérée bonne, et les lésions visibles à la tomodensitométrie se sont entièrement résorbées au bout d’un mois. Le patient vit toujours après un an et présente une fonction rénale normale. PMID:25295145
Études des propriétés électro-optiques d'une série de diphtalocyanines de terres rares
NASA Astrophysics Data System (ADS)
Videlot, C.; Fichou, D.; Garnier, F.
1998-06-01
In this work, we describe the study of photovoltaic cells for a series of rare earth diphthalocyanines. This p type organic compounds have been used in Schottky and pn configurations. Current-voltage curves and action spectra show different replies in energy's conversion according to the rare earth of the diphthalocyanine. Dans ce travail, nous décrivons l'étude de cellules photovoltaïques pour une série de diphtalocyanines de terres rares. Ces composés organiques de type p ont été étudiés dans des configurations Schottky et hétérojonction pn. Les courbes de courant-tension et les spectres d'action montrent des réponses différentes dans la conversion de l'énergie suivant la terre rare de la diphtalocyanine.
2014-11-01
Sa Majesté la Reine (en droit du Canada), telle que représentée par le ministre de la Défense nationale, 2014 DRDC-RDDC-2014-R102 i...avec la surface des matériaux est d’une importance fondamentale pour de nombreux processus, dont l’adhésion, les réactions chimiques, le transport...hydrodynamique et la nettoyabilité des surfaces. Les propriétés des surfaces peuvent se situer dans une gamme allant d’un caractère hydrophile ou
Phillips, Deborah; Prince, Shantay; Schiebelhut, Laura
2004-10-01
This study examined the responses of elementary school children in Washington, DC, to the September 11 terrorist attacks. Parents (primarily mothers) of children in kindergarten through Grade 6 and children in Grades 4 to 6, including 47 matched parent-child pairs, completed questionnaires regarding exposure, stress reactions, and constructive actions taken 3 months after the attacks. Parent reports and, to an even greater extent, children's self-reports revealed high levels of negative reactions to the attacks on behalf of the children. These reactions were best understood in the context of their exposure to the attacks, primarily through television news, and the reactions of and coping assistance provided by their parents. Implications for school personnel, health care professionals, and intervention efforts are discussed. ((c) 2004 APA, all rights reserved).
Strategies of psychological terrorism perpetrated by ETA's network: delimitation and classification.
Martín-Peña, Javier; Rodríguez-Carballeira, Alvaro; Escartín Solanelles, Jordi; Porrúa García, Clara; Willem Winkel, Frans
2010-02-01
This paper defines and analyzes the harassment perpetrated by ETA's terrorist network in the Basque Country, providing a taxonomy of its strategies of psychological violence. The usefulness of this taxonomy has been tested and contrasted by means of a content analysis of 19 testimonies of persons who were the victims of violence by the terrorist network. The taxonomy of strategies of psychological violence is made up of four dimensions that emphasize the actions on the context of the persons affected, and on their emotional state, cognitions, and behaviour. Results show the predominance of emotional and cognitive strategies. Intra-observer and inter-observer reliability analysis in coding showed a Cohen's Kappa coefficient of .92 and .87, respectively. The psychological violence analyzed in this study reflects a form of psychological terrorism that harasses and persecutes a specific sector of the population.
What Constitutes Terrorist Network Resiliency?
2011-05-31
organizations like al Qaeda. One of the main deficiencies with international law is with the Financial Action Task Force ( FATF ) which had been...2005). The FATF identified 40 recommendations to be implemented to counter money laundering activities. However, no formal binding convention or...treaty was created therefore consistent implementation of the FATF recommendations did not occur thus leaving loop holes in international law for
Sen. Graham, Lindsey [R-SC
2014-07-10
Senate - 07/17/2014 Resolution agreed to in Senate without amendment and with a preamble by Unanimous Consent. (All Actions) Tracker: This bill has the status Agreed to in SenateHere are the steps for Status of Legislation:
ERIC Educational Resources Information Center
Howell, Lyn C.; Brown, Heidi J.
This qualitative study followed 41 fourth- and fifth-grade students from the terrorist attacks of September 11, 2001 through December of that year, in an attempt to understand how these students were affected by the attacks and subsequent government actions. Class assignments and teachers' anecdotal journals were analyzed. Through their work and…
Sen. Coons, Christopher A. [D-DE
2013-10-11
Senate - 11/06/2013 Resolution agreed to in Senate without amendment and with a preamble by Unanimous Consent. (All Actions) Tracker: This bill has the status Agreed to in SenateHere are the steps for Status of Legislation:
Rep. Bilirakis, Gus M. [R-FL-9
2009-02-24
House - 09/22/2009 Provisions of measure incorporated into Title XI, Section 1107 of H.R. 3619, as reported by the Committee on Transportation. (All Actions) Tracker: This bill has the status Passed HouseHere are the steps for Status of Legislation:
Rep. Sessions, Pete [R-TX-32
2014-05-06
House - 05/08/2014 Mr. Sessions asked unanimous consent to modify H. Res. 567 in the form he had placed at the desk. Without objection, the modification was agreed to. (All Actions) Tracker: This bill has the status Agreed to in HouseHere are the steps for Status of Legislation:
Rep. Wilson, Frederica S. [D-FL-24
2014-05-06
House - 05/20/2014 On motion to suspend the rules and agree to the resolution, as amended Agreed to by voice vote. (All Actions) Tracker: This bill has the status Agreed to in HouseHere are the steps for Status of Legislation:
Dual energy detection of weapons of mass destruction
NASA Astrophysics Data System (ADS)
Budner, Gregory J.
2006-03-01
There is continuing plans and actions from terrorists to use "violence to inculcate fear with intent to coerce or try to intimidate governments or societies in the pursuit of goals that are generally political, religious or ideological." (Joint Pub 3-07.2) One can characterize the types of attacks and plan to interdict terrorist actions before they become crises. This paper focuses on Radiological (RDD) and Nuclear (WMD) threats. The X-ray inspection process and the use of dual-energy imaging will interdict materials for WMDs. Listed herewith is "several major characteristics that one can exploit for the detection. First, both WMDs and RDDs are radioactive. Therefore, one can hope to detect radiation coming from the containers to identify the threat. However since uranium and plutonium are largely self-shielding and since lead can be used to shield and hide these substances, passive detection of emitted radiation can be easily defeated. An important second characteristic is that WMDs and shielded dirty bombs contain materials with very high atomic numbers. Since normal commerce rarely contains materials with atomic numbers higher than that of iron, dual-energy imaging technology can detect such materials automatically, for the successful interdiction of WMDs and dirty bombs". (Bjorkolm 2005)
Suicide Terrorists: Are They Suicidal?
ERIC Educational Resources Information Center
Townsend, Ellen
2007-01-01
Are suicide terrorists suicidal? A review of the worldwide literature on suicide terrorism uncovered five published empirical studies describing data collected from potential suicide terrorists or the surviving friends and families of deceased terrorists. The many discrepancies uncovered between suicide terrorists and other suicides on key factors…
Presence de Carbone-13 dans les elements combustibles de type (U,Pu)O 2 irradies en reacteur rapide
NASA Astrophysics Data System (ADS)
Kryger, Bernard; Hagemann, Robert
1982-06-01
Du carbone-13 produit par la réaction de capture neutronique 168O + 10n → 136C + 42He se forme dans les combustibles de type oxyde irradiés en neutrons rapides. Cette réaction, dont le seuil d'énergie se situe à 2.35 MeV, conduit à la formation d'une quantité de carbone-13 qui peut varier notablement suivant le spectre neutronique du réacteur (entre 20 et 40 × 10 -6g 13C/g (U,Pu)O 2 pour une fluence de 2 × 10 23 n/cm 2). DES mesures effectuées sur le combustible et la gaine par spectrométrie de masse après irradiation montrent qu'une fraction égale ou supérieure à la moitié du carbone-13 produit dans l'oxyde peut être transférée dans la gaine. Un tel comportement nous fait considérer le carbone-13 comme un véritable marqueur du carbone plus généralement contenu dans l'oxyde et, à ce titre, la détection de cet isotope devrait contribuer à élucider tout particulièrement les mécanismes de carburation de la gaine par les combustibles (U,Pu)O 2 des réacteurs surgénérateurs.
Armed Intervention in Terrorist Hostage Situations: A Comparative Analysis
1989-01-01
Unit (AJ) Armed Forces of National Liberation (Fuerzas Armadas de Liberacion Nacional (FALN) Armenian Secret Army for the Liberation of Armenia (AALA...Fascist Resistance Group (Grupo de Resistencia Antifascista de Primero de Octubre-GRAPO) Free Land (Terra Lliure-TL) Freedom for The Basque Hoaieland...Euskadi ta Askatasuna-ETA) International revolutionary Action Groups (Grupos de Accion RaVo- lutionaria Internacionalista-6ARI) Moroccan Patriotic
[Radicalisation and geopolitics, the pathways to violence].
Guidère, Mathieu
2017-10-01
Although the reasons for radicalisation appear diverse, the overwhelming majority of radicalised individuals and announcements claiming responsibility for terrorist attacks make reference to the same cause: western military interventions in Muslim countries. This raises the question of the link between radicalisation and geopolitics and the need to identify the motivations and the pathway between radicalisation and violent actions. Copyright © 2017 Elsevier Masson SAS. All rights reserved.
Protecting Americans from the Proliferation of Weapons to Terrorists Act of 2013
Rep. DesJarlais, Scott [R-TN-4
2013-06-25
House - 06/25/2013 Referred to the Committee on Foreign Affairs, and in addition to the Committees on Armed Services, and Intelligence (Permanent Select), for a period to be subsequently determined by the Speaker, in each case for consideration of such provisions as fall within the... (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
Intergovernmental Unity of Effort in Support of Biological Threat Prevention
2013-09-01
jurisdictional barriers (such as time delays in developing decisions and implementing large scale action) are tangible. Connecting the “dots” of awareness...groups are developing the capability and the intention to deliver biological weapons of mass destruction. Four coalitions of governments were studied...Intelligence sources from around the globe report that terrorist groups are developing the capability and the intention to deliver biological weapons
Energizing the Enterprise: An Incentive-Based Approach to Homeland Security
2010-12-01
participation in efforts to deter terrorists and other malicious actors and mitigate radicalization toward violence38 • Mission 3: Enforcing and...citizens are able in influence homeland security—as explained namely by public choice theory. Both paths lead individuals toward realizing enterprise...in citizen preparedness. A September 2004 survey revealed the following figures: • 58 percent of Americans had taken at least one action toward
Code of Federal Regulations, 2010 CFR
2010-01-01
... the September 11, 2001 Terrorist Attacks § 123.601 Is my business eligible to apply for an economic... September 11, 2001, or as a direct result of any related federal action taken between September 11, 2001 and October 22, 2001, you are eligible to apply for an economic injury disaster loan under this subpart. (1...
Radiological Dispersal Device Primer: From A Terrorists Perspective
2008-02-15
third order ecnomic effects resulting from the lack of RDD insurance.69 This section discussed radiation impacts from a RDD attack. Based on...Command (NORTHCOM), to conduct warfighting within the homeland defense area of responsibility ( essentially the United States, Canada, and Mexico) and to...RDD attack.130 A prepared media will be essential to calm the public and facilitate first responder actions. Lastly, a robust and frequent
Sen. Shaheen, Jeanne [D-NH
2014-09-09
Senate - 09/09/2014 Submitted in the Senate, considered, and agreed to without amendment and with a preamble by Unanimous Consent. (All Actions) Tracker: This bill has the status Agreed to in SenateHere are the steps for Status of Legislation:
Understanding political radicalization: The two-pyramids model.
McCauley, Clark; Moskalenko, Sophia
2017-04-01
This article reviews some of the milestones of thinking about political radicalization, as scholars and security officials struggled after 9/11 to discern the precursors of terrorist violence. Recent criticism of the concept of radicalization has been recognized, leading to a 2-pyramids model that responds to the criticism by separating radicalization of opinion from radicalization of action. Security and research implications of the 2-pyramids model are briefly described, ending with a call for more attention to emotional experience in understanding both radicalization of opinion and radicalization of action. (PsycINFO Database Record (c) 2017 APA, all rights reserved).
DOE Office of Scientific and Technical Information (OSTI.GOV)
Brown, Nathanael J. K.; Gearhart, Jared Lee; Jones, Dean A.
Currently, much of protection planning is conducted separately for each infrastructure and hazard. Limited funding requires a balance of expenditures between terrorism and natural hazards based on potential impacts. This report documents the results of a Laboratory Directed Research & Development (LDRD) project that created a modeling framework for investment planning in interdependent infrastructures focused on multiple hazards, including terrorism. To develop this framework, three modeling elements were integrated: natural hazards, terrorism, and interdependent infrastructures. For natural hazards, a methodology was created for specifying events consistent with regional hazards. For terrorism, we modeled the terrorists actions based on assumptions regardingmore » their knowledge, goals, and target identification strategy. For infrastructures, we focused on predicting post-event performance due to specific terrorist attacks and natural hazard events, tempered by appropriate infrastructure investments. We demonstrate the utility of this framework with various examples, including protection of electric power, roadway, and hospital networks.« less
The intelligence community and the war on terror: the role of behavioral science.
Busch, Kenneth G; Weissman, Sidney H
2005-01-01
The United States intelligence community has been under intense scrutiny from both inside and outside in the aftermath of September 11. Post mortem assessments of intelligence breakdowns may judge the events as more predictable than was in fact the actual reality. In a troubled world, when threats to national security can materialize very quickly, the intelligence community must be able to effectively and swiftly develop and implement plans to prevent further terrorist attacks on the homeland. Numerous scenarios need to be considered for the management of crisis situations. Intelligence actions must make it more difficult for terrorists to strike at their targets. The war on terror must confront a new generation of enemies who threaten to attack the United States with weapons of mass destruction. This essay will focus on the role of behavioral science and how related reforms within the intelligence community could improve its capability to respond to a huge challenge.
Evaluation d’une grille de supervision des laboratoires des leishmanioses cutanées au Maroc
El Mansouri, Bouchra; Amarir, Fatima; Hajli, Yamina; Fellah, Hajiba; Sebti, Faiza; Delouane, Bouchra; Sadak, Abderrahim; Adlaoui, El Bachir; Rhajaoui, Mohammed
2017-01-01
Introduction Afin d’évaluer une grille de contrôle standardisée de laboratoire de diagnostic des leishmanioses, comme nouveau outil de supervision. Méthodes Un essai pilote a été pratiqué sur sept laboratoires provinciaux, appartenant à quatre provinces au Maroc, en suivant l’évolution de leurs performances tous les deux ans, entre l’année 2006 et 2014. Cette étude détaille la situation des laboratoires provinciaux avant et après la mise en œuvre de la grille de supervision. Au total vingt et une grille sont analysées. Résultats En 2006, les résultats ont montré clairement une insuffisance des performances des laboratoires: besoin en formation (41.6%), personnel pratiquant le prélèvement cutané (25%), pénurie en matériels et réactifs (65%), gestions documentaire et local non conformes (85%). Différentes actions correctives ont été menées par le Laboratoire National de Référence des Leishmanioses (LNRL) durant la période d’étude. En 2014, le LNRL a enregistré une nette amélioration des performances des laboratoires. Les besoins en matière de formation, qualité du prélèvement, dotation en matériels et réactifs ont été comblés et une coordination efficace s’est établie entre le LNRL et les laboratoires provinciaux. Conclusion Ceci montre l'efficacité de la grille comme outil de supervision de grande qualité, et comme pierre angulaire de tout progrès qui doit être obtenu dans les programmes de lutte contre les leishmanioses. PMID:29187922
Nécrolyse épidermique liée à l'application cutanée d'une solution d'hydroxyde de potassium
Korsaga-Somé, Nina; Tapsoba, Patrice; Ouédraogo, Muriel Sidnoma; Ilboudo, Léopold Baowendsom; Barro-Traoré, Fatou; Niamba, Pascal; Traoré, Adama
2015-01-01
Dans nos régions, une solution d'hydroxyde de potassium est régulièrement utilisée en application sur la peau comme traitement traditionnel dans le but de traiter un prurit ou une éruption cutanée. Dans notre pratique quotidienne, nous observons de plus en plus de réactions cutanées à ce type de traitement. Nous rapportons un cas de nécrolyse épidermique généralisée suite à l'application d'une solution concentrée d'hydroxyde de potassium. Il s'agissait d'une patiente de 51 ans, séropositive au VIH2, et au virus de l'hépatite virale C, mais non éligible au traitement antirétroviral. Elle était hospitalisée pour des décollements épidermiques nécrolytiques quasi-généralisés survenue le lendemain de l'application une solution de concentré de potasse sur tout le tégument. Cette solution avait été appliquée dans le but de traiter une éruption micropapuleuse prurigineuse généralisée (exanthème maculo-papuleux) survenue suite à a prise de cotrimoxazole. La réépidermisation était totale sans séquelle après un mois de suivi. Le diagnostic nécrolyse épidermique toxique ou syndrome de Lyell qui met souvent en jeu le pronostic vital avait été écarté devant la conservation de l'état général, l'absence d'atteinte muqueuse et la rapide cicatrisation. Certains traitements traditionnels ont fait la preuve au cours du temps de leur efficacité, mais un mésusage peut être à l'origine d'effets secondaires graves. PMID:26587148
ERIC Educational Resources Information Center
Alix, Christian; Petit, Rene
1983-01-01
A program involving one French and two German secondary schools in an interdisciplinary program featuring a bicultural teaching team is described and a project focusing on habitat and lifestyle is used for illustration. Issues of program administration and coordination are also discussed. (MSE)
Freyburger, L.; Lemaitre, L.; Médaille, C.; Oberli, F.; Fanchon, L.; Bergamo, P.
2011-01-01
L’innocuité de deux vaccins commercialisés en France contre la babésiose canine – Nobivac Piro® (NP) et Pirodog® (P) – a été étudiée. Leur impact local, général et biochimique a été comparé, en conditions expérimentales maîtrisées, sur un groupe témoin (T) et deux groupes vaccinés deux fois à 21 jours d’intervalle. Tous les chiens ont présenté une réaction locale modérée. Cependant, le groupe NP a présenté une réaction locale significativement plus intense que le groupe P. Ceci est objectivé par les paramètres cliniques et biologiques. Aucune différence statistiquement significative n’est mise en évidence entre les évolutions des groupes P et T. PMID:22091461
Une nouvelle théorie de la cinétique des réactions radical-radical
NASA Astrophysics Data System (ADS)
Green, N. J. B.; Rickerby, A. G.
1999-01-01
Radical recombination reactions are of central importance in radiation chemistry. In general such reactions are slower than diffusion-controlled because of the radical spins. The rate constant is corrected by a multiplicative spin statistical factor, which represents the probability that the radicals encounter one another in a reactive state. However, this method does not account for the possibility that the reactivity of a pair may recover following an unreactive encounter, for example by spin relaxation or by a coherent evolution of the spin function. In this paper we show how the spin statistical factor can be corrected for the recovery of reactivity. The new theory covers a large range of mechanisms for the recovery of reactivity, and gives simple analytical results. Both steady-state and transient solutions are presented and the former are tested against experiment for the reaction between the hydrated electron and oxygen, and for the magnetic field effect on the rate constant of an elementary reaction. Les réactions de recombinaison entre deux radicaux libres ont une grande importance en chimie sous rayonnement. En général, du fait du spin des radicaux, de telles réactions sont moins rapides que celles qui sont contrôlées par la diffusion. Les constantes de vitesse sont corrigées par un facteur multiplicatif, le facteur statistique de spin, qui représente la probabilité pour que les radicaux se rencontrent, l'un avec l'autre, dans un état réactif. Cependant, cette méthode ne tient pas compte de la possibilité pour que la même paire se rencontre plusieurs fois en raison de rencontres non-réactives. Ensuite la réactivité de cette paire peut se rétablir par exemple par relaxation de spins, ou par évolution cohérente d'une superposition des états de spin. Dans cet article on démontre comment on peut corriger le facteur statistique de spin pour le rétablissement de la réactivité. La nouvelle théorie couvre un large domaine de mécanismes de rétablissement de la réactivité ; elle donne des résultats analytiques simples pour le facteur statistique modifié. On présente des solutions dans l'état stationnaire et des solutions transitoires; les premières sont testées pour la réaction entre l'électron hydraté et l'oxygène et également pour l'effet d'un champ magnétique sur la constante de vitesse d'une réaction élémentaire.
Sen. Vitter, David [R-LA
2009-01-06
Senate - 01/06/2009 Read twice and referred to the Committee on Banking, Housing, and Urban Affairs. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
Sen. Vitter, David [R-LA
2011-01-25
Senate - 01/25/2011 Read twice and referred to the Committee on Banking, Housing, and Urban Affairs. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
Violent Systems: Defeating Terrorists, Insurgents, and Other Non-State Adversaries
2004-03-01
LTTE must be proactive in dealing with donor organizations in the Tamil Diaspora, whereas it takes a defensive, or even reactive, approach to...processing system that influence action, be they conscious or not, be they rational or not, be they distributed across an organization or not. They must...heuristics and biases, ecological rationality, fast and frugal heuristics, metaphor and analogy, the storytelling mind, “hot” emotional cognition
Aviation Security-Related Findings and Recommendations of the 9/11 Commission
2005-03-30
The 9/11 Commission found that al Qaeda operatives exploited known weaknesses in U.S. aviation security to carry out the terrorist attacks of...September 11, 2001. While legislation and administration actions after September 11, 2001 were implemented to strengthen aviation security , the 9/11...Commission concluded that several weaknesses continue to exist. These include perceived vulnerabilities in cargo and general aviation security as well as
Military Countermeasures to Terrorism in the 1980s,
1984-08-01
institutional prejudices of the inteligence function, on one side, and the operations element, on the other. When looking to place blame for a failed mission, the...2 An upward trend in higher-order terrorist attacks is revealed when the number of premeditated actions (installations plus individuals) is compared...requirements between operators and intelligence personnel can spell the difference between life and death in the field, or the success or failure of
Kossowska, Małgorzata; Trejtowicz, Mariusz; de Lemus, Soledad; Bukowski, Marcin; Van Hiel, Alain; Goodwin, Robin
2011-05-01
The present study tested the role of right-wing authoritarianism (RWA), terrorist threat, and sociopolitical 'climate' as predictors of support for governmental anti-terrorism policies and actions. Two dimensions of analysis were defined: the presence versus absence of al-Qaeda attacks, and adherence to surveillance versus anti-surveillance mainstream politics. In order to study the influence of these two contextual dimensions on the expression of attitudes, we selected four European countries that fall into these two dimensions--Poland, Belgium, Spain, and the UK. Results from our study provide support for the contention that attitudes towards restrictions of civil rights are related to RWA independently of the cultural context. Moreover, in the UK sample, we found that the threat of terrorism increases acceptance of limitations of civil liberties, but only among people who hold authoritarian beliefs. However, in Spain, the other country that experienced terrorist attacks, this moderation effect was not found which is interpreted in terms of differences in the sociopolitical climate in both countries. As predicted, we did not find such moderation effect in countries in which threat is relatively low (Poland and Belgium). The results are discussed with reference to the conceptual framework based on the importance of fear experiences, security-focused policies, as well as the specific cultural context in the study of reaction to terrorist threat. ©2010 The British Psychological Society.
Andonaba, Jean Baptiste; Barro-Traoré, Fatou; Yaméogo, Téné; Diallo, Boukary; Korsaga-Somé, Nina; Traoré, Adama
2013-01-01
La localisation cutanée de la maladie tuberculeuse demeure une forme rare et représente seulement 2,1% des localisations. L'objet de cette étude est de rapporter le profil épidémiologique, anatomoclinique et évolutif des cas de tuberculose ganglio-cutanée diagnostiqués dans un CHU au Burkina Faso. La fréquence de la tuberculose cutanée est très faible au CHUSS. Six cas ont été diagnostiqués entre 2004 et 2010, soit une fréquence de un cas par an. La durée d’évolution des cas allait de deux jusqu’à dix ans avant leur diagnostic. Les lésions observées étaient: trois scrofulodermes, trois gommes, une tuberculose testiculaire associée à un mal de Pott, un cas de polyadénopathies et des cicatrices atropho-rétractiles dans la plupart des cas. Sur le plan anatomopathologique, des granulomes tuberculoïdes ont été mis en évidence dans tous les cas avec une forte réaction tuberculinique à l'IDR. Sous antituberculeux pendant six mois, l’évolution a été bonne dans tous les cas mais au prix de séquelles cutanées cicatricielles inesthétiques. Son ampleur reste peut-être encore méconnue. Le renforcement du plateau technique du CHU et une bonne collaboration interdisciplinaire contribuerait à un meilleur diagnostic et prise en charge de cette affection. PMID:24648863
Omejec, Gregor; Podnar, Simon
2018-06-01
Ulnar neuropathy at the elbow (UNE) consists mainly of two conditions: entrapment under the humeroulnar aponeurosis (HUA) and extrinsic compression in the retrocondylar (RTC) groove. These in our opinion need different treatment: surgical HUA release and avoidance of inappropriate arm positioning, respectively. We treated our UNE patients accordingly, and studied their long-term outcomes. We invited our cohort of UNE patients to a follow-up examination consisting of history, neurological, electrodiagnostic (EDx) and ultrasonographic (US) examinations performed by four blinded investigators. At a mean follow-up time of 881 days, we performed a complete evaluation in 117 of 165 (65%) patients, with 96 (90%; 35 HUA and 61 RTC) treated according to our recommendations. An improvement was reported by 83% of HUA and 84% of RTC patients. In both groups the ulnar nerve mean compound muscle action potential (CMAP) amplitude, and the minimal motor nerve conduction velocity increased, while the maximal ulnar nerve cross-sectional area (CSA) decreased. After 2.5 years similar proportions of HUA and RTC patients reported clinical improvement that was supported by improvement in EDx and US findings. These results suggest that patients with UNE improve following both surgical decompression and non-operative treatment. A clinical trial comparing treatment approaches in neuropathy localised to the HUA and RTC will be needed to possibly confirm our opinion that the therapeutic approach should be tailored according to the presumed aetiology of UNE. Copyright © 2018 International Federation of Clinical Neurophysiology. Published by Elsevier B.V. All rights reserved.
Bombing Alone: Tracing the Motivations and Antecedent Behaviors of Lone-Actor Terrorists*,†,‡
Gill, Paul; Horgan, John; Deckert, Paige
2014-01-01
This article analyzes the sociodemographic network characteristics and antecedent behaviors of 119 lone-actor terrorists. This marks a departure from existing analyses by largely focusing upon behavioral aspects of each offender. This article also examines whether lone-actor terrorists differ based on their ideologies or network connectivity. The analysis leads to seven conclusions. There was no uniform profile identified. In the time leading up to most lone-actor terrorist events, other people generally knew about the offender’s grievance, extremist ideology, views, and/or intent to engage in violence. A wide range of activities and experiences preceded lone actors’ plots or events. Many but not all lone-actor terrorists were socially isolated. Lone-actor terrorists regularly engaged in a detectable and observable range of activities with a wider pressure group, social movement, or terrorist organization. Lone-actor terrorist events were rarely sudden and impulsive. There were distinguishable behavioral differences between subgroups. The implications for policy conclude this article. PMID:24313297
Bombing alone: tracing the motivations and antecedent behaviors of lone-actor terrorists,.
Gill, Paul; Horgan, John; Deckert, Paige
2014-03-01
This article analyzes the sociodemographic network characteristics and antecedent behaviors of 119 lone-actor terrorists. This marks a departure from existing analyses by largely focusing upon behavioral aspects of each offender. This article also examines whether lone-actor terrorists differ based on their ideologies or network connectivity. The analysis leads to seven conclusions. There was no uniform profile identified. In the time leading up to most lone-actor terrorist events, other people generally knew about the offender's grievance, extremist ideology, views, and/or intent to engage in violence. A wide range of activities and experiences preceded lone actors' plots or events. Many but not all lone-actor terrorists were socially isolated. Lone-actor terrorists regularly engaged in a detectable and observable range of activities with a wider pressure group, social movement, or terrorist organization. Lone-actor terrorist events were rarely sudden and impulsive. There were distinguishable behavioral differences between subgroups. The implications for policy conclude this article. © 2013 American Academy of Forensic Sciences.
NASA Astrophysics Data System (ADS)
Samson, Thomas
Nous proposons une methode permettant d'obtenir une expression pour la conductivite de Hall de structures electroniques bidimensionnelles et nous examinons celle -ci a la limite d'une temperature nulle dans le but de verifier l'effet Hall quantique. Nous allons nous interesser essentiellement a l'effet Hall quantique entier et aux effets fractionnaires inferieurs a un. Le systeme considere est forme d'un gaz d'electrons en interaction faible avec les impuretes de l'echantillon. Le modele du gaz d'electrons consiste en un gaz bidimensionnel d'electrons sans spin expose perpendiculairement a un champ magnetique uniforme. Ce dernier est decrit par le potentiel vecteur vec{rm A} defini dans la jauge de Dingle ou jauge symetrique. Conformement au formalisme de la seconde quantification, l'hamiltonien de ce gaz est represente dans la base des etats a un-corps de Dingle |n,m> et exprime ainsi en terme des operateurs de creation et d'annihilation correspondants a_sp{ rm n m}{dag} et a _{rm n m}. Nous supposons de plus que les electrons du niveau fondamental de Dingle interagissent entre eux via le potentiel coulombien. La methode utilisee fait appel a une equation mai tresse a N-corps, de nature quantique et statistique, et verifiant le second principe de la thermodynamique. A partir de celle-ci, nous obtenons un systeme d'equations differentielles appele hierarchie d'equations quantique dont la resolution nous permet de determiner une equation a un-corps, dite de Boltzmann quantique, et dictant l'evolution de la moyenne statistique de l'operateur non-diagonal a _sp{rm n m}{dag } a_{rm n}, _{rm m}, sous l'action du champ electrique applique vec{rm E}(t). C'est sa solution Tr(p(t) a _sp{rm n m}{dag} a_{rm n},_ {rm m}), qui definit la relation de convolution entre la densite courant de Hall vec{rm J}_{rm H }(t) et le champ electrique vec {rm E}(t) dont la transformee de Laplace-Fourier du noyau nous fournit l'expression de la conductivite de Hall desiree. Pour une valeur de facteur d'occupation (nombre d'electrons/degenerescence des etats de Dingle) superieure a un, c'est-a-dire en absence d'interaction electron-electron, il nous sera facile d'evaluer cette conductivite a la limite d'une temperature nulle et de demontrer qu'elle tend vers l'une des valeurs quantiques qe^2/h conformement a l'effet Hall quantique entier. Cependant, pour une valeur du facteur d'occupation inferieure a un, c'est-a-dire en presence d'interaction electron-electron, nous ne pourrons evaluer cette limite et obtenir les resultats escomptes a cause de l'impossibilite de determiner l'un des termes impliques. Neanmoins, ce dernier etant de nature statistique, il pourra etre aisement mis en fonction du propagateur du gaz d'electrons dont on doit maintenant determiner une expression en regime effet Hall quantique fractionnaire. Apres avoir demontre l'impuissance de la theorie des perturbations, basee sur le theoreme de Wick et la technique des diagrammes de Feynman, a accomplir cette tache correctement, nous proposons une seconde methode. Celle -ci fait appel au formalisme de l'integrale fonctionnelle et a l'utilisation d'une transformation de Hubbard-Stratonovich generalisee permettant de substituer a l'interaction a deux-corps une interaction effective a un-corps. L'expression finale obtenue bien que non completement resolue, devrait pouvoir etre estimee par une bonne approximation analytique ou au pire numeriquement.
The Madrid Train Bombings: A Decision-Making Model Analysis
2009-12-11
train bombing terrorist attack AML Anti Money Laundering CFT Combating the Financing of Terrorism ETA Euzkadi Ta Azkatasuna otherwise known as the...Fund board of executives have ―adopted action plans to enhance efforts for AML / CFT [anti money laundering and combating the financing of terrorism...Anti-Money Laundering ( AML ) and Combating the Financing of Terrorism ( CFT ), X-2, http://www1.worldbank.org/finance/html/amlcft /docs/Ref_Guide_EN/v2/10
JPRS Report, Near East & South Asia, Pakistan
1992-06-11
of emotion , and, at the end of the 14-year crisis in Afghanistan, form an interim council government of the mujaheddin; and, with unanimous...masses of Afghanistan came to our country, they were accompanied by their criminal, terrorist, antisocial , and enemy agents. There was no way for us to...Sindh is the irresponsible behaviour , incompetence and lack of action by the police. Had it not been for the police department’s failure to carry
Screening for Potential Terrorists in the Enlisted Military Accessions Process
2005-04-29
course includes small group discussions that focus on racism , gender, diversity, power and discrimination, and extremism. If necessary, the instructor... the military of all people would fall for such liberal lies that the south represented only the action of slavery and racism . To me it looks as if the ...observed racism Subject self-professed to being in KKK Subject skinhead racist and member of Church of the Creator Subject spoke out against
Special Warfare: A Selected Bibliography.
1983-10-01
G8234 1982) 31. Chaliand, Gerard. Revolution in the Third World: Myth and Prosnects. New York: Viking Pres, 1977. (D842 .C45) 32. Clutterbuck, Richard ...L. Guerrillas and Terrorists. London: Faber and Faber, 1977. (HV6431 .C61) 33. Clutterbuck, Richard L. The Long. Lona War: Counterinsurgency in Malaya...Boulder: Panther, 1965. (U240 D3) 39. Darnell, Richard J. Civic Action Program in the Armed Forces. Fort Belvoir: US Army Combat Developments Command
Sen. Portman, Rob [R-OH
2014-07-30
Senate - 09/18/2014 Resolution agreed to in Senate with an amendment and an amendment to the Title and an amended preamble by Unanimous Consent. (All Actions) Tracker: This bill has the status Agreed to in SenateHere are the steps for Status of Legislation:
[Terrorism and mental health (problem's scale, population tolerance, management of care)].
Iastrebov, V S
2004-01-01
The consequences of terrorist threat and terrorist acts for mental health of the individual, groups of individuals and community in general are analyzed. Mental disorders emerging in the victims of terrorism is described. The problem of terrorist threats use as a psychic weapon is discussed. Tolerance of population to terrorism can be divided into two types--psychophysiological and socio-psychological. The ways for elevating tolerability to terrorist threat and terrorist acts are suggested. Help in the centers of terrorist act must be of the complex character, being provided by different specialists including psychologists and psychiatrists. The importance of state structures and community support in this work is emphasized.
ERIC Educational Resources Information Center
Kavanagh, Jennifer
2011-01-01
Poverty is often identified as a determinant of terrorist group participation, but existing research reveals mixed support for this relationship. Some studies find that macroeconomic decline is associated with increased production of terrorists, but micro-level research suggests terrorists have above average socioeconomic status and educational…
Monitoring from source to tap: the new paradigm for ensuring water security and quality
NASA Astrophysics Data System (ADS)
Kroll, Dan
2011-06-01
The threat of terrorist action targeting water supplies is often overlooked for the more historically obvious threats of an air attack or a dirty bomb. Studies have shown that an attack on water is simple to orchestrate, inexpensive and can result in mass casualties. The twin motivators of the terrorist threat to water along with consumer demands for safe and potable supplies has lead to a sea change in the drinking water industry. From a historical perspective, most monitoring in the distribution system as well as source water has been relegated to the occasional snapshot provided by grab sampling for a few limited parameters or the infrequent regulatory testing required by mandates such as the Total Coliform Rule. New technologies are being deployed to ameliorate the threat from both intentional and accidental water contamination. The threat to water and these new technologies are described as well as needs and requirements for new sensors to improve the monitoring structure.
Horgan, John; Shortland, Neil; Abbasciano, Suzzette; Walsh, Shaun
2016-09-01
Involvement in terrorism has traditionally been discussed in relatively simplistic ways with little effort spent on developing a deeper understanding of what involvement actually entails, and how it differs from person to person. In this paper, we present the results of a three-year project focused on 183 individuals associated with the global jihadist movement who were convicted in the United States, for terrorist offenses, between 1995 and 2012. These data were developed by a large-scale, open-source data collection activity that involved a coding dictionary of more than 120 variables. We identify and explore the diversity of behaviors that constitute involvement in terrorism. We also compare lone actors and those who acted as part of a group, finding that lone actors differed from group-based actors in key demographic attributes and were more likely to be involved in attack execution behaviors. Implications for counterterrorism are then discussed. © 2016 American Academy of Forensic Sciences.
Real Time Big Data Analytics for Predicting Terrorist Incidents
ERIC Educational Resources Information Center
Toure, Ibrahim
2017-01-01
Terrorism is a complex and evolving phenomenon. In the past few decades, we have witnessed an increase in the number of terrorist incidents in the world. The security and stability of many countries is threatened by terrorist groups. Perpetrators now use sophisticated weapons and the attacks are more and more lethal. Currently, terrorist incidents…
76 FR 56631 - Continuation of the National Emergency With Respect to Certain Terrorist Attacks
Federal Register 2010, 2011, 2012, 2013, 2014
2011-09-13
... declared on September 14, 2001, in Proclamation 7463, with respect to the terrorist attacks of September 11... terrorist threat continues, the national emergency declared on September 14, 2001, and the powers and... September 14, 2001, with respect to the terrorist threat. This notice shall be published in the Federal...
Le Laser A Argon Ionise : Applications Therapeutiques
NASA Astrophysics Data System (ADS)
Brunetaud, J. M.; Mosquet, L.; Mordon, S.; Rotteleur, G.
1984-03-01
Le laser a argon ionise est un laser a emission continue, reglee en general en multiraies de 487 a 544 nm. Le rayonnement de ce laser est bien absorbe par les tissus vivants, avec une action preferentielle au niveau des pigments rouges (hemoglobine, myoglobine) et noirs (melanine). Le laser a argon est princi-palement utilise en therapeutique pour ses effets thermiques : en fonction du choix des parametres (puissance optique, surface exposee, temps d'exposition) on peut obtenir une coagulation (temperature optimale au niveau des tissus 60° - 80°) ou une volatisation (temperature superieure a 100°). Si la zone volatilisee est tres etroite (inferieure a 0,5 mm) on obtient un effet de coupe. Par rapport aux deux autres lasers egalement utilises pour leurs effets thermiques (CO2 et Nd. YAG) l'argon a des effets intermediaires : la coagulation sera plus superficielle qu'avec le Nd. YAG et la volatisation plus profonde qu'avec le CO2. Lors de la coupe, la necrose sur les berges sera egalement plus importante qu'avec le CO2.
Shimi, Mohammed; Mahdane, Hicham; Mechchat, Atif; El Ibrahimi, Abedelhalim; El Mrini, Abedelmajid
2013-01-01
La dysplasie acétabulaire de l’adulte jeune entraîne, dans plus de 50% des cas, une coxarthrose secondaire avant l’âge de 50 ans, l’ostéotomie de CHIARI a été décrite initialement dans le traitement de la dysplasie acétabulaire de l’enfant et de l’adolescent, elle a vu ses indications s’étendre à la dysplasie acétabulaire de l’adulte. Nous avons réalisé 9 ostéotomies de CHIARI de 2009 à 2012. Les 9 hanches ont été évaluées cliniquement et radiologiquement en préopératoire et en postopératoire, avec un recul moyen de 18.4 mois. L’ostéotomie a été réalisée sur des hanches douloureuses dysplasiques, sans arthrose (45%) ou avec une arthrose peu évoluée (stade 2: 11%) ou évoluée (stade 3 et 4: 44%). Les résultats fonctionnels ont été très satisfaisants au dernier recul. En effet, le score PMA au dernier recul était de 17.4 en moyenne, avec en particulier, une action antalgique remarquable. Radiologiquement, l’ostéotomie a normalisé pratiquement dans tous les cas la coxométrie, grâce à une médialisation importante habituellement supérieure à 20 mm (87.5%). L’ostéotomie de CHIARI est une intervention sûre. Si l’indication est correctement posée, elle soulage remarquablement les patients et stoppe l’arthrose. Elle garde donc une place privilégiée dans le traitement de la coxarthrose même évoluée sur dysplasie acétabulaire pure ou mixte. PMID:23565312
Government Actions to Control Terrorist Violence: A Case Study on Northern Ireland
1988-03-01
Continue on reverse if necessary and identify by block number) E~~0! G~P I -OP ITerrorism; Government Legislation to Control Terrorism; Irish Re...of the British government’s efforts to legislate improvements in Northern Ireland. It appears that only through this process can peace and...international attention and has been the focus of much of the British government’s efforts to legislate improvements in Northern Ireland. It appears that
Asking the Right Questions: A Framework for Assessing Counterterrorism Actions
2016-02-01
into obedience. Hannah Arendt , “Ideology and Terror: A Novel Form of Government,” The Review of Politics 15, no. 3 (July 1953). 20 Policymakers...Summer 1974): 291. See also Hannah Arendt , On Violence (New York: Harcourt, Brace & World, 1969), p. 89. 32 Max Abrams, “What Terrorists Really...Operation Assessment, August 2015. Arendt , Hannah , “Ideology and Terror: A Novel Form of Government,” The Review of Politics, 15, no. 3 (July 1953
2011-12-01
Special Weapons and Tactics SWORDS Special Weapons Observation Remote Reconnaissance Direct Action System TAF Turkish Armed Forces tEODor...especially concentrated in the southeastern part of Turkey where the Turkish Armed Forces ( TAF ) are fighting against terrorists determinedly and continuously...Systems (MDS) to strengthen the TAF and to modernize its current systems. Today, many countries are making large investments to strengthen their
Precipitating the Decline of Terrorist Groups: A Systems Analysis
1994-03-24
terrorist group. The author assumes terrorsst groups are social organizations, therefore terrorist groups come to va~lue organiwaionwsl survival over...ideological or programmatir achievements. The same determinants that cause social organizations to decline will cause terrorist organizations to decline... social orgainizations. eventually come to value organizational su~rvival over ideological or progcinmrnatic achievements. 20 Distribution/Availability
Johnson, Kendall; Luna, Joanne M Tortorici
2011-01-01
A retrospective report details external support rendered to a Lower Manhattan school crisis team following the 9/11/01 terrorist attack on the World Trade Center This analysis occasions an opportunity for consideration of working assumptions, the formative use of data to plan support actions, and the subsequent emergence of a collaborative approach to post-disaster team support in school settings. The nature of assessment and nature of subsequent service delivery illustrates a community resilience-based approach to school crisis management. Recommendations for such work are based upon mixed qualitative and quantitative data gathered from on-scene team members as part of the ongoing support effort.
