WorldWideScience

Sample records for air terrorist acts

  1. Defender's Edge: Utilizing Intelligent Agent Technology to Anticipate Terrorist Acts

    National Research Council Canada - National Science Library

    Scheiber, Lane

    2003-01-01

    ...), to the problem of anticipating terrorist acts. Two areas in which IAs could play a significant role are in the development and maintenance of a real-time picture of terrorist activity, and in predicting potential occurrences of terrorist acts...

  2. Air traffic security act unconstitutional

    International Nuclear Information System (INIS)

    Heller, W.

    2006-01-01

    In the interest of more effective protective measures against terrorist attacks, the German federal parliament inter alia added a clause to the Air Traffic Security Act (Sec. 14, Para. 3, Air Traffic Security Act) empowering the armed forces to shoot down aircraft to be used as a weapon against human lives. In Germany, this defense possibility has been discussed also in connection with deliberate crashes of hijacked aircraft on nuclear power plants. The 1 st Division of the German Federal Constitutional Court, in its decision of February 15, 2006, ruled that Sec. 14, Para. 3, Air Traffic Security Act was incompatible with the Basic Law and thus was null and void (file No. 1 BvR 357/05) for two reasons: - There was no legislative authority on the part of the federal government. - The provision was incompatible with the basic right of life and the guarantee of human dignity as enshrined in the Basic Law. (orig.)

  3. Motives of terrorist acts

    Directory of Open Access Journals (Sweden)

    Krstić Marko

    2015-01-01

    Full Text Available Terrorism is a relatively new phenomenon, and data on terrorist motivations and psychological profiles of terrorists are fairly scarce and limited. In theory, there is a large number of quantitative analyses of collective violence, murder, and crime, however, none of these can be identified with terrorism. Most current studies do not consider a great heterogeneity of terrorists, and numerous practical, conceptual, and psychological barriers slow down the science of learning about terrorism. Psychology, as a science of behavior, certainly makes a great contribution to the study of terrorism as a very complex phenomenon. The aim of this paper is to analyze and synthesize social and psychological determinants which contribute to the development of terrorist motives, and to elaborate on those facts which have been discussed in scientific and professional literature so far.

  4. Air traffic security act unconstitutional; Luftsicherheitsgesetz verfassungswidrig

    Energy Technology Data Exchange (ETDEWEB)

    Heller, W.

    2006-05-15

    In the interest of more effective protective measures against terrorist attacks, the German federal parliament inter alia added a clause to the Air Traffic Security Act (Sec. 14, Para. 3, Air Traffic Security Act) empowering the armed forces to shoot down aircraft to be used as a weapon against human lives. In Germany, this defense possibility has been discussed also in connection with deliberate crashes of hijacked aircraft on nuclear power plants. The 1{sup st} Division of the German Federal Constitutional Court, in its decision of February 15, 2006, ruled that Sec. 14, Para. 3, Air Traffic Security Act was incompatible with the Basic Law and thus was null and void (file No. 1 BvR 357/05) for two reasons: - There was no legislative authority on the part of the federal government. - The provision was incompatible with the basic right of life and the guarantee of human dignity as enshrined in the Basic Law. (orig.)

  5. TERRITORIAL RISK ASSESMENT AFTER TERRORIST ACT: EXPRESS MODEL

    Directory of Open Access Journals (Sweden)

    M. M. Biliaiev

    2018-02-01

    Full Text Available Purpose. The paper involves the development of a method to assess the territorial risk in the event of a terrorist attack using a chemical agent. Methodology. To describe the process of chemical agent scattering in the atmosphere, ejected in the event of a terrorist attack, the equation of mass transfer of an impurity in atmospheric air is used. The equation takes into account the velocity of the wind flow, atmospheric diffusion, the intensity of chemical agent emission, the presence of buildings near the site of the emission of a chemically hazardous substance. For numerical integration of the modeling equation, a finite difference method is used. A feature of the developed numerical model is the possibility of assessing the territorial risk in the event of a terrorist attack under different weather conditions and the presence of buildings. Findings. A specialized numerical model and software package has been developed that can be used to assess the territorial risk, both in the case of terrorist attacks, with the use of chemical agents, and in case of extreme situations at chemically hazardous facilities and transport. The method can be implemented on small and medium-sized computers, which allows it to be widely used for solving the problems of the class under consideration. The results of a computational experiment are presented that allow estimating possibilities of the proposed method for assessing the territorial risk in the event of a terrorist attack using a chemical agent. Originality. An effective method of assessing the territorial risk in the event of a terrorist attack using a chemically hazardous substance is proposed. The method can be used to assess the territorial risk in an urban environment, which allows you to obtain adequate data on possible damage areas. The method is based on the numerical integration of the fundamental mass transfer equation, which expresses the law of conservation of mass in a liquid medium. Practical

  6. FINANCIAL INSTRUMENTS OF THE STATE POLICY FOR THE PREVENTION OF TERRORIST ACTS IN UKRAINE

    Directory of Open Access Journals (Sweden)

    Mykola Bunchuk

    2017-11-01

    Full Text Available The article’s objective is to determine the mechanism for implementing the financial instruments of the state policy to counter terrorist acts in the territory not controlled by Ukrainian authorities in Donetsk and Luhansk regions. Methodology. Within the scientific research, for the most effective approaches at the national level to prevent the threat of international terrorism, under the conditions of the deep internal political crisis and extremely difficult economic situation, in order to improve the efficiency of public administration in developing and implementing the anti-terrorism state policies in Ukraine, the paper analyses international and domestic regulations on preventing the terrorist financing, considers factors that affect the deterioration of the social and economic situation of the temporarily occupied parts of Donbas. Results of the research allow formulating the definition of financial instruments of antiterrorist policies, the paper develops and proposes a series of organizational measures in order to prevent the terrorist financing in Ukraine. Practical implications. Based on the above, we propose an option of classification of main illegal mechanisms that may be used to finance terrorist activities in the territories of Donetsk and Luhansk regions uncontrolled by Ukrainian authorities, dividing them into internal and external. Given the above studied factors and classification of financing of terrorist acts in eastern Ukraine, we can assume that for the purpose of evading duty payable to relevant state bodies of Ukraine, external supplies of inventories in the uncontrolled areas of the Donetsk region, which are later obtained by illegal armed groups, are possibly carried out as follows: on behalf of a commercial entity registered in a foreign country for the Ukrainian commercial entity, registered in settlements located in the uncontrolled territory; crossing of international transit traffic that moves through the

  7. The human body as a terrorist weapon: hunger strikes and suicide bombers

    OpenAIRE

    Mollica, Marcello; Dingley, James

    2007-01-01

    This article argues that a major factor in terrorist acts is an appeal to the actor's own community at an emotional and symbolic level, through acts of sacrifice, particularly self-sacrifice. Although other aims also exist, a prime concern is to recall the actor's home audience to the struggle, because the actor regards himself as acting on their behalf. This utilizes the imagery and symbolism of traditional religion, implying a strong communal and non-material impetus to terrorist acts, rath...

  8. The correlation between diversion (Article 113 of the Criminal Code of Ukraine and terrorist act (Article 258 of the Criminal Code of Ukraine

    Directory of Open Access Journals (Sweden)

    Андрій Сергійович Климосюк

    2018-03-01

    During the investigating of the punishability for these crimes, it was found that in some cases the actual infliction of harm by a s diversion causes the necessity for additional qualifications by Part 2 of Art. 115 or Part 3 of Art. 258 of the Criminal Code of Ukraine. It is proved that the norm of diversion can be competed with the norm of a terrorist act as a whole (Article 113 of the Criminal Code of Ukraine and as part of the whole (Article 258 of the Criminal Code of Ukraine, and in such cases the preference in enforcement should be qualified as a diversion. Examples given in this article are an illustrations of an ideal and actual set of diversion e and terrorist act.

  9. Canada's Clean Air Act

    International Nuclear Information System (INIS)

    2006-01-01

    This paper provided an outline of Canada's Clean Air Act and examined some of the regulatory changes that will occur as a result of its implementation. The Act is being introduced to strengthen the legislative basis for taking action on reducing air pollution and GHGs, and will allow the government to regulate both indoor and outdoor air pollutants and GHGs. The Act will require the Ministers of the Environment and Health to establish national air quality objectives, as well as to monitor and report on their attainment. The Canadian Environmental Protection Act will be amended to enable the government to regulate the blending of fuels and their components. The Motor Vehicle Fuel Consumption Standards Act will also be amended to enhance the government's authority to regulate vehicle fuel efficiency. The Energy Efficiency Act will also be expanded to allow the government to set energy efficiency standards and labelling requirements for a wider range of consumer and commercial products. The Act will commit to short, medium and long-term industrial air pollution targets. Regulations will be proposed for emissions from industry; on-road and off-road vehicles and engines; and consumer and commercial products. It was concluded that the Government of Canada will continue to consult with provinces, territories, industries and Canadians to set and reach targets for the reduction of both indoor and outdoor air pollutants and GHG emissions. 6 figs

  10. How and Why Do Terrorist Organizations Use the Internet?

    Directory of Open Access Journals (Sweden)

    Karolina Wojtasik

    2017-12-01

    Full Text Available The article gives general characterisation of the ways in which these organizations use modern communication technologies. Currently, every major terrorist organisation maintain robust media wings, which focus on producing videos, publishing magazines and sharing them with the public via the Web. The empirical system of reference is based on the activity of al-Qaeda, her franchise AQAP (al-Qaeda in the Arabian Peninsula and ISIS (the so-called Islamic State. While analysing the media of terrorist organisations, the Lasswell model was applied. This formula is a standard research procedure used for investigating acts of communication by answering the questions: who, says what, in which channel, to whom, with what effect?. The author also present typology of videos produced by jihadist organisations, characterised the most important and active media actions of terrorist organisations and a typology of recipients of such messages. The article presents a number of reasons why the Internet has become such an important tool for terrorists.

  11. Odor and the Clean Air Act

    International Nuclear Information System (INIS)

    Morse, H.N.

    1993-01-01

    The case described in this paper involves the interpretation of language contained in the Texas Clean Air Act Texas Health and Safety Code Ann. Sections 382.001-382.141. The State of Texas, on behalf of the Texas Air Control Board, brought suit in the District Court of Erath County, Texas against the F/R Cattle Company, Inc., alleging that, because of odors emanating from the company's cattle feeding facility, the company was violating the Clean Air Act. The Board is granted the power and duty to administer the Clean Air Act and is directed to accomplish the purposes of the Act through the control of air contaminants by all practical and economically feasible methods. Described here is the evidence presented at and proceedings of the trial

  12. The Clean Air Act

    International Nuclear Information System (INIS)

    Coburn, L.L.

    1990-01-01

    The Clean Air Act amendments alter the complex laws affecting atmospheric pollution and at the same time have broad implications for energy. Specifically, the Clean Air Act amendments for the first time deal with the environmental problem of acid deposition in a way that minimizes energy and economic impacts. By relying upon a market-based system of emission trading, a least cost solution will be used to reduce sulfur dioxide (SO 2 ) emissions by almost 40 percent. The emission trading system is the centerpiece of the Clean Air Act (CAA) amendments effort to resolve energy and environmental interactions in a manner that will maximize environmental solutions while minimizing energy impacts. This paper will explore how the present CAA amendments deal with the emission trading system and the likely impact of the emission trading system and the CAA amendments upon the electric power industry

  13. The Current Legal Framework of the Use of Force against Terrorist Organizations

    Directory of Open Access Journals (Sweden)

    Petra PERISIC

    2013-11-01

    Full Text Available Events that took place on 9/11, when symbols of American nation were destroyed by hijacked civilian airplanes, raised the issue of the effectiveness of the currently existing legal framework which regulates terrorist activities. Prior to that event, dealing with terrorist activities was mostly regulated by conventions, many of which were ratified by no more than couple of states. However, it became questionable whether these instruments are sufficient to fight terrorists who are not only immune to a threat of sanctions, but are even ready to sacrifice their lives. After the attacks took place, the United States launched against Afghanistan an armed action, ending up in a more than a decade long occupation, holding Taliban regime responsible for the attacks undertaken by Al-Qaida. The United States response to the 9/11 raised an important question: what is the legal response to terrorist attacks? This article explores the current legal framework of the use of force in response to terrorist attacks, especially with regard to distinguishing terrorist acts which are attributable to a certain state, from those which are undertaken by a terrorist group, not associated with any particular state.