NASA Astrophysics Data System (ADS)
Rouch, H.; Pons, M.; Bernard, C.; Madar, R.
1995-06-01
The growth of Si{1-x}Gex layers at a high temperature (1300 K) and low pressure (315 Pa) (by chemical vapour deposition) was studied by a thermodynamic approach and a mass transport analysis using simplifying assumptions. The results showed that the thermodynamic analysis does not permit alone to explain the experimental measurements concerning the composition of the layer. The mass transport analysis showed that thermodiffusion would be of importance on layer composition and uniformity for large substrates. La croissance de couches de Si{1-x}Gex à haute température (1300 K) et basse pression (315 Pa) par réaction chimique à partir d'une phase gazeuse a été étudiée à l'aide d'une approche thermodynamique et de l'analyse du transfert de matière pour laquelle des hypothèses très simplificatrices ont été émises. Les résultats ont montré que l'analyse thermodynamique, seule, ne permet pas d'interpréter les mesures concernant la composition du matériau déposé. Quant à l'étude du transfert de matière, elle a montré que la thermodiffusion jouait un rôle important sur la composition du matériau déposé ainsi que sur l'uniformité du dépôt sur des substrats de grandes dimensions.
Terrorist Attacks Escalate in Frequency and Fatalities Preceding Highly Lethal Attacks
Martens, Andy; Sainudiin, Raazesh; Sibley, Chris G.; Schimel, Jeff; Webber, David
2014-01-01
Highly lethal terrorist attacks, which we define as those killing 21 or more people, account for 50% of the total number of people killed in all terrorist attacks combined, yet comprise only 3.5% of terrorist attacks. Given the disproportionate influence of these incidents, uncovering systematic patterns in attacks that precede and anticipate these highly lethal attacks may be of value for understanding attacks that exact a heavy toll on life. Here we examined whether the activity of terrorist groups escalates–both in the number of people killed per attack and in the frequency of attacks–leading up to highly lethal attacks. Analyses of terrorist attacks drawn from a state-of-the-art international terrorism database (The Global Terrorism Database) showed evidence for both types of escalation leading up to highly lethal attacks, though complexities to the patterns emerged as well. These patterns of escalation do not emerge among terrorist groups that never commit a highly lethal attack. PMID:24755753
IRA: Intrusion - Reaction - Appats
2004-11-01
deuxième phase fut de mettre en œuvre un IDS au sein d’une plate-forme de tests afin d’en présenter les différents aspects. Les trois ...local et / ou distant vers le Responsable SSI 4 / Analyse 3.2.2 Modes d’action des IDS Trois modes d’actions sont caractéristiques des outils de...et la capture des informations. La figure suivante montre ce que pourrait être un honeynet. Trois réseaux séparés par un pare-feu : l’Internet
Civilian exposure to toxic agents: emergency medical response.
Baker, David
2004-01-01
Civilian populations are at risk from exposure to toxic materials as a result of accidental or deliberate exposure. In addition to industrial hazards, toxic agents designed for use in warfare now are a potential hazard in everyday life through terrorist action. Civil emergency medical responders should be able to adapt their plans for dealing with casualties from hazardous materials (HazMat) to deal with the new threat. Chemical and biological warfare (CBW) and HazMat agents can be viewed as a continuous spectrum. Each of these hazards is characterized by qualities of toxicity, latency of action, persistency, and transmissibility. The incident and medical responses to release of any agent is determined by these characteristics. Chemical and biological wardare agents usually are classified as weapons of mass destruction, but strictly, they are agents of mass injury. The relationship between mass injury and major loss of life depends very much on the protection, organization, and emergency care provided. Detection of a civil toxic agent release where signs and symptoms in casualties may be the first indicator of exposure is different from the military situation where intelligence information and tuned detection systems generally will be available. It is important that emergency medical care should be given in the context of a specific action plan. Within an organized and protected perimeter, triage and decontamination (if the agent is persistent) can proceed while emergency medical care is provided at the same time. The provision of advanced life support (TOXALS) in this zone by protected and trained medical responders now is technically feasible using specially designed ventilation equipment. Leaving life support until after decontamination may have fatal consequences. Casualties from terrorist attacks also may suffer physical as well as toxic trauma and the medical response also should be capable of dealing with mixed injuries.
America’s Targeted Killing Policy: Is it Right? Is it Working?
2013-03-01
Targeted Killing Policy: Is it Right? Is it Working? If another nation cannot or will not take action , we will. And it is an unfortunate fact that...to save many innocent lives we are sometimes obliged to take lives − the lives of terrorists who seek to murder fellow citizens. —John O. Brennan1...setting precedent for making targeted killing a routine tool of warfare and it should set a worthy example in order to prevent abuse by others. 2
2012-04-17
nitrate / Fuel oil (ANFO). The explosive and the shielded CsCl sources are packaged into bombs and loaded onto a truck. The total explosive yield in...Transportation Eric Jacobs State of Colorado Laura Johnston Dewberry Carl Miller Colorado Springs OEM John Miller American Red Cross Matthew...the health effects of the contamination will be. Scenario Terrorist obtain approximately 2,300 curies of 137 Cs (CsCl), and 1.5 tons of Ammonium
Biological Event Modeling for Response Planning
NASA Astrophysics Data System (ADS)
McGowan, Clement; Cecere, Fred; Darneille, Robert; Laverdure, Nate
People worldwide continue to fear a naturally occurring or terrorist-initiated biological event. Responsible decision makers have begun to prepare for such a biological event, but critical policy and system questions remain: What are the best courses of action to prepare for and react to such an outbreak? Where resources should be stockpiled? How many hospital resources—doctors, nurses, intensive-care beds—will be required? Will quarantine be necessary? Decision analysis tools, particularly modeling and simulation, offer ways to address and help answer these questions.
National Character vs. National Security: Conflict in the Making?
2011-03-01
liberties. Since the 9/11 terrorist attacks, the U.S. public has watched the Patriot Act, full-body scanners and restricted access to public buildings...from 1.3 trillion to 3.5 trillion dollars, representing some 40% of total U.S. debt.”36 However, that debt restricts fiscal freedom of action for the...the American public has to keep in check its tendency toward national egoism .39 It would be the natural inclination of any leader of a uni-polar
Rep. Tiahrt, Todd [R-KS-4
2010-05-27
House - 07/26/2010 Referred to the Subcommittee on the Constitution, Civil Rights, and Civil Liberties. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
We Bomb, Therefore We Are: The Evolution of Terrorist Group Life Cycles
1994-03-24
and arms robberies peaked during this phase, a marked qhift toward political action occurred. °Quoted in Gilio , Tupamaros, 79 and 82. "•Ucbano...52. 蕀Quoted in Gilio , 120. 63 Claude Fly on 7 August 1970: and ended with abduction of British Ambassador Geoffrey Jackson on 8 January 1971...stabilize the present system "•’Quoted in della Porta, "Political Socialization," 273. 2 Quoted in Gilio , Tupamaros, 78. 2mIbid., 268. 14Ibid., 270. 124
The Rising Importance of Women in Terrorism and the Need to Reform Counterterrorism Strategy
2009-05-21
ABSTRACT It is evident that women are increasingly playing a role in terrorism. The war on terror has restricted freedom of action within the...Marne L. Sutten, U.S. Army, 53 pages. It is evident that women are increasingly playing a role in terrorism. The war on terror has restricted freedom...to the benefits provided by terrorist organizations. The World Bank states that educating women ―increases their productivity on the farm and in the
Hezbollah: The Network and Its Support Systems, Can They be Stopped?
2008-06-01
that the use of direct action against Hezbollah Nash Point (2,2) SQ 1,1 2,3 3,4 ALLIES H E Z B O L L A H Hezbollah Security Level Allies...different strategy to defeat them may be in order. Using Hezbollah as an example, this thesis addresses the question of whether the direct military...Using Hezbollah as an example, this thesis addresses the question of whether the direct military approach used to combat terrorist groups, such as Al
2010-03-17
the sole "superpower" and once again changed the international security paradigm. Finally, on September 11, 2001, a terrorist attack on the U.S. by...be employed in the near term in order to improve operations in today’s security environment. Cooperative security is intended to change how militruy...default. However, the changing world security environment has dictated that the U.S. avoids any actions that could be perceived as heavy-handed
A Chronology of Terrorist Attacks and Other Criminal Actions Against Maritime Targets
1983-09-01
34 was ordered to leave the port of Rio de Janeiro because it had a bomb on board. Twenty-eight crewmembers abandoned the ship for security reasons. The...ship was to have been repaired in a yard in Rio de Janeiro , but the captain, Henzo Battagliarin, found the bomb and reported it to Brazilian...naval plane and persuaded to alter course for Recife, Brazil where Galvao had negotiations on 31 January with a U.S. Naval Admiral and on 1 February
Rep. Hunter, Duncan D. [R-CA-52
2009-12-16
House - 01/21/2010 Referred to the Subcommittee on Terrorism, Unconventional Threats and Capabilities. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
Les cooperatives et l'electrification rurale du Quebec, 1945--1964
NASA Astrophysics Data System (ADS)
Dorion, Marie-Josee
Cette these est consacree a l'histoire de l'electrification rurale du Quebec, et, plus particulierement, a l'histoire des cooperatives d'electricite. Fondees par vagues successives a partir de 1945, les cooperatives rurales d'electricite ont ete actives dans plusieurs regions du Quebec et elles ont electrifie une partie significative des zones rurales. Afin de comprendre le contexte de la creation des cooperatives d'electricite, notre these debute (premiere partie) par une analyse du climat sociopolitique des annees precedant la naissance du systeme cooperatif d'electrification rurale. Nous y voyons de quelle facon l'electrification rurale devient progressivement, a partir de la fin des annees 1920, une question d'actualite a laquelle les divers gouvernements qui se succedent tentent de trouver une solution, sans engager---ou si peu---les fonds de l'Etat. En ce sens, la premiere etatisation et la mise sur pied d'Hydro-Quebec, en 1944, marquent une rupture quant au mode d'action privilegie jusque-la. La nouvelle societe d'Etat se voit cependant retirer son mandat d'electrifier le monde rural un an apres sa fondation, car le gouvernement Duplessis, de retour au pouvoir, prefere mettre en place son propre modele d'electrification rurale. Ce systeme repose sur des cooperatives d'electricite, soutenues par un organisme public, l'Office de l'electrification rurale (OER). L'OER suscite de grandes attentes de la part des ruraux et c'est par centaines qu'ils se manifestent. Cet engouement pour les cooperatives complique la tache de l'OER, qui doit superviser de nouvelles societes tout en assurant sa propre organisation. Malgre des hesitations et quelques delais introduits par un manque de connaissances techniques et de personnel qualifie, les commissaires de l'OER se revelent perspicaces et parviennent a mettre sur pied un systeme cooperatif d'electrification rurale qui produit des resultats rapides. Il leur faudra cependant compter sur l'aide des autres acteurs engages dans l'electrification, les organismes publics et les compagnies privees d'electricite. Cette periode de demarrage et d'organisation, traitee dans la deuxieme partie de la these, se termine en 1947-48, au moment ou l'OER et les cooperatives raffermissent leur maitrise du systeme cooperatif d'electrification rurale. Les annees 1948 a 1955 (troisieme partie de these) correspondent a une periode de croissance pour le mouvement cooperatif. Cette partie scrute ainsi le developpement des cooperatives, les vastes chantiers de construction et l'injection de millions de dollars dans l'electrification rurale. Cette troisieme partie prend egalement acte des premiers signes que quelque chose ne va pas si bien dans le monde cooperatif. Nous y verrons egalement les ruraux a l'oeuvre: comme membres, d'abord, mais aussi en tant que benevoles, puis a l'emploi des cooperatives. La quatrieme et derniere partie, les annees 1956 a 1964, aborde les changements majeurs qui ont cours dans l'univers cooperatif; il s'agit d'une ere nouvelle et difficile pour le mouvement cooperatif, dont les reseaux paraissent inadaptes aux changements de profil de la consommation d'electricite des usagers. L'OER sent alors le besoin de raffermir son controle des cooperatives, car il pressent les problemes et les defis auxquels elles auront a faire face. Notre etude se termine par l'acquisition des cooperatives par Hydro-Quebec, en 1963-64. Fondee sur des sources riches et variees, notre demarche propose un eclairage inedit sur une dimension importante de l'histoire de l'electricite au Quebec. Elle permet, ce faisant, de saisir les rouages et l'action de l'Etat sous un angle particulier, avant sa profonde transformation amorcee au cours des annees 1960. De meme, elle apporte quelques cles nouvelles pour une meilleure comprehension de la dynamique des milieux ruraux de cette periode.
Organized Crime and Terrorist Activity in Mexico, 1999-2002
2003-02-01
ORGANIZED CRIME AND TERRORIST ACTIVITY IN MEXICO, 1999-2002 A Report Prepared by the Federal Research Division, Library of...REPORT DATE FEB 2003 2. REPORT TYPE N/A 3. DATES COVERED - 4. TITLE AND SUBTITLE Organized Crime and Terrorist Activity in Mexico, 1999-2002...scope of organized crime and terrorist activity in the Republic of Mexico during the period 1999 to 2002, and the extent of cooperation and possible
Computational social network modeling of terrorist recruitment.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Berry, Nina M.; Turnley, Jessica Glicken; Smrcka, Julianne D.
2004-10-01
The Seldon terrorist model represents a multi-disciplinary approach to developing organization software for the study of terrorist recruitment and group formation. The need to incorporate aspects of social science added a significant contribution to the vision of the resulting Seldon toolkit. The unique addition of and abstract agent category provided a means for capturing social concepts like cliques, mosque, etc. in a manner that represents their social conceptualization and not simply as a physical or economical institution. This paper provides an overview of the Seldon terrorist model developed to study the formation of cliques, which are used as the majormore » recruitment entity for terrorist organizations.« less
Kollek, Daniel
2003-01-01
This paper reviews terrorism in Canada, assessing the incidence and nature of terrorist activity, the potential targets of terrorist attacks, risk factors to Canadian nationals and institutions, and the responses of the Canadian government in dealing with the threat and the effectiveness of those responses. Despite the fact that there have been no recent high-profile terrorist events in Canada, this country has a serious terrorism problem, the key manifestation of which is the multitude of terrorist organizations that have designated Canada as a base of operations. In addition, Canadians have been attacked overseas and Canadian organizations, both local and abroad, are potential targets of terrorist activity. Canadian attempts to deal with terrorism through foreign and domestic policy have been ineffective, primarily because the policies have been poorly enforced. Until recently, terrorist organizations legally could raise funds in Canada, in direct contravention of international treaties signed by Canada. It is possible that the ineffectiveness in enforcing the anti-terrorism legislation stems from hope that placating terrorist organizations, and the countries that support them, will prevent Canada from becoming a target. Unfortunately evidence from other countries has shown this strategy to be ineffective.
Active Shooters: Is Law Enforcement Ready for a Mumbai Style Attack?
2013-09-01
wolves and small terrorist cells ” represented the nation’s biggest terrorist threat because their low profile made it difficult to intervene or...and small terrorist cells ” represent the nation’s biggest terrorist threat because their low profile making it difficult to intervene before they act...conversation on his cell phone, “…Everything is being 38 recorded by the media. Inflict the maximum damage. Keepfighting. Don’t be taken alive
When Devils Walk the Earth: The Mentality and Roots of Terrorism, and How to Respond
2004-01-01
the statistical inability of terrorists of both kinds to form enduring sexual relationships with a beloved partner is an aspect of terrorist...for the trees. A review of historical terror cases makes it startlingly clear: Terrorists rarely have successful dating histories. Sexual fears...society and the more fervent its rejection of reciprocity in sexual relations, the more terrorists it produces, and the greater the gap in social status
1979-08-01
longer lasting was the brand of terror introduced in the United States in the early days of the industrial age-- the terror of capital and labor...terrorists are found among adherents of almost every brand of the left wing, and the right wing, the overwhelming majority of today’s terrorists can be...Jay Mallin stated that definitions are important since the rhetoric of political denunciation brands with the term "terrorist" those people whom others
The alliance relationship analysis of international terrorist organizations with link prediction
NASA Astrophysics Data System (ADS)
Fang, Ling; Fang, Haiyang; Tian, Yanfang; Yang, Tinghong; Zhao, Jing
2017-09-01
Terrorism is a huge public hazard of the international community. Alliances of terrorist organizations may cause more serious threat to national security and world peace. Understanding alliances between global terrorist organizations will facilitate more effective anti-terrorism collaboration between governments. Based on publicly available data, this study constructed a alliance network between terrorist organizations and analyzed the alliance relationships with link prediction. We proposed a novel index based on optimal weighted fusion of six similarity indices, in which the optimal weight is calculated by genetic algorithm. Our experimental results showed that this algorithm could achieve better results on the networks than other algorithms. Using this method, we successfully digged out 21 real terrorist organizations alliance from current data. Our experiment shows that this approach used for terrorist organizations alliance mining is effective and this study is expected to benefit the form of a more powerful anti-terrorism strategy.
RISK DISCLOSURE AGAINST ATTACK ON CRITICAL INFRASTRUCTURES
NASA Astrophysics Data System (ADS)
Yoshida, Mamoru; Kobayashi, Kiyoshi
This paper analyzes the government's defensive and disclosure strategies to reduce the damage caused by terrorists that attack critical infrastructures using subjective game theory. The government recognizes a terrorist as a hidden opponent and the government's decision making about the policies against terror attacks depends on the belief about the existence of terrorist. In addition, it is not necessarily true that the government and the terrorist play the common game and make their decisions. Considering these points, the paper formulates the model in which the government and the terrorist formulate the subjective games respectively, and they induce the strategies using the equilibriums of their subjective games. The paper concluded that the government's disclosure about the implementation of the countermeasure, rather than the disclosure of warning level related with the belief about the existence of terrorist, brings about the higher increment of the subjective payoffs of the government.
NASA Astrophysics Data System (ADS)
Multon, Bernard; Lucidarme, Jean; Prévond, Laurent
1995-05-01
In this paper, we study the extending of speed range of motors (or generators) with permanent magnet inductor and supplied by electronic converter. The amplitude of phase voltage and current waveforms are limited by electronics supply. The aim of this study is to achieve a maximum power near of the base speed one on an extended speed range. This require an airgap flux weakening so called “flux weakening” above base speed. A parametric analysis of motor electromagnetic characteristics is made to show the influence of armature reaction and magnetic saliency on speed range. We show that exists an ideal condition to obtain a constant power speed range theoretically unlimited. Magnetic saliency permits to enhance the power factor especially when L_d> L_q. As main hypotheses, we consider no saturation, e.m.f. and current sine waveforms and a sinusoidal airgap flux density. Finally, we recapitulate the permanent magnet rotor structures able to obtain a flux-weakening operation. Cet article traite de l'extension de la plage de vitesse des moteurs (ou alternateurs) à excitation par aimants permanents et alimentés par convertisseur électronique. La tension et le courant sont limités en amplitude par l'alimentation électronique.L'objectif est d'obtenir une puissance proche de celle correspondant au régime de base sur une plage de vitesse étendue. Ceci nécessite une réduction de flux d'entrefer ou “désexition” au delà de la vitesse de base. Une analyse paramétrique des caractéristiques du moteur est effectuée pour mettre en évidence l'influence de la réaction d'induit et de la saillance magnétique. Nous montrons qu'il existe une condition idéale pour obtenir une plage de fonctionnement à puissance constante théoriquement illimitée. La saillance magnétique permet d'accroître le facteur de puissance surtout lorsque L_d> L_q. Les principales hypothèses de cette étude sont l'absence de saturation, des f.e.m. et des courants sinusoïdaux et une induction spatiale sinusoïdale dans l'entrefer. Enfin, nous effectuons un bilan des structures de rotors permettant un fonctionnement en régime de désexcitation.
NASA Astrophysics Data System (ADS)
Leger, Michel T.
Les activites humaines energivores telles l'utilisation intensive de l'automobile, la surconsommation de biens et l'usage excessif d'electricite contribuent aux changements climatiques et autres problemes environnementaux. Bien que plusieurs recherches rapportent que l'etre humain est de plus en plus conscient de ses impacts sur le climat de la planete, ces memes recherches indiquent qu'en general, les gens continuent a se comporter de facon non ecologique. Que ce soit a l'ecole ou dans la communaute, plusieurs chercheurs en education relative a l'environnement estiment qu'une personne bien intentionnee est capable d'adopter des comportements plus respectueux de l'environnement. Le but de cette these etait de comprendre le processus d'integration de comportements d'attenuation des changements climatiques dans des familles. A cette fin, nous nous sommes fixe deux objectifs : 1) decrire les competences et les procedes qui favorisent l'adoption de comportements d'attenuation des changements climatiques dans des familles et 2) decrire les facteurs et les dynamiques familiales qui facilitent et limitent l'adoption de comportements d'attenuation des changements climatiques dans des familles. Des familles ont ete invitees a essayer des comportements personnels et collectifs d'attenuation des changements climatiques de sorte a integrer des modes de vie plus ecologiques. Sur une periode de huit mois, nous avons suivi leur experience de changement afin de mieux comprendre comment se produit le processus de changement dans des familles qui decident volontairement d'adopter des comportements d'attenuation des changements climatiques. Apres leur avoir fourni quelques connaissances de base sur les changements climatiques, nous avons observe le vecu de changement des familles durant huit mois d'essais a l'aide de journaux reflexifs, d'entretiens d'explicitation et du journal du chercheur. La these comporte trois articles scientifiques. Dans le premier article, nous presentons une recension des ecrits sur le changement de comportement en environnement. Nous explorons egalement la famille comme systeme fonctionnel de sorte a mieux comprendre ce contexte d'action environnementale qui est, a notre connaissance, peu etudie. Dans le deuxieme article, nous presentons nos resultats de recherche concernant les facteurs d'influence observes ainsi que les competences manifestees au cours du processus d'adoption de nouveaux comportements environnementaux dans trois familles. Enfin, le troisieme article presente les resultats du cas d'une quatrieme famille ou les membres vivent depuis longtemps des modes de vie ecologique. Dans le cadre d'une demarche d'analyse par theorisation ancree, l'etude de ce cas modele nous a permis d'approfondir les categories conceptuelles identifiees dans le deuxieme article de sorte a produire une modelisation de l'integration de comportements environnementaux dans le contexte de la famille. Les conclusions degagees grace a la recension des ecrits nous ont permis d'identifier les elements qui pourraient influencer l'adoption de comportements environnementaux dans des familles. La recension a aussi permis une meilleure comprehension des divers facteurs qui peuvent affecter l'adoption de comportements environnementaux et, enfin, elle a permis de mieux cerner le phenomene de changement de comportement dans le contexte de la famille consideree comme un systeme. En appliquant un processus d'analyse inductif, a partir de nos donnees qualitatives, les resultats de notre etude multi-cas nous ont indique que deux construits conceptuels semblent influencer l'adoption de comportements environnementaux en famille : 1) les valeurs biospheriques communes au sein de la famille et 2) les competences collectivement mises a profit collectivement durant l'essai de nouveaux comportements environnementaux. Notre modelisation du processus de changement dans des familles indique aussi qu'une dynamique familiale collaborative et la presence d'un groupe de soutien exterieur sont deux elements conceptuels qui tendent a influencer les deux principaux construits et, par ce fait, tendent a augmenter les chances d'integrer de nouveaux comportements environnementaux dans des familles. En conclusion, nous presentons les limites de notre recherche ainsi que des pistes pour des recherches futures. Notamment, nous recommandons que l'ecole accueille les familles des eleves dans le cadre d'activites d'education a l'environnement ou les freres, les soeurs et les parents des eleves puissent apprendre ensemble, a l'ecole. Par exemple, nous recommandons la conduite en ERE d'une recherche action portant sur l'apprentissage intergenerationnel de nouveaux comportements dans le contexte de la famille. Mots-cles : education relative a l'environnement, comportement environnemental en famille, changement de comportement en famille, valeurs biospheriques, competences d'action.
Military-Media Relationships: Analyzing U.S. Navy Officers’ Attitudes Towards the News Media
2003-12-01
Terrorist activities 4. Effect on reaching policy goals 5. Quality of life/Human casualties In order to understand if the military is sensitive to the...threats 19-2 51 55.43% Counter-terrorist activities 19-3 78 84.78% Military readiness 19-4 58 63.04% Effect on reaching policy goals...following issues? o Terrorist threats o Counter-terrorist activities o Military readiness o Effect on reaching policy goals o Physical damage o
Review of Injuries from Terrorist Bombings and Earthquakes
2016-08-31
distribution is unlimited. August 2016 Review of Injuries from Terrorist Bombings and Earthquakes DTRA-TR-16-064 T E C H N IC A L R E P...08-16 Technical Report 4. TITLE AND SUBTITLE 5a. CONTRACT NUMBER Review of Injuries Types from Terrorist Bombings and Earthquakes HDTRA1-14-D-0003...Terrorist bombings and earthquakes provide valuable insight on the types of injuries that may occur in an improvised nuclear device (IND) scenario
Management of victims of urban chemical attack: the French approach.
Laurent, J F; Richter, F; Michel, A
1999-10-01
Since the early 1980s several disasters involving mass release of toxic substances have focused the attention of different administrations and the fire services into producing protocols and guidelines for action in civilian situations. The bomb attack in the Tokyo subway, in March 1995, made it clear that a terrorist attack using highly toxic agents is now feasible. Management of disasters in the civil sector in France is based upon two interlinked plans: the Red Plan, which covers on-site organisation, and the White Plan, which concerns the interface with hospital services. Special procedures have been developed to adapt the Red and White Plans for use in the event of toxic attack and concern the deployment of emergency responding personnel, the provision of life support and antidotes in the contaminated zone, the prevention of secondary contamination and the transport and reception of victims at the hospital. Based on the established principle of pre-hospital resuscitation and well-tried assistance plans, this doctrine allows a safe and effective response to terrorist attacks as well as to other toxic release incidents.
Department of Treasury Semiannual Regulatory Agenda
Federal Register 2010, 2011, 2012, 2013, 2014
2010-04-26
... from the abuses of terrorist financing, money laundering, and other financial crime. The proposed... money laundering, terrorist financing, and other illicit transactions through the financial system. This... services posing lower risks of money laundering and terrorist financing from certain requirements. FinCEN...
75 FR 21867 - Semiannual Agenda
Federal Register 2010, 2011, 2012, 2013, 2014
2010-04-26
... to safeguard the U.S. financial system from the abuses of terrorist financing, money laundering, and... prepaid access as a means for furthering money laundering, terrorist financing, and other illicit... products and services posing lower risks of money laundering and terrorist financing from certain...
World commercial aircraft accidents. Second edition, 1946--1992
DOE Office of Scientific and Technical Information (OSTI.GOV)
Kimura, C.Y.
1993-01-01
This report is a compilation of all accidents world-wide involving aircraft in commercial service which resulted in the loss of the airframe or one or more fatality, or both. This information has been gathered in order to present a complete inventory of commercial aircraft accidents. Events involving military action, sabotage, terrorist bombings, hijackings, suicides, and industrial ground accidents are included within this list. Included are: accidents involving world commercial jet aircraft, world commercial turboprop aircraft, world commercial pistonprop aircraft with four or more engines and world commercial pistonprop aircraft with two or three engines from 1946 to 1992. Each accidentmore » is presented with information in the following categories: date of the accident, airline and its flight numbers, type of flight, type of aircraft, aircraft registration number, construction number/manufacturers serial number, aircraft damage, accident flight phase, accident location, number of fatalities, number of occupants, cause, remarks, or description (brief) of the accident, and finally references used. The sixth chapter presents a summary of the world commercial aircraft accidents by major aircraft class (e.g. jet, turboprop, and pistonprop) and by flight phase. The seventh chapter presents several special studies including a list of world commercial aircraft accidents for all aircraft types with 100 or more fatalities in order of decreasing number of fatalities, a list of collision accidents involving commercial aircrafts, and a list of world commercial aircraft accidents for all aircraft types involving military action, sabotage, terrorist bombings, and hijackings.« less
World commercial aircraft accidents
DOE Office of Scientific and Technical Information (OSTI.GOV)
Kimura, C.Y.
1993-01-01
This report is a compilation of all accidents world-wide involving aircraft in commercial service which resulted in the loss of the airframe or one or more fatality, or both. This information has been gathered in order to present a complete inventory of commercial aircraft accidents. Events involving military action, sabotage, terrorist bombings, hijackings, suicides, and industrial ground accidents are included within this list. Included are: accidents involving world commercial jet aircraft, world commercial turboprop aircraft, world commercial pistonprop aircraft with four or more engines and world commercial pistonprop aircraft with two or three engines from 1946 to 1992. Each accidentmore » is presented with information in the following categories: date of the accident, airline and its flight numbers, type of flight, type of aircraft, aircraft registration number, construction number/manufacturers serial number, aircraft damage, accident flight phase, accident location, number of fatalities, number of occupants, cause, remarks, or description (brief) of the accident, and finally references used. The sixth chapter presents a summary of the world commercial aircraft accidents by major aircraft class (e.g. jet, turboprop, and pistonprop) and by flight phase. The seventh chapter presents several special studies including a list of world commercial aircraft accidents for all aircraft types with 100 or more fatalities in order of decreasing number of fatalities, a list of collision accidents involving commercial aircrafts, and a list of world commercial aircraft accidents for all aircraft types involving military action, sabotage, terrorist bombings, and hijackings.« less
Mindekem, Rolande; Lechenne, Monique; Alfaroukh, Idriss Oumar; Moto, Daugla Doumagoum; Zinsstag, Jakob; Ouedraogo, Laurent Tinoaga; Salifou, Sahidou
2017-01-01
Introduction La rage canine demeure une préoccupation en Afrique comme au Tchad. La présente étude vise à évaluer les Connaissances-Attitudes-Pratiques des populations pour la prise en charge appropriée des personnes exposées et une lutte efficace. Méthodes C’était une étude transversale descriptive réalisée en juillet et septembre dans quatre districts sanitaires au Tchad en 2015. Les données ont été collectées à l’aide d’un questionnaire auprès des ménages recrutés suivant un sondage aléatoire à 3 degrés. Résultats C’était 2428 personnes enquêtées avec un niveau maximum primaire (54,12%). L’âge moyen était de 36 ± 13,50 ans. Ils étaient cultivateurs (35,17%), commerçants (18,04%), ménagères (12,81%). La rage était définie comme une maladie transmise du chien à l’homme (41,43%), une altération du cerveau (41,27%), une sous-alimentation (10,26%). Le chat était faiblement connu réservoir (13,84%) et vecteur (19,77%) ainsi que la griffure comme moyen de transmission (4,61%) et la vaccination du chat comme mesure préventive (0,49%). Les premiers soins en cas de morsure à domicile étaient les pratiques traditionnelles (47,69%), le lavage des plaies (19,48%) ou aucune action entreprise (20,43%). Les ménages consultaient la santé humaine (78,50%), la santé animale (5,35%) et les guérisseurs traditionnels (27%). Conclusion La communication en rapport avec des premiers soins à la maison en cas de morsure, la connaissance du chat comme réservoir et vecteur, celle de la griffure comme moyen de transmission et la promotion de la consultation des services vétérinaires en cas de morsure sont nécessaires. PMID:28761600
A Selective Chronology of Terrorist and Counter-Terrorist Incidents.
ERIC Educational Resources Information Center
Totten, Sam
1986-01-01
Beginning with the July 22, 1966, Palestinian hijacking of an El Al airliner and ending with the April 5, 1986, bombing raid on Libya by the United States, this chronology details 56 terrorist events which were covered in the world press. (JDH)
Trends & Controversies: Sociocultural Predictive Analytics and Terrorism Deterrence
DOE Office of Scientific and Technical Information (OSTI.GOV)
Sanfilippo, Antonio P.; McGrath, Liam R.
2011-08-12
The use of predictive analytics to model terrorist rhetoric is highly instrumental in developing a strategy to deter terrorism. Traditional (e.g. Cold-War) deterrence methods are ineffective with terrorist groups such as al Qaida. Terrorists typically regard the prospect of death or loss of property as acceptable consequences of their struggle. Deterrence by threat of punishment is therefore fruitless. On the other hand, isolating terrorists from the community that may sympathize with their cause can have a decisive deterring outcome. Without the moral backing of a supportive audience, terrorism cannot be successfully framed as a justifiable political strategy and recruiting ismore » curtailed. Ultimately, terrorism deterrence is more effectively enforced by exerting influence to neutralize the communicative reach of terrorists.« less
Malevolent Creativity in Terrorist Organizations
ERIC Educational Resources Information Center
Gill, Paul; Horgan, John; Hunter, Samuel T.; Cushenbery, Lily D.
2013-01-01
Terrorist organizations are both imitative and innovative in character. While the drivers of imitation have been extensively modeled using concepts such as contagion and diffusion, creativity and innovation remain relatively underdeveloped ideas in the context of terrorist behavior. This article seeks to redress this deficiency by presenting a…
31 CFR 594.310 - Specially designated global terrorist; SDGT.
Code of Federal Regulations, 2012 CFR
2012-07-01
... 31 Money and Finance:Treasury 3 2012-07-01 2012-07-01 false Specially designated global terrorist... (Continued) OFFICE OF FOREIGN ASSETS CONTROL, DEPARTMENT OF THE TREASURY GLOBAL TERRORISM SANCTIONS REGULATIONS General Definitions § 594.310 Specially designated global terrorist; SDGT. The term specially...
31 CFR 594.310 - Specially designated global terrorist; SDGT.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 31 Money and Finance:Treasury 3 2011-07-01 2011-07-01 false Specially designated global terrorist... (Continued) OFFICE OF FOREIGN ASSETS CONTROL, DEPARTMENT OF THE TREASURY GLOBAL TERRORISM SANCTIONS REGULATIONS General Definitions § 594.310 Specially designated global terrorist; SDGT. The term specially...
31 CFR 594.310 - Specially designated global terrorist; SDGT.
Code of Federal Regulations, 2013 CFR
2013-07-01
... 31 Money and Finance:Treasury 3 2013-07-01 2013-07-01 false Specially designated global terrorist... (Continued) OFFICE OF FOREIGN ASSETS CONTROL, DEPARTMENT OF THE TREASURY GLOBAL TERRORISM SANCTIONS REGULATIONS General Definitions § 594.310 Specially designated global terrorist; SDGT. The term specially...
31 CFR 594.310 - Specially designated global terrorist; SDGT.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false Specially designated global terrorist... (Continued) OFFICE OF FOREIGN ASSETS CONTROL, DEPARTMENT OF THE TREASURY GLOBAL TERRORISM SANCTIONS REGULATIONS General Definitions § 594.310 Specially designated global terrorist; SDGT. The term specially...
31 CFR 594.310 - Specially designated global terrorist; SDGT.
Code of Federal Regulations, 2014 CFR
2014-07-01
... 31 Money and Finance:Treasury 3 2014-07-01 2014-07-01 false Specially designated global terrorist... (Continued) OFFICE OF FOREIGN ASSETS CONTROL, DEPARTMENT OF THE TREASURY GLOBAL TERRORISM SANCTIONS REGULATIONS General Definitions § 594.310 Specially designated global terrorist; SDGT. The term specially...
Know thy enemy: Education about terrorism improves social attitudes toward terrorists.
Theriault, Jordan; Krause, Peter; Young, Liane
2017-03-01
Hatred of terrorists is an obstacle to the implementation of effective counterterrorism policies-it invites indiscriminate retaliation, whereas many of the greatest successes in counterterrorism have come from understanding terrorists' personal and political motivations. Drawing from psychological research, traditional prejudice reduction strategies are generally not well suited to the task of reducing hatred of terrorists. Instead, in 2 studies, we explored education's potential ability to reduce extreme negative attitudes toward terrorists. Study 1 compared students in a college course on terrorism (treatment) with wait-listed students, measuring prosocial attitudes toward a hypothetical terrorist. Initially, all students reported extremely negative attitudes; however, at the end of the semester, treatment students' attitudes were significantly improved. Study 2 replicated the effect within a sample of treatment and control classes drawn from universities across the United States. The present work was part of an ongoing research project, focusing on foreign policy and the perceived threat of terrorism; thus classes did not explicitly aim to reduce prejudice, making the effect of treatment somewhat surprising. One possibility is that learning about terrorists "crowds out" the initial pejorative associations-that is, the label terrorism may ultimately call more information to mind, diluting its initial negative associative links. Alternatively, students may learn to challenge how the label terrorist is being applied. In either case, learning about terrorism can decrease the extreme negative reactions it evokes, which is desirable if one wishes to implement effective counterterrorism policies. (PsycINFO Database Record (c) 2017 APA, all rights reserved).
Family Therapy of Terroristic Trauma: Psychological Syndromes and Treatment Strategies.
ERIC Educational Resources Information Center
Miller, Laurence
2003-01-01
Reviews pertinent literature on terroristic trauma and combines this information with the author's experience in treating adults, children, and family victims and survivors of recent terrorist attacks. Describes the psychological syndromes resulting from terrorism and discusses the relevant individual and family therapy modalities for treating…
77 FR 7998 - Semiannual Agenda and Fiscal Year 2012 Regulatory Plan
Federal Register 2010, 2011, 2012, 2013, 2014
2012-02-13
... to safeguard the U.S. financial system from the abuses of terrorist financing, money laundering, and... prepaid access as a means for furthering money laundering, terrorist financing, and other illicit... products and services posing lower risks of money laundering and terrorist financing from certain...
75 FR 79837 - Semiannual Agenda and Fiscal Year 2011 Regulatory Plan
Federal Register 2010, 2011, 2012, 2013, 2014
2010-12-20
.... financial system from the abuses of terrorist financing, money laundering, and other financial crime. The... furthering money laundering, terrorist financing, and other illicit transactions through the financial system... services posing lower risks of money laundering and terrorist financing from certain requirements. FinCEN...
Code of Federal Regulations, 2010 CFR
2010-07-01
... FOREIGN TRANSACTIONS Special Information Sharing Procedures To Deter Money Laundering and Terrorist... money laundering—(1) In general. A law enforcement agency investigating terrorist activity or money... suspected based on credible evidence of engaging in, terrorist activity or money laundering; include enough...
NASA Astrophysics Data System (ADS)
Lasri, Abdel-Halim
Dans cette recherche-developpement, nous avons concu, developpe et mis a l'essai un simulateur interactif pour favoriser l'apprentissage des lois probabilistes impliqees dans la genetique mendelienne. Cet environnement informatise devra permettre aux etudiants de mener des experiences simulees, utilisant les statistiques et les probebilites comme outils mathematiques pour modeliser le phenomene de la transmission des caracteres hereditaires. L'approche didactique est essentiellement orientee vers l'utilisation des methodes quantitatives impliquees dans l'experimentation des facteurs hereditaires. En incorporant au simulateur le principe de la "Lunette cognitive" de Nonnon (1986), l'etudiant fut place dans une situation ou il a pu synchroniser la perception de la representation iconique (concrete) et symbolique (abstraite) des lois probabilistes de Mendel. A l'aide de cet environnement, nous avons amene l'etudiant a identifier le(s) caractere(s) hereditaire(s) des parents a croiser, a predire les frequences phenotypiques probables de la descendance issue du croisement, a observer les resultats statistiques et leur fluctuation au niveau de l'histogramme des frequences, a comparer ces resultats aux predictions anticipees, a interpreter les donnees et a selectionner en consequence d'autres experiences a realiser. Les etapes de l'approche inductive sont privilegiees du debut a la fin des activites proposees. L'elaboration, du simulateur et des documents d'accompagnement, a ete concue a partir d'une vingtaine de principes directeurs et d'un modele d'action. Ces principes directeurs et le modele d'action decoulent de considerations theoriques psychologiques, didactiques et technologiques. La recherche decrit la structure des differentes parties composant le simulateur. L'architecture de celui-ci est construite autour d'une unite centrale, la "Principale", dont les liens et les ramifications avec les autres unites confere a l'ensemble du simulateur sa souplesse et sa facilite d'utilisation. Le simulateur "Genetique", a l'etat de prototype, et la documentation qui lui est afferente ont ete soumis a deux mises a l'essai: l'une fonctionnelle, l'autre empirique. La mise a l'essai fonctionnelle, menee aupres d'un groupe d'enseignants experts, a permis d'identifier les lacunes du materiel elabore afin de lui apporter les reajustements qui s'imposaient. La mise a l'essai empirique, conduite par un groupe de onze (11) etudiants de niveau secondaire, avait pour but, d'une part, de tester la facilite d'utilisation du simulateur "Genetique" ainsi que les documents d'accompagnement et, d'autre part, de verifier si les participants retiraient des avantages pedagogiques de cet environnement. Trois techniques furent exploitees pour recolter les donnees de la mise a l'essai empirique. L'analyse des resultats a permis de faire un retour critique sur les productions concretes de cette recherche et d'apporter les modifications necessaires tant au simulateur qu'aux documents d'accompagnement. Cette analyse a permis egalement de conclure que notre simulateur interactif favorise une approche inductive permettant aux etudiants de s'approprier les lois probabilistes de Mendel. Enfin, la conclusion degage des pistes de recherches destinees aux etudes ulterieures, plus particulierement celles qui s'interessent a developper des simulateurs, afin d'integrer a ceux-ci des representations concretes et abstraites presentees en temps reel. Les disquettes du simulateur "Genetique" et les documents d'accompagnement sont annexes a la presente recherche.
3 CFR - Continuation of the National Emergency With Respect to Certain Terrorist Attacks
Code of Federal Regulations, 2013 CFR
2013-01-01
... 3 The President 1 2013-01-01 2013-01-01 false Continuation of the National Emergency With Respect to Certain Terrorist Attacks Presidential Documents Other Presidential Documents Notice of September 11, 2012 Continuation of the National Emergency With Respect to Certain Terrorist Attacks Consistent...
3 CFR - Continuation of the National Emergency With Respect to Certain Terrorist Attacks
Code of Federal Regulations, 2012 CFR
2012-01-01
... 3 The President 1 2012-01-01 2012-01-01 false Continuation of the National Emergency With Respect to Certain Terrorist Attacks Presidential Documents Other Presidential Documents Notice of September 9, 2011 Continuation of the National Emergency With Respect to Certain Terrorist Attacks Consistent...
The Effect of Terrorist Incidents on the Occupational Attitude of Teachers
ERIC Educational Resources Information Center
Üstün, Ahmet
2016-01-01
This study examined how many terrorist incidents affected the teachers' occupational attitude by the variables of gender, marital status, birthplace, the term of employment and occupational status with "the effect of terrorist incidents on the occupational attitude of the teacher" scale. In this study, "descriptive scanning…
Rhode Island School Terrorist Attack Preparedness
ERIC Educational Resources Information Center
Dube, Michael W. M.
2012-01-01
This study examined the state of safety and terrorist attack preparedness in Rhode Island Schools as determined by Rhode Island school leader perceptions. The study is descriptive in nature as it gathers data to describe a particular event or situation. Using a researcher generated survey based on terrorist preparedness guidelines and suggestions…
Israeli Adolescents' Coping Strategies in Relation to Terrorist Attacks
ERIC Educational Resources Information Center
Tatar, Moshe; Amram, Sima
2007-01-01
Exposure to terrorism seriously threatens the well-being of children and adolescents. Israeli citizens have witnessed massive ongoing terrorist attacks during the last few years. The present research, conducted among 330 Israeli adolescents, examined coping strategies in relation to terrorist attacks. We found that adolescents utilize more…
3 CFR - Continuation of the National Emergency With Respect to Certain Terrorist Attacks
Code of Federal Regulations, 2010 CFR
2010-01-01
... national emergency declared on September 14, 2001, in Proclamation 7463, with respect to the terrorist attacks of September 11, 2001, and the continuing and immediate threat of further attacks on the United States. Because the terrorist threat continues, the national emergency declared on September 14, 2001...
Sen. Lautenberg, Frank R. [D-NJ
2011-07-22
Senate - 07/22/2011 Submitted in the Senate, considered, and agreed to without amendment and with a preamble by Unanimous Consent. (All Actions) Tracker: This bill has the status Agreed to in SenateHere are the steps for Status of Legislation:
2011-09-01
seen in contemporary news headlines. One need only consider recent United States (U.S.) military action taken in Pakistan to kill Osama Bin Laden to...intelligence before leaving the country. News reports indicated that the Pakistani government was informed of the mission after it was well underway. While...U.S. relations with Pakistan reached a new low, with the leaking of the name of the Central Intelligence Agency’s (CIA’s) station chief in Pakistan
Are Suicide Terrorists Suicidal? A Critical Assessment of the Evidence
2014-01-01
Objective: Most of the research on suicide terrorism is conducted in the political science and international relations fields. The prevailing wisdom within this literature is that suicide terrorists are not suicidal. But how good is the evidence for this assumption? Knowing whether suicide terrorists are suicidal has implications for prevention, rehabilitation, and the “softer” side of counterterrorism designed to win minds and hearts. In addition it may deepen our understanding of suicide itself. Design: This article uses a review of existing literature to examine the arguments and evidence for and against the possibility that suicide terrorists could be suicidal in the context of a broad range of explanations for suicide terrorism. Results: Much of the evidence against the possibility that suicide terrorists are suicidal is based on anecdote or faulty assumptions about suicide. Relatively few formal systematic studies of suicidality in suicide terrorists have been conducted. Nonetheless, there is emerging evidence that suicidality may play a role in a significant number of cases. Conclusion: The field needs a more multidimensional approach, more systematic data at the individual level, and greater international cross-disciplinary collaboration. Would-be suicide terrorists (intercepted and arrested on their way to an attack) should be routinely interviewed using standard internationally accepted psychiatric diagnostic interviews as well as suicidality and homicidality rating scales. Psychological autopsies should also be routinely conducted worldwide. Since no one research site can collect all of the information that is needed, the creation of an internationally shared database that focuses on suicide terrorists rather than simply incidents is encouraged. PMID:25520891
NASA Astrophysics Data System (ADS)
Traoré, Philippe; Koulova-Nenova, D.; Romat, H.; Perez, A.
2009-03-01
The electro-thermo-convective flow in a horizontal dielectric liquid layer placed between two electrodes and subjected to an injection of electric charges from one of the electrodes and at the same time to a thermal gradient is studied numerically. We consider the case of a strong charge injection in order to only take into account the Coulomb force disregarding the dielectric forces, from above and below the layer. The effect of the action of both electric and thermal fields on the dielectric liquid layer is analyzed and the behavior of the flow when these fields compete or cooperate is studied. It is demonstrated that the electrically induced convection enhances the heat transfer. To cite this article: Ph. Traoré et al., C. R. Mecanique 337 (2009).
Code of Federal Regulations, 2011 CFR
2011-07-01
... to deter money laundering and terrorist activity for insurance companies. 1025.520 Section 1025.520... ENFORCEMENT NETWORK, DEPARTMENT OF THE TREASURY RULES FOR INSURANCE COMPANIES Special Information Sharing... to deter money laundering and terrorist activity for insurance companies. (a) Refer to § 1010.520 of...
Code of Federal Regulations, 2013 CFR
2013-07-01
... to deter money laundering and terrorist activity for insurance companies. 1025.520 Section 1025.520... ENFORCEMENT NETWORK, DEPARTMENT OF THE TREASURY RULES FOR INSURANCE COMPANIES Special Information Sharing... to deter money laundering and terrorist activity for insurance companies. (a) Refer to § 1010.520 of...
Code of Federal Regulations, 2012 CFR
2012-07-01
... to deter money laundering and terrorist activity for insurance companies. 1025.520 Section 1025.520... ENFORCEMENT NETWORK, DEPARTMENT OF THE TREASURY RULES FOR INSURANCE COMPANIES Special Information Sharing... to deter money laundering and terrorist activity for insurance companies. (a) Refer to § 1010.520 of...
Code of Federal Regulations, 2014 CFR
2014-07-01
... to deter money laundering and terrorist activity for insurance companies. 1025.520 Section 1025.520... ENFORCEMENT NETWORK, DEPARTMENT OF THE TREASURY RULES FOR INSURANCE COMPANIES Special Information Sharing... to deter money laundering and terrorist activity for insurance companies. (a) Refer to § 1010.520 of...
28 CFR 16.105 - Exemption of Foreign Terrorist Tracking Task Force System.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 28 Judicial Administration 1 2010-07-01 2010-07-01 false Exemption of Foreign Terrorist Tracking Task Force System. 16.105 Section 16.105 Judicial Administration DEPARTMENT OF JUSTICE PRODUCTION OR... of Foreign Terrorist Tracking Task Force System. (a) The following system of records is exempt from 5...
Kidnapping by Terrorist Groups, 1970-2010: Is Ideological Orientation Relevant?
ERIC Educational Resources Information Center
Forest, James J. F.
2012-01-01
This article examines whether a terrorist group's ideology has a meaningful impact on its involvement in kidnapping. On a global level, incident data (1970-2010) indicate that in the past decade the number of kidnappings by terrorist groups has increased, while Muslim extremists have replaced left-wing/Marxist revolutionaries as the world's…
DOT National Transportation Integrated Search
2014-12-01
This study suggests an integrated framework to quantify cyber attack impacts on the U.S. airport security system. A cyber attack by terrorists on the U.S. involves complex : strategic behavior by the terrorists because they could plan to invade an ai...
ERIC Educational Resources Information Center
Fischer, Peter; Postmes, Tom; Koeppl, Julia; Conway, Lianne; Fredriksson, Tom
2011-01-01
This article hypothesized that the possibility to construct intellectual meaning of a terrorist attack (i.e., whether participants can cognitively understand why the perpetrators did their crime) reduces the negative psychological consequences typically associated with increased terrorist threat. Concretely, the authors investigated the effect of…
Code of Federal Regulations, 2013 CFR
2013-07-01
... to deter money laundering and terrorist activity for operators of credit card systems. 1028.520...) FINANCIAL CRIMES ENFORCEMENT NETWORK, DEPARTMENT OF THE TREASURY RULES FOR OPERATORS OF CREDIT CARD SYSTEMS... information sharing procedures to deter money laundering and terrorist activity for operators of credit card...
Code of Federal Regulations, 2012 CFR
2012-07-01
... to deter money laundering and terrorist activity for operators of credit card systems. 1028.520...) FINANCIAL CRIMES ENFORCEMENT NETWORK, DEPARTMENT OF THE TREASURY RULES FOR OPERATORS OF CREDIT CARD SYSTEMS... information sharing procedures to deter money laundering and terrorist activity for operators of credit card...
Code of Federal Regulations, 2011 CFR
2011-07-01
... to deter money laundering and terrorist activity for operators of credit card systems. 1028.520...) FINANCIAL CRIMES ENFORCEMENT NETWORK, DEPARTMENT OF THE TREASURY RULES FOR OPERATORS OF CREDIT CARD SYSTEMS... information sharing procedures to deter money laundering and terrorist activity for operators of credit card...
Code of Federal Regulations, 2014 CFR
2014-07-01
... to deter money laundering and terrorist activity for operators of credit card systems. 1028.520...) FINANCIAL CRIMES ENFORCEMENT NETWORK, DEPARTMENT OF THE TREASURY RULES FOR OPERATORS OF CREDIT CARD SYSTEMS... information sharing procedures to deter money laundering and terrorist activity for operators of credit card...
The Mass Media Role in Terrorist Campaigns.
ERIC Educational Resources Information Center
Moore, Tim; Clavier, David E.
Terrorists seek recognition for their cause by using violence to create public fear which will force the government into repressive counter-measures. The mass media play a vital role in this strategy. News reports of terrorism may magnify the climate of fear, thereby augmenting the public's overreaction. Moreover, broadcast of terrorist acts may…
2009-05-21
Monterrey , CA: Naval Post Graduate School, 2002), 1. 12 Kathleen M. Carley, Jeffrey Reminga, and Natasha Kamneva, “Destabilizing Terrorist Networks...An example of this experience is when two colleagues in a professional school learn that one colleague was recently divorced from a woman the other
ERIC Educational Resources Information Center
Hutchinson, E. M.; And Others
This course was held to review research and investigations undertaken in Europe, their significance for the practice of adult education, and the possibility of cooperative action in the future. Delegates reached conclusions calling for the general review of European adult education, bibliographic services, general and joint research, cooperation,…
Code of Federal Regulations, 2012 CFR
2012-07-01
... to deter money laundering and terrorist activity for casinos and card clubs. 1021.520 Section 1021... ENFORCEMENT NETWORK, DEPARTMENT OF THE TREASURY RULES FOR CASINOS AND CARD CLUBS Special Information Sharing Procedures To Deter Money Laundering and Terrorist Activity for Casinos and Card Clubs § 1021.520 Special...
Code of Federal Regulations, 2013 CFR
2013-07-01
... to deter money laundering and terrorist activity for casinos and card clubs. 1021.520 Section 1021... ENFORCEMENT NETWORK, DEPARTMENT OF THE TREASURY RULES FOR CASINOS AND CARD CLUBS Special Information Sharing Procedures To Deter Money Laundering and Terrorist Activity for Casinos and Card Clubs § 1021.520 Special...
Code of Federal Regulations, 2011 CFR
2011-07-01
... to deter money laundering and terrorist activity for casinos and card clubs. 1021.520 Section 1021... ENFORCEMENT NETWORK, DEPARTMENT OF THE TREASURY RULES FOR CASINOS AND CARD CLUBS Special Information Sharing Procedures To Deter Money Laundering and Terrorist Activity for Casinos and Card Clubs § 1021.520 Special...
Code of Federal Regulations, 2014 CFR
2014-07-01
... to deter money laundering and terrorist activity for casinos and card clubs. 1021.520 Section 1021... ENFORCEMENT NETWORK, DEPARTMENT OF THE TREASURY RULES FOR CASINOS AND CARD CLUBS Special Information Sharing Procedures To Deter Money Laundering and Terrorist Activity for Casinos and Card Clubs § 1021.520 Special...
1986-08-01
victims of some of the most vicious terrorist acts occurring in the past year, airport security has come under increasing scrutiny by television...operations and contingency planning can be the weapons which airport security managers use to successfully battle the increasing trend of terrorist acts on airports today. (Author)
Code of Federal Regulations, 2010 CFR
2010-07-01
... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false Alphabetical Listing of Blocked Persons, Blocked Vessels, Specially Designated Nationals, Specially Designated Terrorists, Specially Designated Global Terrorists, Foreign Terrorist Organizations, and Specially Designated Narcotics Traffickers (as of May 13, 2010) A Appendix A to Chapte...
3 CFR - Continuation of the National Emergency With Respect to Certain Terrorist Attacks
Code of Federal Regulations, 2014 CFR
2014-01-01
... 3 The President 1 2014-01-01 2014-01-01 false Continuation of the National Emergency With Respect to Certain Terrorist Attacks Presidential Documents Other Presidential Documents Notice of September 10, 2013 Continuation of the National Emergency With Respect to Certain Terrorist Attacks Consistent with section 202(d) of the National Emergencies...
Code of Federal Regulations, 2011 CFR
2011-07-01
... to deter money laundering and terrorist activity for mutual funds. 1024.520 Section 1024.520 Money... ENFORCEMENT NETWORK, DEPARTMENT OF THE TREASURY RULES FOR MUTUAL FUNDS Special Information Sharing Procedures... deter money laundering and terrorist activity for mutual funds. (a) Refer to § 1010.520 of this chapter...
ERIC Educational Resources Information Center
Tatar, Moshe; Amram, Sima; Kelman, Talia
2011-01-01
Exposure to terrorism poses a challenge for children and adolescents as well as parents. For many years, Israeli citizens have been exposed to ongoing terrorist attacks. The present article is aimed at revealing the reactions of Israeli parents when facing terrorist attacks and their perceptions regarding the help-seeking behaviours of their…
3 CFR - Continuation of the National Emergency With Respect to Certain Terrorist Attacks
Code of Federal Regulations, 2011 CFR
2011-01-01
... 3 The President 1 2011-01-01 2011-01-01 false Continuation of the National Emergency With Respect to Certain Terrorist Attacks Presidential Documents Other Presidential Documents Notice of September 10, 2010 Continuation of the National Emergency With Respect to Certain TerroristAttacks Consistent with section 202(d) of the National Emergencies...
PACFEST : enabling technologies in the war on terrorism in the Pacific region.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Moore, Judy Hennessey; Whitley, John B.; Sugimura, Tak
2003-12-01
On October 22-24, 2003, about 40 experts involved in various aspects of homeland security from the United States and four other Pacific region countries meet in Kihei, Hawaii to engage in a free-wheeling discussion and brainstorm (a 'fest') of the role that technology could play in winning the war on terrorism in the Pacific region. The result of this exercise is a concise and relatively thorough definition of the terrorism problem in the Pacific region, emphasizing the issues unique to Island nations in the Pacific setting, along with an action plan for developing working demonstrators of advanced technological solutions tomore » these issues. In this approach, the participants were asked to view the problem and their potential solutions from multiple perspectives, and then to identify barriers (especially social and policy barriers) to any proposed technological solution. The final step was to create a roadmap for further action. This roadmap includes plans to: (1) create a conceptual monitoring and tracking system for people and things moving around the region that would be 'scale free', and develop a simple concept demonstrator; (2) pursue the development of a system to improve local terrorism context information, perhaps through the creation of an information clearinghouse for Pacific law enforcement; (3) explore the implementation of a Hawaii based pilot system to explore hypothetical terrorist scenarios and the development of fusion and analysis tools to work with this data (Sandia); and (4) share information concerning the numerous activities ongoing at various organizations around the understanding and modeling of terrorist behavior.« less
Une fistule recto-vaginale rentrant dans le cadre d'un syndrome de Currarino
Idrissi, Mounia Lakhdar; Babakhoya, Abdeladim; Bouabdellah, Youssef; Hida, Mostapha
2011-01-01
Le syndrome de Currarino (SC) est défini par une triade rassemblant une malformation ano-rectale, une agénésie sacrée et une tumeur pré-sacrée. Nous rapportons le cas d'une fille de 4 ans et demi ayant été admise en consultation de gastro-entérologie pédiatrique pour constipation avec issue de selle à travers un orifice vulvaire. La radiographie du rachis avait montré une agénésie sacrée. Le fistulo-scanner a mis en évidence une fistule recto-vaginale et l'IRM pelvienne a confirmé l'agénésie sacrée et a retrouvé une méningocèle antérieure. La découverte d'une malformation ano-rectale doit faire chercher une autre anomalie de la triade de Currarino. Cette affection, rare, nécessite une prise en charge médico-chirurgicale assez complexe. PMID:22384297
Myths and realities of female-perpetrated terrorism.
Jacques, Karen; Taylor, Paul J
2013-02-01
The authors examined the backgrounds and social experiences of female terrorists to test conflicting accounts of the etiology of this offending group. Data on 222 female terrorists and 269 male terrorists were examined across 8 variables: age at first involvement, educational achievement, employment status, immigration status, marital status, religious conversion, criminal activity, and activist connections. The majority of female terrorists were found to be single, young (<35 years old), native, employed, educated to at least secondary level, and rarely involved in criminality. Compared with their male counterparts, female terrorists were equivalent in age, immigration profile, and role played in terrorism, but they were more likely to have a higher education attainment, less likely to be employed, and less likely to have prior activist connections. The results clarify the myths and realities of female-perpetrated terrorism and suggest that the risk factors associated with female involvement are distinct from those associated with male involvement.
The Separation Wall and the right to healthcare.
Borgo, Melania; Picozzi, Mario
2016-12-01
Nowadays, the concepts of soldier and war have changed due to terrorism and the war on terrorism. According to the literature, to prevent terrorism, it is possible to use more violence, but how can we grant the safety of many versus the dignity of a few? In Israel, in order to protect civilians against possible terrorist attacks, Palestinian ambulances that would reach the Israeli hospitals (or the Palestinian hospitals in East Jerusalem) must be quickly controlled. However, many times, at the checkpoint, patients have to wait for an Israeli vehicle that will take them to Israel. This procedure causes many delays in medical emergency. How to avoid that terrorists may receive better care than Palestinian civilians may just because they are already on the Israeli side of the Separation Wall? How is it possible to ensure the life and safety of many, without denying the right to healthcare to somebody? How to decide when the State requirements conflict with traditional medical duties? Is it acceptable to provide health care to a terrorist? What should be done when it is uncertain whether the ambulance transports weapons besides patients? These questions call upon the core role of the doctor and of the medical profession: taking care of all sick persons. The care is the starting point of ethics. If we do not care about other human beings we do not have a real moral comprehension of any human ideal or action. For this reason we can say that the care is the premise of morality. The rights of all citizens, including the claim to public security, grounds on the care for each individual who needs help.
[Biological and toxin terrorism weapons].
Bokan, Slavko
2003-03-01
The use of biological agents and toxins in warfare and terrorism has a long history. Human, animal and plant pathogens and toxins can cause disease and can be used as a threat to humans, animals and staple crops. The same is true for biological agents. Although the use of biological agents and toxins in military conflicts has been a concern of military communities for many years, several recent events have increased the awareness of terrorist use of these weapons against civilian population. A Mass Casualty Biological (Toxin) Weapon (MCBTW) is any biological and toxin weapon capable of causing death or disease on a large scale, such that the military or civilian infrastructure of the state or organization being attacked is overwhelmed. A militarily significant (or terrorist) weapon is any weapon capable of affecting, directly or indirectly, that is physically or psychologically, the outcome of a military operation. Although many biological agents such as toxins and bioregulators can be used to cause diseases, there are only a few that can truly threaten civilian populations on a large scale. Bioregulators or modulators are biochemical compounds, such as peptides, that occur naturally in organisms. They are new class of weapons that can damage nervous system, alter moods, trigger psychological changes and kill. The potential military or terrorist use of bioregulators is similar to that of toxins. Some of these compounds are several hundred times more potent than traditional chemical warfare agents. Important features and military advantages of new bioregulators are novel sites of toxic action; rapid and specific effects; penetration of protective filters and equipment, and militarily effective physical incapacitation. This overview of biological agents and toxins is largely intended to help healthcare providers on all levels to make decisions in protecting general population from these agents.
Catalyseur d'hydrocraquage à base de sulfure de NiMo déposé sur une zéolithe HEMT modifiée
NASA Astrophysics Data System (ADS)
Baalala, M.; Becue, T.; Leglise, J.; Manoli, J. M.; van Gestel, J. N. M.; Lamotte, J.; Bensitel, M.; Goupil, J. M.; Cornet, D.
1999-02-01
Treating a NH4EMT zeolite with a solution of (NH4)2SiF6 at 80 °C affords a solid containing amorphous SiO2 intimately mixed with the zeolite. This acidic support EMT-Si was loaded with NiMo sulfide in order to prepare a bifunctional catalyst, which was tested for the hydrogenation of benzene and the hydrocracking of n-heptane. This NiMo/EMT-Si catalyst was found more active for hydrogenation than the analogous NiMo/HY. This is ascribed to a higher dispersion of the NiMo sulfide, which is almost equally shared between the internal mesopores in the modified EMT solid, and the fissures, which were created throughout the zeolite grains upon inserting the NiMo sulfide. The catalyst with the EMT-Si support was also found more active than the NiMo/HY for the hydrocracking of heptane, with a slightly higher selectivity into heptane isomers. Le traitement d'une zéolithe NH4EMT par une solution de (NH4)2SiF6 fournit un solide comportant une phase SiO2 amorphe intimement mélangée aux parties intactes de la zéolithe. Sur ce support acide EMT-Si, on a greffé un sulfure de NiMo afin de préparer un catalyseur bifonctionnel qui a été testé dans les réactions d'hydrogénation du benzène et d'hydrocraquage du n-heptane. Ce catalyseur NiMo/EMT-Si s'avère plus actif en hydrogénation que son analogue NiMo/HY, en raison d'une meilleure dispersion du sulfure de NiMo. Sur le solide EMT modifié, le sulfure se répartit à peu près également entre les mésopores internes et les fissures crées dans les grains de zéolithe lors de l'insertion du sulfure de NiMo. Au contraire sur le support Y, une partie du sulfure est externe aux grains de zéolithe et inactive en catalyse. Le catalyseur NiMo/EMT-Si est aussi trouvé plus actif que le NiMo/HY en hydrocraquage du n-heptane, et un peu plus sélectif en isomères.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 3 The President 1 2011-01-01 2011-01-01 false Continuation of the National Emergency With Respect to Terrorists Who Threaten To Disrupt the Middle East Peace Process Presidential Documents Other Presidential Documents Notice of January 20, 2010 Continuation of the National Emergency With Respect to Terrorists Who Threaten To Disrupt the Middle...
Code of Federal Regulations, 2010 CFR
2010-01-01
... 3 The President 1 2010-01-01 2010-01-01 false Continuation of the National Emergency with Respect to Terrorists Who Threaten to Disrupt the Middle East Peace Process Presidential Documents Other Presidential Documents Notice of January 15, 2009 Continuation of the National Emergency with Respect to Terrorists Who Threaten to Disrupt the Middle...
Code of Federal Regulations, 2013 CFR
2013-01-01
... 3 The President 1 2013-01-01 2013-01-01 false Continuation of the National Emergency With Respect to Terrorists Who Threaten To Disrupt the Middle East Peace Process Presidential Documents Other Presidential Documents Notice of January 19, 2012 Continuation of the National Emergency With Respect to Terrorists Who Threaten To Disrupt the Middle...
Code of Federal Regulations, 2012 CFR
2012-01-01
... 3 The President 1 2012-01-01 2012-01-01 false Continuation of the National Emergency With Respect to Terrorists Who Threaten To Disrupt the Middle East Peace Process Presidential Documents Other Presidential Documents Notice of January 13, 2011 Continuation of the National Emergency With Respect to Terrorists Who Threaten To Disrupt the Middle...
Code of Federal Regulations, 2014 CFR
2014-01-01
... 3 The President 1 2014-01-01 2014-01-01 false Continuation of the National Emergency With Respect to Terrorists Who Threaten To Disrupt the Middle East Peace Process Presidential Documents Other Presidential Documents Notice of January 17, 2013 Continuation of the National Emergency With Respect to Terrorists Who Threaten To Disrupt the Middle...
The Violent Islamic Radicalization Process: A Framework for Understanding
2011-12-01
transformation from a non-violent and religiously based understanding and practice of the Islamic faith to one with a violent, religious and politically...Group Radicalization Narrative ................................37 3. Religiously Based Pathways and Theories of Salafi-Jihadi Radicalization...of terrorists, who becomes a terrorist, and why persons become terrorists in the first place, has long been a topic of study. Research conducted based
Terrorism in the Maritime Domain
2013-03-01
Indonesia-based terrorist group formed in the early 1990s to establish an Islamic state encompassing southern Thailand, Malaysia , Singapore, Indonesia...overseas. There are instances where the warships need to replenish their fuel and food supplies in a foreign country’s harbor. The terrorist group...initiated to improve the maritime domain awareness in the tri-border area (TBA) between the Philippines, Malaysia , and Indonesia, where terrorist
Two Models for Semi-Supervised Terrorist Group Detection
NASA Astrophysics Data System (ADS)
Ozgul, Fatih; Erdem, Zeki; Bowerman, Chris
Since discovery of organization structure of offender groups leads the investigation to terrorist cells or organized crime groups, detecting covert networks from crime data are important to crime investigation. Two models, GDM and OGDM, which are based on another representation model - OGRM are developed and tested on nine terrorist groups. GDM, which is basically depending on police arrest data and “caught together” information and OGDM, which uses a feature matching on year-wise offender components from arrest and demographics data, performed well on terrorist groups, but OGDM produced high precision with low recall values. OGDM uses a terror crime modus operandi ontology which enabled matching of similar crimes.
Frickmann, Hagen; Wulff, B; Loderstædt, U; Hagen, R M; Sturm, D; Polywka, S
2013-12-01
We evaluated the feasibility of intentional transmission of HIV by means of suicide bombing and rape as a terrorist tactic in asymmetric conflicts by evaluating the recognised optimum conditions for biological warfare. We also estimated the suitability of a fourth-generation rapid test for HIV detection in the blood of dead terrorists killed in the completion of their mission. The feasibility of deliberate transmission of HIV for terroristic ends was evaluated on the basis of published experience from passive biological warfare research. In addition, blood from four recently deceased HIV-positive patients and four HIV-negative control corpses, stored at 4°C in a mortuary, was analysed at 12, 24, 36 and 48 h postmortem by rapid serological testing. The feasibility of HIV infection for terroristic purposes was established. The fourth-generation HIV rapid test we evaluated identified all HIV-positive samples and was negative for all HIV-negative samples. Rapid HIV testing from the remains of dead terrorists in the deployed military environment is possible. Samples should be acquired quickly, basic sample preparation is advisable and consequent decisions concerning postexposure prophylaxis should take into account the diagnostic gap in early infections.
2011-01-01
Background Terrorist attacks are traumatic events that may result in a wide range of psychological disorders for people exposed. This review aimed to systematically assess the current evidence on major depressive disorder (MDD) after terrorist attacks. Methods A systematic review was performed. Studies included assessed the impact of human-made, intentional, terrorist attacks in direct victims and/or persons in general population and evaluated MDD based on diagnostic criteria. Results A total of 567 reports were identified, 11 of which were eligible for this review: 6 carried out with direct victims, 4 with persons in general population, and 1 with victims and general population. The reviewed literature suggests that the risk of MDD ranges between 20 and 30% in direct victims and between 4 and 10% in the general population in the first few months after terrorist attacks. Characteristics that tend to increase risk of MDD after a terrorist attack are female gender, having experienced more stressful situations before or after the attack, peritraumatic reactions during the attack, loss of psychosocial resources, and low social support. The course of MDD after terrorist attacks is less clear due to the scarcity of longitudinal studies. Conclusions Methodological limitations in the literature of this field are considered and potentially important areas for future research such as the assessment of the course of MDD, the study of correlates of MDD or the comorbidity between MDD and other mental health problems are discussed. PMID:21627850
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hoffman, B.
This report examines recent trends and future prospects of terrorism in the United States and assesses their implications for the possibility of a terrorist group attempting an act of nuclear terrorism involving either the theft of a weapons system or strategic nuclear material or an attack on a weapons facility. An emerging trend of ideologically motivated terrorism by groups espousing white supremacist and anti-federalist beliefs or opposing specific issues such as abortion has largely supplanted the ethnic centered violence that dominated earlier domestic terrorist activity. The threat to U.S. nuclear weapons facilities from unknown terrorist groups in this country cannotmore » be considered high at this time. There is no evidence to suggest that any of the organizations reviewed in this study have seriously contemplated a nuclear-related act, nor is there any indication that any group is poised to undertake such an attack in the future. Nevertheless, trends in the terrorist activities of certain groups must be considered in the context of possible operations directed against nuclear weapons sites. Members of these groups are considerably more skilled with weapons than are other terrorist in this country, they possess large stockpiles of sophisticated weapons, they are well trained guerrilla warfare and survival techniques, and they possess an apocalyptic vision of the future-factors that make them the most likely domestic terrorists to attempt an act of nuclear terrorism. In sum, while the volume of annual terrorist incidents in the United States is relatively small, the emerging trends merit intensive and continuing attention.« less
Friemert, B; Franke, A; Bieler, D; Achatz, A; Hinck, D; Engelhardt, M
2017-10-01
The treatment of patients in the context of mass casualty incidents (MCI) represents a great challenge for the participating rescue workers and clinics. Due to the increase in terrorist activities it is necessary to become familiar with this new kind of threat to civilization with respect to the medical treatment of victims of terrorist attacks. There are substantial differences between a "normal" MCI and a terrorist MCI with respect to injury patterns (blunt trauma vs. penetrating/perforating trauma), the type and form of the incident (MCI=static situation vs. terrorist attack MCI= dynamic situation) and the different security positions (rescue services vs. police services). This article is concerned with question of which changes in the surgical treatment of patients are made necessary by these new challenges. In this case it is necessary that physicians are familiar with the different injury patterns, whereby priority must be given to gunshot and explosion (blast) injuries. Furthermore, altered strategic and tactical approaches (damage control surgery vs. tactical abbreviated surgical care) are necessary to ensure survival for as many victims of terrorist attacks as possible and also to achieve the best possible functional results. It is only possible to successfully counter these new challenges by changing the mindset in the treatment of terrorist MCI compared to MCI incidents. An essential component of this mindset is the acquisition of a maximum of flexibility. This article would like to make a contribution to this problem.
Variabilite temporelle des naines T et construction d'une camera infrarouge a grand champ
NASA Astrophysics Data System (ADS)
Artigau, Etienne
Le travail de thèse décrit ici se divise en deux sections distinctes: la première porte sur une étude de la variabilité temporelle des naines T et la seconde sur la construction et les performances de la Caméra PAnoramique Proche InfraRouge (CPAPIR). Les naines brunes sont des objets qui se forment comme les étoiles, lors de l'effondrement gravitationnel d'un nuage de gaz moléculaire, mais dont la masse est trop faible pour leur permettre d'entretenir des réactions de fusion nucléaire. Environ 70% des naines brunes de type L, qui ont des températures comprises entre 2200 K et 1500 K, présentent une variabilité temporelle dont les mécanismes exacts font toujours l'objet de débats. Nous avons étendu la recherche de variabilité temporelle aux naines brunes ayant des températures inférieures à ~1500 K et qui présentent les signatures du méthane, soit les naines T. Nos observations menées à l'Observatoire du mont Mégantic montrent qu'une fraction importante des naines T sont variables à 1.2 mm et 1.6 mm à des niveaux allant de 17 mmag à 53 mmag RMS. Les propriétés photométriques de cette variabilité sont consistantes avec une évolution de la couverture de nuages de poussière à la surface de plusieurs naines T. Des observations complémentaires menées en spectroscopie au télescope Canada-France-Hawaii montrent, pour une naine T, une variabilité spectroscopique dans le proche infrarouge qui est aussi consistante avec l'évolution de tels nuages de poussière. CPAPIR est une caméra infrarouge con=E7ue pour être utilisée à l'Observatoire du mont Mégantic. Elle possède un champ de 30' × 30', soit le plus grand champ de vue parmi les caméras infrarouges astronomiques actuellement en service. CPAPIR est équipé d'un détecteur de type Hawaii-II sensible de 0.8 mm à 2.4 mm avec 2048×2048 pixels. L'optique cryogénique de CPAPIR comprend 8 lentilles cryogéniques et 10 filtres disposés dans deux roues à filtres. Les observations menées au télescope avec CPAPIR montrent que la qualité d'image obtenue et la transmission globale sont conformes aux prédictions faites à partir du design optique et des courbes de transmission des revêtements utilisées pour ses différentes composantes optiques. Mots-clefs . astronomie, naines brunes, naines T, instrumentation, caméra, relevé, infrarouge
FIRST trial: Lemay park collection plan
2007-12-01
expériences : une expé- rience de détection de panache de gaz, une de plastique simulant un panache de gaz, DRDC Valcartier TN 2007-435 i une de...panache de gaz, une de plastique simulant un panache de gaz, une de poudre chimique et une d’artilleries non explosées. Objectifs : Par cet exercice
The Spatial and Temporal Patterns of Insurgent Attacks
2014-06-13
INTRODUCTION We must not rely on changing the hearts and minds of terrorists. The motivation for terrorism results from long-term social, cultural and...psychological pressures, which are difficult to alter. But motivation is only part of the formula for terrorism. The other is opportunity for attack that...terrorists; motivation and opportunity reduction brings more immediate protection. In any case, easy opportunities encourage terrorists to attack
2009-04-01
terrorist social networks are quite vulnerable to penetration and exploitation by indigenous personnel working in the communities where the groups operate...LEVERAGING INDIGENOUS SECURITY FORCES by Mack-Jan H. Spencer, Maj, USAF A Research Report Submitted to the Faculty In Partial Fulfillment of the...4. TITLE AND SUBTITLE Connecting the Spots: Combating Transnational Terrorist Groups Through Leveraging Indigenous Security Forces 5a. CONTRACT
Closing the Gap: Measuring the Social Identity of Terrorists
2008-09-01
considering social psychological aspects of terrorism studies. Despite what might be apparent within the media and even parts of academic circles, terrorism...MEASURING THE SOCIAL IDENTITY OF TERRORISTS by Keith W. Ludwick September 2008 Thesis Advisor: Anders Strindberg Second Reader: David...COVERED Master’s Thesis 4. TITLE AND SUBTITLE Closing the Gap: Measuring the Social Identity of Terrorists 6. AUTHOR(S) Keith W. Ludwick 5
Operation Noble Eagle and the Use of Combat Air Patrols for Homeland Defense
2008-12-01
aviation security , together with the absence of terrorist attacks on the homeland and of no actionable intelligence indicating an imminent air threat in America. The following sub-areas were researched to help evaluate and recommend changes to the current ONE CAP policy: the history of air defense in America; U.S. air defense mistakes on 9/11 and the evolution of ONE; improvements in the intelligence community and aviation security since 9/11; specific threats to aviation and the risk of another 9/11-style attack in the United States; and the cost and
Satellite Power System (SPS) military applications
NASA Technical Reports Server (NTRS)
Ozeroff, M. J.
1978-01-01
The potential military role, both offensive and defensive, of a Satellite Power System (SPS) is examined. A number of potential military support possibilities are described. An SPS with military capabilities may have a strong negative impact on international relations if it is not internationalized. The SPS satellite would be vulnerable to military action of an enemy with good space capability, but would experience little or no threat from saboteurs or terrorists, except via the ground controls. The paper concludes with an outline of some of the key issues involved, and a number of recommendations for future study, including some areas for long term efforts.
The Proliferation of Unmanned Aerial Vehicles: Terrorist Use, Capability, and Strategic Implications
DOE Office of Scientific and Technical Information (OSTI.GOV)
Ball, Ryan Jokl
There has been unparalleled proliferation and technological advancement of consumer unmanned aerial vehicles (UAVs) across the globe in the past several years. As witnessed over the course of insurgency tactics, it is difficult to restrict terrorists from using widely available technology they perceive as advantageous to their overall strategy. Through a review of the characteristics, consumer market landscape, tactics, and countertactics, as well as operational use of consumer-grade UAVs, this open-source report seeks to provide an introductory understanding of the terrorist-UAV landscape, as well as insights into present and future capabilities. The caveat is evaluating a developing technology haphazardly usedmore » by terrorists in asymmetric conflicts.« less
Bennett, Russell L
2006-03-01
The possibility of a terrorist attack employing the use of chemical or biological weapons of mass destruction (WMD) on American soil is no longer an empty threat, it has become a reality. A WMD is defined as any weapon with the capacity to inflict death and destruction on such a massive scale that its very presence in the hands of hostile forces is a grievous threat. Events of the past few years including the bombing of the World Trade Center in 1993, the Murrah Federal Building in Oklahoma City in 1995 and the use of planes as guided missiles directed into the Pentagon and New York's Twin Towers in 2001 (9/11) and the tragic incidents involving twentythree people who were infected and five who died as a result of contact with anthrax-laced mail in the Fall of 2001, have well established that the United States can be attacked by both domestic and international terrorists without warning or provocation. In light of these actions, hospitals have been working vigorously to ensure that they would be "ready" in the event of another terrorist attack to provide appropriate medical care to victims. However, according to a recent United States General Accounting Office (GAO) nationwide survey, our nation's hospitals still are not prepared to manage mass causalities resulting from chemical or biological WMD. Therefore, there is a clear need for information about current hospital preparedness in order to provide a foundation for systematic planning and broader discussions about relative cost, probable effectiveness, environmental impact and overall societal priorities. Hence, the aim of this research was to examine the current preparedness of hospitals in the State of Mississippi to manage victims of terrorist attacks involving chemical or biological WMD. All acute care hospitals in the State were selected for inclusion in this study. Both quantitative and qualitative methods were utilized for data collection and analysis. Six hypotheses were tested. Using a questionnaire survey, the availability of functional preparedness plans, specific preparedness education/training, decontamination facilities, surge capacity, pharmaceutical supplies, and laboratory diagnostic capabilities of hospitals were examined. The findings revealed that a majority (89.2%) of hospitals in the State of Mississippi have documented preparedness plans, provided specific preparedness education/training (89.2%), have dedicated facilities for decontamination (75.7%), and pharmaceutical plans and supplies (56.8%) for the treatment of victims in the event of a disaster involving chemical or biological WMD. However, over half (59.5%) of the hospitals could not increase surge capacity (supplies, equipment, staff, patient beds, etc.) and lack appropriate laboratory diagnostic services (91.9%) capable of analyzing and identifying WMD. In general, hospitals in the State of Mississippi, like a number of hospitals throughout the United States, are still not adequately prepared to manage victims of terrorist attacks involving chemical or biological WMD which consequently may result in the loss of hundreds or even thousands of lives. Therefore, hospitals continue to require substantial resources at the local, State, and national levels in order to be "truly" prepared.