  14. Allegheny County Clean Indoor Air Act Exemptions

    Data.gov (United States)

    Allegheny County / City of Pittsburgh / Western PA Regional Data Center — List and location of all the businesses and social clubs who have received an exemption from the Pennsylvania Clean Indoor Air Act. “The Clean Indoor Air Act, Act...

  15. Profile of a Terrorist.

    Science.gov (United States)

    1988-04-01

    than those questions dealing with terrorists and their methods. Explosives are used routinely and plastique has entered the terrorist’s preferred...to handle. (12:23) The female Lebanese terrorist, May Mansin, easily concealed plastique in a body cavity and proceeded to blow a hole into the side

  16. Understanding public confidence in government to prevent terrorist attacks.

    Energy Technology Data Exchange (ETDEWEB)

    Baldwin, T. E.; Ramaprasad, A,; Samsa, M. E.; Decision and Information Sciences; Univ. of Illinois at Chicago

    2008-04-02

    A primary goal of terrorism is to instill a sense of fear and vulnerability in a population and to erode its confidence in government and law enforcement agencies to protect citizens against future attacks. In recognition of its importance, the Department of Homeland Security includes public confidence as one of the principal metrics used to assess the consequences of terrorist attacks. Hence, a detailed understanding of the variations in public confidence among individuals, terrorist event types, and as a function of time is critical to developing this metric. In this exploratory study, a questionnaire was designed, tested, and administered to small groups of individuals to measure public confidence in the ability of federal, state, and local governments and their public safety agencies to prevent acts of terrorism. Data was collected from three groups before and after they watched mock television news broadcasts portraying a smallpox attack, a series of suicide bomber attacks, a refinery explosion attack, and cyber intrusions on financial institutions, resulting in identity theft. Our findings are: (a) although the aggregate confidence level is low, there are optimists and pessimists; (b) the subjects are discriminating in interpreting the nature of a terrorist attack, the time horizon, and its impact; (c) confidence recovery after a terrorist event has an incubation period; and (d) the patterns of recovery of confidence of the optimists and the pessimists are different. These findings can affect the strategy and policies to manage public confidence after a terrorist event.

  17. Air toxics and the 1990 Clean Air Act: Managing trace element emissions

    International Nuclear Information System (INIS)

    Chow, W.; Levin, L.; Miller, M.J.

    1992-01-01

    The US Environmental Protection Agency (EPA) has historically regulated air toxics (hazardous air pollutants) under Section 112 of the Clean Air Act. To date, EPA has established emission standards for 8 hazardous air pollutants (arsenic, asbestos, benzene, beryllium, mercury, radionuclides, coke oven emissions and vinyl chloride). The US electric utility industry was not determined to be a source category requiring regulation for any of the eight chemicals. Of the eight, radionuclides were the last species for which EPA established hazardous emissions standards. In this instance, EPA determined that the risks associated with electric utility fossil fuel power plant emissions were sufficiently low that they should not be regulated. However, the 1990 Clean Air Act Amendments require a new evaluation of the electric utility industry emissions of hazardous air pollutants. This paper summarizes the key features of the air toxics provisions of the Clean Air Act Amendments, describes EPRI's activities on the subject, and provides some preliminary insights from EPRI's research to date

  18. Improving Local and State Agency Response to Terrorist Incidents Involving Biological Weapons

    National Research Council Canada - National Science Library

    2003-01-01

    .... Because of multiple terrorist acts such as the September II, 2001 attacks on the Pentagon and the World Trade Center, as well as anthrax contaminated mail and the Oklahoma City bombing, there is a...

  19. Benefits and Costs of the Clean Air Act

    Science.gov (United States)

    Congress added to the 1990 Clean Air Act Amendments a requirement under section 812 that EPA conduct periodic, scientifically reviewed studies to assess the benefits and the costs of the entire Clean Air Act.

  20. INTERNATIONALLY LEGAL MEASURES TO COMBAT TERRORIST FINANCING

    Directory of Open Access Journals (Sweden)

    Yuniarti Yuniarti

    2014-09-01

    Full Text Available Following the terrorist attacks in the USA on September 11th, 2001, it was discovered that money laundering was a significant source of finance for terrorists. Although, the amount of money that involve is not as involve as in drug and gun trafficking, terrorist financing had been the most important substance to be monitor. Further, various legal measures have been taken internationally in order to combat terrorist financing. This research analyses the legal measures that have been taken internationally and at EU level to combat terrorist financing. Key words: Money Laundering, Terrorist Financing, International Legal measures, EU.

  1. Terrorists: analogies and differences with mental diseases. A phenomenological-metaphysical perspective.

    Science.gov (United States)

    Fisogni, Primavera

    2010-01-01

    Are islamic terrorists insane? International scholars generally concede that Al Qaeda members are not mentally ill. But, until now, there has not been a shared consensus and a strong argument that can prove it. This paper intends to throw light on the specific dehumanization of terrorists and to show that they are always responsible for their acts, unlike those who are affected by mental diseases. The members of Al Qaeda deny the world of life and take the distance from its sense and value: in their perspective only subversive action makes sense. However they always maintain a transcendent relation with the world (I-you; I-it). Persons with serious mental diseases have generally lost the sense of their self and the transcendence with the world. Terrorists and people with mental illness share a common separation from the world of life: one is voluntary, the other is the consequence of a number of factors (biological, social, etc.). Terrorists and psychotics have nevertheless something in common: the deprivation of the self. A loss of being that--I argue--is at the origin of the ordinariness of terrorists and the experience of void in psychotics. Two symptoms that reveal the condition of an intimate dryness, from a phenomenological and a metaphysical point of view as a consequence of a distorted relation with the world of life. I shall discuss how ordinariness is strictly related with the blurring definition of terrorism.

  2. Aviation security : TSA is enhancing its oversight of air carrier efforts to identify passengers on the No Fly and Selectee lists, but expects ultimate solution to be implementation of Secure Flight : report to congressional committees

    Science.gov (United States)

    2008-09-01

    Air carriers remain a front-line defense against acts of terrorism that target the nations civil aviation system. A key responsibility of air carriers is to check passengers names against terrorist watch-list records to identify persons who sho...

  3. 45 CFR 2543.86 - Clean Air Act and the Federal Water Pollution Control Act.

    Science.gov (United States)

    2010-10-01

    ... 45 Public Welfare 4 2010-10-01 2010-10-01 false Clean Air Act and the Federal Water Pollution... Water Pollution Control Act. Contracts and subgrants of amounts in excess of $100,000 shall contain a... regulations issued pursuant to the Clean Air Act (42 U.S.C. 7401 et seq.) and the Federal Water Pollution...

  4. Clinical and psychological aspects of adolescent involvement in extremist and terrorist activities

    Directory of Open Access Journals (Sweden)

    Oshevsky D.S.

    2017-07-01

    Full Text Available The article deals with the clinical and psychological aspects of including minors in terrorist and extremist activities. In the historical perspective, it was traced how the views on the role of mental disorders in the genesis of such crimes changed. It is shown that terrorist and extremist activity must be viewed as a complex multi-factor phenomenon, in which socio-psychological components play a leading role. It is noted that the psychopathological process can act as a prerequisite for inclusion in such radical groups. Psychoanalytic, sociological, cognitive approaches, theories of social learning and the concept of diffuse ego-identity making attempts to explain the mechanisms of terrorist and extremist activity in minors are analyzed. The problem of insufficient study of the influence of the Internet and social networks on the formation of readiness for admission to adolescents in radical organizations is posed.

  5. Terrorist targeting and energy security

    Energy Technology Data Exchange (ETDEWEB)

    Toft, Peter; Duero, Arash; Bieliauskas, Arunas [Institute of Energy, Joint Research Center of the European Commission, P.O. Box 2, 1755 ZG Petten (Netherlands)

    2010-08-15

    Sudden, short-term disruptions seriously endangering energy security can be triggered by a variety of events - among them attacks by terrorists. This study investigates terrorist attack practices against energy infrastructures and discusses how we may understand them. Our results indicate that attacks against energy infrastructures are comparatively few. Also, we find no strong connection between the ideologies of various terrorist groups and their proclivity to attack. In addition, the highly disproportionate number of attacks in a handful of countries highlights the strong geographic concentration of attacks. To explain these findings, we analyze terrorist targeting incentives including intimidation levels, symbolism, attack feasibility, and concerns for stakeholders. We argue that terrorists in general have comparatively few incentives to attack energy supply infrastructures based on our assessment of these factors. Moreover, higher levels of terrorist incidents in states more prone to internal violent conflict may suggest stronger incentives to attack energy infrastructures. When outlining energy security policies, the low frequency of worldwide attacks coupled with the high concentration of attacks in certain unstable countries should be taken into consideration. Energy importing countries could benefit from developing strategies to increase stability in key energy supply and/or transit countries facing risks of internal instability. (author)

  6. Religious cover to terrorist movement

    International Nuclear Information System (INIS)

    Zaidi, M.K.

    2005-01-01

    Full text: Terrorism is the use of force or the threat of force against civilian populations to achieve political objectives. The terrorists create fear, response and disruption. People fighting for freedom who have no bombs - no airplanes would resort to such atrocities as beheading even though killing of innocent people is strictly prohibited in all the religions practiced on this earth. It is done out of political madness and not religious fervor so it was said that the fight against terrorism is not a military problem, nor is it a diplomatic one, but a cultural one. Terrorism is not associated to any particular faith or discipline but it is rooted deeply in poor education and resource system. Some frustrated individuals with no employment seek easy ways to form groups and cause harassment in neighborhoods and it expands to the local and national level. The scientific community must now resolve to confront the dangers facing civilized countries through employing the scientific culture, which means scientific excellence and solidarity, to overcome ignorance in the face of global terrorism. The developed nations have adopted to collect information, do research, have tools to act and take action. States must improve the timely cross-border sharing of national security intelligence information, under appropriate circumstances, between intelligence and law enforcement agencies to better prevent and disrupt terrorist activities and to prosecute terrorists. Some world's leaders have agreed to use the national security intelligence information in investigation and prosecution process as a vital component in the battle against terrorism. Political leaders, rulers, administrator, school counselors and teachers should think of how the problems could be solved if they meet the needs and hopes of their inhabitants, provide proper education to build good moral values and also address their concerns. (author)

  7. Religious cover to terrorist movement

    Energy Technology Data Exchange (ETDEWEB)

    Zaidi, M K [US Department of Energy, Idaho Radiological and Environmental Sciences Laboratory (RESL), Idaho Falls (United States)

    2005-07-01

    Full text: Terrorism is the use of force or the threat of force against civilian populations to achieve political objectives. The terrorists create fear, response and disruption. People fighting for freedom who have no bombs - no airplanes would resort to such atrocities as beheading even though killing of innocent people is strictly prohibited in all the religions practiced on this earth. It is done out of political madness and not religious fervor so it was said that the fight against terrorism is not a military problem, nor is it a diplomatic one, but a cultural one. Terrorism is not associated to any particular faith or discipline but it is rooted deeply in poor education and resource system. Some frustrated individuals with no employment seek easy ways to form groups and cause harassment in neighborhoods and it expands to the local and national level. The scientific community must now resolve to confront the dangers facing civilized countries through employing the scientific culture, which means scientific excellence and solidarity, to overcome ignorance in the face of global terrorism. The developed nations have adopted to collect information, do research, have tools to act and take action. States must improve the timely cross-border sharing of national security intelligence information, under appropriate circumstances, between intelligence and law enforcement agencies to better prevent and disrupt terrorist activities and to prosecute terrorists. Some world's leaders have agreed to use the national security intelligence information in investigation and prosecution process as a vital component in the battle against terrorism. Political leaders, rulers, administrator, school counselors and teachers should think of how the problems could be solved if they meet the needs and hopes of their inhabitants, provide proper education to build good moral values and also address their concerns. (author)