Bennett, Russell L.
2006-01-01
The possibility of a terrorist attack employing the use of chemical or biological weapons of mass destruction (WMD) on American soil is no longer an empty threat, it has become a reality. A WMD is defined as any weapon with the capacity to inflict death and destruction on such a massive scale that its very presence in the hands of hostile forces is a grievous threat. Events of the past few years including the bombing of the World Trade Center in 1993, the Murrah Federal Building in Oklahoma City in 1995 and the use of planes as guided missiles directed into the Pentagon and New York’s Twin Towers in 2001 (9/11) and the tragic incidents involving twenty-three people who were infected and five who died as a result of contact with anthrax-laced mail in the Fall of 2001, have well established that the United States can be attacked by both domestic and international terrorists without warning or provocation. In light of these actions, hospitals have been working vigorously to ensure that they would be “ready” in the event of another terrorist attack to provide appropriate medical care to victims. However, according to a recent United States General Accounting Office (GAO) nationwide survey, our nation’s hospitals still are not prepared to manage mass causalities resulting from chemical or biological WMD. Therefore, there is a clear need for information about current hospital preparedness in order to provide a foundation for systematic planning and broader discussions about relative cost, probable effectiveness, environmental impact and overall societal priorities. Hence, the aim of this research was to examine the current preparedness of hospitals in the State of Mississippi to manage victims of terrorist attacks involving chemical or biological WMD. All acute care hospitals in the State were selected for inclusion in this study. Both quantitative and qualitative methods were utilized for data collection and analysis. Six hypotheses were tested. Using a questionnaire survey, the availability of functional preparedness plans, specific preparedness education/training, decontamination facilities, surge capacity, pharmaceutical supplies, and laboratory diagnostic capabilities of hospitals were examined. The findings revealed that a majority (89.2%) of hospitals in the State of Mississippi have documented preparedness plans, provided specific preparedness education/training (89.2%), have dedicated facilities for decontamination (75.7%), and pharmaceutical plans and supplies (56.8%) for the treatment of victims in the event of a disaster involving chemical or biological WMD. However, over half (59.5%) of the hospitals could not increase surge capacity (supplies, equipment, staff, patient beds, etc.) and lack appropriate laboratory diagnostic services (91.9%) capable of analyzing and identifying WMD. In general, hospitals in the State of Mississippi, like a number of hospitals throughout the United States, are still not adequately prepared to manage victims of terrorist attacks involving chemical or biological WMD which consequently may result in the loss of hundreds or even thousands of lives. Therefore, hospitals continue to require substantial resources at the local, State, and national levels in order to be “truly” prepared. PMID:16823078
Asymmetric threat data mining and knowledge discovery
NASA Astrophysics Data System (ADS)
Gilmore, John F.; Pagels, Michael A.; Palk, Justin
2001-03-01
Asymmetric threats differ from the conventional force-on- force military encounters that the Defense Department has historically been trained to engage. Terrorism by its nature is now an operational activity that is neither easily detected or countered as its very existence depends on small covert attacks exploiting the element of surprise. But terrorism does have defined forms, motivations, tactics and organizational structure. Exploiting a terrorism taxonomy provides the opportunity to discover and assess knowledge of terrorist operations. This paper describes the Asymmetric Threat Terrorist Assessment, Countering, and Knowledge (ATTACK) system. ATTACK has been developed to (a) data mine open source intelligence (OSINT) information from web-based newspaper sources, video news web casts, and actual terrorist web sites, (b) evaluate this information against a terrorism taxonomy, (c) exploit country/region specific social, economic, political, and religious knowledge, and (d) discover and predict potential terrorist activities and association links. Details of the asymmetric threat structure and the ATTACK system architecture are presented with results of an actual terrorist data mining and knowledge discovery test case shown.
National Institute of Justice (NIJ): technology challenges
NASA Astrophysics Data System (ADS)
Morgan, John S.
2004-09-01
Law enforcement agencies play a key role in protecting the nation from and responding to terrorist attacks. The National Institute of Justice (NIJ) is the focal point for the research, development, test and evaluation of technology for law enforcement. NIJ and the Department of Homeland Security's Directorate of Science & Technology (DHS S&T) have related missions to support research and technology development for public safety. DHS S&T provides law enforcement agencies technology to respond to terrorist threats involving weapons of mass destruction, while NIJ focuses on technologies applicable across the spectrum of law enforcement needs. Investment in C3I technology offers perhaps the greatest potential benefit with respect to improving the ability to law enforcement agencies to respond to all types of crime including terrorist acts. Providing effective communications and information systems remains a key technology challenge, as does providing law enforcement responders accurate information that they can act on. Sensors and surveillance systems can play a key role in identifying terrorists and preventing or effectively responding to a terrorist attack.
Gradus, Jaimie L; Marx, Brian P; Sloan, Denise M
2016-06-01
Acts of terrorism are becoming increasingly common throughout the world. These events represent a significant public health concern given the associated health consequences. Although it is clear that terrorist attacks have mental and physical health sequelae, the exact nature and prevalence of these consequences are unclear. Epidemiological research can play an important role in better understanding the mental and physical impact of terrorist attacks. In this editorial, we highlight recent epidemiological research on these terrorism-related health outcomes. We also provide suggestions for how future studies can build on the existing literature and describe ways in which epidemiological methods can be harnessed to extend the current literature. Lastly, we offer recommendations on how to best prepare communities for the aftermath of terrorist attacks, highlighting secondary intervention and prevention strategies. Overall, multilevel strategies are needed to adequately cope with the growing rise of terrorist acts, and these strategies will have to be reassessed as the nature of terrorist attacks changes.
Terrorist Group Brands: Understanding Terrorist Group Strategies Through Brand Exposure
2016-06-01
firms do, terrorist groups use branding to increase support and thus their capacity to conduct operations. This thesis introduces the new concept...The commercial marketplace uses branding to differentiate the products of one company from another.5 Scholars apply the term brand loosely and...these brands brings with it perceived added value to the product performance, trust, and reliability.11 Consumers also recognize people themselves as
Combating Terrorism: U.S. Government Strategies and Efforts to Deny Terrorists Safe Haven
2011-06-03
havens—such as activities funded through State’s Peacekeeping Operations and State-funded DHS training to combat money laundering and bulk cash...Management, Committee on Homeland Security House of Representatives COMBATING TERRORISM U.S. Government Strategies and Efforts to Deny Terrorists... Combating Terrorism: U.S. Government Strategies and Efforts to Deny Terrorists Safe Haven 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT
The Sociology and Psychology of Terrorism: Who Becomes a Terrorist and Why?
1999-09-01
where many terrorists first become familiar with Marxist-Leninist ideology or other revolutionary ideas and get involved with radical groups. Russell...Terrorists have the ability to use a variety of weapons, vehicles, and communications equipment and are familiar with their physical environment...acquires the group’s mindset only after being fully indoctrinated and familiarized with its ideology, point of view, leadership attitudes, ways of
Post, Jerrold M; McGinnis, Cody; Moody, Kristen
2014-01-01
There are no psychological characteristics or psychopathology separating terrorists from the general population. Rather, it is group dynamics, with a particular emphasis on collective identity, that helps to explain terrorist psychology. Just as there is a diverse spectrum of kinds of terrorism, so too is there a spectrum of terrorist psychologies. Some terrorists, those in nationalist-separatist groups, such as Fatah and the IRA, are continuing with the mission of their parents who are dissident to the regime. The opposite generational provenance is seen among social-revolutionary terrorists, such as the Weather Underground and the Red Army Faction in Germany, who are rebelling against their parents' generation, which is loyal to the regime. Four waves of terrorism can be distinguished: the "anarchist wave"; the "anti-colonial wave" (nationalist-separatist), with minority groups seeking to be liberated from their colonial masters or from the majority in their country; the "new left" wave (social-revolutionary); and now the "religious" wave. With the communications revolution, a new phenomenon is emerging which may presage a fifth wave: lone wolf terrorists who through the Internet are radicalized and feel they belong to the virtual community of hatred. A typology of lone wolf terrorism is proposed. Copyright © 2014 John Wiley & Sons, Ltd.
Pacini, Matteo; Maremmani, Icro
2018-04-01
Psychiatric evaluations of violent political crime were mostly performed on a case-by-case basis in a forensic environment, which made them unduly dependent on categories of presumed dangerousness and legal responsibility, rather than on a clinical definition of their mental status. In referring to such "clinical" definitions, the disorder we have in mind is not limited to the major, agitated psychotic manias or mixed states. The presence of a dominant temperament, or protracted hypomania, is enough by itself to explain an individual's engagement in a wide range of activities, not necessarily sociopathic or violent. We put forward the hypothesis that formal and transpolitical radical choices, either in favor of an illegal lifestyle or of activities involving a high level of risk, may be linked with certain mental states, especially when considering small clandestine groups showing a high level of internal ideological consensus, and a no-return attitude toward a commitment to radical choices. Available data about the psycho(patho)logical profile of terrorists are still hard to come by. The only available studies are those on identified living terrorists (judging by the trials of those who personally admitted to having been terrorists), and statistical data imply a number of documented cases belonging to the same terrorist organization. In Italy, the period often called the "years of lead [bullets]" displays an interesting viewpoint for the study of terrorist psychology, for two main reasons: first of all, it is a historically defined period (1968-1988), and second, the number of ascertained participants in terrorist activities was quite large.
Golan, Ron; Soffer, Dror; Givon, Adi; Peleg, Kobi
2014-01-01
Terrorist explosions occurring in varying settings have been shown to lead to significantly different injury patterns among the victims, with more severe injuries generally arising in confined space attacks. Increasing numbers of terrorist attacks have been targeted at civilian buses, yet most studies focus on events in which the bomb was detonated within the bus. This study focuses on the injury patterns and hospital utilisation among casualties from explosive terrorist bus attacks with the bomb detonated either within a bus or adjacent to a bus. All patients hospitalised at six level I trauma centres and four large regional trauma centres following terrorist explosions that occurred in and adjacent to buses in Israel between November 2000 and August 2004 were reviewed. Injury severity scores (ISS) were used to assess severity. Hospital utilisation data included length of hospital stay, surgical procedures performed, and intensive care unit (ICU) admission. The study included 262 victims of 22 terrorist attacks targeted at civilian bus passengers and drivers; 171 victims were injured by an explosion within a bus (IB), and 91 were injured by an explosion adjacent to a bus (AB). Significant differences were noted between the groups, with the IB population having higher ISS scores, more primary blast injury, more urgent surgical procedures performed, and greater ICU utilisation. Both groups had percentages of nearly 20% for burn injury, had high percentages of injuries to the head/neck, and high percentages of surgical wound and burn care. Explosive terrorist attacks detonated within a bus generate more severe injuries among the casualties and require more urgent surgical and intensive level care than attacks occurring adjacent to a bus. The comparison and description of the outcomes to these terrorist attacks should aid in the preparation and response to such devastating events. Copyright © 2013 Elsevier Ltd. All rights reserved.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Ackerman, G; Bale, J; Moran, K
Certain types of infrastructure--critical infrastructure (CI)--play vital roles in underpinning our economy, security, and way of life. One particular type of CI--that relating to chemicals--constitutes both an important element of our nation's infrastructure and a particularly attractive set of potential targets. This is primarily because of the large quantities of toxic industrial chemicals (TICs) it employs in various operations and because of the essential economic functions it serves. This study attempts to minimize some of the ambiguities that presently impede chemical infrastructure threat assessments by providing new insight into the key motivational factors that affect terrorist organizations propensity to attackmore » chemical facilities. Prepared as a companion piece to the Center for Nonproliferation Studies August 2004 study--''Assessing Terrorist Motivations for Attacking Critical Infrastructure''--it investigates three overarching research questions: (1) why do terrorists choose to attack chemical-related infrastructure over other targets; (2) what specific factors influence their target selection decisions concerning chemical facilities; and (3) which, if any, types of groups are most inclined to attack chemical infrastructure targets? The study involved a multi-pronged research design, which made use of four discrete investigative techniques to answer the above questions as comprehensively as possible. These include: (1) a review of terrorism and threat assessment literature to glean expert consensus regarding terrorist interest in targeting chemical facilities; (2) the preparation of case studies to help identify internal group factors and contextual influences that have played a significant role in leading some terrorist groups to attack chemical facilities; (3) an examination of data from the Critical Infrastructure Terrorist Incident Catalog (CrITIC) to further illuminate the nature of terrorist attacks against chemical facilities to date; and (4) the refinement of the DECIDe--the Determinants Effecting Critical Infrastructure Decisions--analytical framework to make the factors and dynamics identified by the study more ''usable'' in future efforts to assess terrorist intentions to target chemical-related infrastructure.« less
Barron, Gary R S
2016-08-01
In this paper, I describe dividing practices in making up a specific medical-legal category-the revolving door patient-to identify, label, and direct the actions of particular people living with mental illness. The revolving door patient was a category that had been spoken of for some time, but became a formal legal subject with the introduction of the Alberta Mental Health Act 2010 and Community Treatment Orders (CTOs). I demonstrate how a rationale of control over unpredictable and dangerous individuals was primary in creating this new category, and that the characterization of the revolving door patient required a disciplinary technology to reduce danger. I argue that the CTO is a medical-legal technology that solves the problem of governing a subject in order to produce a patient that manages mental illness. I conclude by reflecting on how the narrative of the revolving door patient, and of mental illness more broadly, has implications for personal identity and tensions between care and control. Dans cet article, je décris comment des 'pratiques divisées' ont créé une catégorie spécifique médico-légale - le « revolving door patient » - afin d'identifier, d'étiqueter et de contrôler les comportements de certains individus vivants avec une maladie mentale. Le «revolving door patient», une catégorie dont on avait parlé depuis un certain temps, est devenu un sujet juridique formel par l'introduction de la loi de la santé mentale de l'Alberta 2010 et de l'Ordre de Traitement Communautaire (OCT). Je démontre comment une logique de contrôle sur les individus imprévisibles et dangereux eu un rôle prépondérant lors de la création de cette catégorie et que la caractérisation du «revolving door patient», entant que telle, a nécessité une technologie disciplinaire pour réduire le danger social. Je soutiens que le OTC est une technologie médico-légale qui résout le problème de contrôle d'un sujet en produisant un patient qui gère une maladie mentale. Je conclus en démontrant de quelle façon le «revolving door patient», et la maladie mentale en général, a des répercussions sur l'identité personnelle et produisent des tensions entre les soins et le contrôle. © 2016 Canadian Sociological Association/La Société canadienne de sociologie.
Etude des facteurs de risque du retard de croissance intra-utérin à Lubumbashi
Moyambe, Jules Ngwe Thaba; Bernard, Pierre; Khang'Mate, Faustin; Nkoy, Albert Mwembo Tambwe A; Mukalenge, Faustin Chenge; Makanda, Daudet; Twite, Eugene; Ndudula, Arthur Munkana; Lubamba, Cham; Kadingi, Arnauld Kabulu; Kayomb, Mutach; Kayamba, Prosper Kalenga Muenze
2013-01-01
Introduction Dans notre milieu, il n'existe aucune politique de prévention du Retard de Croissance Intra-Utérin (RCIU) clairement défini. L'objectif de ce travail était d'identifier les facteurs de risque de RCIU afin de proposer une stratégie de lutte contre cette pathologie en agissant surtout sur des facteurs pouvant faire l'objet d'une action préventive. Méthodes Une étude cas-témoins a été menée dans 11 centres hospitaliers de Lubumbashi en République Démocratique du Congo, de Janvier 2010 à Juin 2011, dans le but d'identifier les facteurs de risque du retard de croissance intra-utérin (RCIU). Au total 420 gestantes (cas et témoins) avec grossesse monofoetale d'au moins 24 semaines d'aménorrhée ont été inclues dans l'étude. Les cas correspondaient aux gestantes dont le poids du fœtus était resté inférieur au 10 eme percentile des courbes de référence d'Alexander, après 2 échographies successives réalisées à intervalle de 4 semaines. Les témoins correspondaient aux gestantes dont le poids du fœtus était supérieur ou égal au 10 eme percentile de mêmes courbes. A chaque cas a été apparié un témoin de même parité porteur d'une grossesse de même âge. Résultats L'analyse univariée a identifié comme facteurs de risque: la taille maternelle. Conclusion L'amélioration du niveau socio-économique des populations, la lutte contre le paludisme et les consultations prénatales mieux organisées couplées à une meilleure éducation sanitaire et nutritionnelle peuvent contribuer sensiblement à la réduction de la fréquence du RCIU à Lubumbashi. PMID:23504392
Le syndrome d’Usher: à propos d’une observation
Daoudi, Chama; boutimzine, Noureddine; Haouzi, Samia El; Lezrek, Omar; Tachfouti, Samira; Lezrek, Mounir; Laghmari, Mina; Daoudi, Rajae
2017-01-01
Résumé Le syndrome d'Usher est une maladie génétique comportant une double atteinte sensorielle (auditive et visuelle) appelée surdicécité. Nous rapportons l'observation d'un patient de 50 ans, issue d'un mariage consanguin présentant une surdité congénitale avec une fonction vestibulaire normale et une rétinopathie pigmentaire responsable d'une baisse bilatérale de l'acuité visuelle apparue vers l'âge de 16 ans. Cette association compose le type 2 du syndrome d'Usher, affection rare de transmission autosomique récessive. La chirurgie de la cataracte a permis une amélioration de l'acuité visuelle chez ce patient. PMID:28979619
2006-12-29
access to scientific and technical information (S& T ) for legitimate uses while protecting it from potential terrorists poses difficult policy choices...September 11, 2001 terrorist attacks, controls increasingly have been placed on some unclassified research and S& T information, including that used to...identify SBU information, especially S& T information; how to keep it from terrorists, while allowing access for those who need to use it; and how to
Aptitude for Destruction. Volume 2: Case Studies of Organizational Learning in Five Terrorist Groups
2005-01-01
traditional military operations against opposing security forces with terrorist bombings or assassinations-we use "terrorism," "terrorist violence ," and...in the Israeli military. The IDF pres- sured Hizballah in a variety of ways, ranging from threats against its leadership to technological measures... violence . The group’s implementation of this strategy is articulated in The Green Book, a PIRA policy and training manual:2 1. A war of attrition against
2004-06-15
therefore should be the subject of additional due diligence . Independent Task Force on Terrorist Financing 47 • Cooperate fully with any multilateral...unusually talented group who brought enthusiasm, diligence , and strong analytical skills to this project. We are especially appreciative of the hard...State Department’s latest Patterns of Global Terrorism report, continue to give praise where praise is due but too often go to lengths to avoid
The Development of Decision Aids for Counter-Terrorist Applications
1980-12-01
I.D. AM OLT of PLO A14YOLP of PLO Agua Sandinist TPLF of Turkey 0 TERORISTS 3 4 25 2 GROUP CAPABILITY Unknown Unknown Auto Weapons Sten Gun "DEADLINE...of any terrorist group to different situ - ations are not independent, but reflect a coherent policy regarding violence and willingness to negotiate...importance in this stage is the need to deter future terrorist activities with- out jeopardizing our credibility in future negotiation situ - ations. I8
2012-12-01
across the internet, and terrorists have evolved to become more adept at covert communication. Web chat through on multiplayer online video games ...Tom Wells. “TERRORISTS are using online war games like Call of Duty to plot attacks, The Sun can reveal.” http://www.thesun.co.uk/sol/homepage/news...4205896/Terrorists-play- online - games -like-Call-of- Duty-to-plan-attacks.html#ixzz2E2lOCwjd 10 Daily News and Analysis. “Headley used ’electronic dead
Jemaah Islamiyah: Reevaluating the Most Dangerous Terrorist Threat in Southeast Asia
2010-12-01
why some terrorist groups last longer than others, namely “ideological motivation , economic conditions, regime type, the size of groups, and/or the...States Air Force, RAND Corporation and Project Air Force (U.S.), The Dynamic Terrorist Threat: An Assessment of Group Motivations and Capabilities in a...in 2003 and 2004, then shifted tactics from car bombs to backpack bombs for their 2005 and 2009 attacks.58 Their operatives received safe haven and
Globalization and U.S. Navy Forces
2002-07-01
terrorists from Carlos the Jackal to Osama bin Laden. Sudan has been far too eco- nomically destitute to cause international trouble, but now has oil. Sudan...Asia’s stability, and possibly even its future, the two governments enter into a new coop- erative relationship recalling the " golden moment" of Baker...nationality. But, unlike the 1970s, when there were European and Japanese terrorists (even a Venezuelan—Carlos the Jackal ), the global terrorists of note now
Maritime Security: Potential Terrorist Attacks and Protection Priorities
2007-01-09
Liquefied Natural Gas: Siting and Safety .” Feb. 15, 2005. 108 U.S. Coast Guard. U.S. Coast Guard Captain of the Port Long Island Sound Waterways...Order Code RL33787 Maritime Security: Potential Terrorist Attacks and Protection Priorities January 9, 2007 Paul W. Parfomak and John Frittelli...Terrorist Attacks and Protection Priorities 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT NUMBER 5e. TASK
Relative risk perception for terrorism: implications for preparedness and risk communication.
Caponecchia, Carlo
2012-09-01
Terrorism presents a significant risk that is often approached at public policy, infrastructure, or emergency management level. Public perceptions of the likelihood of terrorist events, and how this may relate to individual preparedness, are not always extensively examined. The tendency to think that negative events are less likely to happen to oneself than to the average person is known as optimism bias. Optimism bias is relevant to perceptions of terrorism, because it is thought to be related to a reduction in precaution use. Using an online survey of 164 participants, this study aimed to determine whether Sydney residents thought they had a lower likelihood of experiencing terrorist events than other Australians. Significant optimism bias was observed for witnessing terrorist events, but not for personally experiencing terrorist events. In addition, Sydney residents tended to think that terrorist attacks were more likely to occur in Sydney than another major Australian city in the next five years. At the same time, household and workplace preparedness for terrorism was quite low, as was awareness of emergency strategies in the central business district. Perceptions of high likelihood of terrorism happening in one's own city, yet low preparedness present a challenge for risk communication and emergency management strategies. The diversity of possible terrorist targets, and the simple plans that can moderate the effects of a disaster may need to be emphasized in future anti-terrorism initiatives. © 2012 Society for Risk Analysis.
Dynamique d'une frontière libre : un siège fascinant de morphogénèse
NASA Astrophysics Data System (ADS)
Misbah, Chaouqi; Müller-Kurmbhaar, Heiner
Un front de solidification, dont le mouvement est limité par une simple diffusion, est le siège d'une myriade de morphogénèses statiques et dynamiques, allant d'une dendrite aux fractals, et d'un front cellulaire stationnaire au chaos spatio-temporel. Plusieurs de ces caractéristiques sont communes à une vaste liste de systèmes hors équilibre. Même l'organisation spatio-temporelle d'une population d'entités vivantes, telles que les bactéries, présente une forte similarité avec celle d'un front de croissance.
Maladie de Takayasu et polyarthrite rhumatoïde: une association rare - à propos d'une observation
Frikha, Faten; Maazoun, Fatma; Snoussi, Mouna; Abid, Leila; Abid, Hanen; Bouassida, Walid; Kaddour, Neila; Bahloul, Zouhir
2012-01-01
L'artérite de Takayasu ou maladie de Takayasu (MT) et la polyarthrite rhumatoïde (PR) et sont deux maladies inflammatoires chroniques et leur association a été rapportée dans la littérature à travers quelques observations de cas sporadiques. Nous rapportons une nouvelle observation d'une telle association. Une patiente âgée de 44 ans, diagnostiquée avec une polyarthrite rhumatoïde à facteur rhumatoïde positif, qui a développé des céphalées avec des vertiges de caractère permanent. L'examen révélait un pouls radial et huméral abolis à droite, un souffle carotidien bilatéral et une tension artérielle imprenable à droite. L'artériographie a confirmé la présence d'une atteinte de l'arc aortique type MT. Le diagnostic d'une maladie de Takayasu associée à une polyarthrite rhumatoïde était retenu. La patiente était traitée par une corticothérapie (prednisone à la dose de 0,5 mg/kg par jour) et un traitement de fond par Méthotrexate avec une bonne réponse initiale. A travers notre observation et une revue de la littérature, les caractéristiques épidémiologiques, étiopathogéniques, cliniques, thérapeutiques et évolutives de cette association seront discutées. PMID:22937201
Can Nuclear Terrorists be Deterred?
NASA Astrophysics Data System (ADS)
Ferguson, Charles
2005-04-01
Conventional thinking since September 11, 2001, posits that nuclear-armed terrorists cannot be deterred. However, not all terrorist groups are alike. For instance, those that are strongly affiliated with a national territory or a constituency that can be held hostage are more likely to be self-deterred against using or even acquiring nuclear weapons. In contrast, international terrorist organizations, such as al Qaeda, or apocalyptic groups, such as Aum Shinrikyo, may welcome retaliatory nuclear strikes because they embrace martyrdom. Such groups may be immune to traditional deterrence, which threatens direct punishment against the group in question or against territory or people the terrorists' value. Although deterring these groups may appear hopeless, nuclear forensic techniques could provide the means to establish deterrence through other means. In particular, as long as the source of the nuclear weapon or fissile material could be identified, the United States could threaten a retaliatory response against a nation that did not provide adequate security for its nuclear weapons or weapons-usable fissile material. This type of deterrent threat could be used to compel the nation with lax security to improve its security to meet rigorous standards.
INTERPOL's Surveillance Network in Curbing Transnational Terrorism
Gardeazabal, Javier; Sandler, Todd
2015-01-01
Abstract This paper investigates the role that International Criminal Police Organization (INTERPOL) surveillance—the Mobile INTERPOL Network Database (MIND) and the Fixed INTERPOL Network Database (FIND)—played in the War on Terror since its inception in 2005. MIND/FIND surveillance allows countries to screen people and documents systematically at border crossings against INTERPOL databases on terrorists, fugitives, and stolen and lost travel documents. Such documents have been used in the past by terrorists to transit borders. By applying methods developed in the treatment‐effects literature, this paper establishes that countries adopting MIND/FIND experienced fewer transnational terrorist attacks than they would have had they not adopted MIND/FIND. Our estimates indicate that, on average, from 2008 to 2011, adopting and using MIND/FIND results in 0.5 fewer transnational terrorist incidents each year per 100 million people. Thus, a country like France with a population just above 64 million people in 2008 would have 0.32 fewer transnational terrorist incidents per year owing to its use of INTERPOL surveillance. This amounts to a sizeable average proportional reduction of about 30 percent.
A real-time early warning system for pathogens in water
NASA Astrophysics Data System (ADS)
Adams, John A.; McCarty, David; Crousore, Kristina
2006-05-01
The events of September 11, 2001 represented an escalation in the means and effects of terrorist attacks and raised awareness of the vulnerability of major infrastructures such as transportation, finance, power and energy, communications, food, and water. A re-examination of the security of critical assets was initiated. Actions were taken in the United States to protect our drinking water. Anti-terrorism monitoring systems that allow us to take action before contaminated water can reach the consumer have been under development since then. This presentation will discuss the current performance of a laser-based, multi-angle light scattering (MALS) technology for continuous, real-time detection and classification of microorganisms for security applications in all drinking and process water applications inclusive of protection of major assets, potable and distributed water. Field test data for a number of waterborne pathogens will also be presented.
El Ghali, Zineb; Lahcen, Zineb Ait; Fadili, Wafaa; Kaitouni, Abderrahim Idrissi; Hakkou, Mohamed; Hamdaoui, Abderrachid; Laouad, Inass
2014-01-01
L'hyperoxalurie primitive est une anomalie métabolique congénitale rare caractérisée par un excès de production avec accumulation d'oxalate secondaire à un déficit enzymatique hépatique. Nous rapportons le cas d'un patient de 18 ans qui avait comme antécédent des lithiases rénales récidivantes depuis l'enfance évoluant vers l'insuffisance rénale chronique terminale, mis en hémodialyse périodique depuis 4 ans avec apparition d'une anémie résistante à l’érythropoïétine pour laquelle il a été multitransfusé et qui était admis pour prise en charge de douleurs osseuses invalidantes d'aggravation progressive associées à un syndrome tumoral fait d'adénopathies périphériques et de splénomégalie avec dyspnée et altération de l’état général. Le bilan réalisé avait objectivé de multiples images lytiques lacunaires et condensantes au niveau des poignets et des mains avec des petits reins calcifiés, une pleurésie avec péricardite de grande abondance drainée, une ascite de moyenne abondance avec splénomégalie homogène, une anémie normochrome normocytaire à 7.2 g/dl avec hyperferritinémie à 1129 μg/l et un syndrome inflammatoire biologique. La calcémie était spontanément normale à 97 mg/l avec hyperphosphorémie à 83 mg/l et hypoparathyroïdie à 74,85 pg/ml. Les PAL étaient à 136 UI/l, l'aluminium sérique à 13μg/l et la Vitamine D native à 20,87ng/ml. Le diagnostic d'hyperoxalurie a été retenu sur les données de la biopsie ostéomédullaire objectivant des dépôts de cristaux d'oxalate de calcium avec fibrose médullaire et réaction macrophagique à corps étranger. L’évolution a été marquée par la survenue de fractures spontanées récidivantes au niveau de l’épaule et des 2 hanches. PMID:25328593
78 FR 12420 - Submission for OMB Review; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2013-02-22
... of Special Information Sharing Procedures to Deter Money Laundering and Terrorist Activity. Abstract... efficiency and effectiveness of its anti-money laundering and counter- terrorist financing policies. Affected...
[Civilian massacre in Banija: Kraljevcani and Pecki, 14-16 March 1991].
Kovacević, S; Judas, M; Marusić, A
1991-01-01
On 14 and 16 August 1991, Serbian terrorists attacked two villages near Petrinja in the Banija region. The village of Kraljevcani was attacked on 14 August, when the terrorists killed five older villagers, 3 women and 2 men who stayed in the village to watch the livestock and the houses. The women were killed by automatic rifle fire and grenades, and the bodies of the two men were blown up by a hand rocket-launcher projectiles. On 16 August 1991, Serbian terrorists captured four villagers from Pecki, who came to the deserted village to feed the livestock left after the inhabitants fled from the terrorists. The forensic medical expertise revealed that they were first wounded by rifle fire, then tortured and finally executed by hand axes and bayonets.
Heilbrun, Kirk; Wolbransky, Melinda; Shah, Sanjay; Kelly, Rebecca
2010-01-01
Risk communication is an important vehicle for the scientific understanding of the perception of and response to various kinds of threats. The present study provides apparently the first empirical attempt to compare perceptions, decision-making, and anticipated action in response to threats of three kinds: natural disaster, violent crime, and terrorism. A total of 258 college undergraduates were surveyed using a vignette-based, 2 × 2 × 3 between-subjects design that systematically manipulated threat imminence (high vs. low), risk level (high vs. low), and nature of the threat (natural disaster vs. crime vs. terrorism). There were substantial differences in participants' perceptions and reported actions in response to natural disaster, relative to the other domains of risk, under conditions of high risk. The risk of natural disaster was more likely to lead participants to report that they would change their daily activities and to relocate. It was also more likely than terrorism to lead to action securing the home. It appears that the mechanisms for perception, decision-making, and action in response to threats cannot be generalized in a straightforward way across these domains of threat. Copyright © 2010 John Wiley & Sons, Ltd.
Who Did It? Using International Forensics to Detect and Deter Nuclear Terrorism
DOE Office of Scientific and Technical Information (OSTI.GOV)
Dunlop, W H; Smith, H P
On February 2, the ''New York Times'' reported that the Pentagon has formed a nuclear forensics team tasked with identifying the terrorist attackers should the United States be hit with a nuclear bomb. Adapting nuclear technology to the forensics of exploded nuclear weapons is an old but rapidly evolving field. It dates back to at least 1949, when analysis of airborne debris, retrieved at high altitude off the coast of China, convinced President Harry Truman that the Soviet Union had exploded a nuclear device on the steppes of central Asia. The technology is neither new nor has it been particularlymore » secret, but the formation of a national nuclear forensics team was newsworthy and a useful development. An international team, however, would be even better. Although Washington has naturally focused on preventing a nuclear terrorism attack in the United States, a U.S. city is not necessarily the most likely target for nuclear terrorists. It is doubtful that a terrorist organization would be able to acquire a U.S. nuclear device and even more doubtful that it would acquire one on U.S. soil. Accordingly, if a terrorist organization does get its hands on a fission device, it is likely that it will do so on foreign territory. At that point, the terrorists will have an enormously valuable political weapon in their hands and will be loath to risk losing that asset. Given the risks associated with getting the device into the United States, the rational choice would be to deploy the device abroad against much softer targets. For Islamist terrorists, a major ''Christian'' capital such as London, Rome, or Moscow might offer a more suitable target. Among these, Moscow perhaps presents the most compelling case for international cooperation on post-detonation nuclear forensics. Russia has the largest stockpile of poorly secured nuclear devices in the world. It also has porous borders and poor internal security, and it continues to be a potential source of contraband nuclear material and weapons, despite the best efforts of the Cooperative Threat Reduction (CTR) program. If terrorists obtained the nuclear material in Russia and set Moscow as their target, they would not have to risk transporting the weapon, stolen or makeshift, across international borders. Attacks by Chechen terrorists in Beslan and the Dubrovka Theater in Moscow offer ample proof that a willingness to commit mass murder for fanatical reasons rests within Russian borders, and a foreign source of operatives, particularly from the neighboring Islamic states to the south, is by no means inconceivable. Moscow is also a predominantly Christian city where local authorities routinely discriminate against Muslim minorities. Furthermore, extremists might conclude that a nuclear blast in Moscow could inflict damage well beyond those directly stemming from the attack. The Soviet generation that came to power during the Cold War retained a memory of the United States as an ally in the Great Patriotic War. The present Russian generation has no such remembrance but seems to have retained the animosities and suspicions that were a part of the nuclear standoff. Hence, nuclear terrorists may well believe that they could cause another East-West cold war or even encourage Russia to retaliate against the United States. After all, the sinking of the Kursk was believed by some influential Russians to be the result of American action. How much more likely would be such a view if the Kremlin were destroyed? As long as the world is filled with suspicion and conflict, such reactions are to be expected and, more importantly, anticipated. One has only to remember the early reactions and suspicions in the United States following the 1996 TWA Flight 800 airline disaster. Because the United States is the technological leader in nuclear forensics, its capability will certainly be offered and probably demanded no matter what foreign city is subjected to the devastation of a nuclear explosion. The entire world, not just Americans, will live in fear of a second or third nuclear explosion, and forensics could play a vital role in removing or at least narrowing that fear. Because of such worldwide dread, there will be an international aspect to nuclear forensics regardless of where the explosion takes place. It would be better to be prepared in advance for such contingencies than to delve into the arcane world of nuclear weapons and radiochemistry on the fly.« less
2015-06-01
UCAVs) may enhance Turkey’s ability to counter active terrorists in that region. In this research, Map Aware Non-uniform Automata (MANA) is used to...Aerial Vehicles (UCAVs) may enhance Turkey’s ability to counter active terrorists in that region. In this research, Map Aware Non-uniform Automata (MANA...Attack Munition LOS Line-of-Sight MALE Medium-Altitude Long-Endurance MANA Map Aware Non-Uniform Automata MANA-V Map Aware Non-Uniform Automata
Nuclear terrorism - Threat or not?
NASA Astrophysics Data System (ADS)
Pomper, Miles A.; Tarini, Gabrielle
2017-11-01
A terrorist attack using nuclear or radiological materials is a low-probability event, but if executed, would lead to unprecedented socio-economic, material, and psychological disruption and damage. This chapter seeks to provide a sound assessment of the scope and nature of the threat by examining the different types of nuclear terrorism, each of which poses different risks, involves different barriers to success, and requires different terrorist capabilities. In addition, the chapter aims to provide an overview of the sources and nature of terrorists' motivations to employ a nuclear attack.
Choroïdopathie du lupus érythémateux systémique, à propos d'un cas
Idriss, Benatiya Andaloussi; Fouad, Chraibi; Salima, Bhallil; Meryem, Abdellaoui; Hicham, Tahri
2013-01-01
Le lupus érythémateux systémique (LES) est une maladie auto-immune multi systémique d’étiologie inconnue. Nous rapportons une manifestation très rare du LES représentée par une choroidopathie bilatérale sans hypertension artérielle associée. Il s'agit d'une patiente âgée de 45 ans, suivie pour un LES depuis 5 ans, qui présente une baisse de l'acuité visuelle bilatérale et progressive depuis 3 mois. L'examen du fond d’œil, complété l'angiographie à la fluorescéine et la tomographie en cohérence optique, retrouve un décollement séreux rétinien (DSR) multifocal et bilatéral. L’évolution après corticothérapie systémique est marquée par une amélioration de l'acuité visuelle et une régression du DSR. L'atteinte oculaire au cours du LED est dominée par la kérato-conjonctivite sèche (1/4 à 1/3 des cas). La choroïdopathie est plus rare: seulement une trentaine de cas sont rapportés dans littérature. Elle se manifeste par un décollement séreux rétinien et est habituellement observée chez les patients présentant une néphropathie ou une hypertension artérielle, ce qui n'est pas le cas de notre observation. L'apparition d'une atteinte oculaire au cours du LES peut annoncer une poussée d'atteinte systémique et doit susciter une enquête appropriée. PMID:23717732
Potential criminal adversaries of nuclear programs: a portrait
DOE Office of Scientific and Technical Information (OSTI.GOV)
Jenkins, B.M.
1980-07-01
This paper examines the possibility that terrorists or other kinds of criminals might attempt to seize or sabotage a nuclear facility, steal nuclear material, or carry out other criminal activities in the nuclear domain which has created special problems for the security of nuclear programs. This paper analyzes the potential threat. Our tasks was to describe the potential criminal adversary, or rather the spectrum of potential adversaries who conceivably might carry out malevolent criminal actions against nuclear programs and facilities. We were concerned with both the motivations as well as the material and operational capabilities likely to be displayed bymore » various categories of potential nuclear adversaries.« less
Drachal, Marcin
2017-01-01
Using case studies of the Ebola outbreak in Western Africa in 2014, and the terrorist attacks in Paris and Brussels in 2015 and 2016 respectively, this paper demonstrates how various resilience-related corporate functions contributed to effective crisis response. This paper describes the logical order of actions taken in each of the cases, and how the organisation prioritised its assets and coordinated activities to ensure the response was adequate, efficient and timely. The article demonstrates how business continuity, physical security, threat management, security intelligence and incident management worked together to support the organisation's crisis management structures in complex crisis situations.
`Googling' Terrorists: Are Northern Irish Terrorists Visible on Internet Search Engines?
NASA Astrophysics Data System (ADS)
Reilly, P.
In this chapter, the analysis suggests that Northern Irish terrorists are not visible on Web search engines when net users employ conventional Internet search techniques. Editors of mass media organisations traditionally have had the ability to decide whether a terrorist atrocity is `newsworthy,' controlling the `oxygen' supply that sustains all forms of terrorism. This process, also known as `gatekeeping,' is often influenced by the norms of social responsibility, or alternatively, with regard to the interests of the advertisers and corporate sponsors that sustain mass media organisations. The analysis presented in this chapter suggests that Internet search engines can also be characterised as `gatekeepers,' albeit without the ability to shape the content of Websites before it reaches net users. Instead, Internet search engines give priority retrieval to certain Websites within their directory, pointing net users towards these Websites rather than others on the Internet. Net users are more likely to click on links to the more `visible' Websites on Internet search engine directories, these sites invariably being the highest `ranked' in response to a particular search query. A number of factors including the design of the Website and the number of links to external sites determine the `visibility' of a Website on Internet search engines. The study suggests that Northern Irish terrorists and their sympathisers are unlikely to achieve a greater degree of `visibility' online than they enjoy in the conventional mass media through the perpetration of atrocities. Although these groups may have a greater degree of freedom on the Internet to publicise their ideologies, they are still likely to be speaking to the converted or members of the press. Although it is easier to locate Northern Irish terrorist organisations on Internet search engines by linking in via ideology, ideological description searches, such as `Irish Republican' and `Ulster Loyalist,' are more likely to generate links pointing towards the sites of research institutes and independent media organisations than sites sympathetic to Northern Irish terrorist organisations. The chapter argues that Northern Irish terrorists are only visible on search engines if net users select the correct search terms.
Confronting the Unconventional: Innovation and Transformation in Military Affairs
2006-10-01
Politics, 1954-1962, Columbus: The Ohio State University Press, 1966, p. 398. 10. Colonel Laure, quoted in Jean Planchais, “Petite histoire de...communication, une histoire du SIPRA, Paris: ADDIM, 1989, pp. 10–35. 12. Ratte and Thyrard, Armee et communication, pp. 67, 69–71, 76, 80; Géré, La... Histoire Politique de L Armée: de Gaulle a de Gaulle, Paris: Éditions du Seuil, 1967, p. 338; Mégret, L’ Action Psychologique, p. 111; Girardet, La
The Impact of Culture on Moral and Ethical Decision-Making: An Integrative Literature Review
2007-06-01
circonstanciels et contextuels et sont plus disposées à tenir compte de ces facteurs dans leur interprétation et leur description de la réalité, comparativement ...opérations militaires, comparativement à des militaires d’autres nations. Le professionnalisme et la propension à la compassion ont également été...les officiers subalternes, avaient une plus grande liberté d’action, comparativement aux militaires d’autres pays, ce qui expliquait en partie
The terrorist mind: I. A psychological and political analysis.
Miller, Laurence
2006-04-01
Part I of this two-part article describes the major forms of domestic and foreign terrorism, the motivations of the perpetrators, and the psychological, social, and political forces that contribute to this most particular expression of violence. The article addresses the question of whether all terrorists are sick or evil and considers the possibility that some forms of terrorism, however odious their result, can be a rational response to a situation of perceived intolerable injustice. The article examines what motivates people to join terrorist groups and what may later move them to leave the terrorist lifestyle. Special consideration is given to the psychological and religious dynamics of suicide terrorism and what might motivate some people to give their lives for their cause. Finally, the article offers recommendations for a multipronged approach to dealing with this modern yet ageless scourge.
Ferré Romeu, Pilar
2006-05-01
In this study, I investigated students' memories of the terrorist attacks of September 11, 2001, carried out by Al Qaeda terrorists against the World Trade Center in New York and the Pentagon in Washington. Participants completed on two occasions (2 weeks and 8 months after the events took place) a memory questionnaire that included an assessment of the phenomenal richness of their memories. The results showed that the participants remembered very well the circumstances in which they first heard about the terrorist attacks, that they were very confident about this information, and that these memories were characterized by a high phenomenal richness. Over time, there was a decrease in all of these variables, but people's ratings of phenomenology and confidence were still very high.
Understanding public confidence in government to prevent terrorist attacks.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Baldwin, T. E.; Ramaprasad, A,; Samsa, M. E.
A primary goal of terrorism is to instill a sense of fear and vulnerability in a population and to erode its confidence in government and law enforcement agencies to protect citizens against future attacks. In recognition of its importance, the Department of Homeland Security includes public confidence as one of the principal metrics used to assess the consequences of terrorist attacks. Hence, a detailed understanding of the variations in public confidence among individuals, terrorist event types, and as a function of time is critical to developing this metric. In this exploratory study, a questionnaire was designed, tested, and administered tomore » small groups of individuals to measure public confidence in the ability of federal, state, and local governments and their public safety agencies to prevent acts of terrorism. Data was collected from three groups before and after they watched mock television news broadcasts portraying a smallpox attack, a series of suicide bomber attacks, a refinery explosion attack, and cyber intrusions on financial institutions, resulting in identity theft. Our findings are: (a) although the aggregate confidence level is low, there are optimists and pessimists; (b) the subjects are discriminating in interpreting the nature of a terrorist attack, the time horizon, and its impact; (c) confidence recovery after a terrorist event has an incubation period; and (d) the patterns of recovery of confidence of the optimists and the pessimists are different. These findings can affect the strategy and policies to manage public confidence after a terrorist event.« less
Shrira, Amit; Palgi, Yuval; Hamama-Raz, Yaira; Goodwin, Robin; Ben-Ezra, Menachem
2014-01-01
The present study tested the maturation and inoculation hypotheses by examining whether age and previous exposure to the September 11, 2001, World Trade Center (WTC) terrorist attack moderated the relationship between degree of exposure to Hurricane Sandy and related posttraumatic stress disorder (PTSD) symptoms. An online sample of 1,000 participants from affected states completed self-report questionnaires one month after Hurricane Sandy hit the East Coast. Participants reported their degree of exposure to the WTC terrorist attack and to Hurricane Sandy, and their posttraumatic stress disorder (PTSD) symptoms following Hurricane Sandy. The positive relationship between degree of exposure to Hurricane Sandy and level of PTSD symptoms was weaker among older adults. An additional significant three-way interaction suggested that both age and previous exposure to the WTC terrorist attack moderated the relationship between degree of exposure to Hurricane Sandy and level of PTSD symptoms. Previous high degree of exposure to the WTC terrorist attack was related to a weaker effect of current exposure to Hurricane Sandy on PTSD symptoms among older adults. However, among younger adults, previous high degree of exposure to the WTC terrorist attack was related to a stronger effect of current exposure on PTSD symptoms. When confronted by a natural disaster, American older adults are generally resilient. Supporting the inoculation hypothesis, resilience of older adults may be partly related to the strength successfully extracted from previous exposure to adverse events.
NASA Astrophysics Data System (ADS)
Ballah Solkam, Rosalie; Médard, Ndoutorlengar
2018-05-01
Au Tchad, le réseau d'aires protégées couvre près de 10,2% de la surface du pays et reste globalement représentatif de toute la diversité des écosystèmes de la région. Cependant, ce réseau n'est pas constitué d'écosystèmes intacts car de nombreuses altérations y ont été apportés (certaines espèces sont déjà au seuil critique d'extinction (Addax, gazelle dama, lamantin), voire ont disparu (Rhinocéros noir et blanc, Oryx)) surtout dans les parcs nationaux. Ce qui nous amène à nous interroger sur la dynamique des ressources naturelles et le degré de conservation du parc national de Manda? Une évaluation de la diversité biologique et des ressources hydrographiques de 1951 à 1999 sur la base de la bibliographie existante, de la carte topographique de 1956, des images satellitaires Landsat 5 et 7 TM et ETM+ de 2 périodes (1986, 1999), complétée par des interviews semi-structurés et des transects sur le terrain, permettra de mieux appréhender la dynamique des ressources et les actions de conservation de la biodiversité réalisées à cet effet. Les résultats montrent une dynamique progressive de la faune de 1951 à 1970, puis une dynamique régressive de 1970 à 1989. Après cette tumultueuse période, un repeuplement du parc s'opère de 1989 à 2002. Par contre, la flore est relativement bien conservée avec quelques cours d'eau, des mares, champs et plantations. Et cela grâce aux multiples projets de conservation de la biodiversité. La promotion de l'écotourisme serait une alternative au développement durable de ce parc.
Fofana, Youssouf; Traore, Bekaye; Dicko, Adama; Faye, Ousmane; Berthe, Siritio; Cisse, Lamissa; Keita, Alimata; Tall, Koureissi; Kone, Mamadou Bakary; Keita, Somita
2016-01-01
Introduction Les maladies de peau constituent un problème majeur de santé publique dans les pays en voie développement. En pratique courante les enfants représentent la couche sociale la plus touchée. Le but de notre travail était de décrire les aspects épidémio- cliniques des dermatoses chez les enfants de 0-15 ans dans le service de dermatologie du centre national d’appui à la lutte contre la maladie à Bamako, Mali. Méthodes Il s’agissait d’une étude transversale effectuée au cours de la période allant du premier janvier 2009 au 31 Décembre 2009 dans le service de Dermato-vénérologie du centre national d’appui à la lutte contre la maladie. Sur un total de 16339 patients ayant fait une consultation dermatologique 5149 enfants ont été inclus. Résultats La fréquence hospitalière des dermatoses infantiles était de 31,51%. Les malades se répartissaient en 2838 garçons (55,10%) et 2311 filles (44,90%) soit un sex-ratio de 1,22. L’âge des malades variait de 03 jours à 15 ans avec une moyenne d’âge de 8±5,7 ans. Parmi les affections retrouvées les dermatoses infectieuses représentaient 55,10% de l’ensemble des dermatoses, les dermatoses immuno-allergiques (32,5%), les dermatoses inflammatoires (11,85%). Conclusion Notre étude a révélé l’importance des pathologies infectieuses et immuno-allergiques et la nécessité de mener des actions de prévention simple comme l’hygiène, l’achat d’une tondeuse pour chaque enfant. PMID:28293354
Aviation security : terrorist acts illustrate severe weaknesses in aviation security
DOT National Transportation Integrated Search
2001-09-20
This is the statement of Gerald L. Dillingham, Director, Physical Infrastructure Issues before the Subcommittee on Transportation, Senate and House Committees on Appropriations regarding vulnerabilities to terrorist attacks of the nation's aviation s...
Mode de révélation particulier d'une tumeur brune chez une patiente hémodialysée chronique
El Harraqui, Ryme; Karimi, Ilham; Chemlal, Abdeljalil; Ismaili, Fatiha Alaoui; Haddiya, Intissar
2014-01-01
Les tumeurs brunes constituent une complication rare mais sévère de la dialyse, le plus souvent asymptomatique. Nous rapportons le cas d'une patiente dont le mode de révélation de la tumeur brune fut atypique. Observation médicale: Madame F. est une patiente hémodialysée chronique depuis 14 ans suite à une néphropathie indéterminée. Sur le plan phosphocalcique, elle présente une ostéoporose depuis plus de 10 ans, ainsi qu'une hyperparathyroïdie secondaire. A la date du 24 octobre 2013, elle rapporte qu'elle a constaté la présence d'une petite « bosse » pariétale, apparue de façon spontanée la veille, sans notion de traumatisme. A l'examen clinique, nous trouvons une petite tuméfaction de 2cm de diamètre environs, de consistance dure, indolore, mobile par rapport au cuir chevelu. L’échographie a conclu à un lipome. Le lendemain matin, la patiente entre dans un état de coma profond. Le scanner cérébral a révélé la présence d'un hématome extradural associé à un hématome superficiel extra-crânien en regard d'une lyse de l'os pariétal, qui est en fait une tumeur brune. La patiente est transférée en réanimation où elle décède dans la journée. PMID:25422698
Omigbodun, O O; Okunade, T A
2002-01-01
This case report illustrates the sudden onset, brief course and remission of a psychotic illness in a middle-aged Nigerian starting soon after she heard about the terrorist attacks in America. Vulnerability factors including personality traits and other concurrent life events were identified in the patients. Common mental disorder associated with terrorist attacks, disasters and armed robbery, and the need for health workers to be sensitised to these disorders are discussed in light of the ongoing violence in parts of Nigeria.
Stolen Vehicles for Export: A Major Concern for Domestic and International Security
2018-03-01
Terrorists and Organized Crime Join Forces,” New York Times, May 24, 2005. 5 Bryan Bender, “Stolen U.S. Vehicles End up as Bombs in Iraq, FBI Says,” New...also trafficked to finance other crimes. They can also be used as bomb carriers or in the perpetration of other crimes.31 In an effort to address...as VBIEDs in terrorist activities, but it is believed to be in the dozens.67 “A car bomb is the absolute favorite delivery methods of terrorists
Un cas isolé de tuberculose appendiculaire
Mountassir, Moujahid; Ennafae, Issam; Kechna, Hicham; Berrada, Samir; El Kandry, Siffedine
2011-01-01
La tuberculose est une affection qui sévit à l’état endémique dans notre pays, elle demeure un problème majeur de santé publique .la tuberculose appendiculaire primitive est une affection très rare. Nous rapportons le cas d'un patient de sexe masculin âgé de 17 ans, admis au service pour une prise en charge d'une douleur de la fosse iliaque droite évoluant dans un contexte fébrile avec conservation de l’état général posant le diagnostic d'une appendicite aigue. Une appendicectomie a été réalisée ; le compte rendu anatomopathologique était en faveur d'une tuberculose appendiculaire isolée. Le patient a été mis sous traitement anti-bacillaire complémentaire pendant neuf mois avec une bonne évolution clinique. Le diagnostic de tuberculose doit être évoqué en premier surtout dans les pays d'endémie tuberculeuse. PMID:22355426
Hémophilie B mineure révélée par une hémorragie cérébrale: à propos d'un cas
Naji, Abdelhalim; Rkain, Maria; Amrani, Rim; Benajiba, Noufissa
2015-01-01
L'hémorragie intracrânienne (HIC) du nouveau-né à terme est une pathologie rare, leur prévalence est estimée à 2% des naissances vivantes. Les manifestations cliniques sont variables et non spécifique. Les causes d'HIC sont multiples et souvent intriquées, les mécanismes physiopathologiques principaux sont la dysrégulation du débit cérébral, une obstruction des vaisseaux ou une coagulation intravasculaire; ou une lésion directe par traumatisme. Nous rapportons le cas d'un nourrisson d'un mois qui a été admis dans notre service pour prendre en charge des convulsions associées à une pâleur cutanéomuqueuse, suite à laquelle l'examen biologique a mis fortuitement en faveur une hémophilie mineure sur une maladie hémorragique tardive. PMID:26491519
Complete dislocation of the ulnar nerve at the elbow: a protective effect against neuropathy?
Leis, A Arturo; Smith, Benn E; Kosiorek, Heidi E; Omejec, Gregor; Podnar, Simon
2017-08-01
Recurrent complete ulnar nerve dislocation has been perceived as a risk factor for development of ulnar neuropathy at the elbow (UNE). However, the role of dislocation in the pathogenesis of UNE remains uncertain. We studied 133 patients with complete ulnar nerve dislocation to determine whether this condition is a risk factor for UNE. In all, the nerve was palpated as it rolled over the medial epicondyle during elbow flexion. Of 56 elbows with unilateral dislocation, UNE localized contralaterally in 17 elbows (30.4%) and ipsilaterally in 10 elbows (17.9%). Of 154 elbows with bilateral dislocation, 26 had UNE (16.9%). Complete dislocation decreased the odds of having UNE by 44% (odds ratio = 0.475; P = 0.028), and was associated with less severe UNE (P = 0.045). UNE occurs less frequently and is less severe on the side of complete dislocation. Complete dislocation may have a protective effect on the ulnar nerve. Muscle Nerve 56: 242-246, 2017. © 2016 Wiley Periodicals, Inc.
Birkelund, Gunn Elisabeth; Chan, Tak Wing; Ugreninov, Elisabeth; Midtbøen, Arnfinn H; Rogstad, Jon
2018-01-24
Terrorist attacks are known to influence public opinion. But do they also change behaviour? We address this question by comparing the results of two identical randomized field experiments on ethnic discrimination in hiring that we conducted in Oslo. The first experiment was conducted before the 2011 terrorist attacks in Norway; the second experiment was conducted after the attacks. In both experiments, applicants with a typical Pakistani name were significantly less likely to get a job interview compared to those with a typical Norwegian name. But the ethnic gap in call-back rates were very similar in the two experiments. Thus, Pakistanis in Norway still experienced the same level of discrimination, despite claims that Norwegians have become more positive about migrants after the far-right, anti-migrant terrorist attacks of 2011. © London School of Economics and Political Science 2018.
Une masse palpébrale révélant une fistule carotidocaverneuse
Oulali, Noureddine; Moufid, Fayçal; Khoulali, Mohammed; Sekhsoukh, Rachid; Housni, Brahim; Ghailan, Mohamed Rachid
2012-01-01
Les auteurs rapportent une observation particulière, chez un homme de 48 ans ayant dans ces antécédents un traumatisme crânio-faciale grave il y'a dix ans, qui présente depuis huit mois une masse palpébrale droite, avec une discrète exophtalmie et hémorragie sous conjonctivale, l'angio IRM a permis de confirmer le diagnostique d'une fistule carotidocaverneuse à haut débit, qui est responsable de cette symptomatologie. L'objectif de cet article est de mettre la lumière sur cette pathologie rare, en insistant sur les particularités cliniques de présentation d'une part, et sur le plan thérapeutique d'autre part, en exposant l'intérêt de la radiologie interventionnelle. PMID:23330040
Hémothorax spontané révélant une vascularite de Wegener chez une femme enceinte
Serhane, Hind; Yassine, Msougar; Amro, Lamyae
2016-01-01
L’hémothorax spontané demeure une pathologie rare. Ses étiologies sont multiples mais restent parfois inconnues. Chez certains patients, la thoracotomie peut être le seul recours pour déterminer son origine. Les vascularites n’ont pas été rapporté comme cause habituelle des hémothorax spontanés. La grossesse ne semble pas avoir d’effet causal, ni aggravant des hémothorax spontanés, ni des vascularites. Nous rapportons une observation assez particulière d’une jeune patiente, présentant au cours de sa grossesse un hémothorax spontané secondaire à une vasularite de type Wegener, diagnostiquée par la biopsie pleurale faite au cours d’une thoracotomie exploratrice et confirmée par le dosage des ANCA. PMID:28154726
Ostéo-arthrite tuberculeuse tarsienne: à propos d’un cas
Yacoubi, Hicham; Erraji, Moncef; Abdelillah, Rachid; Abbassi, Najib; Abdeljawad, Najib; Daoudi, Abdelkrim
2012-01-01
Nous rapportons le cas d’une patiente de 45 ans sans antécédents médicaux particuliers, qui a présenté une atteinte inflammatoire du pied gauche, sans notion de traumatisme ni de fièvre, avec apparition secondaire d’une fistule cutanée purulente à la face externe du cou de pied. Les radiographies standards et la Tomodensitométrie de la cheville mettaient en évidence une ostéite calcanéenne avec atteinte articulaire subtalienne. Une biopsie chirurgicale associée à une excision des tissus inflammatoires et nécrotiques et l’ablation du trajet fistuleux, ont été réalisées. L’analyse histologique montrait une image de granulome épithélio-giganto-cellulaire avec une nécrose caséeuse et les prélèvements bactériologiques (retrouvaient Mycobacterium tuberculosis. Une chimiothérapie antituberculeuse a été administrée pendant 12 mois. À 24 mois, la patiente ne présentait pas de récidive mais une arthropathie dégénérative secondaire subtalienne. Il nous semble intéressant de rappeler que tout tableau clinique traînant ou toute lésion osseuse suspecte et de présentation atypique doit faire évoquer le diagnostic de tuberculose afin d’éviter des retards de diagnostic. Ceci permet une prise en charge thérapeutique précoce de la pathologie. PMID:22655098
Anomalous dielectric relaxation in lithium-potassium tantalate crystals
NASA Astrophysics Data System (ADS)
Doussineau, P.; Farssi, Y.; Frénois, C.; Levelut, A.; Toulouse, J.; Ziolkiewicz, S.
1994-08-01
In order to describe the unusual dielectric properties observed in Ki{1-χ}Li{χ}TaO3. crystals a new approchh is proposed. The dynamical Glauber theory, previously applied to spinglasses, is modifiéd by the introduction of the spectral distribution of the random interactions between the dipoles associated with the Li+ ions. Moreover, the dipole corrélations are taken into account by the Onsager réaction field. As a result, the calculated dielectric constant reproduces well the unusual features of the Argand diagrams and, in particular, their finite slope at low frequencies and infinite slope at high frequencies (strophoidal shape). The temperature dépendance of some parameters shows, however, the limits of a spin-glass type model in describing the collective behaviour of randomly distributed dipoles in a highly polarizable medium. Une nouvelle approche est présentée qui permet de décrire les propriétés diélectriques particulières de cristaux mixtes de Ki{1-χ}Li{χ}TaO3. Elle s'appuie sur la théorie dynamique de Glauber, déjà utilisée pour les verres de spins, et modifiée par l'introduction d'une distribution spectrale spécifique aux interactions aléatoires des dipôles électriques associés aux ions Li+. En outre, les corrélations entre dipôles sont prises en compte par le champ de réaction d'Onsager. II s'ensuit que la constante diélectrique complexe ainsi calculée reproduit fidèlement les particularités des diagrammes d'Argand, telles que la pente finie aux basses fréquences et la pente infinie aux hautes fréquences (forme strophoïdale). La dépendance en température de certains paramètres déterminés par le calcul montre les limites de l'analogie avec les verres de spins et met en évidence le rôle d'un réseau très polarisable dans le comportement collectif d'une assemblée de dipôles électriques.
Matters of Scale: Sociology in and for a Complex World.
Pyyhtinen, Olli
2017-08-01
The article proposes that if sociology is to make sense of a world that is ever more complex and complicated, it is important to reconsider the scale(s) of our relations and actions. Instead of assuming a nested vertical hierarchy of the micro to macro binary, scale should be treated not only as multiple, but also as something produced and sustained in practice. Coming to grips with the complex world, we are living in also necessitates attending to the conduits and connections between various sites, fields, and terrains to which our lives are entangled. The article concludes with a note on the marginalization of sociology from public discussions, and it argues that it is possibly by attending to ambiguity and to the unfinished making of our contemporary world that sociology might have the most to give to discussions about the economy, about the future of humanity, and how to organize society. Cet article suggère que si la sociologie doit nous éclairer sur le sens d'un monde de plus en plus complexe, il est important de revoir l'échelle de nos relations et actions. Au lieu d'assumer une hiérarchie verticale de la dualité micro-macro, cette étendue doit être traitée non seulement comme multiple, mais aussi comme une chose produite et soutenue par la pratique. Pour faire face à la complexité du monde dans lequel nous vivons, il faut aussi de s'occuper des conduits et connections entre des sites divers, des champs, et des terrains dans lesquels nos vies se déroulent. Cet article conclut avec une note sur la marginalisation de la sociologie dans les discussions publiques ; et il défend l'idée que c'est possiblement en appréhendant l'ambiguïté et la construction incomplète de notre monde contemporain que la sociologie peut être la plus fructueuse en termes de discussions portant sur l'économie, le futur de l'humanité, et l'organisation de la société. © 2017 Canadian Sociological Association/La Société canadienne de sociologie.
A Bayesian Belief Network of Threat Anticipation and Terrorist Motivations
DOE Office of Scientific and Technical Information (OSTI.GOV)
Olama, Mohammed M; Allgood, Glenn O; Davenport, Kristen M
Recent events highlight the need for efficient tools for anticipating the threat posed by terrorists, whether individual or groups. Antiterrorism includes fostering awareness of potential threats, deterring aggressors, developing security measures, planning for future events, halting an event in process, and ultimately mitigating and managing the consequences of an event. To analyze such components, one must understand various aspects of threat elements like physical assets and their economic and social impacts. To this aim, we developed a three-layer Bayesian belief network (BBN) model that takes into consideration the relative threat of an attack against a particular asset (physical layer) asmore » well as the individual psychology and motivations that would induce a person to either act alone or join a terrorist group and commit terrorist acts (social and economic layers). After researching the many possible motivations to become a terrorist, the main factors are compiled and sorted into categories such as initial and personal indicators, exclusion factors, and predictive behaviors. Assessing such threats requires combining information from disparate data sources most of which involve uncertainties. BBN combines these data in a coherent, analytically defensible, and understandable manner. The developed BBN model takes into consideration the likelihood and consequence of a threat in order to draw inferences about the risk of a terrorist attack so that mitigation efforts can be optimally deployed. The model is constructed using a network engineering process that treats the probability distributions of all the BBN nodes within the broader context of the system development process.« less
Fistule vesico-sigmoïdienne compliquant une hydatidose intestinale: à propos d'un cas rare
Lahyani, Mounir; Jabbour, Younes; Karmouni, Tarik; Elkhader, Khalid; Koutani, Abdellatif; Andaloussi, Ahmed Ibn attya
2014-01-01
La fistule colo-vésicale sur une hydatidose sigmoidienne est une entité pathologique exceptionnelle. Nous rapportions une nouvelle observation, ou seront rappelées les principales données diagnostique et thérapeutique de cette affection. PMID:25722790
Code of Federal Regulations, 2013 CFR
2013-01-01
... Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM... analyze key data from chemical facilities. Chemical-terrorism Vulnerability Information or CVI shall mean... or terrorist incident shall mean any incident or attempt that constitutes terrorism or terrorist...
Code of Federal Regulations, 2014 CFR
2014-01-01
... Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM... analyze key data from chemical facilities. Chemical-terrorism Vulnerability Information or CVI shall mean... or terrorist incident shall mean any incident or attempt that constitutes terrorism or terrorist...
Code of Federal Regulations, 2012 CFR
2012-01-01
... Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM... analyze key data from chemical facilities. Chemical-terrorism Vulnerability Information or CVI shall mean... or terrorist incident shall mean any incident or attempt that constitutes terrorism or terrorist...
Code of Federal Regulations, 2011 CFR
2011-01-01
... Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM... analyze key data from chemical facilities. Chemical-terrorism Vulnerability Information or CVI shall mean... or terrorist incident shall mean any incident or attempt that constitutes terrorism or terrorist...
Evaluation of Terrorist Interest in Radioactive Wastes
DOE Office of Scientific and Technical Information (OSTI.GOV)
McFee, J.N.; Langsted, J.M.; Young, M.E.
2006-07-01
Since September 11, 2001, intelligence gathered from Al Qaeda training camps in Afghanistan, and the ensuing terrorist activities, indicates nuclear material security concerns are valid. This paper reviews available information on sealed radioactive sources thought to be of interest to terrorists, and then examines typical wastes generated during environmental management activities to compare their comparative 'attractiveness' for terrorist diversion. Sealed radioactive sources have been evaluated in numerous studies to assess their security and attractiveness for use as a terrorist weapon. The studies conclude that tens of thousands of curies in sealed radioactive sources are available for potential use in amore » terrorist attack. This risk is mitigated by international efforts to find lost and abandoned sources and bring them under adequate security. However, radioactive waste has not received the same level of scrutiny to ensure security. This paper summarizes the activity and nature of radioactive sources potentially available to international terrorists. The paper then estimates radiation doses from use of radioactive sources as well as typical environmental restoration or decontamination and decommissioning wastes in a radioactive dispersal device (RDD) attack. These calculated doses indicate that radioactive wastes are, as expected, much less of a health risk than radioactive sources. The difference in radiation doses from wastes used in an RDD are four to nine orders of magnitude less than from sealed sources. We then review the International Atomic Energy Agency (IAEA) definition of 'dangerous source' in an adjusted comparison to common radioactive waste shipments generated in environmental management activities. The highest waste dispersion was found to meet only category 1-3.2 of the five step IAEA scale. A category '3' source by the IAEA standard 'is extremely unlikely, to cause injury to a person in the immediate vicinity'. The obvious conclusion of the analysis is that environmental management generated radioactive wastes have substantially less impact than radioactive sources if dispersed by terrorist-induced explosion or fire. From a health standpoint, the impact is very small. However, there is no basis to conclude that wastes are totally unattractive for use in a disruptive or economic damage event. Waste managers should be cognizant of this potential and take measures to ensure security of stored waste and waste shipments. (authors)« less
Latrech, Hanane; Gaouzi, Ahmed
2015-01-01
L'hyperplasie congénitale des surrénales par déficit en 11ß hydroxylase se voit dans 5 à 10% des cas et est diagnostiquée, habituellement, devant des signes de virilisation d'un nouveau né ou d'un fœtus 46 XX et plus tard devant une HTA avec une hypokaliémie. Le pronostic de taille chez ces patients est très souvent compromis. Nous rapportons le cas d'un déficit en 11ß hydroxylase chez une enfant âgée de 7 ans révélé par une pseudo- puberté précoce traitée par hydrocortisone. La survenue d'une puberté précoce centrale complique encore plus la situation par la mise en jeu du pronostic de taille finale et nécessitant une prise en charge thérapeutique particulière. PMID:26113905
Kyste hydatique mammaire primitive
Boufettal, Houssine; Samouh, Naïma
2015-01-01
La localisation mammaire du kyste hydatique est exceptionnelle. De ce fait, le diagnostic est difficile avant l'examen anatomopathologique. Nous rapportons une observation d'un cas de kyste hydatique du sein chez une femme de 32 ans, qui consultait pour un nodule du sein, dont l'imagerie montrait une lésion en rétro-aréolaire du sein gauche, homogène, ovalaire et de contours réguliers. L'examen anatomopathologique objectivait un kyste hydatique à localisation mammaire. Les suites opératoires étaient simples. L'hydatidose est une maladie ubiquitaire, pouvant atteindre tous les organes. Le diagnostic peut être évoqué devant une masse kystique du sein avec des aspects très évocateurs à l'imagerie. La confirmation du diagnostic n'est confirmée qu'après une cytoponction ou une chirurgie d'exérèse qui réalise le traitement de cette pathologique. La négativité du bilan d'extension hydatique permet de retenir une localisation primitive de l’échinococcose. PMID:26185575
Anomalie d’émergence radiculaire par racine conjointe S1: à propos d'un cas
Kessely, Yannick Canton; Sakho, Maguette Gaye; Fondo, Alidji; Daisy, Akerey Diop; Thiam, Aley; Sakho, Youssoupha
2015-01-01
De découverte per-opératoire pour hernie discale, les anomalies d’émergence radiculaires constituent une entité rare. La présentation clinique est généralement identique à celle d'une radiculopathie. Nous rapportons le cas d'un patient âgé de 35 ans présentant une sciatique droite S1 hyperalgique rebelle aux multiples médications. L'IRM du rachis lombo-sacré avait mis en évidence une discopathie protrusive de petit volume en L5 S1 droite et un aspect de grosse racine ou de kyste de Tarlov au niveau de l’émergence droite de S1. Une fenestration inter lamaire L5-S1 droite avec une ablation du ligament jaune a montré une émergence radiculaire double au niveau de l'espace retro-discal. Un geste de foraminostomie a été réalisé sans discectomie. L’évolution a très favorable avec une rétrocession dès le lendemain. L'analyse pré-opératoire fine et rigoureuse de l'imagerie est indispensable. Une bonne libération améliore l’état clinique du patient. Y penser en cas de sciatique hyperalgique sans Lasègue. PMID:26113909
Pseudotumeur cardiaque révélant une maladie de Behçet
Nya, Fouad; Abdou, Abdessamad; Bamous, Mehdi; Moutakiallah, Younes; Atmani, Noureddine; Seghrouchni, Aniss; Houssa, Mahdi Ait; Boulahya, Abdellatif
2017-01-01
La thrombose intracardiaque est une complication rare de la maladie de Behçet (MB), qui peut se présenter comme une tumeur intracardiaque. Sa découverte précède, dans la moitié des cas, le diagnostic de MB. La mortalité élevée peut être en rapport avec des complications post-chirurgicales et/ou une atteinte associée des artères pulmonaires. Nous rapportons l’observation d’un jeune patient de 29 ans, aux antécédents d’aphtose bipolaire, qui a bénéficie d’une intervention chirurgicale après la découverte d’une tumeur de l’atrium et du ventricule droits. Il s’agissait d’un thrombus à l’examen anatomopathologique et dans les suites opératoires nous avons diagnostiqué une MB. L’évolution a été favorable sous traitement médical associant une corticothérapie, de la colchicine et des antivitamines K (AVK). La découverte d’une masse intracardiaque chez un sujet jeune doit faire évoquer le diagnostic de thrombus cardiaque et de maladie de Behçet, même en l’absence de facteur ethnique ou géographique prédisposant. PMID:28533874
Advanced traveler information system capabilities : human factors research needs : summary report
DOT National Transportation Integrated Search
2003-09-01
The number and intensity of domestic and international terrorist events, along with the September 11, 2001, attacks, change the way Americans think and live. Terrorists attack targets where human casualties and economic consequences are likely to be ...
Intelligence Constraints on Terrorist Network Plots
NASA Astrophysics Data System (ADS)
Woo, Gordon
Since 9/11, the western intelligence and law enforcement services have managed to interdict the great majority of planned attacks against their home countries. Network analysis shows that there are important intelligence constraints on the number and complexity of terrorist plots. If two many terrorists are involved in plots at a given time, a tipping point is reached whereby it becomes progressively easier for the dots to be joined and for the conspirators to be arrested, and for the aggregate evidence to secure convictions. Implications of this analysis are presented for the campaign to win hearts and minds.
A false dichotomy? Mental illness and lone-actor terrorism.
Corner, Emily; Gill, Paul
2015-02-01
We test whether significant differences in mental illness exist in a matched sample of lone- and group-based terrorists. We then test whether there are distinct behavioral differences between lone-actor terrorists with and without mental illness. We then stratify our sample across a range of diagnoses and again test whether significant differences exist. We conduct a series of bivariate, multivariate, and multinomial statistical tests using a unique dataset of 119 lone-actor terrorists and a matched sample of group-based terrorists. The odds of a lone-actor terrorist having a mental illness is 13.49 times higher than the odds of a group actor having a mental illness. Lone actors who were mentally ill were 18.07 times more likely to have a spouse or partner who was involved in a wider movement than those without a history of mental illness. Those with a mental illness were more likely to have a proximate upcoming life change, more likely to have been a recent victim of prejudice, and experienced proximate and chronic stress. The results identify behaviors and traits that security agencies can utilize to monitor and prevent lone-actor terrorism events. The correlated behaviors provide an image of how risk can crystalize within the individual offender and that our understanding of lone-actor terrorism should be multivariate in nature.
Assessing Terrorist Motivations for Attacking Critical Infrastructure
DOE Office of Scientific and Technical Information (OSTI.GOV)
Ackerman, G; Abhayaratne, P; Bale, J
Certain types of infrastructure--critical infrastructure (CI)--play vital roles in underpinning our economy, security and way of life. These complex and often interconnected systems have become so ubiquitous and essential to day-to-day life that they are easily taken for granted. Often it is only when the important services provided by such infrastructure are interrupted--when we lose easy access to electricity, health care, telecommunications, transportation or water, for example--that we are conscious of our great dependence on these networks and of the vulnerabilities that stem from such dependence. Unfortunately, it must be assumed that many terrorists are all too aware that CImore » facilities pose high-value targets that, if successfully attacked, have the potential to dramatically disrupt the normal rhythm of society, cause public fear and intimidation, and generate significant publicity. Indeed, revelations emerging at the time of this writing about Al Qaida's efforts to prepare for possible attacks on major financial facilities in New York, New Jersey, and the District of Columbia remind us just how real and immediate such threats to CI may be. Simply being aware that our nation's critical infrastructure presents terrorists with a plethora of targets, however, does little to mitigate the dangers of CI attacks. In order to prevent and preempt such terrorist acts, better understanding of the threats and vulnerabilities relating to critical infrastructure is required. The Center for Nonproliferation Studies (CNS) presents this document as both a contribution to the understanding of such threats and an initial effort at ''operationalizing'' its findings for use by analysts who work on issues of critical infrastructure protection. Specifically, this study focuses on a subsidiary aspect of CI threat assessment that has thus far remained largely unaddressed by contemporary terrorism research: the motivations and related factors that determine whether a terrorist organization will attack critical infrastructure. In other words, this research investigates: (1) why terrorists choose to attack critical infrastructure rather than other targets; (2) how groups make such decisions; (3) what, if any, types of groups are most inclined to attack critical infrastructure targets; and (4) which types of critical infrastructure terrorists prefer to attack and why. In an effort to address the above questions as comprehensively as possible, the project team employed four discrete investigative approaches in its research design. These include: (1) a review of existing terrorism and threat assessment literature to glean expert consensus regarding terrorist target selection, as well as to identify theoretical approaches that might be valuable to analysts and decision-makers who are seeking to understand such terrorist group decision-making processes; (2) the preparation of several concise case studies to help identify internal group factors and contextual influences that have played significant roles in leading some terrorist groups to attack critical infrastructure; (3) the creation of a new database--the Critical Infrastructure Terrorist Incident Catalog (CrITC)--to capture a large sample of empirical CI attack data that might be used to illuminate the nature of such attacks to date; and (4) the development of a new analytical framework--the Determinants Effecting Critical Infrastructure Decisions (DECIDe) Framework--designed to make the factors and dynamics identified by the study more ''usable'' in any future efforts to assess terrorist intentions to target critical infrastructure. Although each is addressed separately in the following chapters, none of the four aspects of this study were developed in isolation. Rather, all the constituent elements of the project informed--and were informed by--the others. For example, the review of the available literature on terrorist target selection made possible the identification of several target selection factors that were both important in the development of the analytical framework and subsequently validated by the case studies. Similarly, statistical analysis of the CrITIC data yielded measurable evidence that supported hypotheses derived from the framework, the case studies, and the writings of various experts. Besides providing an important mechanism of self-reinforcement and validation, the project's multifaceted nature made it possible to discern aspects of CI attack motivations that would likely have been missed if any single approach had been adopted.« less
La dysplasie fibreuse: état des lieux
Akasbi, Nessrine; Abourazzak, Fatima Ezzahra; Talbi, Sofia; Tahiri, Latifa; Harzy, Taoufik
2015-01-01
La dysplasie fibreuse des os est une affection osseuse bénigne congénitale mais non héréditaire, où l'os normal est remplacé par un tissu fibreux renfermant une ostéogenèse immature. Elle est due à une mutation du gène GNAS 1sur le chromosome 20q13, une mutation activatrice de la sous-unité α de la protéine G. C'est une pathologie qui est le plus souvent silencieuse, de découverte fortuite sur une radiographie standard ou révélée par une douleur osseuse ou une fracture pathologique. L'imagerie et l'histologie, quand elle est nécessaire, permettent d’établir le diagnostic. Bien qu'il ne s'agisse pas d'une tumeur, elle est souvent classée dans la catégorie des tumeurs osseuses bénignes pour des raisons de diagnostic différentiel radiographique et anatomopathologique. Elle peut être monostotique ou polyostotique. L'approche thérapeutique est essentiellement symptomatique. Quelques publications récentes ont suggéré l'intérêt majeur d'un bisphosphonate, en particulier le pamidronate, qui diminuerait les douleurs et stimulerait une reminéralisation progressive des zones ostéolytiques chez les patients traités. D'autres traitements tels que la thérapie ciblée sont en cours d’évaluation. PMID:26401215
Méningiome en plaque sphéno-orbitaire: à propos d'un cas avec revue de la littérature
Abdellaoui, Meriem; Andaloussi, Idriss Benatiya; Tahri, Hicham
2015-01-01
Le méningiome intra osseux est une variété des méningiomes ectopiques dans lequel les cellules méningothéliales envahissent la paroi osseuse et entraînent une hyperostose. Le méningiome en plaque, variante macroscopique des méningiomes intra osseux, est une tumeur rare et survient fréquemment au niveau de la région sphéno-orbitaire ce qui le confond avec les tumeurs osseuses primitives. Nous rapportons le cas d'une patiente de 50 ans qui présente une exophtalmie avec cécité unilatérale gauche d'installation progressive depuis un an. L'examen trouve une exophtalmie axile, indolore et non réductible ainsi qu'une limitation de la motilité oculaire dans tous les sens du regard. La palpation montre une masse temporale gauche dure et adhérente à l'os. L'examen du fond d’œil trouve un œdème papillaire gauche. Le scanner montre une lésion ostéocondensante temporo-sphéno-orbitaire gauche avec envahissement locorégional. Le diagnostic préopératoire fut une tumeur osseuse essentiellement maligne primitive ou secondaire. L’étude histologique a révélée un méningiome meningothélial de type en plaque. La patiente a bénéficié d'une exérèse avec reconstruction chirurgicale. Aucune récidive n'a été notée après 1 an de recul. PMID:26327996
Métastase pleurale et pulmonaire d’une polyadénofibromatose dégénéréé: à propos d’un cas
El Hachimi, Kawtar; Benjelloun, Hanane; Zaghba, Nahid; Yassine, Najiba
2017-01-01
La polyadénofibromatose ou l’adénofibromatose est définie par la présence d’au moins 3 adénofibromes, uni ou bilatéraux atteignant une taille importante responsable de troubles trophiques. Nous rapportons une observation colligée au service des maladies respiratoires du Centre Hospitalier Universitaire Ibn Rochd de Casablanca. Il s’agit d’une patiente âgée de 46ans, suivie depuis l’âge de 30 ans pour une adénofibromatose bilatérale opérée à 4 reprises. Suite à un bilan préopératoire d’une mastectomie bilatérale, une radio du thorax a été réalisée objectivant un hémithorax droit opaque avec refoulement des éléments du médiastin. L’examen clinique retrouvait un syndrome d’épanchement liquidien de l’hémithorax droit et une adénopathie cervicale sus claviculaire gauche. La ponction biopsie pleurale confirmait la localisation pleurale d’un carcinome peu différencié et invasif compatible avec une origine mammaire. La bronchoscopie après évacuation pleurale objectivait un aspect infiltré de tout l’arbre bronchique, dont les biopsies concluaient au même résultat anatomopathologique. Le traitement préconisé était une polychimiothérapie. L’évolution était marquée par l’apparition de métastases hépatiques. A travers cette observation, nous concluons que les adénofibromes nécessitent une surveillance régulière vu le risque de dégénérescence vers le cancer du sein qui est une cause fréquente de métastases pleuropulmonaires. PMID:29515733
Public Understanding of Medical Countermeasures.