  8. Near-space airships against terrorist activities

    Science.gov (United States)

    Kesenek, Ceylan

    2014-06-01

    Near-space is a region surrounding the earth which is too dense for a satellite to fly and also too thin for air breathing vehicles to fly. The near-space region which is located between 65,000 and 325,000 feet is really underutilized despite its unique potential. Near-Space airships can be used to exploit the potential of near space. Such a system can supply not only a great deal of information using ISR (Intelligence Surveillance Reconnaissance) sensors on board but also serve as a communication/data relay. Airships used in near space can cover a very wide footprint area for surveillance missions. Free of orbital mechanics these near-space assets can continue its mission for long period of time with a persistence of days and months. These assets can provide persistent intelligence for fight against terrorist activities. Terrorism is a non-state threat and doesn't have a static hierarchical structure. To fight against such an adversary an overwhelming intelligence activity must be applied. Therefore, intelligence collection and surveillance missions play a vital role in counter terrorism. Terrorists use asymmetric means of threat that require information superiority. In this study exploitation of near space by airships is analyzed for fight against terrorism. Near-space airships are analyzed according to the operational effectiveness, logistic structure and cost. Advantages and disadvantages of airships are argued in comparison with satellites and airplanes. As a result, by bridging the gap between the air and space, nearspace airships are considered to be the most important asset of warfighter especially with its operational effectiveness.

  9. Transition from Terrorist Event Management to Consequence Management, Executive Summary

    Science.gov (United States)

    1982-03-31

    hUMIEe " BDM/W-82-l1 5-TR AUTO11(o 1. CONTR ACT OR GRANT NumURe) J. C. Evanis, M. K. Pilgrim, C. J. Potter EMW-C-0744 9. PER•O^•ING ORGANIZATIN NAME...should, and is expected to, provide leadership in this regard. There exists a variety of experience and planning for responding to terrorist events. The

  10. `Googling' Terrorists: Are Northern Irish Terrorists Visible on Internet Search Engines?

    Science.gov (United States)

    Reilly, P.

    In this chapter, the analysis suggests that Northern Irish terrorists are not visible on Web search engines when net users employ conventional Internet search techniques. Editors of mass media organisations traditionally have had the ability to decide whether a terrorist atrocity is `newsworthy,' controlling the `oxygen' supply that sustains all forms of terrorism. This process, also known as `gatekeeping,' is often influenced by the norms of social responsibility, or alternatively, with regard to the interests of the advertisers and corporate sponsors that sustain mass media organisations. The analysis presented in this chapter suggests that Internet search engines can also be characterised as `gatekeepers,' albeit without the ability to shape the content of Websites before it reaches net users. Instead, Internet search engines give priority retrieval to certain Websites within their directory, pointing net users towards these Websites rather than others on the Internet. Net users are more likely to click on links to the more `visible' Websites on Internet search engine directories, these sites invariably being the highest `ranked' in response to a particular search query. A number of factors including the design of the Website and the number of links to external sites determine the `visibility' of a Website on Internet search engines. The study suggests that Northern Irish terrorists and their sympathisers are unlikely to achieve a greater degree of `visibility' online than they enjoy in the conventional mass media through the perpetration of atrocities. Although these groups may have a greater degree of freedom on the Internet to publicise their ideologies, they are still likely to be speaking to the converted or members of the press. Although it is easier to locate Northern Irish terrorist organisations on Internet search engines by linking in via ideology, ideological description searches, such as `Irish Republican' and `Ulster Loyalist,' are more likely to

  11. 23 CFR 633.211 - Implementation of the Clean Air Act and the Federal Water Pollution Control Act.

    Science.gov (United States)

    2010-04-01

    ... Water Pollution Control Act. 633.211 Section 633.211 Highways FEDERAL HIGHWAY ADMINISTRATION, DEPARTMENT...) implementing requirements with respect to the Clean Air Act and the Federal Water Pollution Control Act are... Contracts (Appalachian Contracts) § 633.211 Implementation of the Clean Air Act and the Federal Water...

  12. 14 CFR 1274.926 - Clean Air-Water Pollution Control Acts.

    Science.gov (United States)

    2010-01-01

    ... 14 Aeronautics and Space 5 2010-01-01 2010-01-01 false Clean Air-Water Pollution Control Acts...-Water Pollution Control Acts. Clean Air-Water Pollution Control Acts July 2002 If this cooperative... 91-604) and section 308 of the Federal Water Pollution Control Act, as amended (33 U.S.C. 1251 et seq...

  13. Licensing issues in the context of terrorist attacks on nuclear power plants

    International Nuclear Information System (INIS)

    Danwitz, T. von

    2002-01-01

    The terrorist attack on the World Trade Center in September 2001 has prompted enhanced nuclear risk awareness among the German population. But in the current public debate about the safety of nuclear power plants in Germany in times of new dimensions of danger, aspects such as the role of the constitutional law, the German Atomic Energy Act, and the regulatory system governing nuclear power plant licensing in the context of protection and safety have not been addressed. The author therefore discusses the German nuclear power plant licensing law and administrative regime, elaborating on the significance attributed in those bodies of law to risks like terrorist attacks on nuclear power plants. (orig./CB) [de

  14. New Clean Air Act complicates power plant operation, design

    International Nuclear Information System (INIS)

    Smock, R.W.

    1991-01-01

    In November the president signed into law the new Clean Air Act, ushering in a new era in the power generation industry. This paper reviews the six important sections of the Clean Air Act and their impact on power plant operation and design

  15. The Decision Calculus of Terrorist Leaders

    OpenAIRE

    J. Tyson Chatagnier; Alex Mintz; Yair Samban

    2012-01-01

    This article contributes to the literature on terrorist group decision-making by introducing a new procedure, Applied Decision Analysis, in an attempt to understand how leaders of terrorist organizations make decisions. We examine twenty-three decisions taken by leaders of three terrorist organizations: Al-Qaeda, Hamas, and Hizballah. We also demonstrate the use of the Applied Decision Analysis procedure to uncover the "Decision DNA" or “decision code” of leaders of such organizat...

  16. 60 years of Health Protection under the Clean Air Acts

    OpenAIRE

    Longhurst, J.

    2016-01-01

    2016 marks 60 years of UK Clean Air Acts. This presentation explores the challenges, opportunities and progress since the Clean Air Act, 1956. It reflects upon historical attempts to manage air pollution noting success factors and barriers to progress. Particular attention is given to the impact of the 1952 Great Smog and the role of National Smoke Abatement Society, the forerunner of Environmental Protection UK, in creating the momentum for the 1956 Act. The presentation concludes with a rev...

  17. Threat Assessment of Potential Terrorist Attacks to the Transport Infrastructure

    Directory of Open Access Journals (Sweden)

    Gabriel Nowacki

    2014-06-01

    Full Text Available The paper presents threat assessment of potential terrorist attacks to the transport infrastructure. The range of transportation infrastructure has spread and includes railway, inland waterways, road, maritime, air, intermodal transport infrastructure and intelligent transport systems (ITS. ITS service is the provision of an ITS application through a well-defined organisational and operational framework with the aim of contributing to the user safety, efficiency, comfort and/or to facilitate or support transport and travel operations. Terrorism means acts of violence committed by groups that view themselves as victimized by some notable historical wrong. Although these groups have no formal connection with governments, they usually have the financial and moral backing of sympathetic governments. Typically, they stage unexpected attacks on civilian targets, including transport infrastructure, with the aim of sowing fear and confusion. Based on the analyses, transportation infrastructure is potentially threatened with terrorism attacks, especially road and rail infrastructure (about 23 %, and to a smaller degree the maritime and air transport infrastructure (about 2 %. There were 90,3% of incidents involve land transport (74,5% – vehicles, 9,5% – buses, 6,3% - rail covered the 41-year period 1967-2007 in the USA. Legal steps to fight terrorism have been taken on the international level, furthermore, some institutions have been established for this purpose.

  18. Malevolent Creativity in Terrorist Organizations

    Science.gov (United States)

    Gill, Paul; Horgan, John; Hunter, Samuel T.; Cushenbery, Lily D.

    2013-01-01

    Terrorist organizations are both imitative and innovative in character. While the drivers of imitation have been extensively modeled using concepts such as contagion and diffusion, creativity and innovation remain relatively underdeveloped ideas in the context of terrorist behavior. This article seeks to redress this deficiency by presenting a…

  19. Combatting the Terrorist Threat.

    Science.gov (United States)

    1985-05-22

    have supplied many terrorist groups with plastique and other explosives to build bombs. 3 Using these explosives they have produced vehicle bombs which...deceptive, if not dangerously naive.1 5 State Supported Terrorism State supported terrorism is not a new concept , however, it has only recently been...terrorist incidents. The product of that study was the tri-level US anti- terrorism program concept . 3 The program structure is shown in Figure 11. President

  20. 48 CFR 252.209-7001 - Disclosure of ownership or control by the government of a terrorist country.

    Science.gov (United States)

    2010-10-01

    ...) (a) Definitions. As used in this provision— (1) Government of a terrorist country includes the state... the government of which has repeatedly provided support for acts of international terrorism. As of the...

  1. Some impacts of the 1990 Clean Air Act and state clean-air regulations on the fertilizer industry

    International Nuclear Information System (INIS)

    Breed, C.E.; Kerns, O.S.

    1992-01-01

    The Clean Air Act amendments of 1990 will intensify national efforts to reduce air pollution. They will have major impacts on governmental agencies and on industrial and commercial facilities throughout the country. As with other industries, it is essential for fertilizer dealers and producers to understand how these changes to the Clean Air Act can significantly change the way they do business. This paper is proffered as an overview of ways in which the 1990 amendments to the Clean Air Act may impact the fertilizer industry. The nonattainment, toxics, and permit provisions of the amended act will be three areas of particular concern to the fertilizer industry. Implementation of the new regulatory requirements of this legislation promises to be a long and onerous process for all concerned. However, it appears that state and local regulations may have a much more profound impact on the fertilizer industry than the new Clean Air Act

  2. Australian Correctional Management Practices for Terrorist Prisoners

    Directory of Open Access Journals (Sweden)

    Nathan Tompson

    2018-03-01

    Full Text Available Management practices for incarcerated terrorists is an important counterterrorism policy consideration. Moreover, there is a misconception that once incarcerated, terrorists cease to be a risk. If correctional management regimes are implemented poorly, terrorist prisoners may be afforded the opportunity to remain active while incarcerated, including the recruitment of other prisoners, and the planning of future attacks. Equally, they may be viewed as role models or martyrs for sympathisers to aspire to. Despite the magnitude of the consequences, there is no agreed approach to managing Australian terrorist prisoners. As such, a dichotomy of dominant models has emerged; that is, to either segregate terrorist prisoners, or conversely, to disperse them throughout the wider prisoner population. Each strategy presents its own set of benefits and risks. This paper compares the management practices for terrorist prisoners in the states of New South Wales and Victoria to determine the strengths and vulnerabilities of each of these approaches. The paper concludes that policy-makers should consider reassessing current strategies. It suggests that a focus that extends the immediate containment considerations to encompass post-release factors would bring benefits for society.

  3. The Terrorist and the Media: Partners in Crime or Rituals and Harmless Observers?

    Science.gov (United States)

    Dowling, Ralph E.

    This paper explores the idea that the media "cause" or strongly motivate acts of terrorism. In an effort to refute this view the paper applies Kenneth Burke's dramatistic theory of communication to show that the motives and behavior of political terrorists can be explained without reference to the media coverage terrorism produces. The…

  4. The Clean Air Act Amendments of 1990 - Implementation

    International Nuclear Information System (INIS)

    Radford, N.D. Jr.

    1991-01-01

    On November 15, 1991 the Clean Air Act Amendments of 1990 were signed into law. The Amendments include eleven titles. They are: Title I specifies the requirements for attainment and maintenance of the national ambient air quality standards; Title II provides for more stringent motor vehicle emission limits and cleaner vehicle fuels; Title III addresses the release of air toxics; Title IV creates an acid deposition control program; Title V imposes a new comprehensive operating permit system for stationary sources; Title VI provides for stratospheric ozone protection; Title VII imposes increased civil and criminal penalties and liability; Title VIII contains miscellaneous provisions. Title IX provides for air quality research projects; Title X directs the EPA to make ten percent of research funds available to disadvantaged businesses; and Title XI amends the Job Training Partnership Act

  5. Detecting Hidden Hierarchy of Non Hierarchical Terrorist Networks

    DEFF Research Database (Denmark)

    Memon, Nasrullah

    measures (and combinations of them) to identify key players (important nodes) in terrorist networks. Our recently introduced techniques and algorithms (which are also implemented in the investigative data mining toolkit known as iMiner) will be particularly useful for law enforcement agencies that need...... to analyze terrorist networks and prioritize their targets. Applying recently introduced mathematical methods for constructing the hidden hierarchy of "nonhierarchical" terrorist networks; we present case studies of the terrorist attacks occurred / planned in the past, in order to identify hidden hierarchy...

  6. Public health preparedness and response to a radiological terrorist attack

    International Nuclear Information System (INIS)

    Yamaguchi, Ichiro

    2016-01-01

    Given the potential for intentional malevolent acts, the security of radioactive sources should be ensured. In the event of a terrorist attack using a radioactive source, we should care not only about health concerns of victims, especially including first responders who suffer from radiation injury, but also public health activities with affected people during the long recovery phase. Regarding the radiological public health viewpoint, preventive efforts are also important. In fact, regulatory reform is progressing in Japan according to the code of conduct issued by IAEA. One of the difficulties of countermeasures for the security of radioactive sources in Japan is to establish a disposal facility for disused sealed radioactive sources, since radioactive waste has been additionally a point of contention in society since the nuclear disaster. This paper presents an overview of countermeasures for terrorist attacks using a radioactive source, from the viewpoint of public health in Japan including the results of survey targeted hospitals equipped with blood irradiation machines. (author)

  7. 31 CFR 595.311 - Specially designated terrorist.

    Science.gov (United States)

    2010-07-01

    ...) OFFICE OF FOREIGN ASSETS CONTROL, DEPARTMENT OF THE TREASURY TERRORISM SANCTIONS REGULATIONS General Definitions § 595.311 Specially designated terrorist. (a) The term specially designated terrorist means: (1...

  8. 31 CFR 597.309 - Foreign terrorist organization.

    Science.gov (United States)

    2010-07-01

    ... REGULATIONS General Definitions § 597.309 Foreign terrorist organization. The term foreign terrorist... respect to which the Secretary of State has notified Congress of the intention to designate as a foreign...

  9. Understanding Terrorist Ideology

    National Research Council Canada - National Science Library

    Cragin, Kim

    2007-01-01

    This variation, by its very nature, makes it somewhat difficult to identify overarching patterns in how terrorist ideologies might motivate individuals and sympathetic communities on a global level...

  10. Terrorist Financing: The 9/11 Commission Recommendation

    National Research Council Canada - National Science Library

    Weiss, Martin A

    2005-01-01

    .... The Commission recommended that the U.S. government shift the focus of its efforts to counter terrorist financing from a strategy based on seizing terrorist assets to a strategy based on exploiting intelligence gathered from financial investigations...

  11. Liquid Missile Fuels as Means of Chemical Terrorist Attack

    International Nuclear Information System (INIS)

    Superina, V.; Orehovec, Z.

    2007-01-01

    Modern world is faced with numerous terrorist attacks whose goals, methods and means of the conduct are various. It seems that we have entered the era when terrorism, one's own little terrorism, is the easiest and the most painless way of achieving a goal. That is why that such a situation has contributed to the necessity for strengthening individual and collective protection and safety, import and export control, control of the production and illegal sale of the potential means for delivering terrorist act. It has also contributed to the necessity for devising means of the delivery. For more than 10 years, a series of congresses on CB MTS Industry has pointed at chemicals and chemical industry as potential means and targets of terrorism. The specialization and experience of different authors in the field of the missile technology and missile fuels, especially those of Eastern origin, and the threat that was the reality of the war conflicts in 1990s was the reason for making a scientific and expert analysis of the liquid missile fuels as means of terrorism. There are not many experts in the field of NBC protection who are familiar with the toxicity and reaction of liquid missile fuels still lying discarded and unprotected in abandoned barracks all over Europe and Asia. The purpose of this paper is to draw public attention to possible different abuses of liquid missile fuels for a terrorist purpose, as well as to possible consequences and prevention measures against such abuses. (author)

  12. 9/11, Act II : A Fine-Grained Analysis of Regional Variations in Traffic Fatalities in the Aftermath of the Terrorist Attacks

    OpenAIRE

    Gaissmaier, Wolfgang; Gigerenzer, Gerd

    2012-01-01

    Terrorists can strike twice - first, by directly killing people, and second, through dangerous behaviors induced by fear in people's minds. Previous research identified a substantial increase in U.S. traffic fatalities subsequent to the September 11 terrorist attacks, which were accounted for as due to a substitution of driving for flying, induced by fear of dread risks. Here, we show that this increase in fatalities varied widely by region, a fact that was best explained by regional variatio...

  13. Complying with Clean Air Act acid rain provisions: A case history of required air quality analyses

    International Nuclear Information System (INIS)

    McComb, G.G. Jr.; Naperkoski, G.J.; Rogers, F.A.

    1990-01-01

    Clean Air Act Amendments being considered by Congress require SO 2 emissions reductions from numerous large power generation sources nationwide. As currently written, these amendments also require that the affected sources must continue to comply with all provisions of the existing Clean Air Act while achieving the required reductions. United Engineers and Constructors is presently assisting utilities in the evaluation of compliance options for units totaling over 18,000 MW. The methods of achieving compliance with the probable requirements of the Act most often include the retrofit installation of SO 2 scrubbers. A study designed to determine permitting issues and the scope of air quality analyses required to demonstrate the regulatory acceptability of installation of wet scrubbing systems has been completed for units totaling a portion of the above-referenced 18,000 MW. The study results show that, under certain commonly occurring circumstances, there is a risk of creating National Ambient Air Quality Standards contraventions for SO 2 and NO 2 when scrubbers are installed at an existing facility. Any such contraventions subject the plant to state and/or federal enforcement actions. In addition, installation of materials handling equipment for lime stone can trigger Prevention of Significant Deterioration requirements as a major modification. This paper is divided into two major areas. The first deals with the air quality regulatory requirements imposed upon installation of pollution control equipment. The first section is further sub-divided into two sections: one covering requirements emanating from the 1977 Clean Air Act Amendments and its implementing regulations and the other the regulatory requirements of the new Clean Air Act Amendments. This section on regulatory requirements provides background information for the understanding of the second major section of the paper which gives the results of the hypothetical case study

  14. Clean Air Act. Revision 5

    Energy Technology Data Exchange (ETDEWEB)

    1994-02-15

    This Reference Book contains a current copy of the Clean Air Act, as amended, and those regulations that implement the statute and appear to be most relevant to DOE activities. The document is provided to DOE and contractor staff for informational purposes only and should not be interpreted as legal guidance. This Reference Book has been completely revised and is current through February 15, 1994.

  15. Real Time Big Data Analytics for Predicting Terrorist Incidents

    Science.gov (United States)

    Toure, Ibrahim

    2017-01-01

    Terrorism is a complex and evolving phenomenon. In the past few decades, we have witnessed an increase in the number of terrorist incidents in the world. The security and stability of many countries is threatened by terrorist groups. Perpetrators now use sophisticated weapons and the attacks are more and more lethal. Currently, terrorist incidents…

  16. Immigration: Terrorist Grounds for Exclusion and Removal Aliens

    National Research Council Canada - National Science Library

    Garcia, Michael J; Wasem, Ruth E

    2008-01-01

    ...., legal permanent residents) or temporarily as nonimmigrants. Notably, any alien who engages in terrorist activity, or is a representative or member of a designated foreign terrorist organization, is generally inadmissible...

  17. 9/11, Act II: a fine-grained analysis of regional variations in traffic fatalities in the aftermath of the terrorist attacks.

    Science.gov (United States)

    Gaissmaier, Wolfgang; Gigerenzer, Gerd

    2012-12-01

    Terrorists can strike twice--first, by directly killing people, and second, through dangerous behaviors induced by fear in people's minds. Previous research identified a substantial increase in U.S. traffic fatalities subsequent to the September 11 terrorist attacks, which were accounted for as due to a substitution of driving for flying, induced by fear of dread risks. Here, we show that this increase in fatalities varied widely by region, a fact that was best explained by regional variations in increased driving. Two factors, in turn, explained these variations in increased driving. The weaker factor was proximity to New York City, where stress reactions to the attacks were previously shown to be greatest. The stronger factor was driving opportunity, which was operationalized both as number of highway miles and as number of car registrations per inhabitant. Thus, terrorists' second strike exploited both fear of dread risks and, paradoxically, an environmental structure conducive to generating increased driving, which ultimately increased fatalities.

  18. Will it Ever be Possible to Profile the Terrorist?

    Directory of Open Access Journals (Sweden)

    Jonathan A Rae

    2012-09-01

    Full Text Available 'This paper critiques the claim that terrorists can be profiled – that is to say that terrorists possess distinguishable attributes that can be conceivably identified by an observer. In doing so, the most prominent profiling parameters - racial, gender, age, pathological, psychological and socioeconomic – are investigated. The above approaches are found to have little to no applied value in identifying terrorists from a societal population. The dominant criticisms of these methods emphasise their crude reductionism, an absence of internal and external validity, and their lack of practical application. Current evidence indicates that the profiling of terrorists is a futile venture.'

  19. Implementation by environmental administration of the Finnish air pollution control act

    Energy Technology Data Exchange (ETDEWEB)

    Haapaniemi, J. [Turku Univ. (Finland). Dept. of Political Science

    1995-12-31

    The aim of this research is to show how the general wording of the Air Pollution Control Act which came into force in 1982 has been given practical meanings. The main interest is the administrational implementation of the aims of the air pollution legislation for regulation of industrial activities and the energy sector. The article focuses on the decisions and the decision-making process through the Air Pollution Control Act with its relatively flexible norms. It gives a view of air pollution control practices and its problems, especially concerning sulphur emissions of whose control there is already lot of experiences. The grounds for resolutions given according to the Air Pollution Control Act and the possibility of public participation in their making are the centre of attention here. The greatest interest is cases on the decisions made by applying general governmental decisions, especially regulations concerning coal-fired power plants, and the regulations for sulphur dioxide emissions, in the governmental decision of 1987. (author)

  20. Implementation by environmental administration of the Finnish air pollution control act

    Energy Technology Data Exchange (ETDEWEB)

    Haapaniemi, J [Turku Univ. (Finland). Dept. of Political Science

    1996-12-31

    The aim of this research is to show how the general wording of the Air Pollution Control Act which came into force in 1982 has been given practical meanings. The main interest is the administrational implementation of the aims of the air pollution legislation for regulation of industrial activities and the energy sector. The article focuses on the decisions and the decision-making process through the Air Pollution Control Act with its relatively flexible norms. It gives a view of air pollution control practices and its problems, especially concerning sulphur emissions of whose control there is already lot of experiences. The grounds for resolutions given according to the Air Pollution Control Act and the possibility of public participation in their making are the centre of attention here. The greatest interest is cases on the decisions made by applying general governmental decisions, especially regulations concerning coal-fired power plants, and the regulations for sulphur dioxide emissions, in the governmental decision of 1987. (author)

  1. The Clean Air Act Amendments of 1990

    International Nuclear Information System (INIS)

    Mosby, R.C.