Liu, Brooke Fisher; Quinn, Sandra C; Egnoto, Michael; Freimuth, Vicki; Boonchaisri, Natalie
Medical countermeasures, including new drugs and vaccines, are necessary to protect the public's health from novel diseases and terrorist threats. Experience with the 2001 anthrax attack and the 2009 H1N1 pandemic suggest that there is limited willingness to accept such drugs and that minority groups may respond differently from others. We conducted 148 intercept interviews in the metropolitan Washington, DC, area, examining 2 hypothetical scenarios: a new respiratory virus and public exposure to high levels of radiation. Findings provide insights into key factors that affect whether diverse members of the public comply with recommended protective actions like taking emergency authorized vaccines. These insights can help improve how public health practitioners communicate during uncertain times.
Towards integrative risk management and more resilient societies
NASA Astrophysics Data System (ADS)
Al-Khudhairy, D.; Axhausen, K.; Bishop, S.; Herrmann, H.; Hu, B.; Kröger, W.; Lewis, T.; MacIntosh, J.; Nowak, A.; Pickl, S.; Stauffacher, D.; Tan, E.
2012-11-01
Society depends decisively on the availability of infrastructure systems such as energy, telecommunication, transportation, banking and finance, health care and governmental and public administration. Even selective damages of one of these infrastructures may result in disruptions of governmental, industrial or public functions. Vulnerability of infrastructures therefore provides spectacular leverage for natural disasters as well as criminal and terrorist actions. Threats and risks are part of the technological, economical, and societal development. This article focuses on the development and characterization of an integrative risk-management which, from the perspective of "resilient systems", can be seen as an innovative and pro-active crisis management approach dealing with the increasing amount of complexity in societies in a comprehensive, agile and adaptive way.
Public Understanding of Medical Countermeasures
Quinn, Sandra C.; Egnoto, Michael; Freimuth, Vicki; Boonchaisri, Natalie
2017-01-01
Medical countermeasures, including new drugs and vaccines, are necessary to protect the public's health from novel diseases and terrorist threats. Experience with the 2001 anthrax attack and the 2009 H1N1 pandemic suggest that there is limited willingness to accept such drugs and that minority groups may respond differently from others. We conducted 148 intercept interviews in the metropolitan Washington, DC, area, examining 2 hypothetical scenarios: a new respiratory virus and public exposure to high levels of radiation. Findings provide insights into key factors that affect whether diverse members of the public comply with recommended protective actions like taking emergency authorized vaccines. These insights can help improve how public health practitioners communicate during uncertain times. PMID:28388223
Une rare cause de sciatique non discale: une polyarthrite rhumatoïde
Akasbi, Nessrine; Abourazzak, Fatima Ezzahra; Harzy, Taoufik
2014-01-01
La polyarthrite rhumatoïde est le rhumatisme inflammatoire chronique le plus fréquent. Ses complications neurologiques sont dominées par les neuropathies périphériques, cliniquement asymptomatiques, mais peuvent être détectées sur l’électromyogramme (EMG). Nous rapportons l'observation d'une patiente qui a présenté une neuropathie sensitivo-motrice aux deux membres inférieurs associée à une sciatique de topographie L5 d'origine rhumatoïde. PMID:25709734
Pathomimie de l'enfant: à propos d'une observation
Abilkassem, Rachid; Dini, Nezha; Ourai, Hakim; Kmari, Mohamed; Agadr, Aomar
2013-01-01
La pathomimie cutanée se définit comme une maladie factice, provoquée dans un etat de conscience claire par le patient lui-même, au niveau du revêtement cutanéo-muqueux et/ou des phanères. Rare chez l'enfant, il s'agit d'une manifestation psychopathologique potentiellement grave et souvent difficile à prendre en charge. Nous rapportons le cas d'une fillette de 10 ans présentant une pathomimie sous forme de lésions excoriées multiples du visage. PMID:23504605
Decision Processes in Military Moral Dilemmas: The Role of Moral Intensity and Moral Judgment
2008-12-01
dilemmes moraux. Selon les analyses de régression, la façon dont les participants percevaient une option comparativement à l’autre (c.-à-d., d’une...option comparativement à l’autre (c.-à-d., d’une manière plus positive ou plus négative) sur l’échelle de l’intensité morale avait une corrélation...perception des participants à l’égard d’une option comparativement à l’autre pour ce qui est de l’intensité morale et de la
1983-07-01
crEE impose une onde de choc situde dane is zone Evolutive CD oO elle peut occuper une position stable en raison de is divergence...ENTR.E UNE ONDE DE CHOC ET UNE STRUCTURE TOURBILLONNAIRE ENROU LEE par J.Delery et E.Horowitz 5 ON THE GENERATION AND SUBSEQUENT DEVELOPMENT OF SPIRAL...dont une dclotge. ont fitA analysdes plus finement au vdlocimktre loser. Pour un dclatement, is structure moyenne de l’dcoulement ,dr*dien inclut un
Localisation humérale d'une tumeur à cellules géantes récidivantes (à propos d'un cas)
Nader, Youssef; Serghini, Issam; Koulali, Idrissi Khalid; Salahi, Hicham; Galwia, Farid
2015-01-01
Les auteurs rapportent un cas de localisation rare d'une tumeur à cellules géantes au niveau de la palette humérale du coude droit chez un militaire de 36 ans de sexe masculin, la radio standard montrait une image kystique ne soufflant pas la corticale. L'examen anatomo-pathologique a permis d’ établir le diagnostic et le traitement a fait appel: au début a une Exérèse chirurgicale totale et une greffe osseuse par un greffon iliaque de la totalité de la palette huméral qui s'est compliquée à 6 mois de recule d une récidive locale. PMID:25995809
Applying Intermediate Microeconomics to Terrorism
ERIC Educational Resources Information Center
Anderton, Charles H.; Carter, John R.
2006-01-01
The authors show how microeconomic concepts and principles are applicable to the study of terrorism. The utility maximization model provides insights into both terrorist resource allocation choices and government counterterrorism efforts, and basic game theory helps characterize the strategic interdependencies among terrorists and governments.…
The Guardian. Volume 11, Issue 2, Fall 2009
2009-01-01
control, and communications; material support; and finances .” It denies state sponsorship and sanctuary and forces terrorists “to disperse and then...disavowed Algerian Groupe Islamique Armé (GIA) terrorist acts against Muslim civilians.42 Later, he sponsored similar operations in Iraq, while
Combatting Commercial Terrorists: The PKK Case
2015-12-01
Kurdistan Workers’ Party, drug trafficking, human trafficking, cigarette smuggling, prostitution, extortion, money laundering , Turkey 15. NUMBER OF...91 F. MONEY LAUNDERING ............................................................... 93 G. CONCLUSION...opportunity to launder illegal money . Also, donations from a sympathetic population is another source of money and legitimacy for terrorist
76 FR 40114 - Semiannual Agenda
Federal Register 2010, 2011, 2012, 2013, 2014
2011-07-07
... abuses of terrorist financing, money laundering, and other financial crime. The proposed changes are... services posing lower risks of money laundering and terrorist financing from certain requirements. FinCEN... Money Services Businesses to include stored value or prepaid access. In this proposed rulemaking, we are...
MINIMIZING THE VULNERABILITY OF WATER SUPPLIES TO NATURAL AND TERRORIST THREATS
There is increasing concern that drinking water utilities may be vulnerable to attacks by terrorists. In the US the President's Commission on Critical Infrastructure Protection has concluded the US drinking water utilities are vulnerable to physical, cyber and biological terroris...
Code of Federal Regulations, 2013 CFR
2013-04-01
..., earthquake or other natural disaster or terrorist activity that results in a loss of or reduction in pipeline... reason other than hurricane, earthquake or other natural disaster or terrorist activity, the natural gas...
Code of Federal Regulations, 2014 CFR
2014-04-01
..., earthquake or other natural disaster or terrorist activity that results in a loss of or reduction in pipeline... reason other than hurricane, earthquake or other natural disaster or terrorist activity, the natural gas...
Code of Federal Regulations, 2011 CFR
2011-04-01
..., earthquake or other natural disaster or terrorist activity that results in a loss of or reduction in pipeline... reason other than hurricane, earthquake or other natural disaster or terrorist activity, the natural gas...
Code of Federal Regulations, 2012 CFR
2012-04-01
..., earthquake or other natural disaster or terrorist activity that results in a loss of or reduction in pipeline... reason other than hurricane, earthquake or other natural disaster or terrorist activity, the natural gas...
Managing facility risk: external threats and health care organizations.
Reid, Daniel J; Reid, William H
2014-01-01
Clinicians and clinical administrators should have a basic understanding of physical and financial risk to mental health facilities related to external physical threat, including actions usually viewed as "terrorism" and much more common sources of violence. This article refers to threats from mentally ill persons and those acting out of bizarre or misguided "revenge," extortionists and other outright criminals, and perpetrators usually identified as domestic or international terrorists. The principles apply both to relatively small and contained acts (such as a patient or ex-patient attacking a staff member) and to much larger events (such as bombings and armed attack), and are relevant to facilities both within and outside the U.S. Patient care and accessibility to mental health services rest not only on clinical skills, but also on a place to practice them and an organized system supported by staff, physical facilities, and funding. Clinicians who have some familiarity with the non-clinical requirements for care are in a position to support non-clinical staff in preventing care from being interrupted by external threats or events such as terrorist activity, and/or to serve at the interface of facility operations and direct clinical care. Readers should note that this article is an introduction to the topic and cannot address all local, state and national standards for hospital safety, or insurance providers' individual facility requirements. Copyright © 2014 John Wiley & Sons, Ltd.
Defender-Attacker Decision Tree Analysis to Combat Terrorism.
Garcia, Ryan J B; von Winterfeldt, Detlof
2016-12-01
We propose a methodology, called defender-attacker decision tree analysis, to evaluate defensive actions against terrorist attacks in a dynamic and hostile environment. Like most game-theoretic formulations of this problem, we assume that the defenders act rationally by maximizing their expected utility or minimizing their expected costs. However, we do not assume that attackers maximize their expected utilities. Instead, we encode the defender's limited knowledge about the attacker's motivations and capabilities as a conditional probability distribution over the attacker's decisions. We apply this methodology to the problem of defending against possible terrorist attacks on commercial airplanes, using one of three weapons: infrared-guided MANPADS (man-portable air defense systems), laser-guided MANPADS, or visually targeted RPGs (rocket propelled grenades). We also evaluate three countermeasures against these weapons: DIRCMs (directional infrared countermeasures), perimeter control around the airport, and hardening airplanes. The model includes deterrence effects, the effectiveness of the countermeasures, and the substitution of weapons and targets once a specific countermeasure is selected. It also includes a second stage of defensive decisions after an attack occurs. Key findings are: (1) due to the high cost of the countermeasures, not implementing countermeasures is the preferred defensive alternative for a large range of parameters; (2) if the probability of an attack and the associated consequences are large, a combination of DIRCMs and ground perimeter control are preferred over any single countermeasure. © 2016 Society for Risk Analysis.
Analytical technique to address terrorist threats by chemical weapons of mass destruction
NASA Astrophysics Data System (ADS)
Dempsey, Patrick M.
1997-01-01
Terrorism is no longer an issue without effect on the American mind. We now live with the same concerns and fears that have been commonplace in other developed and third world countries for a long time. Citizens of other countries have long lived with the specter of terrorism and now the U.S. needs to be concerned and prepared for terrorist activities.T he terrorist has the ability to cause great destructive effects by focusing their effort on unaware and unprepared civilian populations. Attacks can range from simple explosives to sophisticated nuclear, chemical and biological weapons. Intentional chemical releases of hazardous chemicals or chemical warfare agents pose a great threat because of their ready availability and/or ease of production, and their ability to cause widespread damage. As this battlefront changes from defined conflicts and enemies to unnamed terrorists, we must implement the proper analytical tools to provide a fast and efficient response. Each chemical uses in a terrorists weapon leaves behind a chemical signature that can be used to identify the materials involved and possibly lead investigators to the source and to those responsible. New tools to provide fast and accurate detection for battlefield chemical and biological agent attack are emerging. Gas chromatography/mass spectrometry (GC/MS) is one of these tools that has found increasing use by the military to respond to chemical agent attacks. As the technology becomes smaller and more portable, it can be used by law enforcement personnel to identify suspected terrorist releases and to help prepare the response; define contaminated areas for evacuation and safety concerns, identify the proper treatment of exposed or affected civilians, and suggest decontamination and cleanup procedures.
Proximal detection of energetic materials on fabrics by UV-Raman spectroscopy
NASA Astrophysics Data System (ADS)
Chirico, R.; Almaviva, S.; Colao, F.; Fiorani, L.; Nuvoli, M.; Schweikert, W.; Schnürer, F.; Cassioli, L.; Grossi, S.; Mariani, L.; Angelini, F.; Menicucci, I.; Palucci, A.
2014-05-01
In the last decades there have been several terroristic attacks with improvised explosive devices (IED) that have raised the need for new instrumentation, for homeland security applications, to obtain a reliable and effective fight against terrorism. Public transportation has been around for about 150 years, but terroristic attacks against buses, trains, subways, etc., is a relatively recent phenomenon [1]. Since 1970, transportation has been an increasingly attractive target for terrorists. Most of the attacks to transport infrastructures take place in countries where public transportation is the primary way to move. Terrorists prefer to execute a smaller-scale attack with certainty of success rather than a complex and demanding operation to cause massive death and destruction. [1]. Many commonly available materials, such as fertilizer, gunpowder, and hydrogen peroxide, can be used as explosives and other materials, such as nails, glass, or metal fragments, can be used to increase the amount of shrapnel propelled by the explosion. The majority of substances that are classified as chemical explosives generally contain oxygen, nitrogen and oxidable elements such as carbon and hydrogen [2]. The most common functional group in military explosives is NO2. That functionality can be attached to oxygen (ONO2) in the nitrate esters (PETN), to carbon (C-NO2) in the nitroarenes (TNT) and nitroalkanes (Nitromethane), and to nitrogen (N-NO2) as in the nitramines (RDX). Some organic peroxides, such as TATP and HMTD, are popular amongst terrorists because they are powerful initiators that can be easily prepared from easily available ingredients. Azides are also powerful primary explosives commonly used as initiators (commercial detonators) in civilian and military operations, therefore they could be potentially used by terrorists as initiators for IEDs.
Federal Register 2010, 2011, 2012, 2013, 2014
2010-12-07
... Terrorism Sanctions Regulations; Terrorism Sanctions Regulations; Foreign Terrorist Organizations Sanctions... Foreign Assets Control (``OFAC'') of the U.S. Department of the Treasury is amending the Global Terrorism Sanctions Regulations (``GTSR'') and the Terrorism Sanctions Regulations (``TSR'') to expand the scope of...
Preemption and Retribution: Precision-Guided Munitions to Counter Terrorist Threats
1998-04-01
story are told. Terrorists have become skilled at cultivating 18 the " underdog " image and portraying their adversaries as ruthless aggressors...Frontiers, Israel’s War Against Terrorism, London: Arms and Armour Publications, 1990. Schmemann, Serge. " Netanyahu Defiantly Defending Botched
DOT National Transportation Integrated Search
2017-02-01
Terrorists see transit and passenger rail as an attractive target. Designed for public convenience, trains and stations offer terrorists easy access to crowds of people in confined environments where there are minimal security risks and attacks can c...
Carnage interrupted : an analysis of fifteen terrorist plots against public surface transportation.
DOT National Transportation Integrated Search
2012-04-01
This report examines 13 terrorist plots against public surface transportation that were uncovered and foiled by authorities between 1997 and 2010 and two failed attempts to carry out attacks. Certainly, this is not the total universe of foiled or fai...
Protecting the Privacy of Individuals in Terrorist Tracking Applications
2005-04-01
THE PRIVACY OF INDIVIDUALS IN TERRORIST TRACKING APPLICATIONS 6. AUTHOR(S) Teresa Lunt, Paul Aoki, Dirk Balfanz , Glenn Durfee, Philippe Golle...in Data Mining and Knowledge Discovery. 3) Brent Waters, Dirk Balfanz , Glenn Durfee, and Diana Smetters. Building an encrypted and searchable audit
75 FR 60377 - Financial Crimes Enforcement Network; Cross-Border Electronic Transmittals of Funds
Federal Register 2010, 2011, 2012, 2013, 2014
2010-09-30
... Treasury (Treasury), to further its efforts against money laundering and terrorist financing, and is... regulatory authorities detect, investigate, and prosecute money laundering and other financial crimes by... at national and international levels, to combat money laundering and terrorist financing. See...
Give Deterrence a Chance: A Strategy Against Al Qaeda
2007-03-28
Al Qaeda Terrorists have been described as sociopaths , narcissists, fanatics, extremists, zealots, true-believers, jihadists or demented criminals...If terrorists are sociopaths or other deviants (and it is probable that some are), then it is unlikely that deterrence with its reliance on rational
Foreign Terrorist Threat to Singapore: An Assessment
2001-04-01
mystical power, he impressed potential believers with the help of the yoga technique of momentary levitation. 40 Gullible followers quickly multiplied...flat rented to Ramzi Ahmed Yousef – a freelance terrorist with links to the radical Egyptian group Al-Gama’at al- Islamiyya and indicted for
Exploitation of Free Markets and Globalization to Finance Terrorists
2008-09-01
familiar with the monitoring and 24 Patrick Hardouin and Reiner Weichhardt. “Terrorist fund raising...present status and its war against drugs and terrorism is the period from 1946 to 1958 known as “La Violencia ” which is said to have claimed hundreds
How Terrorism Affects Attitudes toward Democracy: Tunisia in 2015.
Andersen, Robert; Brym, Robert
2017-11-01
Tunisia is the only country that emerged from the Arab Spring as a democracy. However, Tunisian democracy is threatened by political divisions, economic problems, and the threat of terrorist attacks. We shed light on Tunisia's democratic prospects by examining (1) the degree to which major terrorist attacks in 2015 influenced Tunisian public opinion on democracy and (2) the extent to which preference for a democratic system affected opinions on the prospects for democracy in Tunisia. We use data from three waves of a nationwide survey conducted just before and just after Tunisia's first major terrorist attack, and just after the country's second major terrorist attack. We demonstrate that after the attacks the Tunisian public became less favourable toward democracy and less optimistic that Tunisia would soon be ready for it. Such scepticism was widespread, affecting people who preferred democracy as much as those who did not. We conclude that the prospects for Tunisian democracy are more precarious than is sometimes assumed. © 2017 Canadian Sociological Association/La Société canadienne de sociologie.
Analysis of world terror networks from the reduced Google matrix of Wikipedia
NASA Astrophysics Data System (ADS)
El Zant, Samer; Frahm, Klaus M.; Jaffrès-Runser, Katia; Shepelyansky, Dima L.
2018-01-01
We apply the reduced Google matrix method to analyze interactions between 95 terrorist groups and determine their relationships and influence on 64 world countries. This is done on the basis of the Google matrix of the English Wikipedia (2017) composed of 5 416 537 articles which accumulate a great part of global human knowledge. The reduced Google matrix takes into account the direct and hidden links between a selection of 159 nodes (articles) appearing due to all paths of a random surfer moving over the whole network. As a result we obtain the network structure of terrorist groups and their relations with selected countries including hidden indirect links. Using the sensitivity of PageRank to a weight variation of specific links we determine the geopolitical sensitivity and influence of specific terrorist groups on world countries. The world maps of the sensitivity of various countries to influence of specific terrorist groups are obtained. We argue that this approach can find useful application for more extensive and detailed data bases analysis.
Post, Jerrold M
2015-04-01
There are no psychological characteristics or psychopathology that separates terrorists from the general population. Rather it is group dynamics, with a particular emphasis on collective identity that helps explain terrorist psychology. Just as there is a diverse spectrum of terrorisms, so too is there a spectrum of terrorist psychologies. Four waves of terrorism can be distinguished: the Anarchist wave, associated with labor violence in the United States in the late 19th century; the Anti-Colonial wave (nationalist-separatist), with minority groups seeking to be liberated from their colonial masters or from the majority in their country; the New Left wave (social revolutionary); and now the Religious wave. With the communications revolution, a new phenomenon is emerging which may presage a fifth wave: lone wolf terrorists who through the Internet are radicalized and feel they belong to the virtual community of hatred. A typology of lone wolf terrorism is proposed.
Mucocèle appendiculaire: à propos d'un cas observé à Lubumbashi
Wakunga, Eric; Mukuku, Olivier; Bugeme, Marcellin; Tshiband, Moïse; Kipili, Audifax; Mobambo, Pitchou; Arung, Willy; Wakunga, Warach
2014-01-01
La mucocèle appendiculaire est une entité pathologique rare, mais potentiellement dangereuse, elle se présente sous différentes formes cliniques. Nous rapportons ici un cas d'une patiente âgée de 49 ans sans antécédents chirurgicaux chez qui nous avons découvert d'une façon fortuite cette affection. La clinique était celle d'un syndrome appendiculaire aigu patent et elle révélait une masse dans la fosse iliaque droite. Les examens de laboratoire ont montré une hyperleucocytose et une vitesse de sédimentation augmentée. L’échographie a démontré une masse kystique péricaecal. La patiente a subi une appendicectomie avec cæcectomie partielle et la pièce opératoire appendiculaire mesurait 153 mm de longueur et 64 mm de diamètre. L'analyse anatomopathologique de celle-ci a confirmé le diagnostic de mucocèle appendiculaire sans cellules de malignité. Les suites opératoires ont été simples et la patiente est sortie au cinquième jour postopératoire. PMID:25368725
Tumeur stromale du mésentère: une cause inhabituelle d'une masse abdominale
Tarchouli, Mohamed; Bounaim, Ahmed; Boudhas, Adil; Ratbi, Moulay Brahim; Ndjota, Bobby Nguele; Ali, Abdelmounaim Ait; Sair, Khalid
2015-01-01
Les tumeurs stromales gastro-intestinales (GIST) sont les tumeurs mésenchymateuses les plus fréquentes du tractus digestif. Elles représentent une entité nosologique individualisée depuis la découverte de l'expression quasi-constante de la protéine c-Kit détectée par la coloration immunohistochimique de l'antigène CD117. Des tumeurs avec les mêmes caractéristiques morphologiques et immuno-phénotypiques peuvent rarement apparaître en dehors du tractus gastro-intestinal. Nous rapportons le cas d'une jeune patiente de 34 ans présentant une masse tumorale mésentérique se révélant être de nature stromale sans aucun contact avec la paroi intestinale. Il s'agit d'une localisation très rare des tumeurs stromales à laquelle il faut penser en préopératoire afin d'avoir une conduite thérapeutique adaptée et efficace. PMID:26327998
Realisation et Applications D'un Laser a Fibre a L'erbium Monofrequence
NASA Astrophysics Data System (ADS)
Larose, Robert
L'incorporation d'ions de terres rares a l'interieur de la matrice de verre d'une fibre optique a permis l'emergence de composants amplificateurs tout-fibre. Le but de cette these consiste d'une part a analyser et a modeliser un tel dispositif et d'autre part, a fabriquer puis a caracteriser un amplificateur et un oscillateur a fibre. A l'aide d'une fibre fortement dopee a l'erbium fabriquee sur demande, on realise un laser a fibre syntonisable qui fonctionne en regime multimodes longitudinaux avec une largeur de raie de 1.5 GHz et egalement comme source monofrequencielle de largeur de raie de 70 kHz. Le laser sert ensuite a caracteriser un reseau de Bragg ecrit par photosensibilite dans une fibre optique. La technique de syntonisation permet aussi l'asservissement au fond d'une resonance de l'acetylene. Le laser garde alors la position centrale de la raie avec une erreur de moins de 1 MHz corrigeant ainsi les derives mecaniques de la cavite.
Forensic Analysis of Terrorist Counter-Financing to Combat Nuclear Proliferation
DOE Office of Scientific and Technical Information (OSTI.GOV)
Drame, B.; Toler, L.; Bachner, Katherine
The single greatest threat to U.S. homeland security remains the proliferation of nuclear weapons, especially among terrorists and other non-state actors who are not governed by the Non-Proliferation Treaty. One of the most important tools for combating terrorism among such rogue actors is counter-financing. Without funding, terrorists cannot acquire, maintain, or deploy nuclear weapons. According to the official report of the 9/11 Commission, counter-financing could have prevented the attacks of September 11, 2001. Unfortunately, no single country can defeat global terrorism. Successful counter-financing requires significant international cooperation. Since 2001, the United States and the European Union, despite vastly different approachesmore » to intelligence gathering, have shared information through the Terrorist Finance Tracking Program (TFTP). That shared information allows authorities to trace suspicious transactions, identify culprits, and map out global terrorist networks. The TFTP successfully thwarted a 2011 plot to assassinate the Saudi Arabian Ambassador to the U.S. and multiple threats during the 2012 Summer Olympics in London; it also aided in the investigation of the 2013 Boston Marathon bombing. That program is necessary but not sufficient. To strengthen our ability to detect and disrupt terrorist plotting and prevent nuclear proliferation, we must expand and coordinate two additional transnational measures: (1) the Society for Worldwide Interbank Financial Telecommunications (SWIFT), a standardized global messaging network for financial institutions to quickly, accurately, and securely send and receive money transfer instructions, and (2) International Bank Account Numbers (IBAN) to identify individual accounts involved in international transactions. Both initiatives were incompletely adopted in the wake of 9/11, but most global banks use one or neither. More fully implementing and coordinating these two systems would allow for coherent information sharing, an essential tool for combating money laundering and terrorist financing, verifying sanctions against rogue nations and non-state actors, tracking nuclear proliferation networks, and protecting dual-use materials. These steps can save lives without interfering with state sovereignty or individual rights. The specter of nuclear threat is real and constant. This paper will provide forensic analysis of the most effective financial tools and policies to combat that threat, placing special emphasis on multinational and public-private cooperation.« less
Une complication exceptionnelle du tétanos généralisé: l’embolie pulmonaire
Regaieg, Kais; Bahloul, Mabrouk; Gargouri, Rahma; Bouattour, Abir; Chelly, Hèdi; Bouaziz, Mounir
2016-01-01
Le tétanos est une maladie caractérisée par une paralysie spastique et des spasmes. C’est une pathologie grave. Elle nécessite une prise en charge en milieu de réanimation. La mortalité est essentiellement liée aux complications neurovégétatives et infectieuses. Les complications thromboemboliques sont exceptionnelles au cours de cette maladie. A notre connaissance, l’embolie pulmonaire n’a jamais été rapportée et confirmée au cours du tétanos généralisé. Nous présentons à travers cette observation un cas de tétanos généralisé compliqué d’une embolie pulmonaire fibrino cruorique. PMID:28292134
Cardiomyopathie du péripartum: à propos d’une observation et revue de la littérature
Bouzerda, Abdelmajid
2016-01-01
La cardiomyopathie du péripartum ou cardiomyopathie gravidique primitive, est une entité rare et méconnue définie comme une insuffisance cardiaque systolique survenant le dernier mois de la grossesse ou les cinq premiers mois du postpartum en l'absence d'étiologie connue ou de cardiopathie préexistante. Nous rapportons l'observation d'une jeune patiente de 31 ans sans antécédents pathologiques particuliers admise pour une poussée d'insuffisance cardiaque gauche 1mois après son accouchement. Le contexte de péripartum nous a fait penser au diagnostic et a motivé la réalisation d'une Echocardiographie qui a confirmé cette entité. PMID:28154713
Awab, Almahdi; Elahmadi, Brahim; Lamkinsi, Tarik; El Moussaoui, Rachid; El Hijri, Ahmed; Azzouzi, Abderrahim; Alilou, Mustapha
2013-01-01
Introduction L'incidence des complications respiratoires postopératoires (CRPO) reste très diversement appréciées selon les critères diagnostiques retenues dans les différentes études, ce qui la fait varier de 5 à plus de 50%. Les CRPO majeurs après chirurgie de l'aorte abdominale sont responsables d'une grande morbi-mortalité pouvant aller jusqu’à 36%, d'une durée d'hospitalisation et d'un coût plus importants. Ainsi dans l'optique d'améliorer notre prise en charge périopératoire de la chirurgie de l'aorte, nous avons décidé de mener une étude pour dresser le profil épidémiologique et déterminer les facteurs de risque des complications respiratoires dans notre contexte Méthodes Il s'agit d'une étude de cohorte rétrospective du mois de Janvier 2007 au mois de décembre 2011 portant sur l'ensemble des patients opérés pour pathologie aortique au bloc opératoire central de l'hôpital Ibn Sina de Rabat, Maroc. Résultats Cent vingt cinq patients ont été inclus dans notre étude, 24 patients ont été opérés pour anévrysme de l'aorte abdominale et 101 patients pour lésion occlusive aortoiliaque. Dans notre série 22 malades soit 17,6% ont présenté une complication respiratoire majeure avec, une reventilation dans 4,8% des cas, une difficulté de sevrage de la ventilation artificielle dans 3,2% des cas, une pneumopathie dans 4% des cas, un syndrome de détresse respiratoire aigue (SDRA) dans 4% des cas et une nécessité de fibroaspiration bronchique dans 1,6% des cas. En analyse univariée: l’âge, la présence d'une BPCO avec dyspnée stade 3 ou 4, la présence d'une anomalie à l'EFR préopératoire, la présence d'un stade avancé (III ou IV) de LOAI et la reprise chirurgicale étaient statistiquement associés à la survenue d'une complication respiratoire postopératoire. En analyse multivariée, seule une anomalie à l'EFR en préopératoire constituait un facteur de risque indépendant de survenue d'une complication respiratoire postopératoire dans notre série avec un Odds Ratio (OR): 11,5; un Intervalle de Confiance (IC) à 95% de (1,6 - 85,2) et un p = 0,016. Conclusion Au terme de notre étude, il nous parait donc nécessaire pour diminuer l'incidence des CRPO majeurs dans notre population, d'agir sur les facteurs que nous jugeons modifiables tel l'amélioration de l’état respiratoire basal moyennant une préparation respiratoire préopératoire, s'intégrant dans un véritable programme de réhabilitation et associant une rééducation à l'effort, une kinésithérapie incitative ainsi qu'une optimisation des thérapeutiques habituelles. PMID:23504435
Networks model of the East Turkistan terrorism
NASA Astrophysics Data System (ADS)
Li, Ben-xian; Zhu, Jun-fang; Wang, Shun-guo
2015-02-01
The presence of the East Turkistan terrorist network in China can be traced back to the rebellions on the BAREN region in Xinjiang in April 1990. This article intends to research the East Turkistan networks in China and offer a panoramic view. The events, terrorists and their relationship are described using matrices. Then social network analysis is adopted to reveal the network type and the network structure characteristics. We also find the crucial terrorist leader. Ultimately, some results show that the East Turkistan network has big hub nodes and small shortest path, and that the network follows a pattern of small world network with hierarchical structure.
Terrorism and Other Threats to Civilization
NASA Astrophysics Data System (ADS)
Garwin, Richard L.
2014-07-01
In the Seminars on Planetary Emergencies, we have for more than a decade had a strong focus on terrorism, and, indeed, on megaterrorism. We realized early that there was much that could be achieved to mitigate the consequences of terrorists' acts, and so our original PMP, ably chaired by Kamal, was split into PMP-MTA (Mitigation of Terrorists Acts) and PMP-Motivation of Terrorism. Clearly, terrorism doesn't just happen, but is performed by people, either relatively spontaneously or in an organized fashion. I will not presume to report on the considerations and accomplishments of our colleagues, chaired by John Alderdice, who have studied terrorist motivations and worked hard to eliminate such motivations...
Deaths in World Trade Center terrorist attacks--New York City, 2001.
2002-09-11
On September 11, 2001, terrorists flew two hijacked airplanes into the World Trade Center (WTC) in lower Manhattan in New York City (NYC), destroying both towers of the WTC. This report presents preliminary vital statistics on the deaths caused by the terrorist attacks and describes the procedures developed by the New York City Department of Health and Mental Hygiene (NYCDOHMH) to issue death certificates in response to the attacks. These data underscore the need for legal mechanisms to expedite the issuance of death certificates in the absence of human remains and the need for vital registration systems that can be relocated in case of emergency.
Etiologie Rare de Sinusites Nosocomiales en Milieu de Reanimation - A Propos d'une Observation
Messadi, A.A.; Oueslati, S.; Thabet, L.; Bousselmi, K.; Menif, E.
2006-01-01
Summary Les sinusites nosocomiales ne sont pas rares en réanimation. Elles surviennent en général dans les suites d'une intubation nasotrachéale voire même orotrachéale. Le tubage gastrique peut être à lui seul à l'origine d'une sinusite nosocomiale. Nous rapportons le cas d'une patiente hospitalisée qui a été victime de brûlures étendues chez qui la sonde nasogastrique a été à l'origine d'une pansinusite dont l'issue a été fatale. PMID:21991055
Glaciers in 21st Century Himalayan Geopolitics
NASA Astrophysics Data System (ADS)
Kargel, J. S.; Wessels, R.; Kieffer, H. H.
2002-05-01
Glaciers are ablating rapidly the world over. Nowhere are the rates of retreat and downwasting greater than in the Hindu Kush-Himalaya (HKH) region. It is estimated that over the next century, 40,000 square kilometers of present glacier area in the HKH region will become ice free. Most of this area is in major valleys and the lowest glaciated mountain passes. The existence and characteristics of glaciers have security impacts, and rapidly changing HKH glaciers have broad strategic implications: (1) Glaciers supply much of the fresh water and hydroelectric power in South and Central Asia, and so glaciers are valuable resources. (2) Shared economic interests in water, hydroelectricity, flood hazards, and habitat preservation are a force for common cause and reasoned international relations. (3) Glaciers and their high mountains generally pose a natural barrier tending to isolate people. Historically, they have hindered trade and intercultural exchanges and have protected against aggression. This has further promoted an independent spirit of the region's many ethnic groups. (4) Although glaciers are generally incompatible with human development and habitation, many of the HKH region's glaciers and their mountains have become sanctuaries and transit routes for militants. Siachen Glacier in Kashmir has for 17 years been "the world's highest battlefield," with tens of thousands of troops deployed on both sides of the India/Pakistan line of control. In 1999, that conflict threatened to trigger all-out warfare, and perhaps nuclear warfare. Other recent terrorist and military action has taken place on glaciers in Kyrgyzstan and Tajikistan. As terrorists are forced from easily controlled territories, many may tend to migrate toward the highest ground, where definitive encounters may take place in severe alpine glacial environments. This should be a major concern in Nepali security planning, where an Army offensive is attempting to reign in an increasingly robust and brutal Maoist insurgency. (5) Glacier lakes are in many cases very fragile and their natural dams routinely rupture, causing devastating floods. A rising regional terrorist threat in several countries could target these dams and precipitate calamitous and terrifying results. (6) Over the next century, retreating glaciers may open new corridors for trade and human migration across the Himalaya and pave the way for possible new economic, military and political alliances in the region. (7) Glacier retreat might open new sanctuaries for terrorists and open new corridors for possible ground-based military offensive action across the HKH ranges. The documentation of glacier characteristics that may influence their trafficability, and projections of future glacier extent and behavior are relevant to wide ranging concerns of the region's inhabitants. Satellite remote sensing and mapping of glaciers is one approach to defining and monitoring the problems and opportunities presented by HKH glaciers. Global Land Ice Measurements from Space (GLIMS) is a joint USGS/NASA Pathfinder project that has formed a global consortium of glaciologists in several regional centers that are mapping and monitoring the HKH glaciers using repeat-pass ASTER and Landsat ETM+ data. We are currently building a comprehensive satellite multispectral image and GIS database that is providing detailed information on the state and rates of change of each glacier in the HKH region and other areas of the world. Merging these results with DEMs allows a predictive capability that could be useful in policy development and security planning.
Army War College Review: Student Publications. Volume 2, Issue 1
2016-02-01
2011 (called the Jasmine Revolution), Obama employed carrots and sticks in a year-long effort to promote a relatively fair and free election... essence , serves to justify terrorist executions for both terrorists and their supporters. Denying even the possibility of negotiation not only serves
Sheltering the Genie: The LIC Threat to Nuclear Systems
1990-08-01
Conflict", or LIC. War has punctuated the entire historical process and is relatively well understood. Low intensity conflict is a comtemporary phenomenon...often a tool of the terrorist. Mere recognition is insufficient, however, the major networks must pledge not to compete for terrorist business . Reporters
Communicating about the Risks of Terrorism (or Anything Else)
ERIC Educational Resources Information Center
Fischhoff, Baruch
2011-01-01
Communication is essential to preventing terrorists from achieving their objectives. Effective communication can reduce terrorists' chances of mounting successful operations, creating threats that disrupt everyday life, and undermining the legitimacy of the societies that they attack. Psychological research has essential roles to play in that…
Age and Terrorist Victimization.
ERIC Educational Resources Information Center
Trela, James; Hewitt, Christopher
While research has examined how age-related factors structure the probability of experiencing a particular event or suffering a particular kind of injury, one issue which has not been empirically addressed is the age structure of victimization from terrorist activity and civil strife. To explore the relationship between age and terrorist…
22 CFR 40.32 - Terrorist activities. [Reserved
Code of Federal Regulations, 2010 CFR
2010-04-01
... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Terrorist activities. [Reserved] 40.32 Section 40.32 Foreign Relations DEPARTMENT OF STATE VISAS REGULATIONS PERTAINING TO BOTH NONIMMIGRANTS AND IMMIGRANTS UNDER THE IMMIGRATION AND NATIONALITY ACT, AS AMENDED Security and Related Grounds § 40.32...
DOT National Transportation Integrated Search
2012-04-01
Since 1997, terrorists have focused much attention on public surface transportation as a target for attacks. Many of the plots have failed or been foiled, but those that have succeeded have resulted in large numbers of casualties and caused widesprea...
Suggestions for Adults: Talking and Thinking with Children about the Terrorist Attacks.