    1991-01-01

    The natural gas liquids industry and specifically the gas processing business has not been rosy the last several years. processors have been faced with low NGL prices, high inventories and more regulations which have forced product margins to all time lows and have resulted in plant closings, mergers and a determined search for those processors that are left for ways to make ends meet until times get better. Whether a barometer for the future or merely a fluke in the economy, things got better in 1990. Last year represented a change for the positive in all the indicators characterizing the gas processing business. An early winter in 1989, propane distribution problems, overall increases in petrochemical demand for NGLs and the fear brought on by events in Kuwait all contributed to changes in the marketplace. For the gas processor, these events combined with relatively low natural gas prices to produce wider processing margins and a degree of prosperity. The biggest regulatory event in 1990 however was without a doubt the Clean Air Act Amendments. These sweeping changes to the 1970 Clean Air Act promise to affect the economy and public health well into the next century. The purpose of this paper is to examine first the major provisions of the Clean Air Act Amendments of 1990 and then relate those anticipated changes to the gas processing industry. As will be examined later, the Amendments will create both threats and opportunities for gas processors

  2. Phase I Recommendations by the Air Quality Management Work Group to the Clean Air Act Advisory Committee

    Science.gov (United States)

    Recommendations to the Clean Air Act Advisory Committee by Air Quality Management Work Group addressing the recommendations made by the National Research Council to improve the U.S. air quality management system.

  3. The Clean Air Act and the Economy

    Science.gov (United States)

    Since 1970, cleaner air and a growing economy have gone hand in hand. The Act has created market opportunities that have helped to inspire innovation in cleaner technologies for which the United States has become a global market leader.

  4. Agent Based Modeling on Organizational Dynamics of Terrorist Network

    Directory of Open Access Journals (Sweden)

    Bo Li

    2015-01-01

    Full Text Available Modeling organizational dynamics of terrorist network is a critical issue in computational analysis of terrorism research. The first step for effective counterterrorism and strategic intervention is to investigate how the terrorists operate with the relational network and what affects the performance. In this paper, we investigate the organizational dynamics by employing a computational experimentation methodology. The hierarchical cellular network model and the organizational dynamics model are developed for modeling the hybrid relational structure and complex operational processes, respectively. To intuitively elucidate this method, the agent based modeling is used to simulate the terrorist network and test the performance in diverse scenarios. Based on the experimental results, we show how the changes of operational environments affect the development of terrorist organization in terms of its recovery and capacity to perform future tasks. The potential strategies are also discussed, which can be used to restrain the activities of terrorists.

  5. Tenth act amending the German atomic energy act

    International Nuclear Information System (INIS)

    Heller, W.

    2009-01-01

    On January 14, 2009, the German federal government introduced into parliament the 10th Act Amending the Atomic Energy Act. In the first reading in the federal parliament, Federal Minister for the Environment Gabriel emphasized 2 main points: Intensified protection of nuclear facilities and of transports of radioactive substances against unauthorized interventions; transfer by law to the Federal Office for Radiological Protection (BfS) of decommissioning of the Asse mine. Reliability review: The amendment to Sec.12 b of the Atomic Energy Act is to meet the different safety and security conditions after the terrorist attacks on September 11, 2001 in the United States and other terrorist activities afterwards (London, Madrid) also with respect to hazards arising to nuclear facilities and nuclear transports. The bill must be seen in conjunction with the Ordinance on Reliability Reviews under the Atomic Energy Act dated July 1, 1999 which covers reviews of reliability of persons holding special responsibilities. Asse II mine: The competence of the Federal Office for Radiological Protection is achieved by an amendment to Sec.23, Para.1, Number 2, Atomic Energy Act, in which the words ''and for the Asse II mine'' are added after the word ''waste.'' Further proceedings depend on the additional provision in a new Sec.57 b, Atomic Energy Act. Accordingly, the operation and decommissioning of the Asse II mine are subject to the regulations applicable to facilities of the federation pursuant to Sec.9a, Para.3. In this way, Asse II is given the same legal status as the federal waste management facilities. Moreover, it is stipulated that the mine is to be shut down immediately. (orig.)

  6. Survival of the Fittest: Why Terrorist Groups Endure

    Directory of Open Access Journals (Sweden)

    Joseph K. Young

    2014-04-01

    Full Text Available Why do terrorist groups endure? This question is relevant to scholars and policy makers alike. In the past, this issue was not been addressed in a systematic fashion. Recent work investigates this question using data on transnational groups and finds that factors associated with the home country can influence the duration the group endures. Applying the theory of outbidding to terrorist group survival, we argue that strategic competition among groups predicts group duration. Using the Global Terrorism Database, we develop a dataset using the terrorist group as the unit of analysis to model the duration of group activity and thus include the largest sample of groups yet. Controlling for previous explanations of both group duration and terrorism, we find a robust effect for the impact that group competition has on terrorist group survival.

  7. On Deceiving Terrorists

    Science.gov (United States)

    2001-12-01

    developed. By way of contrast, the last two categories—theoretical works and doctrine—attempt to transcend the contextual limits of the first two... Busqueda , the Colombian National Police “Search Bloc,” which was tasked with apprehending Escobar (Bowden, 2001). Deceiving Terrorists Chain Network

  8. Terrorists and Suicide Attacks

    National Research Council Canada - National Science Library

    Cronin, Audrey K

    2003-01-01

    Suicide attacks by terrorist organizations have become more prevalent globally, and assessing the threat of suicide attacks against the United States and its interests at home and abroad has therefore...

  9. Plutonium - how great is the terrorist threat

    International Nuclear Information System (INIS)

    Cohen, B.L.

    1977-01-01

    The terrorists' problems in stealing the plutonium and fabricating the device are measured against the likely effects of its explosion. Alternatives are discussed and it is concluded that there are many easier ways of killing a large number of people. It is considered impossible to guard absolutely against all possible terrorist threats of mass murder. (U.K.)

  10. Threat Assessment: Do Lone Terrorists Differ from Other Lone Offenders?

    Directory of Open Access Journals (Sweden)

    Diane M. Zierhoffer

    2014-10-01

    Full Text Available This study evaluates the viability of a threat assessment model developed to calculate the risk of targeted violence as a predictor of violence by potential lone terrorists. There is no profile, to date, which would assist in the identification of a lone terrorist prior to an attack. The threat assessment model developed by Borum, Fein, Vossekuil, and Berglund and described in “Threat Assessment: Defining an approach for evaluating risk of targeted violence” (1999 poses ten questions about the patterns of thinking and behaviors that may precipitate an attack of targeted violence. Three terrorists are studied to assess the model’s value as a predictor of terrorism. It is assessed for its use within law enforcement, during an investigation of someone brought to attention as a possible terrorist and for family members or friends who suspect potential terrorist behavior. Would these questions encourage someone to report a friend to prevent a possible attack? This threat assessment model provides a foundation for future research focused on developing a structured risk assessment for lone terrorists. In its present form, the questions can assist both citizens and law enforcement personnel in identifying the patterns of thought and behavior potentially indicative of a lone terrorist.

  11. On Terrorists and Terrorism

    National Research Council Canada - National Science Library

    Kellen, Konrad

    1982-01-01

    ...; it examines their socioeconomic backgrounds and their driving ideologies; and it probes into elements that may aid the cohesion of terrorist groups, as well as at elements that drive toward disintegration...

  12. Will it ever be possible to profile the terrorist?

    OpenAIRE

    Rae, Jonathan A.

    2012-01-01

    This paper critiques the claim that terrorists can be profiled – that is to say that terrorists possess distinguishable attributes that can be conceivably identified by an observer. In doing so, the most prominent profiling parameters - racial, gender, age, pathological, psychological and socioeconomic – are investigated. The above approaches are found to have little to no applied value in identifying terrorists from a societal population. The dominant criticisms of these methods emphasise th...

  13. 76 FR 39408 - Privacy Act of 1974; Department of Homeland Security/ALL-030 Use of the Terrorist Screening...

    Science.gov (United States)

    2011-07-06

    ... of Investigation (FBI)/Terrorist Screening Center (TSC) is providing a near real time, synchronized... appropriate clearances or permissions. Retention and disposal: The WLS will maintain a near real time mirror... difficulties they experienced during their travel screening at transportation hubs such as airports and train...

  14. Immigration: Terrorist Grounds for Exclusion and Removal of Aliens

    National Research Council Canada - National Science Library

    Garcia, Michael J; Wasem, Ruth E

    2007-01-01

    ...., legal permanent residents) or temporarily as nonimmigrants. Notably, any alien who engages in terrorist activity, or is a representative or member of a designated foreign terrorist organization, is generally inadmissible...

  15. Definition of Terrorist Act under Eth Law

    African Journals Online (AJOL)

    Wondwossen_D_K

    advanced legal system and rule of law. This article is ..... environmental causes could fall within the terrorism Act 2000 definition.20 ..... Convention for the Suppression of Unlawful Seizure of Aircraft, done at ..... control of any public services.

  16. 77 FR 23278 - Notice of Lodging of Consent Decree Under the Clean Air Act

    Science.gov (United States)

    2012-04-18

    ... accept small appliances, motor vehicle air conditioners (``MVACs''), or MVAC- like appliances with cut... DEPARTMENT OF JUSTICE Notice of Lodging of Consent Decree Under the Clean Air Act Notice is hereby... Agency (``U.S. EPA''), sought penalties and injunctive relief under the Clean Air Act (``CAA'') against...

  17. 76 FR 76762 - Notice of Lodging of Consent Decree Under the Clean Air Act

    Science.gov (United States)

    2011-12-08

    ... recovery at no additional cost; (2) no longer accept small appliances, motor vehicle air conditioners... DEPARTMENT OF JUSTICE Notice of Lodging of Consent Decree Under the Clean Air Act Notice is hereby.... Environmental Protection Agency (``U.S. EPA''), sought penalties and injunctive relief under the Clean Air Act...

  18. 76 FR 57764 - Notice of Lodging of Consent Decree Under the Clean Air Act

    Science.gov (United States)

    2011-09-16

    ... recovery at no additional cost; (2) no longer accept small appliances, motor vehicle air conditioners... DEPARTMENT OF JUSTICE Notice of Lodging of Consent Decree Under the Clean Air Act Notice is hereby... Agency (``U.S. EPA''), sought penalties and injunctive relief under the Clean Air Act (``CAA'') against...

  19. Bombing alone: tracing the motivations and antecedent behaviors of lone-actor terrorists,.

    Science.gov (United States)

    Gill, Paul; Horgan, John; Deckert, Paige

    2014-03-01

    This article analyzes the sociodemographic network characteristics and antecedent behaviors of 119 lone-actor terrorists. This marks a departure from existing analyses by largely focusing upon behavioral aspects of each offender. This article also examines whether lone-actor terrorists differ based on their ideologies or network connectivity. The analysis leads to seven conclusions. There was no uniform profile identified. In the time leading up to most lone-actor terrorist events, other people generally knew about the offender's grievance, extremist ideology, views, and/or intent to engage in violence. A wide range of activities and experiences preceded lone actors' plots or events. Many but not all lone-actor terrorists were socially isolated. Lone-actor terrorists regularly engaged in a detectable and observable range of activities with a wider pressure group, social movement, or terrorist organization. Lone-actor terrorist events were rarely sudden and impulsive. There were distinguishable behavioral differences between subgroups. The implications for policy conclude this article. © 2013 American Academy of Forensic Sciences.

  20. Reducing the attractiveness of chemical plants to terrorist attacks: dehorning rhinos

    NARCIS (Netherlands)

    Khakzad Rostami, N.

    2017-01-01

    The terrorist attacks to two French chemical facilities in June and July 2015 raised the flag about the attractiveness of chemical plants to terrorist groups and the imminent risk of similar attacks in western countries. Although the 9/11 terrorist attacks in the US put the security of chemical

  1. Is ALARP applicable to the management of terrorist risks?

    International Nuclear Information System (INIS)

    Guikema, S.D.; Aven, T.

    2010-01-01

    In this paper, we discuss the applicability of the as low as reasonable practicable (ALARP) principle to terrorist risk management. ALARP is a commonly used framework for managing risk due to non-intelligent threats, but terrorism introduces difficult issues, both technically and socially. In particular, the probability of a terrorist attack is difficult to define, terrorist threats are adaptive, and some terrorist risk management actions raise issues of loss of civil liberties not raised by risk management measures for other types of risk. We discuss these issues and their implications for risk management. After showing how ALARP is used to manage the risk from other hazards in different economic sectors, we discuss both the benefits and difficulties associated with extending the ALARP framework for terrorist risk analysis. We conclude that the ALARP framework can be modified to make it appropriate for risk management for adaptive risks, provided that care is taken to explicitly consider adaptive reallocation of risk in response to risk management actions, to account for perceived or actual loss of civil liberties resulting from risk management actions, and to consider the difficulties associated with using probability to measure uncertainty in adversary actions.

  2. Enhancing U.S. Defenses Against Terrorist Air Attacks

    National Research Council Canada - National Science Library

    2004-01-01

    .... Air Force, law enforcement authorities, the Federal Aviation Administration, airport security personnel, and many other agencies share responsibility for closing gaps in our national air defenses...

  3. The 1990 Clean Air Act amendments

    International Nuclear Information System (INIS)

    Torrens, I.M.; Cichanowicz, J.E.; Platt, J.B.

    1992-01-01

    The impacts of the 1990 Clean Air Act Amendments on utilities are substantial, presenting a host of new technical challenges, introducing new business risks, changing costs of electric generation, creating new winners and losers, and calling for new organizational responses capable of dealing with the complexity and short time for decisions. The magnitude of costs and unknowns puts clean air compliance into a new league of energy issues, in which the decisions utilities must make are not simply technological or engineering economic choices, but rather are very complex business decisions with numerous stakeholders, pitfalls, and opportunities. This paper summarizes the key regulatory requirements of the CAAA, outlines compliance options and questions facing the utility industry, and addresses how utility strategic business decisions could be affected

  4. Fossil fuels and air pollution in USA after the Clean Air Act

    International Nuclear Information System (INIS)

    Chuveliov, A.V.

    1990-01-01

    This paper addresses environmental issues in the USA after the Clean Air Act. Economic damage assessment to population and environment due to air pollution from stationary and mobile sources producing and utilizing fossil fuels in the USA for the period of 1970--1986 is determined and discussed. A comparison of environmental damage assessments for the USA and USSR is provided. The paper also addresses ecologo-economical aspects of hydrogen energy and technology. The effectiveness of hydrogen use in ferrous metallurgy and motor vehicles in the USA is determined and discussed

  5. Money, media and the anti-politics of terrorist finance

    NARCIS (Netherlands)

    de Goede, M.

    2008-01-01

    This article offers a critical analysis of the anti-politics of terrorist finance, understood as the particularly depoliticized governing practices enabled in its name. The article conceptualizes 'terrorist finance' not as an unproblematic reality which has elicited a state response, but as a

  6. 78 FR 2333 - Approval of the Clean Air Act, Section 112(l), Authority for Hazardous Air Pollutants: Asbestos...

    Science.gov (United States)

    2013-01-11

    ...] Approval of the Clean Air Act, Section 112(l), Authority for Hazardous Air Pollutants: Asbestos Management... protection, Administrative practice and procedure, Air pollution control, Hazardous substances, Incorporation...-Sw 2100: Management and Control of Asbestos Disposal Sites Not Operated after July 9, 1981,'' and the...

  7. Reducing Mortality from Terrorist Releases of Chemical and Biological Agents: I. Filtration for Ventilation Systems in Commercial Building

    Energy Technology Data Exchange (ETDEWEB)

    Thatcher, Tracy L.; Daisey, Joan M.

    1999-09-01

    There is growing concern about potential terrorist attacks involving releases of chemical and/or biological (CB) agents, such as sarin or anthrax, in and around buildings. For an external release, the CB agent can enter the building through the air intakes of a building's mechanical ventilation system and by infiltration through the building envelope. For an interior release in a single room, the mechanical ventilation system, which often recirculates some fraction of the air within a building, may distribute the released CB agent throughout the building. For both cases, installing building systems that remove chemical and biological agents may be the most effective way to protect building occupants. Filtration systems installed in the heating, ventilating and air-conditioning (HVAC) systems of buildings can significantly reduce exposures of building occupants in the event of a release, whether the release is outdoors or indoors. Reduced exposures can reduce the number of deaths from a terrorist attack. The purpose of this report is to provide information and examples of the design of filtration systems to help building engineers retrofit HVAC systems. The report also provides background information on the physical nature of CB agents and brief overviews of the basic principles of particle and vapor filtration.

  8. Categorizing terrorist entities listed by the European Union according to terrorist groups’ underlying motives

    Directory of Open Access Journals (Sweden)

    Liane Rothenberger

    2015-10-01

    Full Text Available States and international organizations have compiled lists of a great variety of terrorist groups. The current European Union list includes 44 entities. This study analyzes the underlying motives of the terrorist organizations named in this list. In order to understand the groups’ motivations and consequently be able to advise on methods of countering them with communication strategies, we employ a three-item typology provided by Waldmann (2001. The results show that only five of the 44 groups were religiously motivated to commit terrorism. Most of the groups (n=20 had nationalist-separatist motives, and 19 groups displayed social-revolutionary motives. Based on the respective motives, differing counter-terrorism strategies are proposed, e.g., developing rhetorical counter-narratives that address and reduce the groups’ motivational and identity-generating characteristics.

  9. Intelligence Constraints on Terrorist Network Plots

    Science.gov (United States)

    Woo, Gordon

    Since 9/11, the western intelligence and law enforcement services have managed to interdict the great majority of planned attacks against their home countries. Network analysis shows that there are important intelligence constraints on the number and complexity of terrorist plots. If two many terrorists are involved in plots at a given time, a tipping point is reached whereby it becomes progressively easier for the dots to be joined and for the conspirators to be arrested, and for the aggregate evidence to secure convictions. Implications of this analysis are presented for the campaign to win hearts and minds.

  10. Israeli Adolescents' Coping Strategies in Relation to Terrorist Attacks

    Science.gov (United States)

    Tatar, Moshe; Amram, Sima

    2007-01-01

    Exposure to terrorism seriously threatens the well-being of children and adolescents. Israeli citizens have witnessed massive ongoing terrorist attacks during the last few years. The present research, conducted among 330 Israeli adolescents, examined coping strategies in relation to terrorist attacks. We found that adolescents utilize more…

  11. The alliance relationship analysis of international terrorist organizations with link prediction

    Science.gov (United States)

    Fang, Ling; Fang, Haiyang; Tian, Yanfang; Yang, Tinghong; Zhao, Jing

    2017-09-01

    Terrorism is a huge public hazard of the international community. Alliances of terrorist organizations may cause more serious threat to national security and world peace. Understanding alliances between global terrorist organizations will facilitate more effective anti-terrorism collaboration between governments. Based on publicly available data, this study constructed a alliance network between terrorist organizations and analyzed the alliance relationships with link prediction. We proposed a novel index based on optimal weighted fusion of six similarity indices, in which the optimal weight is calculated by genetic algorithm. Our experimental results showed that this algorithm could achieve better results on the networks than other algorithms. Using this method, we successfully digged out 21 real terrorist organizations alliance from current data. Our experiment shows that this approach used for terrorist organizations alliance mining is effective and this study is expected to benefit the form of a more powerful anti-terrorism strategy.

  12. Underfunding in Terrorist Organizations

    Science.gov (United States)

    Shapiro, Jacob N.; Siegel, David A.

    A review of international terrorist activity reveals a pattern of financially strapped operatives working for organizations that seem to have plenty of money. To explain this observation, and to examine when restricting terrorists’ funds will reduce their lethality, we model a hierarchical terror organization in which leaders delegate financial and logistical tasks to middlemen, but cannot perfectly monitor them for security reasons. These middlemen do not always share their leaders’ interests: the temptation exists to skim funds from financial transactions. When middlemen are sufficiently greedy and organizations suffer from sufficiently strong budget constraints, leaders will not fund attacks because the costs of skimming are too great. Using general functional forms, we find important nonlinearities in terrorists’ responses to government counter-terrorism. Restricting terrorists’ funds may be ineffective until a critical threshold is reached, at which point cooperation within terrorist organizations begins to break down and further government actions have a disproportionately large impact.

  13. A project to develop restoration methods for buildings and facilities after a terrorist attack

    Energy Technology Data Exchange (ETDEWEB)

    Fingas, M.F. [Environment Canada, Ottawa, ON (Canada). Emergencies Science and Technology Div]|[Environment Canada, Ottawa, ON (Canada). River Road Environmental Technology Centre; Volchek, K.; Hornof, M.; Boudreau, L.; Punt, M. [SAIC Canada, Ottawa, ON (Canada); Payette, P.; Best, M. [Health Canada, Ottawa, ON (Canada); Garbutt, M.; Krishnan, J.; Wagener, S.; Bernard, K. [Health Canada, Winnipeg, MB (Canada); Cousins, T.; Haslip, D. [Defence Research and Development Canada, Ottawa, ON (Canada)

    2004-07-01

    A multi-agent project was initiated to review site restoration after a terrorist attack. The objective was to acquire and compile information on all known restoration procedures for buildings, exteriors of buildings, their interior contents, and adjacent areas such as parking lots, lawns and vehicles. All procedures were then tested and validated. Restoration procedures included pickup, neutralization, decontamination, removal and final destruction/deposition of the contaminant, cleaning material and contaminated debris resulting from the terrorist act. This research and development project considered chemical, biological and nuclear contamination with the intent to develop methods to decontaminate and restore buildings after a chemical, biological and radiological (CBR) attack. Ideas were collected from work conducted around the world. The efficacy of best candidates was tested along with all selected chemical target items. The project also involved the preparation of procedures for decontamination and restoration. Ultimately, a tradeoff decision basis will be developed to provide information on abandonment and quarantine versus cleanup. The study revealed that there are several technologies that can be used for the decontamination of structures and equipment after acts of terrorism, however, no one technique will work for all contaminants on all surfaces. The selection of a decontamination method depends on the contaminant, the surface being decontaminated and economic, social and health factors. The amount of waste generated by decontamination is a major feasibility factor. 25 refs., 6 tabs.