ERIC Educational Resources Information Center
Communication Disorders Quarterly, 2002
2002-01-01
Fifteen suggestions for adults talking with children about the terrorist attacks include taking the time to listen, separating fact from fiction, stressing the senselessness of violence, recognizing the impact of their own reactions on children, and addressing religious and moral concerns. (DB)
Maladie de Horton révélée par une dyspnée
Mahfoudhi, Madiha; Mamlouk, Habiba; Turki, Sami; Kheder, Adel
2015-01-01
Les manifestations pleuro-pulmonaires de la maladie de Horton sont rares et peu connues. Elles peuvent être inaugurales, à l'origine d'un retard à la prise en charge si elles sont méconnues. Il s'agissait d'un patient âgé de 75 ans, admis pour une dyspnée, une toux chronique et une fièvre. Il a reçu une antibiothérapie et a bénéficié d'une fibroscopie bronchique avec lavage broncho-alvéolaire à la recherche d'un germe, qui a révélé plutôt, une alvéolite lymphocytaire. L’évolution était marquée par la persistance des signes cliniques et du syndrome inflammatoire biologique. Un angio-scanner thoracique et une échographie cardiaque étaient sans anomalies. Une origine cardiaque, musculaire, hématologique, néoplasique, vasculaire ou métabolique de la dyspnée a été éliminée. Une maladie de Horton a été évoquée. La biopsie de l'artère temporale a confirmé le diagnostic d'une maladie de Horton. L’évolution sous corticothérapie était marquée par la disparition des signes cliniques et biologiques. Les manifestations pleuro-pulmonaires au cours de la maladie de Horton sont rares, et classiquement, rarement révélatrices de la maladie. La dyspnée peut initialement égarer le diagnostic vers d'autres étiologies notamment infectieuses. Le but de ce travail est d'insister sur le fait que la connaissance de ces différentes manifestations respiratoires au cours de la maladie de Horton (toux persistante, dyspnée, épanchement pleural) est utile au clinicien afin de prescrire une corticothérapie, chez un sujet le plus souvent âgé ayant un état fébrile et inflammatoire prolongé, permettant ainsi d’éviter l'apparition de complications. PMID:26161171
Sahin, Yasar Guneri; Ercan, Tuncay
2008-01-01
Terrorism is the greatest threat to national security and cannot be defeated by conventional military force alone. In critical areas such as Iraq, Afghanistan and Turkey, regular forces cannot reach these hostile/terrorist groups, the instigators of terrorism. These groups have a clear understanding of the relative ineffectiveness of counter-guerrilla operations and rely on guerrilla warfare to avoid major combat as their primary means of continuing the conflict with the governmental structures. In Internal Security Operations, detection of terrorist and hostile groups in their hiding places such as caves, lairs, etc. can only be achieved by professionally trained people such as Special Forces or intelligence units with the necessary experience and tools suitable for collecting accurate information in these often harsh, rugged and mountainous countries. To assist these forces, commercial micro-sensors with wireless interfaces could be utilized to study and monitor a variety of phenomena and environments from a certain distance for military purposes. In order to locate hidden terrorist groups and enable more effective use of conventional military resources, this paper proposes an active remote sensing model implanted into animals capable of living in these environments. By using these mobile sensor devices, improving communications for data transfer from the source, and developing better ways to monitor and detect threats, terrorist ability to carry out attacks can be severely disrupted. PMID:27879941
Sahin, Yasar Guneri; Ercan, Tuncay
2008-07-25
Terrorism is the greatest threat to national security and cannot be defeated by conventional military force alone. In critical areas such as Iraq, Afghanistan and Turkey, regular forces cannot reach these hostile/terrorist groups, the instigators of terrorism. These groups have a clear understanding of the relative ineffectiveness of counter-guerrilla operations and rely on guerrilla warfare to avoid major combat as their primary means of continuing the conflict with the governmental structures. In Internal Security Operations, detection of terrorist and hostile groups in their hiding places such as caves, lairs, etc. can only be achieved by professionally trained people such as Special Forces or intelligence units with the necessary experience and tools suitable for collecting accurate information in these often harsh, rugged and mountainous countries. To assist these forces, commercial micro-sensors with wireless interfaces could be utilized to study and monitor a variety of phenomena and environments from a certain distance for military purposes. In order to locate hidden terrorist groups and enable more effective use of conventional military resources, this paper proposes an active remote sensing model implanted into animals capable of living in these environments. By using these mobile sensor devices, improving communications for data transfer from the source, and developing better ways to monitor and detect threats, terrorist ability to carry out attacks can be severely disrupted.
Thrombasthénie de Glanzmann: à propos de 11 cas
Mukendi, Jean-Louis Ntumba; Benkirane, Souad; Masrar, Azlarab
2015-01-01
Introduction La thrombasthénie de Glanzmann est une pathologie hémorragique héréditaire rare due à une déficience ou un dysfonctionnement du complexe glycoprotéique IIb/IIIa de la membrane plaquettaire. Le but de notre étude est de décrire les caractéristiques démographiques, cliniques et biologiques d'une série de patients atteints de thrombasthénie de Glanzmann. Méthodes C'est une étude portant sur tous les patients atteints de thrombasthénie de Glanzmann diagnostiqués au Laboratoire Central d'Hématologie du Centre Hospitalier Ibn Sina de Rabat au Maroc pendant la période allant du 1er mars 2011 au 31 mars 2013, soit 25 mois. Après avoir recueilli les données épidémiologiques et cliniques de nos patients, nous avons réalisé une étude biologique comportant une numération plaquettaire et une agrégométrie. Résultats 11 patients ont présenté des profils agrégométriques compatibles à une TG. La majorité de ces malades étaient issus de mariages consanguins (54,5%) et originaires de régions situées dans le nord du Maroc. Le syndrome hémorragique s'est révélé principalement cutanéo-muqueux, avec une prédominance des gingivorragies (72,7%), des épistaxis (63,6%) et des ecchymoses (45,5%). Conclusion Nos résultats ont montré que la thrombasthénie de Glanzmann est une pathologie relativement fréquente au Maroc. PMID:26587119
L'endométriose de la paroi abdominale: à propos d'un cas rare
Jayi, Sofia; Laadioui, Meriem; Bouguern, Hakima; Chaara, Hikmat; Melhouf, Aabdelilah
2013-01-01
L'endométriose de la paroi est une entité clinique rare, dont la physiopathologie demeure imprécise. Elle survient le plus souvent après une intervention chirurgicale gynécologique ou obstétricale. Nous rapportons le cas d'une patiente présentant une douleur cyclique, au niveau de la cicatrice de césarienne. Avec à l'examen clinique une masse de 3 cm localisée au niveau de la fosse iliaque droite. L'échographie-doppler a objectivé une image d'allure tissulaire, polylobée, à vascularisation centrale, mesurant 32/16 mm, évoquent une masse endométriosique ou une tumeur des parties molles. D'où la décision d'excision de la lésion, au cours de laquelle on a découvert une masse dure de 3/2 cm, en sous aponévrotique accolée au muscle grand droit de l'abdomen. L'étude anatomopathologique a confirmé le diagnostic d'endométriose pariétale. Les suites postopératoires étaient simples avec un recul de 2 ans et demie sans récidive de la masse ni de la douleur. A travers notre cas, nous insisterons sur les caractéristiques de cette pathologie notamment pronostic, ce qui permettra au praticien de comprendre l'intérêt du diagnostic et prise en charge précoce de cette entité - pour laquelle on ne pense jamais assez devant une masse pariétale - et de sa prévention au cours de chaque chirurgie gynécologique ou obstétricale. PMID:24171068
Lupus érythémateux systémique à début pédiatrique: à propos d'un cas
Khlif, Sana; Hachicha, Hend; Frikha, Faten; Feki, Sawsan; Ben Ayed, Mourad; Bahloul, Zouhir; Masmoudi, Hatem
2015-01-01
Le lupus érythémateux systémique (LES) est une maladie systémique auto-immune d’étiologie inconnue qui touche essentiellement les femmes à l’âge adulte. Le lupus pédiatrique est une entité rare. Nous rapportons une nouvelle observation. Il s'agissait d'un nourrisson âgé de 7 mois qui présentait des lésions cutanées purpuriques, une polyarthrite fébrile. Le bilan immunologique était positif (AAN et anti-ADN). Une amélioration clinique et biologique a été notée sous corticothérapie générale avec une récidive lors de la dégression du traitement. PMID:26015845
Syndrome d'interruption de la tige pituitaire à révélation tardive
Marmouch, Héla; Graja, Samah; Arfa, Sondes; Boubaker, Fadia; Khochtali, Ines
2016-01-01
Le syndrome d'interruption de la tige pituitaire est une cause assez fréquente de déficit en hormone de croissance et d'hypopituitarisme souvent révélé pendant la période néonatale et l'enfance. Cette observation illustre les particularités d'une révélation tardive de ce syndrome. Il s'agit d'une patiente âgée de 17ans hospitalisée pour aménorrhée primaire et impubérisme. Elle n'a pas d'antécédent d'incident néonatal. L'examen clinique révèle un retard de croissance sévère. L'hypophysiogramme a montré un hypopituitarisme complet sans diabète insipide. L'imagerie par résonnance magnétique a montré une interruption de la tige pituitaire avec une post hypophyse ectopique. Une malformation rénale a été objectivée, ce qui est en faveur d'une origine congénitale malformative de ce syndrome. Une substitution hormonale a été administrée à cette patiente. Cette forme clinique tardive souligne la nécessité de diagnostic précoce d'impubérisme et/ou de retard de croissance révélant une pathologie à potentiel de gravité important. PMID:27231511
Terrorist Innovations in Weapons of Mass Effect, Phase 2
2012-01-01
Beirut, Lebanon to Ankara, Turkey.1 They demanded the release of the three surviving Munich terrorists. The hijacked airplane was flown to Zagreb ...Yugoslavia. The West German government complied immediately and the three were flown to Zagreb , where they boarded the hijacked plane. The plane then was
78 FR 56579 - Continuation of the National Emergency With Respect to Certain Terrorist Attacks
Federal Register 2010, 2011, 2012, 2013, 2014
2013-09-12
...--Continuation of the National Emergency With Respect to Certain Terrorist Attacks #0; #0; #0; Presidential Documents #0; #0; #0;#0;Federal Register / Vol. 78 , No. 177 / Thursday, September 12, 2013 / Presidential Documents#0;#0; #0; #0;Title 3-- #0;The President [[Page 56581
75 FR 65556 - Designation of Two Individuals Pursuant to Executive Order 13224
Federal Register 2010, 2011, 2012, 2013, 2014
2010-10-25
... Who Commit, Threaten To Commit, or Support Terrorism.'' DATES: The designation by the Director of OFAC... Order, the President declared a national emergency to address grave acts of terrorism and threats of terrorism committed by foreign terrorists, including the September 11, 2001, terrorist attacks in New York...
76 FR 37891 - Designation of Four Individuals Pursuant to Executive Order 13224
Federal Register 2010, 2011, 2012, 2013, 2014
2011-06-28
... Who Commit, Threaten To Commit, or Support Terrorism.'' DATES: The designations by the Director of... Order, the President declared a national emergency to address grave acts of terrorism and threats of terrorism committed by foreign terrorists, including the September 11, 2001 terrorist attacks in New York...
Chlorine Gas: An Evolving Hazardous Material Threat and Unconventional Weapon
Jones, Robert; Wills, Brandon; Kang, Christopher
2010-01-01
Chlorine gas represents a hazardous material threat from industrial accidents and as a terrorist weapon. This review will summarize recent events involving chlorine disasters and its use by terrorists, discuss pre-hospital considerations and suggest strategies for the initial management for acute chlorine exposure events. PMID:20823965
31 CFR 595.408 - Charitable contributions to specially designated terrorists.
Code of Federal Regulations, 2012 CFR
2012-07-01
... charitable contribution or donation of funds, goods, services,or technology to relieve human suffering, such as food, clothing or medicine, may be made to or for the benefit of a specially designated terrorist... contribute funds, goods, services or technology without knowledge or reason to know that the donation or...
31 CFR 595.408 - Charitable contributions to specially designated terrorists.
Code of Federal Regulations, 2011 CFR
2011-07-01
... charitable contribution or donation of funds, goods, services,or technology to relieve human suffering, such as food, clothing or medicine, may be made to or for the benefit of a specially designated terrorist... contribute funds, goods, services or technology without knowledge or reason to know that the donation or...
31 CFR 595.408 - Charitable contributions to specially designated terrorists.
Code of Federal Regulations, 2010 CFR
2010-07-01
... charitable contribution or donation of funds, goods, services,or technology to relieve human suffering, such as food, clothing or medicine, may be made to or for the benefit of a specially designated terrorist... contribute funds, goods, services or technology without knowledge or reason to know that the donation or...
The Counter Terrorist Classroom: Religion, Education, and Security
ERIC Educational Resources Information Center
Gearon, Liam
2013-01-01
The article identifies international cases--from the United States, Europe, and the United Nations--of an emergent interface of religion, education, and security. This is manifest in the uses of religion in education to counter religious extremism, the notional "counter terrorist classroom." To avoid an over-association of extremism with…
Code of Federal Regulations, 2010 CFR
2010-01-01
... to persons designated in or pursuant to Executive Order 13224 (Specially Designated Global Terrorist... Trade (Continued) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE EXPORT ADMINISTRATION... persons designated in or pursuant to Executive Order 13224 (Specially Designated Global Terrorist) (SDGT...
The FBI Vs. Domestic Terrorism.
ERIC Educational Resources Information Center
Webster, William H.
1984-01-01
Describes the efforts of the FBI to combat terrorism. Contingency plans have been established in each FBI field office, and agents are receiving special training in hostage rescue. Psycholinguistics is being used to deduce information about unknown terrorists. In 1982 the FBI arrested 95 terrorist suspects and obtained 84 convictions. (CS)
Activist or Terrorist? Negotiating Discourses of Eco-Terror in "If a Tree Falls"
ERIC Educational Resources Information Center
Olson, Jade
2018-01-01
Environmentalist voices like the Earth Liberation Front have been labeled "eco-terrorists." The 2011 documentary film "If a Tree Falls" explores how "eco-terrorism" troubles the unstable border between activism and terrorism. This essay offers a textual analysis of the film's negotiation of the activism/terrorism…
Islam, Terrorism, and the Strategy of Enlightened Moderation
2005-06-17
The Terrorist Next Door: The Militia Movement and the Radical Right (New York:Thomas Dunne Books, 2002); quoted by Matthew J. Morgan. 58Jessica...Accessed 12 January 2005. 95 Levitas, Daniel. The Terrorist Next Door: The Militia Movement and the Radical Right . New York: Thomas Dunne Books, 2002
When Terrorists Strike: What School Counselors Can Do. ERIC Digest.
ERIC Educational Resources Information Center
Juhnke, Gerald A.
Terrorist attacks in New York City and Washington, DC, and the continued threats of terrorism have the potential to engender negative psychological effects upon school age children and their families. School counselors and mental health professionals working with children need to be knowledgeable regarding interventions which allow students to…
31 CFR 103.110 - Voluntary information sharing among financial institutions.
Code of Federal Regulations, 2010 CFR
2010-07-01
... Information Sharing Procedures To Deter Money Laundering and Terrorist Activity § 103.110 Voluntary.... 5312(a)(2) that is required under this part to establish and maintain an anti-money laundering program... suspects may involve possible terrorist activity or money laundering. (2) Notice requirement. A financial...
31 CFR 103.16 - Reports by insurance companies of suspicious transactions.
Code of Federal Regulations, 2010 CFR
2010-07-01
..., such as terrorist financing or ongoing money laundering schemes, the insurance company shall... fraudulent submission relates to money laundering or terrorist financing. (e) Retention of records. An... 31 Money and Finance: Treasury 1 2010-07-01 2010-07-01 false Reports by insurance companies of...
Breaching the Fortress Wall. Understanding Terrorist Efforts to Overcome Defensive Technologies
2007-01-01
that affect, in overlapping ways, sequential parts of the terrorist activity chain (Figure 1.2). The purposes of each of these types of technologies...fication lineup .51 The ways in which PIRA chose to manage operations also contrib- uted to its overall counterforensic effort. For example, although
Exploiting Terrorist Vulnerabilities: A Law Enforcement Approach to Fighting Terrorist Organizations
2009-05-01
assassination led to a crackdown by the Egyptian Government. This crackdown led to an alliance with Gamal Abdel Nasser. Nasser promised a return to......He believed that the Western powers were bleeding Egyptian resources dry. He was firmly against capitalism and formed a social welfare network
Code of Federal Regulations, 2013 CFR
2013-07-01
...) FINANCIAL CRIMES ENFORCEMENT NETWORK, DEPARTMENT OF THE TREASURY RULES FOR BROKERS OR DEALERS IN SECURITIES... to deter money laundering and terrorist activity for brokers or dealers in securities. 1023.520... securities. (a) Refer to § 1010.520 of this chapter. (b) [Reserved] ...
Code of Federal Regulations, 2014 CFR
2014-07-01
...) FINANCIAL CRIMES ENFORCEMENT NETWORK, DEPARTMENT OF THE TREASURY RULES FOR BROKERS OR DEALERS IN SECURITIES... to deter money laundering and terrorist activity for brokers or dealers in securities. 1023.520... securities. (a) Refer to § 1010.520 of this chapter. (b) [Reserved] ...
Code of Federal Regulations, 2011 CFR
2011-07-01
...) FINANCIAL CRIMES ENFORCEMENT NETWORK, DEPARTMENT OF THE TREASURY RULES FOR BROKERS OR DEALERS IN SECURITIES... to deter money laundering and terrorist activity for brokers or dealers in securities. 1023.520... securities. (a) Refer to § 1010.520 of this chapter. (b) [Reserved] ...
Code of Federal Regulations, 2012 CFR
2012-07-01
...) FINANCIAL CRIMES ENFORCEMENT NETWORK, DEPARTMENT OF THE TREASURY RULES FOR BROKERS OR DEALERS IN SECURITIES... to deter money laundering and terrorist activity for brokers or dealers in securities. 1023.520... securities. (a) Refer to § 1010.520 of this chapter. (b) [Reserved] ...
Terrorism and Schools. Fact Sheet
ERIC Educational Resources Information Center
Arkansas Safe Schools Initiative Division, 2003
2003-01-01
Since September 11, 2001, Americans have experienced a heightened sense of awareness and consciousness over the threat of terrorism against the United States. Terrorism experts agree that a terrorist attack on a school is a viable option for Al Qaeda and other terrorist organizations. In response to this threat, the National Association of School…
Wrestling the Hydra: Exploiting Organizational Evolution in Terrorist Groups
2013-05-02
Nimrod Raphaeli, “Understanding Muqtada al-Sadr,” Middle East Quarterly, Volume XI: Number 4, Fall 2004. 33- 42, http://www.meforum.org/655/understanding...Post, Jerrold M. The Mind of the Terrorist. (New York: Palgrave McMillan 2007). Raphaeli, Nimrod . “Understanding Muqtada al-Sadr.” Middle East
76 FR 59488 - Designation of Three Individuals Pursuant to Executive Order 13224
Federal Register 2010, 2011, 2012, 2013, 2014
2011-09-26
... Who Commit, Threaten To Commit, or Support Terrorism.'' DATES: The designations by the Director of... Order, the President declared a national emergency to address grave acts of terrorism and threats of terrorism committed by foreign terrorists, including the September 11, 2001 terrorist attacks in New York...
75 FR 44312 - Designation of Three Individuals Pursuant to Executive Order 13224
Federal Register 2010, 2011, 2012, 2013, 2014
2010-07-28
... Who Commit, Threaten To Commit, or Support Terrorism.'' DATES: The designation by the Director of OFAC..., the President declared a national emergency to address grave acts of terrorism and threats of terrorism committed by foreign terrorists, including the September 11, 2001, terrorist attacks in New York...
The Rhetoric of Terrorism and Media Response to the "Crisis in Iran."
ERIC Educational Resources Information Center
Palmerton, Patricia R.
1988-01-01
Examines television news coverage of the first days of the 1979 Iranian hostage crisis. Discovers patterns that reinforce terrorist strategy by focusing causation for the crisis on institutional targets and suggesting that military intervention would reestablish control. Suggests that media portrayals of terrorist events support the rhetorical…
Alacrymie congénitale révélant un syndrome d'Allgrove: à propos de trois cas
Derrar, Rajae; Boutimzine, Nourredinne; Laghmari, Amina; Alouane, Amal; Daoudi, Rajae
2015-01-01
Le syndrome d'Allgrove ou triple A syndrome est une affection autosomique récessive constatée chez la population pédiatrique, associant dans sa forme complète: Achalasie œsophagienne, Alacrymie, maladie d'Addison (insuffisance surrénale), une dégénérescence neurologique et occasionnellement une instabilité du système autonome. Nous rapportons les cas de 3 enfants issus de mariages consanguins, chez qui l'examen ophtalmologique a révélé une sécheresse sévère avec dans deux cas une kératite envahissant l'axe visuel, ainsi qu'une paresse du reflexe photomoteur. Le bilan radiologique: transit œsogastroduodénal (TOGD) et fibroscopie œsogastroduodénale (FOGD) a révélé un mégaoesophage associé dans un cas à une œsophagite. Un traitement à base de larmes artificielles est instauré aussitôt, ainsi qu'un traitement chirurgical par voie laparoscopique. La connaissance de cette pathologie permettra une prise de conscience de la gravité de cette maladie en plus de suggérer sa prise en charge. PMID:26185551
Lekpa, Fernando Kemta; Ndongo, Souhaïbou; Fall, Seynabou; Pouye, Abdoulaye; Ka, Mamadou Mourtalla; Moreira-Diop, Thérèse
2014-01-01
Le syndrome d'activation macrophagique (SAM) est une complication du lupus érythémateux systémique (LES), due à l'activation et la prolifération incontrôlée des macrophages dans la moelle osseuse. La bycytopénie voire la pancytopénie est constante. Nous rapportons un cas atypique de SAM diagnostiqué au même moment qu'un LES chez une patiente noire de 17 ans. Le tableau initial associait une fièvre, un syndrome inflammatoire, une anémie, un taux normal de leucocytes et plus surprenant, une thrombocytose. PMID:25584123
Ismaili, Abdellah Alaoui; Abdellaoui, Meriem; Khrifi, Zineb; Eddassi, Noureddine; Nejjari, Ourda; Andaloussi, Idriss Benatiya; Tahri, Hicham
2014-01-01
Les anévrysmes intracrâniens non rompu (AICNR) se manifestent le plus souvent par des tableaux cliniques non spécifiques (céphalées, accidents vasculaires ischémiques cérébraux, paralysies des nerfs crâniens) et sont généralement découverts à l'occasion d'imagerie cérébrale pour d'autres raisons. Une cécité bilatérale révélant AICNR de l'artère communicante antérieure est unique dans la littérature. Il s'agit d'un homme de 48 ans sans antécédents médicaux notables qui consulte aux urgences ophtalmologiques pour baisse de l'acuité visuelle rapidement évolutive en une semaine aboutissant à une cécité bilatérale. L'examen ophtalmologique objective une acuité visuelle réduite à la présence d'une perception lumineuse bilatérale avec un bon réflexe photomoteur et le reste de l'examen ophtalmologique qui est strictement normal. Un examen général réalisé en urgence trouve une tension artérielle à 20/14mmHG. L'imagerie cérébrale notamment une tomodensitométrie cérébrale complétée par une imagerie en résonnance magnétique objective un aspect spectaculaire d'un grand anévrisme de l'artère cérébrale communicante antérieure partiellement thrombosé responsable d'une compression isolée du chiasma optique. Après un équilibre de l'hypertension artérielle le patient a été adressé en neurochirurgie pour une thérapeutique en urgence. Un anévrisme est toujours la conséquence d'une modification structurale de la paroi artérielle. Dans leur forme commune, les anévrismes développés sur les artères intracrâniennes sont sacciformes. Ses étiologies sont nombreuses et variées. L’évolution des anévrysmes intracrâniens se fait vers une augmentation de leur volume sous l'influence de facteurs hémodynamiques qui conduit à une fragilisation de leur paroi. Une rupture de l'anévrisme est le mode de découverte le plus fréquent et aussi le plus dramatique. Toute baisse d'acuité visuelle à fond d'oeil normal doit imposer sans retard une imagerie orbito-cérébrale. PMID:25392724
Mission Command: Elasticity, Equilibrium, Culture, and Intent
2006-11-01
évidence « l’élasticité » de l’organisation. Comparativement à l’organisation décentralisée, une force centralisée possède une réserve beaucoup plus...avoir une faible intention implicite potentiel comparativement à une autre. La mesure dans laquelle la culture de commandement de l’organisation...is that the organisation is optimised, by design , to operate at this point on the continuum. Centralised Decentralised Shared Intent Implicit
The impact of terrorism on children and adolescents: terror in the skies, terror on television.
Fremont, Wanda P; Pataki, Caroly; Beresin, Eugene V
2005-07-01
Terrorist attacks and their aftermath have had a powerful impact on children and their families. Media and television exposure of terrorist events throughout the world has increased during the past few years. There is increasing concern about the effects of this exposure on children who witness these violent images. To develop a proactive and strategic response to reactions of fear, clinicians, educators, and policy makers must understand the psychologic effects of media coverage of terrorism on children. Previous research has focused on media coverage of criminal violence and war. Recent studies have examined the effect of remote exposure of terrorist attacks and have shown a significant clinical impact on children and families.
Fall, Maouly
2015-01-01
Les vomissements gravidiques peuvent être responsables de rares complications neuromusculaires mais graves notamment la paralysie hypokaliémique. Nous rapportons des observations de deux jeunes femmes d'origine guinéenne, sans histoires familiales ni antécédents particuliers, admises pour paralysie flasque des quatre membres dans un contexte de vomissements incoercibles en début de grossesse. Le bilan retrouvait une hypokaliémie majeure associée à quelques troubles électro-cardiographiques. L'apport de potassium par voie parentérale avait permis une récupération motrice totale. La paralysie hypokaliémique est une complication rare des vomissements gravidiques. Une supplémentation potassique prudente avec une surveillance électro-cardiographique et biologique permet une disparition spectaculaire des troubles neuromusculaires. PMID:26327956
Une spondylodiscite tuberculeuse chez une transplantée rénale compliquée d’une mycose systémique
Haddiya, Intissar; El Housni, Siham; El Harraqui, Ryme; Rhou, Hakima; Benamar, Loubna; Eziatouni, Fatima; Ouzeddoun, Naima; Bayahia, Rabia
2014-01-01
En transplantation, les complications infectieuses sont fréquentes et de diagnostic souvent délicat. Elles peuvent coexister chez le transplanté rénal rendant leur diagnostic encore plus difficile. Le but de ce cas clinique est de discuter les difficultés diagnostiques et de surveillance de deux types de pathologies assez fréquentes chez le transplanté rénal, qui sont la tuberculose et la mycose, à travers l’observation clinique d’une patiente de 24 ans transplantée rénale qui présente une spondylodiscite tuberculeuse et qui développe secondairement une septicémie à Candida non albicans à point de départ urinaire dont le seul point d’appel est la fièvre post opératoire. PMID:25667684
Fistules carotido-caverneuses post-traumatiques à propos d'un cas et revue de la littérature
Oumellal, Jamal; Bekaert, Olivier; Gallas, Sophie; Leguerinel, Caroline; Palfi, Stéphane; Derkaoui, Fahd; Fatemi, Nizar El; Gana, Rachid; Elmaquili, Moulay Rachid; Elabbadi, Najia
2015-01-01
Les auteurs rapportent une observation clinique d'une fistule carotidocaverneuse survenue à la suite d'un traumatisme craniofaciale grave. Une exophtalmie unilatérale pulsatile et asymétrie des 2 sinus caverneux au scanner ont permis de suspecter le diagnostic. Une artériographie a permis de confirmer ce diagnostic, avec embolisation couronnée de succès chez ce malade, mais l’évolution est défavorable sur le plan neurologique avec apparition d'une HTIC réfractaire au traitement médical maximal. La fistule carotido-caverneuse est une complication rare mais grave pouvant engager le pronostic fonctionnel (cécité) et vital (hémorragie méningée et intracérébrale).L'artériographie et l'embolisation en un seul temps ont considérablement amélioré le pronostic. PMID:26587139
Analyse experimentale des performances d'une batterie au lithium pour l'aeronautique
NASA Astrophysics Data System (ADS)
Bonnin, Romain
Ce memoire a pour objectif d'identifier et d'etudier les performances necessaires pour qu'une batterie au lithium puisse etre utilisee dans le secteur de l'aeronautique. C'est pourquoi dans le cadre de notre recherche, nous allons proposer une procedure de tests permettant d'analyser et de determiner si la batterie au lithium peut etre implantee dans un avion. En vue de repondre a l'analyse des performances, une etude des fonctionnalites demandees par l'avion ainsi que des normes preexistantes vont etre effectuees. Suite a cette etape, nous allons elaborer un banc d'essais. Une fois le banc d'essais acheve, nous allons tester une batterie au lithium qui est supposee disposer de toutes les caracteristiques techniques requises pour etre implantee dans un avion. Ces tests nous permettront donc d'emettre un avis sur l'utilisation des batteries au lithium dans le domaine de l'aeronautique.
Omejec, Gregor; Podnar, Simon
2018-06-01
The aim of the study was to compare the utility of instrument-based assessment of peripheral nerve function with the neurologic examination in ulnar neuropathy at the elbow (UNE). We prospectively recruited consecutive patients with suspected UNE, performed a neurologic examination, and performed instrument-based measurements (muscle cross-sectional area by ultrasonography, muscle strength by dynamometry, and sensation using monofilaments). We found good correlations between clinical estimates and corresponding instrument-based measurements, with similar ability to diagnose UNE and predict UNE pathophysiology. Although instrument-based methods provide quantitative evaluation of peripheral nerve function, we did not find them to be more sensitive or specific in the diagnosis of UNE than the standard neurologic examination. Likewise, instrument-based methods were not better able to differentiate between groups of UNE patients with different pathophysiologies. Muscle Nerve 57: 951-957, 2018. © 2017 Wiley Periodicals, Inc.
Une hanche douloureuse révélatrice d'une histiocytose osseuse multifocale
Lahrach, Kamal; Alaoui, Adil; el Kadi, Khalid Ibn; Marzouki, Amine; Boutayeb, Fawzi
2014-01-01
L'histiocytose langerhansienne est une maladie rare qui touche principalement l'enfant et l'adulte jeune. Elle peut prendre plusieurs aspects, L'atteinte osseuse peut être uni- ou multifocale. Nous rapportons une observation d'histiocytose langerhansienne osseuse multifocale, révélée chez un patient âgé de 23 ans et ayant touché le col fémoral droit. La scintigraphie osseuse a permis de retrouver plusieurs localisations: l'os temporal, humérale et scapulaire droite. En raison du risque fracturaire, le patient a bénéficié d'une ostéosynthèse par vis-plaque DHS avec curetage biopsie de la lésion. L'examen histologique a révélé une histiocytose langerhansienne. L'évolution fut favorable après chimiothérapie par voie générale. PMID:25018840
Sebbani, Majda; Adarmouch, Latifa; Azzahiri, Isam; Quiddi, Wafa; Cherkaoui, Mohamed; Amine, Mohamed
2016-01-01
Introduction Décrire les connaissances, attitudes et pratiques (CAP) des hommes d'une population enclavée à l'égard de la santé reproductive. Méthodes Il s'agissait d'une étude mixte (focus group et étude CAP) menée dans une région montagneuse prés de Marrakech. L'enquête descriptive a recruté 74 hommes par deux méthodes d'échantillonnage (visiteurs du souk hebdomadaire et accompagnateurs à une compagne sanitaire). La collecte des données (Mars - Avril 2014) était par questionnaire traduit en dialectale et administré par des enquêteurs formés parlant Amazigh. L'analyse des données quantitatives était descriptive et bivariée (seuil de signification statistique à 5%). Le focus group était analysé après enregistrement et retranscription. Résultats La médiane de l'âge était de 38 ans [19 à 80 ans]. Parmi 64 hommes vivant en couple (86,5%), la moitié (55,4%) optait pour la pilule. Les 2 tiers ont reconnu l'intérêt de surveiller la grossesse, tandis que 37% des maris ignoraient la fréquence du suivi. Le non recours à la consultation prénatale était de 56,9% (N=58), dont 42,4% sans raison. Le niveau d'instruction était associé au suivi de la grossesse par la conjointe (p=0,015) et à l'attitude positive à l'égard de son intérêt (p=0,011). La méconnaissance de la possibilité de complications (35,1% des répondants) était un facteur de non recours à la consultation post-natale par la conjointe (p=0,021). Les barrières relevées de l'analyse du focus group étaient d'ordre culturel, géographique et socioéconomique. Conclusion Des actions d'information, d'éducation et de communication devraient viser d'avantage l'implication du sexe masculin dans des contextes similaires. PMID:28292148
NASA Astrophysics Data System (ADS)
Collard-Fortin, Ugo
Le developpement des sciences/technologie a tres clairement contribue a ce que ce dernier domaine de savoirs jouisse d'une place de choix au sein de notre societe. Au-dela des progres de notre civilisation inherents a ce dernier developpement, cette croissance amena avec elle un lot d'ineluctables dommages collateraux, contribuant en corollaire a l'emergence de diverses problematiques environnementales inquietantes pour lesquelles les valeurs ainsi que le mode de fonctionnement de la societe occidentale contemporaine sont largement tributaires. C'est entre autres en reponse a cet etat de fait que la recente vague de reforme de l'Education conduisit a l'integration, dans les curricula de sciences/technologie, de contenus relavant d'education relative a l'environnement (ERE). Face au changement, les enseignants de sciences ont du s'approprier ce nouveau programme afm de l'enseigner a leurs eleves. Toutefois, l'analyse de la situation montre que les prescriptions du programme en matiere d'ERE ne se sont pas toujours traduites en de reelles actions dans la pratique. Le contexte de notre etude s'est interesse aux pratiques educatives de l'ERE ainsi qu'a la representation sociale qui en decoule. Notre recherche aborde plus specifiquement la problematique de la modification de ces derniers objets chez les enseignants de sciences et technologie du deuxieme cycle du secondaire. Pour y arriver, nous avons propose a un groupe de trois praticiens de participer a une activite, en communaute de pratique, de formation continue orientee autour de thematiques ERE. Cette recherche developpement, s'inscrivant dans un paradigme qualitatif/interpretatif, s'est appuyee sur une cueillette de donnees effectuee a partir d'entrevues semi-dirigees, d'observations en situation et d'un groupe de discussion, au debut et a la fm de la formation continue. Les donnees brutes ont ete soumises a une demarche d'analyse inductive et ont genere diverses categories etayant nos objets de recherche. Grosso modo , l'intention de cette formation continue a suivi la piste de la modification des representations sociales ainsi que des pratiques educatives en ERE. Nous avons cherche a savoir si elles se modifieraient ou non pendant la periode de recherche. Les resultats montrent que des elements de modification ont pu etre observes a posteriori, tant dans le discours que dans la pratique. On constate que les enseignants ont, soit bonifie, soit consolide leur representation et leurs pratiques a l'egard de l'ERE.
Bussières, Jean-François; Robelet, Antoine; Therrien, Roxane; Touzin, Karine
2010-01-01
Contexte : Bien que le concept de pharmacie clinique ait été développé dans les années soixante, il existe une grande variété de programmes et une grande disparité entre les programmes en clinique externe et en hospitalisation, bénéficiant de la présence d’un pharmacien dans un secteur de soins. Objectif: Éprouver une méthode de mise à niveau des secteurs de soins pharmaceutiques en établissement de santé. Méthode : Il s’agit d’une étude descriptive se déroulant au Centre hospitalier universitaire Sainte-Justine, un établissement mère-enfant de 500 lits. Le secteur de soins pharmaceutiques ciblé pour illustrer la méthode de mise à niveau est l’hématologie-oncologie pédiatrique. La méthode comporte trois étapes, soit une revue de la documentation scientifique, un profil du secteur et une mise à jour du niveau de pratique selon un profil des activités pharmaceutiques dans le secteur avant et après la mise à niveau. Résultats : Au total, 108 articles ont été recensés et 22 ont été retenus à partir d’une recherche dans PubMed. Après une recherche manuelle complémentaire, 36 articles ont finalement été évalués. Parmi les articles retenus, on compte trois lignes directrices, 11 études de développement, une revue de la littérature scientifique, six études pré- et post-interventions et 15 études quasi expérimentales. Bien que les patients de ce secteur ne comptent que pour 5 % des admissions de l’hôpital, la complexité des cas est élevée tant sur le plan de la codification de l’épisode de soins que du potentiel d’intervention pharmaceutique par admission. Conclusion : Il existe peu de données illustrant une démarche de mise à niveau de la pratique dans un secteur de soins pharmaceutiques. Cette étude a éprouvé une méthode de mise à niveau dans un service d’hématologie-oncologie pédiatrique et comporte une revue de la documentation scientifique, un profil du secteur et une description des tâches des pharmaciens de ce secteur avant et après la mise à niveau. PMID:22478967
2010-01-01
NEFA Foundation (2009). 8 Would-Be Warriors: Incidents of Jihadist Terrorist Radicalization in the United States be strong, but the means are not at...Radicalization: Pathways Toward Terrorism,” Terrorism and Political Violence, Vol. 20, 2008. The NEFA Foundation, Anwar al Awlaki: Pro Al-Qaida
Reasoning about Emotional Contents Following Shocking Terrorist Attacks: A Tale of Three Cities
ERIC Educational Resources Information Center
Blanchette, Isabelle; Richards, Anne; Melnyk, Laura; Lavda, Anastasia
2007-01-01
The authors examined reasoning following the terrorist attacks carried out in London in July 2005. They tested participants in London (United Kingdom), Manchester (United Kingdom), and London (Canada) within 1 week of the attacks and again 6 months later. Participants reasoned about syllogisms of 3 types: neutral, generally emotional, and…
Designating Domestic Terrorist Individuals or Groups
2010-09-01
77 V. STOP HUNTINGDON ANIMAL CRUELTY (SHAC) CASE STUDY: A FOCUS ON THE VULNERABILITIES...designated terrorist SHAC Stop Huntingdon Animal Cruelty SMART Sex Offender Sentencing, Monitoring, Apprehending, Registering, and Tracking SORNA...generalizations (p. 136). The first case study analyzed the activities of an Animal Rights Extremist Group known as Stop Huntingdon Animal Cruelty (SHAC
Code of Federal Regulations, 2013 CFR
2013-07-01
... 31 Money and Finance:Treasury 3 2013-07-01 2013-07-01 false Special information sharing procedures to deter money laundering and terrorist activity for futures commission merchants and introducing brokers in commodities. 1026.520 Section 1026.520 Money and Finance: Treasury Regulations Relating to...
Code of Federal Regulations, 2012 CFR
2012-07-01
... 31 Money and Finance:Treasury 3 2012-07-01 2012-07-01 false Special information sharing procedures to deter money laundering and terrorist activity for futures commission merchants and introducing brokers in commodities. 1026.520 Section 1026.520 Money and Finance: Treasury Regulations Relating to...
Code of Federal Regulations, 2014 CFR
2014-07-01
... 31 Money and Finance:Treasury 3 2014-07-01 2014-07-01 false Special information sharing procedures to deter money laundering and terrorist activity for futures commission merchants and introducing brokers in commodities. 1026.520 Section 1026.520 Money and Finance: Treasury Regulations Relating to...
Code of Federal Regulations, 2011 CFR
2011-07-01
... 31 Money and Finance:Treasury 3 2011-07-01 2011-07-01 false Special information sharing procedures to deter money laundering and terrorist activity for futures commission merchants and introducing brokers in commodities. 1026.520 Section 1026.520 Money and Finance: Treasury Regulations Relating to...
Code of Federal Regulations, 2013 CFR
2013-07-01
... 31 Money and Finance:Treasury 3 2013-07-01 2013-07-01 false Special information sharing procedures to deter money laundering and terrorist activity for money services businesses. 1022.520 Section 1022.520 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) FINANCIAL CRIMES...
Code of Federal Regulations, 2011 CFR
2011-07-01
... 31 Money and Finance:Treasury 3 2011-07-01 2011-07-01 false Special information sharing procedures to deter money laundering and terrorist activity for money services businesses. 1022.520 Section 1022.520 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) FINANCIAL CRIMES...
Code of Federal Regulations, 2014 CFR
2014-07-01
... 31 Money and Finance:Treasury 3 2014-07-01 2014-07-01 false Special information sharing procedures to deter money laundering and terrorist activity for money services businesses. 1022.520 Section 1022.520 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) FINANCIAL CRIMES...
Code of Federal Regulations, 2012 CFR
2012-07-01
... 31 Money and Finance:Treasury 3 2012-07-01 2012-07-01 false Special information sharing procedures to deter money laundering and terrorist activity for money services businesses. 1022.520 Section 1022.520 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) FINANCIAL CRIMES...
Code of Federal Regulations, 2014 CFR
2014-01-01
... to persons designated in or pursuant to Executive Order 13224 (Specially Designated Global Terrorist... persons designated in or pursuant to Executive Order 13224 (Specially Designated Global Terrorist) (SDGT... part 594, the Global Terrorism Sanctions Regulations. OFAC announces the names of persons designated...
Code of Federal Regulations, 2011 CFR
2011-01-01
... to persons designated in or pursuant to Executive Order 13224 (Specially Designated Global Terrorist... persons designated in or pursuant to Executive Order 13224 (Specially Designated Global Terrorist) (SDGT... part 594, the Global Terrorism Sanctions Regulations. OFAC announces the names of persons designated...
Code of Federal Regulations, 2013 CFR
2013-01-01
... to persons designated in or pursuant to Executive Order 13224 (Specially Designated Global Terrorist... persons designated in or pursuant to Executive Order 13224 (Specially Designated Global Terrorist) (SDGT... part 594, the Global Terrorism Sanctions Regulations. OFAC announces the names of persons designated...
Code of Federal Regulations, 2012 CFR
2012-01-01
... to persons designated in or pursuant to Executive Order 13224 (Specially Designated Global Terrorist... persons designated in or pursuant to Executive Order 13224 (Specially Designated Global Terrorist) (SDGT... part 594, the Global Terrorism Sanctions Regulations. OFAC announces the names of persons designated...
Proactive Guide for the Threat of Terrorism in Schools.
ERIC Educational Resources Information Center
Texas School Safety Center, San Marcos.
Although American schools have not been targeted for terrorist activity, circumstances do warrant that schools adopt a heightened state of awareness. This guide addresses the potential for terrorist activity within the context of September 11, 2001, and the new reality America faces. A significant portion of the information in this guide was…
Terrorism in Britain: On the Limits of Free Expression.