  14. Acts of terrorism in Paris and Brussels: common and different

    Directory of Open Access Journals (Sweden)

    O. S. Vonsovych

    2016-10-01

    Full Text Available The article investigates the common and distinctive features of the terrorist attacks in Paris and Brussels in 2015 and 2016. The attacks have confirmed the weakness of European security system in the context of the protection of its citizens from the threat № 1 in the world. The high level of democracy and liberalism are not allowed to use power instruments effectively in the fight against terrorism, which was the result of the fact that the terrorists were able to freely access to the place of their acts and to implement them. It was determined that the common features are the following: in Paris and in Brussels, the attacks were carried out by terrorist militaristic group «The Islamic State of Iraq and the Levant» (ISIL; the places of commission of terrorist acts; guns of terrorists; military units of France and Belgium are parties of the armed conflict in Syria on the side of the Syrian opposition and struggle against ISIL; there were a few terrorist attacks. It is proved that the differences are as follows: in Paris, in addition to explosives, packed with nails, also were used automatic weapons and grenades, but only explosives in Brussels; France is more active in the fight against terrorism in the international arena and in every way opposed to violence against humanity, so there is a terrorist attack can be seen as a blow to the democratic and humanitarian values; Belgium is a «political heart» of the European Union that’s why the terrorist attack on it can be seen as a blow to the political system of the EU; in Paris, the attack was supposed to apply except for the population and for high officials in the name of F. Hollande and F. Steinmeier, and in Brussels – only civilians.conducting effective public diplomacy by means of virtual diplomacy. In the context of the establishment of the global information society the key target groups must be: Diasporas, foreign media (including bloggers, investors, influential foreign

  15. Optimal counterterrorism and the recruitment effect of large terrorist attacks

    DEFF Research Database (Denmark)

    Jensen, Thomas

    2011-01-01

    We analyze a simple dynamic model of the interaction between terrorists and authorities. Our primary aim is to study optimal counterterrorism and its consequences when large terrorist attacks lead to a temporary increase in terrorist recruitment. First, we show that an increase in counterterrorism...... makes it more likely that terrorist cells plan small rather than large attacks and therefore may increase the probability of a successful attack. Analyzing optimal counterterrorism we see that the recruitment effect makes authorities increase the level of counterterrorism after large attacks. Therefore......, in periods following large attacks a new attack is more likely to be small compared to other periods. Finally, we analyze the long-run consequences of the recruitment effect. We show that it leads to more counterterrorism, more small attacks, and a higher sum of terrorism damage and counterterrorism costs...

  16. Saudi Arabia: Terrorist Financing Issues

    National Research Council Canada - National Science Library

    Blanchard, Christoper M; Prados, Alfred B

    2007-01-01

    According to the U.S. State Department 2007 International Narcotics Control Strategy Report, Saudi donors and unregulated charities have been a major source of financing to extremist and terrorist groups over the past 25 years...

  17. Terrorist use of the Internet: exploitation and support through ICT infrastructure

    CSIR Research Space (South Africa)

    Veerasamy, N

    2011-03-01

    Full Text Available methods of fundraising are also possible. Electronic money transfer, laundering and generating support through front organisations are all fundraising methods used by terrorists (Goodman, Kirk & Kirk 2007). According to the Financial Action Task Force... agent. This allows terrorist groups to move money around without actually delivering the auctioned goods or services. Online casinos can be used for both laundering and storing money. When dealing with large sums of money, terrorists can place...

  18. Know thy enemy: Education about terrorism improves social attitudes toward terrorists.

    Science.gov (United States)

    Theriault, Jordan; Krause, Peter; Young, Liane

    2017-03-01

    Hatred of terrorists is an obstacle to the implementation of effective counterterrorism policies-it invites indiscriminate retaliation, whereas many of the greatest successes in counterterrorism have come from understanding terrorists' personal and political motivations. Drawing from psychological research, traditional prejudice reduction strategies are generally not well suited to the task of reducing hatred of terrorists. Instead, in 2 studies, we explored education's potential ability to reduce extreme negative attitudes toward terrorists. Study 1 compared students in a college course on terrorism (treatment) with wait-listed students, measuring prosocial attitudes toward a hypothetical terrorist. Initially, all students reported extremely negative attitudes; however, at the end of the semester, treatment students' attitudes were significantly improved. Study 2 replicated the effect within a sample of treatment and control classes drawn from universities across the United States. The present work was part of an ongoing research project, focusing on foreign policy and the perceived threat of terrorism; thus classes did not explicitly aim to reduce prejudice, making the effect of treatment somewhat surprising. One possibility is that learning about terrorists "crowds out" the initial pejorative associations-that is, the label terrorism may ultimately call more information to mind, diluting its initial negative associative links. Alternatively, students may learn to challenge how the label terrorist is being applied. In either case, learning about terrorism can decrease the extreme negative reactions it evokes, which is desirable if one wishes to implement effective counterterrorism policies. (PsycINFO Database Record (c) 2017 APA, all rights reserved).

  19. Islamic State and Its Attitude to the Terrorist Attacks on the Energy Sector

    Directory of Open Access Journals (Sweden)

    Lukáš Tichý

    2016-06-01

    Full Text Available The main aim of this article is both to analyze the importance of the terrorist attacks on energy infrastructure and industry for strategy of militant terrorist organization Islamic State against the background of the influence of Islam and to describe a specific example and manifestations of the terrorist activities focused on energy sector in the Middle East and North Africa. In the theoretical level, the article is based on the concept of terrorist attack on energy sector and relation between energy and Sunni Islam. In methodological level, the article is based on the case study method framing terrorist attacks of Islamic State on energy industry and infrastructure in Iraq, Syria and Libya.

  20. Bombing Alone: Tracing the Motivations and Antecedent Behaviors of Lone-Actor Terrorists*,†,‡

    Science.gov (United States)

    Gill, Paul; Horgan, John; Deckert, Paige

    2014-01-01

    This article analyzes the sociodemographic network characteristics and antecedent behaviors of 119 lone-actor terrorists. This marks a departure from existing analyses by largely focusing upon behavioral aspects of each offender. This article also examines whether lone-actor terrorists differ based on their ideologies or network connectivity. The analysis leads to seven conclusions. There was no uniform profile identified. In the time leading up to most lone-actor terrorist events, other people generally knew about the offender’s grievance, extremist ideology, views, and/or intent to engage in violence. A wide range of activities and experiences preceded lone actors’ plots or events. Many but not all lone-actor terrorists were socially isolated. Lone-actor terrorists regularly engaged in a detectable and observable range of activities with a wider pressure group, social movement, or terrorist organization. Lone-actor terrorist events were rarely sudden and impulsive. There were distinguishable behavioral differences between subgroups. The implications for policy conclude this article. PMID:24313297

  1. Terrorist threats of nuclear facilities

    International Nuclear Information System (INIS)

    Jozsef Solymosi; Jozser Ronaky; Zoltan Levai; Arpad Vincze; Laszlo Foldi

    2004-01-01

    More than one year has passed since the terrible terrorist attacks against the United States. The tragic event fundamentally restructured our security policy approach and made requirements of countering terrorism a top priority of the 21st century. In one year a lot of studies were published and the majority of them analyses primarily the beginnings of terrorism then focus on the interrelations of causes and consequences of the attacks against the WTC. In most of the cases the authors can only put their questions most of which have remained unanswered to date. Meanwhile, in a short while after the attacks the secret assessments of threat levels of potential targets and areas were also prepared. One of the high priority fields is the issue of nuclear, biological, and chemical security, in short NBC-security. Here and now we focus on component N, that is the assessment techniques of nuclear security in short, without aiming at completeness. Our definite objective is to make non-expert readers understand - and present a concrete example as it is done in risk analysis - the real danger-level of nuclear facilities and especially the terrorist threat. Our objective is not to give tips to terrorists but to provide them with deterring arguments and at the same time calm worried people. In our communique we give an overview of international practice of nuclear antiterrorism and of preventive nuclear protection in Hungary. (author)

  2. Family Therapy of Terroristic Trauma: Psychological Syndromes and Treatment Strategies.

    Science.gov (United States)

    Miller, Laurence

    2003-01-01

    Reviews pertinent literature on terroristic trauma and combines this information with the author's experience in treating adults, children, and family victims and survivors of recent terrorist attacks. Describes the psychological syndromes resulting from terrorism and discusses the relevant individual and family therapy modalities for treating…

  3. Personality and Fear of Terrorist attacks in Ghana: The mediating ...

    African Journals Online (AJOL)

    The study aimed at determining whether or not neuroticism would account for more variance in predicting risk perception and fear of terrorist attack in Ghana compared to conscientiousness. Moreover, it sought to examine the mediating effect of risk perception on the relationship between neuroticism and fear of terrorist ...

  4. Notification: Background Investigation Services EPA’s Efforts to Incorporate Environmental Justice Into Clean Air Act Inspections for Air Toxics

    Science.gov (United States)

    Project #OPE-FY14-0017, March 7, 2014. The OIG plans to begin the preliminary research phase of an evaluation of the EPA's efforts to incorporate environmental justice into Clean Air Act (CAA) inspections for air toxics.

  5. Remediation following a CBRN terrorist attack : domestic and international perspectives

    Energy Technology Data Exchange (ETDEWEB)

    Yanofsky, N. [Defence Research and Development Canada, Ottawa, ON (Canada)

    2005-07-01

    The risks of chemical, biological and radiological/nuclear (CBRN) agents in terrorist attacks is well recognized. Serious measures must be in place to respond to terrorist attacks that involve these agents, including cleanup of affected buildings, machinery, land, water and air. This paper describes what is expected from the science community in the development of adequate, reliable and economical decontamination methods and equipment. It also discusses improved detection methods and adequate personal protection. Cleanup after a terrorist attack has much in common with the cleanup of contaminated sites or dealing with the consequences of industrial accidents, particularly as most potential chemical terror agents are represented by toxic industrial chemicals. The major needs of organizations involved in cleanup procedures were reviewed. Issues concerning first responders, assessment of situations, information collecting and the detection of possible chemical, biological and radiological agents were discussed. The development of generic decontamination procedures and equipment was suggested, with reference to the fact that the spectrum of CBRN weapons is very broad. In addition, the development of detection systems and instruments capable of analyzing a broad range of agents was also seen as desirable. New generation instruments such as Toxic Industrial Materials (TIMs) detectors were reviewed. Guidelines for cleanup procedures and remediation efforts were examined. It was also noted that there is relatively little information available to predict the behaviour of potential agents of CBRN terrorism in a complex urban environment. By studying different complex threat scenarios, scientists, first responders and other parties can achieve a better understanding of how to optimize the deployment of their resources. Mechanical, physiochemical and biological methods of decontamination were evaluated. Issues concerning waste disposal were discussed. It was noted that the

  6. Agent Based Modeling on Organizational Dynamics of Terrorist Network

    OpenAIRE

    Bo Li; Duoyong Sun; Renqi Zhu; Ze Li

    2015-01-01

    Modeling organizational dynamics of terrorist network is a critical issue in computational analysis of terrorism research. The first step for effective counterterrorism and strategic intervention is to investigate how the terrorists operate with the relational network and what affects the performance. In this paper, we investigate the organizational dynamics by employing a computational experimentation methodology. The hierarchical cellular network model and the organizational dynamics model ...

  7. EWAS: Modeling Application for Early Detection of Terrorist Threats

    Science.gov (United States)

    Qureshi, Pir Abdul Rasool; Memon, Nasrullah; Wiil, Uffe Kock

    This paper presents a model and system architecture for an early warning system to detect terrorist threats. The paper discusses the shortcomings of state-of-the-art systems and outlines the functional requirements that must to be met by an ideal system working in the counterterrorism domain. The concept of generation of early warnings to predict terrorist threats is presented. The model relies on data collection from open data sources, information retrieval, information extraction for preparing structured workable data sets from available unstructured data, and finally detailed investigation. The conducted investigation includes social network analysis, investigative data mining, and heuristic rules for the study of complex covert networks for terrorist threat indication. The presented model and system architecture can be used as a core framework for an early warning system.

  8. Kidnapping by Terrorist Groups, 1970-2010: Is Ideological Orientation Relevant?

    Science.gov (United States)

    Forest, James J. F.

    2012-01-01

    This article examines whether a terrorist group's ideology has a meaningful impact on its involvement in kidnapping. On a global level, incident data (1970-2010) indicate that in the past decade the number of kidnappings by terrorist groups has increased, while Muslim extremists have replaced left-wing/Marxist revolutionaries as the world's…

  9. Federal-state partnership: An overview of the Clean Air Act through the 1980s

    International Nuclear Information System (INIS)

    Anon.