ERIC Educational Resources Information Center
Jaehnig, Walter B.
The recent rise in political terrorism has brought to light the conflict between the government's duty to maintain order and the subsequent suspension of the news media's right to report the terrorists' activities to the public. Terrorists recognize that the surest guarantee of publicity for their cause lies in a shocking appeal to traditional…
Federal Register 2010, 2011, 2012, 2013, 2014
2011-07-06
... of Investigation (FBI)/Terrorist Screening Center (TSC) is providing a near real time, synchronized... appropriate clearances or permissions. Retention and disposal: The WLS will maintain a near real time mirror... difficulties they experienced during their travel screening at transportation hubs such as airports and train...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-12-03
... law or regulation, or a suspicious activity related to money laundering, terrorist financing, or other...). \\2\\ The Annunzio-Wylie Anti-Money Laundering Act of 1992 (the Annunzio-Wylie Act), amended the BSA... authorized the sharing of information relating to suspected terrorist or money laundering activities between...
Fears of American Children Following Terrorism
ERIC Educational Resources Information Center
Burnham, Joy J.; Hooper, Lisa M.
2008-01-01
Two months after 9/11, the fears of children and adolescents in Grades 2-12 were examined utilizing the American Fear Survey Schedule for Children and Adolescents (FSSC-AM). Fear intensity scores and age and gender differences are reported. Terrorist-related content on the FSSC-AM (e.g., terrorist attacks, our country being invading by enemies)…
The Theater of Terror: Effects of Press Coverage.
ERIC Educational Resources Information Center
Weimann, Gabriel
1983-01-01
Compared attitudes before and after students read press clippings describing two separate terrorist incidents. Found that students exposed to press coverage tended to consider the event more noteworthy and to call for a solution. Concluded that press attention enhances the status of the people, problem, or cause behind a terrorist event. (PD)
A New Forensic Picture Polygraph Technique for Terrorist and Crime Deception System
ERIC Educational Resources Information Center
Costello, R. H. Brian; Axton, JoAnn; Gold, Karen L.
2006-01-01
The Forensic Terrorist Detection System called Pinocchio Assessment Profile (PAP) employs standard issue polygraphs for a non-verbal picture technique originated as a biofeedback careers interest instrument. The system can be integrated readily into airport screening protocols. However, the method does not rely on questioning or foreign language…
75 FR 55659 - Continuation of the National Emergency With Respect to Certain Terrorist Attacks
Federal Register 2010, 2011, 2012, 2013, 2014
2010-09-13
...), I am continuing for 1 year the national emergency previously declared on September 14, 2001, in Proclamation 7463, with respect to the terrorist attacks of September 11, 2001, and the continuing and... national emergency declared on September 14, 2001, and the powers and authorities adopted to deal with that...
Transnational Crime and the Criminal-Terrorist Nexus: Synergies and Corporate Trends
2004-04-01
Franchising ” .............................................60 iv Shifting Tactics...its size, wealth and global reach. Eurasian organized crime is associated with Russia, Eastern and Central European countries, and the independent ...operation. Not only is that faulty logic, the cost of doing business may be rising for terrorists; similar to a business that expands into franchises
The Rhetorical Genre of Terrorism: Identification and Policy Implications.
ERIC Educational Resources Information Center
Dowling, Ralph E.
Rhetorical critics must examine terrorism to determine what contributions they can make to the understanding of rhetoric and to the evaluation of proposed responses to the terrorist threat. Not only must the rhetorical acts of crusader terrorists be viewed as rhetoric, but they must also be considered a rhetorical genre. This genre, with the…
Toward a psychology of humiliation in asymmetric conflict.
McCauley, Clark
2017-04-01
Humiliation is often cited in attempts to understand the origins of asymmetric conflicts, especially conflicts involving terrorism. This article reviews common usage, expert opinion, and experiences in interpersonal and intergroup conflicts to suggest a construct definition of humiliation as a combination of anger and shame. Following appraisal theory, this definition distinguishes between the situational appraisals associated with humiliation (insult and injury; failure to retaliate) and the emotional experience of humiliation (in which the combination of anger and shame may be more synergism than summation). Research on humiliation has barely begun and focuses on interpersonal relations; a crucial issue is whether interpersonal humiliation is the same experience as the intergroup humiliation salient in accounts of terrorism and terrorists. Also important is the prediction that the targets of terrorist attack will experience humiliation if the terrorists are unknown or unreachable; thus failure to retaliate may humiliate the strong as well as the weak in asymmetric conflict. Better understanding of humiliation may be useful for understanding both terrorist violence and government reactions to this violence. (PsycINFO Database Record (c) 2017 APA, all rights reserved).
Kluger, Yoram; Mayo, Ami; Hiss, Jehuda; Ashkenazi, Eitamar; Bendahan, Jose; Blumenfeld, Amir; Michaelson, Moshe; Stein, Michael; Simon, Daniel; Schwartz, Ivan; Alfici, Ricardo
2005-02-01
Various metal objects added to explosives increase and diversify the wounding from bombing; especially favoured are spherical missiles for their special injuring characteristics. Our objective was to study the medical consequences and ballistic effects on human tissue of spherical metal pellets used in terrorist bombings. The clinical and forensic data of all bodily injured casualties of a suicide terrorist bombing in a crowded hotel dining room were analysed retrospectively. Of the 250 people at the scene, 164 were injured, with 91 (55.5%) suffering bodily injuries; 30 of them died. The immediately deceased had disseminated tissue damage and their bodies were saturated with steel spheres. Thirty-two immediate survivors sustained severe injuries (Injury Severity Score > or =16), and all suffered tissue penetration by the pellets. Twenty-three (32%) underwent surgery and 15 (21%) required intensive care. Metal pellets propelled by the explosion enhanced the secondary pattern of injury and injured even patients remote from the origin. Tissue destruction and specific organ injuries among survivors were limited. To evaluate and manage victims of terrorist bombings properly, medical teams should become familiar with these severe injuries.
The Internet information infrastructure: Terrorist tool or architecture for information defense?
DOE Office of Scientific and Technical Information (OSTI.GOV)
Kadner, S.; Turpen, E.; Rees, B.
The Internet is a culmination of information age technologies and an agent of change. As with any infrastructure, dependency upon the so-called global information infrastructure creates vulnerabilities. Moreover, unlike physical infrastructures, the Internet is a multi-use technology. While information technologies, such as the Internet, can be utilized as a tool of terror, these same technologies can facilitate the implementation of solutions to mitigate the threat. In this vein, this paper analyzes the multifaceted nature of the Internet information infrastructure and argues that policymakers should concentrate on the solutions it provides rather than the vulnerabilities it creates. Minimizing risks and realizingmore » possibilities in the information age will require institutional activities that translate, exploit and convert information technologies into positive solutions. What follows is a discussion of the Internet information infrastructure as it relates to increasing vulnerabilities and positive potential. The following four applications of the Internet will be addressed: as the infrastructure for information competence; as a terrorist tool; as the terrorist`s target; and as an architecture for rapid response.« less
Lone Actor Terrorist Attack Planning and Preparation: A Data-Driven Analysis.
Schuurman, Bart; Bakker, Edwin; Gill, Paul; Bouhana, Noémie
2017-10-23
This article provides an in-depth assessment of lone actor terrorists' attack planning and preparation. A codebook of 198 variables related to different aspects of pre-attack behavior is applied to a sample of 55 lone actor terrorists. Data were drawn from open-source materials and complemented where possible with primary sources. Most lone actors are not highly lethal or surreptitious attackers. They are generally poor at maintaining operational security, leak their motivations and capabilities in numerous ways, and generally do so months and even years before an attack. Moreover, the "loneness" thought to define this type of terrorism is generally absent; most lone actors uphold social ties that are crucial to their adoption and maintenance of the motivation and capability to commit terrorist violence. The results offer concrete input for those working to detect and prevent this form of terrorism and argue for a re-evaluation of the "lone actor" concept. © 2017 The Authors. Journal of Forensic Sciences published by Wiley Periodicals, Inc. on behalf of American Academy of Forensic Sciences.
Hunter, Samuel T; Shortland, Neil D; Crayne, Matthew P; Ligon, Gina S
2017-04-01
For many terrorist organizations, also known as violent extremist organizations (VEOs), their ability to perpetuate violence is often contingent upon successful recruitment and selection of organizational members. Although academic work on terrorist recruitment and selection has improved in recent years, researchers have generally focused more heavily on aspects of radicalization rather than organization attraction and entry. Moreover, a number of terrorism scholars have lamented the lack of conceptual frameworks with which to interpret and extend findings linked to recruitment and selection, specifically. In light of these difficulties, we propose that considering literature bases outside of terrorism may be useful in extending lines of inquiry and offering alternative ways of thinking about how terrorist organizations operate. Specifically, we draw on Industrial and Organizational Psychology, Human Resource Management, and Organizational Behavior literature bases to offer alternative and extended modes of thought on terrorist recruitment and selection. In doing so, we believe both terrorism and more traditional organizational scholars can make substantive and novel contributions to future investigations of increasingly pressing issues surrounding violent extremism. (PsycINFO Database Record (c) 2017 APA, all rights reserved).
The Threat Among Us: Insiders Intensify Aviation Terrorism
DOE Office of Scientific and Technical Information (OSTI.GOV)
Krull, Katie E.
Aviation terrorism is powerful and symbolic, and will likely remain a staple target for terrorists aiming to inflict chaos and cause mass casualties similar to the 9/11 attacks on the U.S. The majority of international and domestic aviation terrorist attacks involves outsiders, or people who do not have direct access to or affiliation with a target through employment. However, several significant attacks and plots against the industry involved malicious employees motivated by suicide or devotion to a terrorist organization. Malicious insiders’ access and knowledge of aviation security, systems, networks, and infrastructure is valuable to terrorists, providing a different pathway formore » attacking the industry through the insider threat. Indicators and warnings of insider threats in these cases exist, providing insight into how security agencies, such as the Transportation Security Administration, can better predict and identify insider involvement. Understanding previous aviation insider threat events will likely aid in stimulating proactive security measures, rather than reactive responses. However, similar to traditional airport security measures, there are social, political, and economic challenges in protecting against the insider threat, including privacy concerns and cost-benefit analysis.« less
La neurobrucellose: une cause curable de surdité neurosensorielle à ne pas méconnaitre
Malhi, Alae Bezzari; Ridal, Mohamed; Bouchal, Siham; Belahsen, Mohammed Faouzi; El Alami, Mohamed-Nourdine
2015-01-01
La brucellose est une zoonose ubiquitaire touchant en particulier les pays méditerranéens et le Moyen-Orient. Les manifestations neurologiques sont assez diverses. Nous rapportons l'observation d'un patient âgé de 45 ans, agriculteur, ayant consulté pour une surdité profonde bilatérale depuis 2 mois associée à des céphalées, des épisodes d'hémiparésie à bascule, de trouble de langage, spontanément résolutifs en quelques minutes et des sensations vertigineuses intermittentes depuis 09 mois. Les résultats de la ponction lombaire, de l'imagerie par résonnance magnétique et surtout la sérologie ont permis de conclure à une neurobrucellose. L’évolution sous bi-antibiothérapie a été favorable, avec régression des signes neurologiques, normalisation du LCR et amélioration de la surdité. La neurobrucellose est une affection grave dont le pronostic dépend de la précocité du diagnostic et du traitement. Nous pensons qu'un tableau clinique associant une surdité neurosensorielle et une symptomatologie neurologique progressive doit évoquer en premier une neurobrucellose, d'autant plus que le patient est à risque et dans les pays où cette maladie est endémique. PMID:26889303
Jaafoura, Neirouz Ghannouchi; Thaljaoui, Wathek; Atig, Amira; Bouker, Ahmed; Khalifa, Mabrouk; Bahri, Fathi
2014-01-01
La granulomatose avec polyangéite, est une vascularite systémique rare qui touche avec prédilection les voies aériennes supérieures, les poumons et les reins. L'atteinte cutanéo-muqueuse ainsi que l'atteinte digestive ne sont pas inhabituelles mais elles sont rarement inaugurales de la maladie. Nous rapportons l'observation d'une femme âgée de 57 ans, ayant une granulomatose avec polyangéite multi-systémique avec comme premières manifestations une atteinte cutanéo-muqueuse à type de nécrose de la langue et d'ulcérations péri-anales ainsi que des rectorragies. La présence de signes radiologiques orientant vers une hémmorragie intra-alvéolaire, l'atteinte rénale, l'atteinte neurologique périphérique ainsi que la positivité des C-ANCA de type anti-PR3 ont permis de rattacher les manifestations dermatologiques à cette vascularite. Des manifestations cutanéo-muqueuses atypiques, au cours d'une granulomateuse avec polyangéite, doivent être connues par le clinicien pour un diagnostic et une prise en charge adéquate. PMID:25404981
Anévrisme de l'artère fémorale superficielle lié à une infection à salmonelle
Mrad, Melek Ben; Hammamia, Mohammed Ben; Miri, Rim; Derbel, Bilel; Koubaa, Mohammed Ali; Ziadi, Jalel; Khayati, Adel
2015-01-01
Les anévrismes infectieux de l'axe fémoro-poplité sont rares et d’évolution silencieuse. Ils surviennent surtout chez les sujets immunodéprimés. Leur traitement fait appel souvent à l'exclusion chirurgicale associée ou non à un geste de revascularisation. Nous rapportons le cas d'un patient opéré pour un anévrisme de l'artère fémorale superficielle, lié à une infection à salmonelle, il a eu une résection de l'anévrysme et une revascularisation par greffe veineuse. Ce patient a été repris par la suite à deux reprise pour rupture du greffon veineux. Pour cette raison, nous étions contraints à une explantation du pontage et une ligature des 2 bouts de l'artère sans revascularisation. Malgré l'absence de revascularisation, l’évolution a été favorable sous couverture d'une une antibiothérapie adaptée. En cas d'anévrysme infectieux de l'axe fémoro-poplité par infection à salmonelle, le rétablissement de la continuité artérielle, même avec un greffon veineux, peut exposer au risque de rupture artérielle. PMID:26955409
Kystes de l'ovaire: score échographique de malignité
Dimassi, Kaouther; Bettaieb, Hajeur; Derbel, Mohammed; Triki, Amel; Gara, Mohammed Faouzi
2014-01-01
Les kystes de l'ovaire constituent l'un des motifs les plus fréquents de consultation en gynécologie. L’étape diagnostique repose principalement sur l’échographie. Nous proposons dans ce travail un score échographique reproductible prédictif de malignité. Nous évaluons la fiabilité de ce score après confrontations des données échographiques et histologiques. Il s'agit d'une étude rétrospective réalisée sur une période de 3 ans. Nous avons élaboré un score basé sur les signes échographiques décrits dans la littérature comme prédictifs de malignité et avons classé les examens échographiques préopératoires selon leurs scores respectifs. Les données échographiques étaient comparées aux résultats histologiques et un seuil prédictif de malignité a été déterminé pour le score adopté. 150 patientes ont été colligées. Les deux signes échographiques les plus prédictifs de malignité étaient: les végétations endo-kystiques, avec une Valeur Prédictive Positive (VPP) à 86,67% et une Valeur Prédictive Négative (VPN) à 100%, et le caractère vascularisé au Doppler couleur avec une VPP à 72,52% et une VPN à 100%. Le seuil retenu pour le score proposé était de 6 avec une spécificité de 100%, une sensibilité de 100%, une VPP de 100% et une VPN de 100%. L’échographie joue un rôle décisif dans la conduite à tenir devant une masse ovarienne. Seul un faisceau d'arguments permet d’évoquer la malignité lors de l'examen échographique. L'utilisation de scores basés sur des signes simples, reproductibles augmente la valeur diagnostique de l’échographie en matière de malignité. PMID:25419341
Tayfur, İsmail; Afacan, Mustafa Ahmet; Erdoğan, Mehmet Özgür; Çolak, Şahin; Söğüt, Özgür; Genç Yavuz, Burcu; Bozan, Korkut
2018-01-01
A coup attempt against the government took place in Turkey on July 15, 2016. This attempt caused serious injuries and deaths in the country. In this study, the data of patients referred to all hospitals in Istanbul during the attempt were evaluated, and differences between natural disasters, other terrorist actions, and coup attempts were analyzed. In total, 1104 patients were injured in the abovementioned coup attempt. In this study, the demographic and health information of 882 coup victims who were admitted to all hospitals (state and private) in Istanbul on July 15 and 16, 2016 and registered at the Crisis Center of Istanbul Provincial Health Directorate was analyzed. Of the 882 patients evaluated, 97.27% were male and 2.73% were female. The mean age of the patients was 34.12 years. Most (82.43%) patients were admitted to state hospitals, and 17.57% were admitted to private hospitals. The total mortality rate due to the abovementioned coup attempt was 10.4% (9.76% in state hospitals and 13.54% in private hospitals). Of the 882 patients evaluated, 65.07% had gunshot injuries, 11.11% had been assaulted, 7.70% had experienced tank/motor vehicle accidents, 5.44% had other penetrating injuries, 5.32% had soft-tissue trauma, 2.83% had experienced falls (including falls from heights), 0.33% had psychiatric disorders, and 2.15% were admitted for other reasons. The patterns of injury and mortality resulting from the July 15, 2016 coup attempt differed from those resulting from natural disasters and terrorist acts and were similar to those encountered during wars: the victims were predominantly male, similar to those in wars. Following a coup attempt, an increase in the number of patients with post-traumatic stress disorder can be expected. Further studies focusing on the incidence of this disorder due to the abovementioned coup attempt in Turkey are needed. Hospital disaster plans need to include information and plans related to terrorist acts, such as coup attempts.
New early Pleistocene hominin teeth from the Swartkrans Formation, South Africa.
Pickering, Travis Rayne; Heaton, Jason L; Sutton, Morris B; Clarke, Ron J; Kuman, Kathleen; Senjem, Jess Hutton; Brain, C K
2016-11-01
We describe 14 hominin teeth and tooth fragments excavated recently from Swartkrans Cave (South Africa). The fossils derive from Members 1 (Lower Bank) and 3, from the Member 2/3 interface and from two deposits not yet assigned to member (the "Talus Cone Deposit" and the "Underground North Excavation" [UNE]) of the Swartkrans Formation, and include the first hominin fossil from the UNE, the two smallest Paranthropus robustus deciduous maxillary second molars in the entire hominin fossil record, and one of the smallest P. robustus permanent maxillary second molars from Swartkrans. The small permanent molar is accompanied by another tooth from a different individual but from the same stratigraphic level of the Swartkrans Formation; this second tooth is among, if not, the largest P. robustus permanent maxillary first molars known from anywhere-lending credence to assertions that degrees of body size sexual dimorphism previously ascribed to this species may be underestimated. It is more equivocal whether this evidence also supports hypotheses proposing that P. robustus assemblages from Swartkrans (as well as those from other South African cave sites) formed through the taphonomically biasing actions of large carnivores. Copyright © 2016 Elsevier Ltd. All rights reserved.
NASA Astrophysics Data System (ADS)
Régipa, R.
A partir d'une théorie sur la détermination des formes et des contraintes globales d'un ballon de révolution, ou s'en rapprochant, une nouvelle famille de ballons a été définie. Les ballons actuels, dits de ``forme naturelle'', sont calculés en général pour une tension circonférencielle nulle. Ainsi, pour une mission donnée, la tension longitudinale et la forme de l'enveloppe sont strictement imposées. Les ballons de la nouvelle génération sont globalement cylindriques et leurs pôles sont réunis par un câble axial, chargé de transmettre une partie des efforts depuis le crochet (pôle inférieur), directement au pôle supérieur. De plus, la zone latérale cylindrique est soumise à un faible champ de tensions circonférencielles. Ainsi, deux paramètres permettent de faire évoluer la distribution des tensions et la forme de l'enveloppe: - la tension du câble de liaison entre pôles (ou la longueur de ce câble) - la tension circonférencielle moyenne désirée (ou le rayon du ballon). On peut donc calculer et réaliser: - soit des ballons de forme adaptée, comme les ballons à fond plat pour le bon fonctionnement des montgolfières infrarouge (projet MIR); - soit des ballons optimisés pour une bonne répartition des contraintes et une meilleure utilisation des matériaux d'enveloppe, pour l'ensemble des programmes stratosphériques. Il s'ensuit une économie sensible des coûts de fabrication, une fiabilité accrue du fonctionnement de ces ballons et une rendement opérationnel bien supérieur, permettant entre autres, d'envisager des vols à très haute altitude en matériaux très légers.
Hull, Mark; Giguère, Pierre; Klein, Marina; Shafran, Stephen; Tseng, Alice; Côté, Pierre; Poliquin, Marc; Cooper, Curtis
2014-01-01
HISTORIQUE : De 20 % à 30 % des Canadiens qui vivent avec le VIH sont co-infectés par le virus de l’hépatite C (VHC), lequel est responsable d’une morbidité et d’une mortalité importantes. La prise en charge du VIH et du VHC est plus complexe en raison de l’évolution accélérée de la maladie hépatique, du choix et des critères d’initiation de la thérapie antirétrovirale et du traitement anti-VHC, de la prise en charge de la santé mentale et des toxicomanies, des obstacles socioéconomiques et des interactions entre les nouvelles thérapies antivirales à action directe du VHC et les antirétroviraux OBJECTIF : Élaborer des normes nationales de prise en charge des adultes co-infectés par le VHC et le VIH dans le contexte canadien. MÉTHODOLOGIE : Le Réseau canadien pour les essais VIH des Instituts de recherche en santé du Canada a réuni un groupe d’experts possédant des compétences cliniques en co-infection par le VIH et le VHC pour réviser les publications à jour ainsi que les lignes directrices et les protocoles en place. Après une vaste sollicitation afin d’obtenir des points de vue, le groupe de travail a approuvé des recommandations consensuelles, qu’il a caractérisées au moyen d’une échelle de qualité des preuves fondée sur la classe (bienfaits par rapport aux préjudices) et sur la catégorie (degré de certitude). RÉSULTATS : Toutes les personnes co-infectées par le VIH et le VHC devraient subir une évaluation en vue de recevoir un traitement du VHC. Les personnes qui ne sont pas en mesure d’entreprendre un traitement du VHC devraient être soignées pour le VIH afin de ralentir l’évolution de la maladie hépatique. La norme de traitement du VHC de génotype 1 est un régime comprenant de l’interféron pégylé et de la ribavirine dosée en fonction du poids, associés à un inhibiteur de la protéase du VHC. Pour les génotypes 2 ou 3, une bithérapie classique est recommandée pendant 24 semaines s’il y a clairance virologique à la semaine 4 ou, pour les génotypes 2 à 6, à 48 semaines. On peut envisager de reporter le traitement chez les personnes ayant une maladie hépatique légère. Le VIH ne devrait pas être considéré comme un obstacle à la transplantation hépatique chez les patients co-infectés. EXPOSÉ : Les recommandations ne se substituent pas au jugement clinique personnel. PMID:24634688
Lignes directrices canadiennes sur la rhinosinusite bactérienne aiguë
Kaplan, Alan
2014-01-01
Résumé Objectif Faire un résumé clinique des lignes directrices canadiennes sur la rhinosinusite bactérienne aiguë (RSBA) qui présente des éléments d’intérêt pour les médecins de famille. Source des données Les auteurs des lignes directrices ont effectué une recherche documentaire systématique et ont rédigé des recommandations. Une cote a été donnée à la fois en fonction de la fiabilité des données probantes et de la solidité des recommandations. On a sollicité les commentaires d’experts en la matière venant de l’extérieur, ainsi que l’aval de sociétés médicales canadiennes (Association pour la microbiologie médicale et l’infectiologie Canada, Société canadienne d’allergie et d’immunologie clinique, Société canadienne d’otorhinolaryngologie et de chirurgie cervicofaciale, Association canadienne des médecins d’urgence et Regroupement canadien des médecins de famille en santé respiratoire). Message principal Le diagnostic de la RSBA repose sur la présence de symptômes particuliers et leur durée; l’imagerie ou une culture n’est pas nécessaire dans les cas peu compliqués. Le traitement dépend de la gravité des symptômes, notamment avec des corticostéroïdes intranasaux (CSIN) recommandés comme monothérapie pour les cas de légers à modérés, quoique leurs bienfaits soient modestes. Le recours à des CSIN accompagnés d’antibiotiques est réservé aux patients qui ne répondent pas aux CSIN après 72 heures et comme traitement initial des patients dont les symptômes sont graves. Le choix de l’antibiotique doit tenir compte du pathogène soupçonné, du risque de résistance, des problèmes concomitants et des tendances locales de la résistance aux antimicrobiens. Des thérapies d’appoint comme l’irrigation nasale avec une solution saline sont recommandées. En présence de cas réfractaires au traitement, d’épisodes récurrents et de signes de complications, on devrait demander une consultation en otorhinolaryngologie. Les lignes directrices portent sur les situations particulières à l’environnement canadien des soins de santé, y compris les actions à prendre durant les périodes d’attente prolongées pour avoir une consultation avec un spécialiste ou une imagerie. Conclusion Les lignes directrices canadiennes offrent des recommandations à jour pour le diagnostic et le traitement de la RSBA qui tiennent compte de la compréhension en évolution de la maladie. De plus, les lignes directrices présentent des outils utiles pour aider les cliniciens à cerner les épisodes viraux par opposition à ceux d’origine bactérienne, ainsi qu’à prendre en charge de manière optimale leurs patients atteints de RSBA.
La perforation stercorale du côlon: à propos d'un cas et revue de la littérature
Mahmoudi, Ammar; Maâtouk, Mezri; Noomen, Faouzi; Nasr, Mohamed; Zouari, Khadija; Hamdi, Abdelaziz
2015-01-01
Affection rare, la perforation stercorale du côlon touche des malades âgés souvent fragiles ayant une longue histoire de constipation chronique et sévère. Elle constitue une urgence chirurgicale dont le pronostic, souvent sombre, dépend du terrain et de la rapidité de la prise en charge. Nous rapportons le cas d'une perforation stercorale du côlon survenu chez une patiente âgée de 74 ans. La symptomatologie clinique était celle d'une péritonite aiguë évoluant depuis quatre jours. Le diagnostic n’était posé qu'en peropératoire. Le geste avait consisté en une intervention de Hartmann. Les suites étaient malheureusement marquées par un état de choc septique résistant aboutissant au décès de la patiente à J 2 postopératoire. Le diagnostic de perforation stercorale du côlon, souvent difficile et retardé, doit être connu par tous les médecins qui prennent en charge une population de patients de plus en plus âgés. PMID:26958112
Tuberculose pariétale compliquée d’embolie pulmonaire
Bopaka, Regis Gothard; Bemba, Presley Lee Esthel; Janah, Hind; Okombi, Franck Hardain Okemba; Jabri, Hasna; Khattabi, Wiam El; Afif, Hicham
2017-01-01
La tuberculose est une maladie infectieuse qui reste fréquente dans les pays en développement. La localisation peut être pulmonaire ou extra-pulmonaire. Cette forme extra-pulmonaire pose un grand problème diagnostique. Nous rapportons le cas d'un patient présentant une embolie pulmonaire révélant une tuberculose pariétale. A travers cette observation, nous soulignons la nécessité de rechercher l'étiologie devant une embolie pulmonaire. PMID:28819528
Airframe/Propulsion Interference
1975-03-01
elancee, en incidence, est prcsenic figure 14. L’intrados se caracterise par une divergence des lignes dc courant, et par une reducti.in ’es nombres...ale de la zone dissipative en R et A/S une fonction du nombre de Hach au recollement Mq et d’un parametre de forme Hiq caracterisant le...extralte d’une Etude expE- rimentale prEsentEe rEf. [13]. Bile se caractErise par un elancement assez important et un rapport de tronoature ft^ /\\M.t
Torsion d'annexe au second trimestre de la grossesse, à propos de deux cas
Ayachi, Amira; Blel, Zeineb; Khelifa, Nahed; Mkaouer, Lassaad; Bouchahda, Rim; Mourali, Mechaal
2016-01-01
Les douleurs pelviennes aigues pendant la grossesse peuvent poser un problème de diagnostic différentiel.Nous rapportons deux cas de torsion d'annexes au deuxième trimestre de la grossesse afin d'attirer l'attention sur ce diagnostic, dont seule une prise en charge précoce permet d'éviter des lésions irréversibles dues à l'ischémie, pouvant mettre en jeu le pronostic ultérieur de fertilité. La première patiente, G1P0, enceinte à 20 SA, s'est présenté initialement pour un syndrome appendiculaire. Une incision de Mac Burney, au cours de l'exploration, a montré un ovaire droit nécrosé et une ovariectomie a été faite. Les suites post opératoires étaient simples. La seconde patiente, G2P2, s'est présenté aux urgences avec des douleurs aigues de la fosse iliaque gauche à 26 SA. La laparotomie a mis en évidence une torsion d'une hydatide de Morgani, dont l'aspect nécrosé dû à une torsion, a orienté vers une ablation de l'hydatide. Pour les deux patientes, aucune complication postopératoire n'a été relevée. La torsion d'annexe est une urgence à ne pas méconnaître devant toute douleur pelvienne aigue chez la femme enceinte. Le traitement conservateur est actuellement le gold standard et une prise en charge appropriée est nécessaire pour éviter d'éventuelles complications maternelles et fœtales. PMID:28292076
Les Cicatrices Retractiles Post-Brulures Du Membre Inferieur Chez L’Enfant
Sankale, A.A.; Manyacka Ma Nyemb, P.; Coulibaly, N.F.; Ndiaye, A.; Ndoye, M.
2010-01-01
Summary Il s'agit d'une étude faisant ressortir les aspects épidémiologiques, cliniques et thérapeutiques des séquelles de brûlures du membre inférieur chez l'enfant, à propos de 42 cas colligés au service de chirurgie infantile de l'Hôpital Aristide Le Dantec (Sénégal). L'âge moyen retrouvé est de 5 ans et 3 mois, et le sex-ratio garçons/filles de 1,8/1. La brûlure thermique est causée par une flamme dans 33% des cas, par un liquide chaud dans 21% des cas, et par des braises dans 21% des cas. Les cicatrices rétractiles intéressent le genou et le creux poplité dans 47% des cas et le pied dans 45% des cas. Elles sont bilatérales dans 21% des cas, et concernent une autre localisation associée dans 21% des cas. Quant aux brides, 21% ont bénéficié d'une chirurgie, avec un délai moyen de 3 ans et 2 mois après la brûlure. Cette procédure chirurgicale consiste en une plastie en Z dans 91% des cas, à laquelle est associée une greffe de peau dans 54% des cas. Une rééducation fonctionnelle est pratiquée chez 54% des opérés. Parallèlement aux données de la littérature, nos résultats montrent que l'optimisation de la prise en charge passe par une meilleure prévention des accidents domestiques et une bonne codification thérapeutique. PMID:21991202
Shear-wave elastography: a new potential method to diagnose ulnar neuropathy at the elbow.
Paluch, Łukasz; Noszczyk, Bartłomiej; Nitek, Żaneta; Walecki, Jerzy; Osiak, Katarzyna; Pietruski, Piotr
2018-06-01
The primary aim of this study was to verify if shear-wave elastography (SWE) can be used to diagnose ulnar neuropathy at the elbow (UNE). The secondary objective was to compare the cross-sectional areas (CSA) of the ulnar nerve in the cubital tunnel and to determine a cut-off value for this parameter accurately identifying persons with UNE. The study included 34 patients with UNE (mean age, 59.35 years) and 38 healthy controls (mean age, 57.42 years). Each participant was subjected to SWE of the ulnar nerve at three levels: in the cubital tunnel (CT) and at the distal arm (DA) and mid-arm (MA). The CSA of the ulnar nerve in the cubital tunnel was estimated by means of ultrasonographic imaging. Patients with UNE presented with significantly greater ulnar nerve stiffness in the cubital tunnel than the controls (mean, 96.38 kPa vs. 33.08 kPa, p < 0.001). Ulnar nerve stiffness of 61 kPa, CT to DA stiffness ratio equal 1.68, and CT to MA stiffness ratio of 1.75 provided 100% specificity, sensitivity, positive and negative predictive value in the detection of UNE. Mean CSA of the ulnar nerve in the cubital tunnel turned out to be significantly larger in patients with UNE than in healthy controls (p < 0.001). A weak positive correlation was found in the UNE group between the ulnar nerve CSA and stiffness (R = 0.31, p = 0.008). SWE seems to be a promising, reliable and simple quantitative adjunct test to support the diagnosis of UNE. • SWE enables reliable detection of cubital tunnel syndrome • Significant increase of entrapped ulnar nerve stiffness is observed in UNE • SWE is a perspective screening tool for early detection of compressive neuropathies.
Mesure optimale de tilt et déplacement d'un faisceau gaussien
NASA Astrophysics Data System (ADS)
Delaubert, V.; Treps, N.; Fabre, C.; Harb, C.; Lam, P. K.; Bachor, H.
2006-10-01
Nous réalisons une expérience de mesure optimale de petits déplacements d'un faisceau gaussien TEM{00}, basée sur une détection homodyne employant un oscillateur local TEM{10}. Nous montrons une amélioration de 56% du signal détecté par rapport à une détection à deux zones. Ce nouveau dispositif permet également de mesurer de façon optimale de petites valeurs de tilt, la quantité conjuguée du déplacement. Enfin, nous montrons que la compression du mode TEM{10} du faisceau incident permet une mesure de déplacement au delà de la limite quantique standard.
Attention and Memory in School-Age Children Surviving the Terrorist Attack in Beslan, Russia
ERIC Educational Resources Information Center
Scrimin, Sara; Moscardino, Ughetta; Capello, Fabia; Axia, Giovanna
2009-01-01
Little is known about the impact of terrorism on children's cognitive functioning and school learning. The primary purpose of this study was to report on cognitive functioning among school-age children 20 months after a terrorist attack against their school. Participants included 203 directly and indirectly exposed children from Beslan and 100…
Local monitoring of post-treatment drinking water using bench-top mass spectrometers could identify target compounds in a mass spectral library. However, a terrorist might seek to incite greater hysteria by injecting or infusing a mixture of unanticipated compounds of unknown tox...
Probabilistic Ontology Architecture for a Terrorist Identification Decision Support System
2014-06-01
in real-world problems requires probabilistic ontologies, which integrate the inferential reasoning power of probabilistic representations with the... inferential reasoning power of probabilistic representations with the first-order expressivity of ontologies. The Reference Architecture for...ontology, terrorism, inferential reasoning, architecture I. INTRODUCTION A. Background Whether by nature or design, the personas of terrorists are
2013-06-13
Security 2009, 4). Additionally, CBP is the component within the DHS that serves as America’s first line of defense to detect and prevent terrorist and...especially smugglers of humans and drugs. The USBP’s concentration of efforts and resources shifted to preventing terrorists and their weapons from
Military Review. March-April 2004
2004-04-01
sophisticated organized crime syndicates are all becoming more capable and more dangerous. Satisfactorily offsetting the hazards of each, individu...that range from rising regional powers to terrorist move ments and irresponsible regimes unbounded by ac cepted restraints governing international...terrorists, and even sophisticated organized crime syndicates are all becoming more capable and more dangerous. Satisfactorily offsetting the hazards
2015-09-01
higher-risk immigrants known as special interest aliens (SIAs) from some 35 countries of interest in the Middle East, North Africa, and Asia where...terrorist organizations operate. Yet ineffectiveness and episodic targeting are indicated, in part by continued migration from those countries to the U.S
Targeting Terrorist Leaders: A Case Study
2011-03-01
PRESSURE .................................38 IV. STATISTICAL ANALYSIS ON ISRAELI LEADERSHIP TARGETING ...43 V. CONCLUSION: HAVE ISRAELI ATTEMPTS TO...organization. D. POTENTIAL WEAKNESSES The use of one case to evaluate the efficacy of the terrorist-leadership targeting model is problematic...times who was in charge. In addition, the literature on Hamas is widely split on the role that inspirational leaders had on operational matters
1988-11-01
Formed 1975. Estimated Membership Unknown. Headquarters Unknown. Area of Operations Worldwide. Leadership ASALA-RM: Monte Melkonian. ASALA-M: Hagop...release. Black Sea are. Stan ulSOVIEIT UNION ®ANKARA ~ Ararat TURKEY Moditerroneen Sea LES- BEIRUT ’ . Historic area claimed by Armenian terrorists...Lima, Peru. - Leadership Ernesto Montes Aliaga (AKA Raul Perez). Other Names Movimiento Revolucionario Tupac Amaru (original language). Armed members of
Code of Federal Regulations, 2014 CFR
2014-07-01
... 31 Money and Finance:Treasury 3 2014-07-01 2014-07-01 false Special information sharing procedures to deter money laundering and terrorist activity for loan or finance companies. 1029.520 Section 1029.520 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) FINANCIAL CRIMES...
Code of Federal Regulations, 2012 CFR
2012-07-01
... 31 Money and Finance:Treasury 3 2012-07-01 2012-07-01 false Special information sharing procedures to deter money laundering and terrorist activity for loan or finance companies. 1029.520 Section 1029.520 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) FINANCIAL CRIMES...
Code of Federal Regulations, 2013 CFR
2013-07-01
... 31 Money and Finance:Treasury 3 2013-07-01 2013-07-01 false Special information sharing procedures to deter money laundering and terrorist activity for loan or finance companies. 1029.520 Section 1029.520 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) FINANCIAL CRIMES...
Bringing the Meaning Back In: Exploring Existentially Motivated Terrorism
2016-06-01
approaches, radicalization theory examines terrorists with a multidisciplinary integration of psychology and rational choice along pathways and processes...Individual psychological traits or abnormalities combine with upbringing and environment to lead an individual down a path toward violence. It is...profiles of individual terrorists finds but one commonality— their essential normalness.56 Explaining terrorism though abnormal psychology is
Western Radicalization: Rethinking the Psychology of Terrorism
2017-03-01
individual is susceptible to radicalization. As Clark McCauley describes, “The psychology behind terrorist violence is normal psychology , abnormal ...behind terrorist violence is normal psychology , abnormal only in the intensity of the group dynamics that link cause with comrades.”65 Nevertheless... psychology , abnormal only in the intensity of the group dynamics that link 249 Anne Manne, The Life
Federal Register 2010, 2011, 2012, 2013, 2014
2011-07-21
... international terrorism.'' \\1\\ In addition, the Secretary is authorized to impose anti-money laundering (``AML... the MSB from being used to facilitate money laundering and the financing of terrorist activities; \\7... businesses posed a high risk of money laundering and terrorist financing. In 2006, FinCEN issued an advance...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-07-25
... DEPARTMENT OF STATE [Public Notice 8390] Designation of Bulut Yayla, AKA: Samet Ince as a Specially Designated Global Terrorist Pursuant to Section 1(b) of Executive Order 13224, as Amended Acting under the authority of and in accordance with section 1(b) of Executive Order 13224 of September 23...
Terrorist Financing: The 9/11 Commission Recommendation
2005-02-25
thing we didn’t do effectively is follow the money . That’s what we have to do.”6 While the goals of freezing terrorist funds and tracking them for...under President Bill Clinton, “There is a big ideological divide right now between the asset freezers and the people who want to follow the money as it
The effects of terrorism on teens' perceptions of dying: the new world is riskier than ever.
Halpern-Felsher, Bonnie L; Millstein, Susan G
2002-05-01
Adolescents assessed after the September 11, 2001 terrorist attacks perceived the risk of dying from general causes, a tornado, and an earthquake as dramatically higher than did adolescents assessed years before the attacks. Adolescents' heightened perceptions of vulnerability to death extended beyond the terrorist acts, and generalized to unrelated risks.
Cyber Terrorism: A Study of the Extent of Coverage in Computer Security Textbooks
ERIC Educational Resources Information Center
Prichard, Janet J.; MacDonald, Laurie E.
2004-01-01
On September 11th, 2001 the United States experienced the largest terrorist attack in its history. This event caused many government agencies to review their security practices and procedures. It also has raised awareness of other avenues that terrorists might pursue to achieve their goals, including cyber terrorism. Cyber terrorism can be…
JPRS Report, Near East & South Asia
1989-01-05
in the field of war production reflects on civilian activity . Success in producing a satellite-carrying rocket could serve the civilian...sives for use in their terrorist operations against the citizens and the police. Among the strange activities of the terrorists is the formation of...responsible in the field . He has his jail and his court system . We do not interfere.
ERIC Educational Resources Information Center
Halberstadt, Amy G.; Thompson, Julie A.; Parker, Alison E.; Dunsmore, Julie C.
2008-01-01
To assess relationships between parental socialization of emotion and children's coping following an intensely emotional event, parents' beliefs and behaviours regarding emotion and children's coping strategies were investigated after a set of terrorist attacks. Parents (n = 51) filled out the Parents' Beliefs about Negative Emotions questionnaire…