    1991-01-01

    This chapter examines the experience with Clean Air Act regulation over the past two decades as a means of understanding the multiple layers of regulatory requirements that now exist since the enactment of the 1990 Amendments to the Act. The efforts of Congress and the EPA to deal with the complexities of clean air regulation suggest several themes for the 1990s: more federal oversight, more complex regulatory issues, an emphasis on alternatives to traditional rulemaking proceedings, and a search for innovative ways to control the escalating costs of clean air regulation

  10. Closing the gap : measuring the social identity of terrorists

    OpenAIRE

    Ludwick, Keith W.

    2008-01-01

    CHDS State/Local Studies of terrorism today focus on psychological and behavioral aspects of individuals. Most research shows that using a single model in an attempt to profile terrorists psychologically is problematic, if not impossible. However, using two well established theories from social psychology, Social Identity Theory and Social Distance Theory, allows the development of a practical model to develop a social profile of a terrorist group. From that, it is further possible to...

  11. Environmental terrorism

    International Nuclear Information System (INIS)

    Zirschky, J.

    1988-01-01

    Environmental terrorism is described as the deliberate use or threat of use of physical, chemical, nuclear, or bacteriological agents in the commission of a terrorist act; an act in which either the agent is delivered to a target population by use of an environmental medium (such as air, water, or soil) or the agent is used to render a natural resource unsuitable for a desired use. Among the recommendations for safeguarding against environmental terrorism are: changes in reporting requirements for chemical inventories and sensitive information such as security measures; development of effective emergency response plans; development of a public relations program to be implemented after an incident in which the goal of the terrorist is to discredit a particular company; and protection from liability for terrorist acts

  12. 25 CFR 11.402 - Terroristic threats.

    Science.gov (United States)

    2010-04-01

    ... ORDER CODE Criminal Offenses § 11.402 Terroristic threats. A person is guilty of a misdemeanor if he or she threatens to commit any crime of violence with purpose to terrorize another or to cause evacuation...

  13. Countering the Nuclear Terrorist Threat

    International Nuclear Information System (INIS)

    Vantine, H C

    2002-01-01

    The nuclear/radioactive threat to homeland security posed by terrorists can be broken into four categories. Of highest concern is the use of an improvised nuclear device (IND). An IND, as its name implies, is a nuclear explosive device. It produces nuclear yield, and this nuclear yield has catastrophic effects. An IND is the ultimate terrorist weapon, and terrorist groups are actively attempting to acquire nuclear weapons. Detonation of an IND could dwarf the devastation of the September 11 attack on the World Trade Center. Dealing with the aftermath of an IND would be horrific. Rescue efforts and cleanup would be hazardous and difficult. Workers would have to wear full protection suits and self-contained breathing apparatus. Because of the residual radioactivity, in certain locations they could only work short times before acquiring their ''lifetime'' dose. As with the Chernobyl event, some rescue workers might well expose themselves to lethal doses of radiation, adding to the casualty toll. Enormous volumes of contaminated debris would have to be removed and disposed. If a terrorist group decides not to pursue an actual nuclear device, it might well turn to Radiological Dispersal Devices (RDDs) or ''dirty bombs'' as they are often called. RDDs spread radioactivity but they do not generate nuclear yield. The fabrication of an RDD requires radioactive material and a dispersal mechanism. Radioactive materials are used all over the world for medical, industrial, and research applications. Standards for safe handling and accountability of radioactive material vary around the world. Stories in the press suggest inadequate controls on radiological materials in parts of the world. The effects of an RDD vary widely, and are measured in terms of contamination area, health effects to the exposed population, and economic consequences. Even a negligible, but measurable, exposure would exploit the general public's fear of things radioactive and would have significant

  14. The Development of Decision Aids for Counter-Terrorist Applications

    Science.gov (United States)

    1980-12-01

    I.D. AM OLT of PLO A14YOLP of PLO Agua Sandinist TPLF of Turkey 0 TERORISTS 3 4 25 2 GROUP CAPABILITY Unknown Unknown Auto Weapons Sten Gun "DEADLINE...of any terrorist group to different situ - ations are not independent, but reflect a coherent policy regarding violence and willingness to negotiate...importance in this stage is the need to deter future terrorist activities with- out jeopardizing our credibility in future negotiation situ - ations. I8

  15. Section 112 hazardous air pollutants Clean Air Act Amendments of 1990; potential impact of fossil/NUC

    International Nuclear Information System (INIS)

    Cronmiller, R.E.

    1990-01-01

    Control of hazardous air pollutants under the Clean Air Act (CAA) goes back several decades. Section 112 of the 1970 CAA as amended in 1977 served as the national statutory basis for controlling hazardous air pollutants until the most recent 1990 Amendments. Following severe criticism of the effectiveness of the Act to address hazardous air pollutant issues and a pile of seemingly never ending lawsuits challenging the regulatory process, the U.S. Congress has substantially rewritten Section 112 in the 1990 CAA Amendments. Many provisions heretofore requiring findings or regulatory decisions by the Environmental Protection Agency (EPA) Administrator are now automatic in the sense that the decisions have already been made by the US Congress legislatively. Thus, the new Section 112 has eliminated many of the existing regulatory obstacles, or safeguards; this will likely result in sweeping new regulatory programs mandating extensive controls on many industrial activities. A much needed study program to address fossil fuel fired steam electric generating units' hazardous air emissions and to identify control alternatives to regulate these emissions, if regulation is required, was incorporated into new Section 112. Because of this study, the regulatory fate of these units under the new Section 112 remains highly uncertain. An extensive regulatory program addressing hazardous air pollutants of these utility units under Section 112 would dwarf electric utility costs associated with the new acid rain control program. First, this paper identifies major provisions of the old law and the resulting regulatory status for both coal and nuclear power facilities before addressing the new Section 112 under the 1990 CAA Amendments and potential implications for electric utilities specifically

  16. Who sets the Agenda: The Author or the Terrorist?

    DEFF Research Database (Denmark)

    Søndergaard, Leif

    2012-01-01

    Definitions of terrorism. Terorism in the 1980s, i.e. taking hostages and exploding bombs outside the US. UNA-bomber and Oklahoma bomber. Relations between author and terrorist in and outside USA before 9/11. Relations between terrorist and press. President Bush's rhetoric and various reactions t...... to 9/11. Novels by Safran Foer (Extremely Loud and Incredibly Close) and Don DeLillo (Falling Man) focus on the personal and private consequences whereas Mohsin Hamid (The Reluctant Fundamentalist) includes the other side....

  17. 76 FR 9609 - Notice of Proposed Consent Decree Under the Clean Air Act

    Science.gov (United States)

    2011-02-18

    ... the Environmental Protection Agency and the San Joaquin Valley Unified Air Pollution Control District... related to emissions of pollutants; install and operate required pollution control technology; undertake... Clean Air Act, 42 U.S.C. 7413(b), for alleged environmental violations at defendant's biomass electric...

  18. Sub Saharan African Terrorist Groups’ use of the Internet

    Directory of Open Access Journals (Sweden)

    Stewart Bertram

    2014-02-01

    Full Text Available Recent actions by French military forces in Niger and the global prominence of terrorist groups such as Al Shabaab and Boko Haram, have highlighted the growing counter terrorist focus on the countries of Sub Saharan Africa. Additionally in a post Bin Laden world and with the immanent withdrawal of coalition combat troops from Afghanistan, there is the possibility of Africa as a continent becoming the new front in the Global War on Terror ('Mben' et al., 2013. However, it is a mistake to assume that Africa’s story is uniformly one of violence and death. Vibrant cultures and a rugged entrepreneurial spirit have combined with a robust Internet backbone, to create the embryonic emergence of high tech hotspots across Africa. With rising IT literacy levels, more and more Africans are becoming connected to the information super highway on a daily basis (Graham, 2010. A tiny minority of these Africans are terrorists.

  19. Anti-money laundering and counter-terrorist financing in the Luxembourg investment fund market

    OpenAIRE

    Dietz, Andrea

    2017-01-01

    The field of Anti-Money Laundering and Counter-Terrorist Financing in their current form have had an important impact on the financial world for almost half a century. Today, Money Laundering and Terrorist Financing pose a threat to the integrity of the financial markets and systems worldwide. The intention behind implementing a regulatory Anti-Money Laundering and Counter-Terrorist Financing framework is to cut off the financial resources of criminals and to follow back the traces that finan...

  20. The impact of cost recovery on electric utilities' Clean Air Act compliance strategies

    International Nuclear Information System (INIS)

    Bensinger, D.L.

    1993-01-01

    By 1995, over 200 electric power plant units in twenty one states must comply with Phase I of the acid rain requirements in Title IV of the 1990 Clean Air Act Amendments (CAAA). By the year 2000, an additional 2200 units must comply with the Title IV. Compliance costs are expected to necessitate significant electricity rate increases. In order to recover their compliance costs, utilities must file rate increase requests with state public utility commissions (PUC's), and undergo a rate proceeding involving public heatings. Because of the magnitude of cost and the complexity of compliance options, including interaction with Titles I and III of the CAAA, extensive PUC reviews of compliance strategies are likely. These reviews could become as adversarial as the nuclear prudence reviews of the 1980's. A lack of understanding of air pollution and the CAA by much of the general public and the flexibility of compliance options creates an environment conducive to adverse public reaction to the cost of complying with the Clean Air Act. Public attitudes toward pollution control technologies will be greatly affected by these hearings, and the early plant hearings will shape the utility rate making process under the Clean Air Act. Inadequate cost recovery due to constrained compliance strategies or adverse hearings could significantly inhibit industry willingness to invest in certain control technologies or advanced combustion technologies. There are already signs that Clean Air Act compliance will be the prudence issue of the 1990's for utilities, even where state statutes mandate particular compliance approaches. Specific actions should be undertaken now by the utility industry to improve the probability of sound cost recovery decisions, preserve compliance options, including multimedia strategies, and avoid the social- and cost-acceptance problems of nuclear power

  1. Combatting Commercial Terrorists: The PKK Case

    Science.gov (United States)

    2015-12-01

    Kurdistan Workers’ Party, drug trafficking, human trafficking, cigarette smuggling, prostitution, extortion, money laundering , Turkey 15. NUMBER OF...91 F. MONEY LAUNDERING ............................................................... 93 G. CONCLUSION...opportunity to launder illegal money . Also, donations from a sympathetic population is another source of money and legitimacy for terrorist

  2. Risk Management Programs under Clean Air Act Section 112(r): Guidance for Implementing Agencies

    Science.gov (United States)

    Accidental release prevention programs under section 112(r) of the Clean Air Act (CAA) are related to and build on activities under the Emergency Planning and Community Right-to-Know Act, and Occupational Safety and Health Administration standards.

  3. 75 FR 24946 - Proposed Consent Decree, Clean Air Act Citizen Suit

    Science.gov (United States)

    2010-05-06

    ..., South Carolina, Wisconsin, Indiana, Michigan, Ohio, Louisiana, Kansas, Nebraska, Missouri, Colorado..., Wisconsin, Indiana, Michigan, Ohio, Louisiana, Kansas, Nebraska, Missouri, Colorado, Montana, South Dakota... ENVIRONMENTAL PROTECTION AGENCY [FRL-9146-3] Proposed Consent Decree, Clean Air Act Citizen Suit...

  4. Air toxics provisions of the Clean Air Act: Potential impacts on energy

    International Nuclear Information System (INIS)

    Hootman, H.A.; Vernet, J.E.

    1991-11-01

    This report provides an overview of the provisions of the Clean Air Act and its Amendments of 1990 that identify hazardous air pollutant (HAP) emissions and addresses their regulation by the US Environmental Protection Agency (EPA). It defines the major energy sector sources of these HAPs that would be affected by the regulations. Attention is focused on regulations that would cover coke oven emissions; chromium emission from industrial cooling towers and the electroplating process; HAP emissions from tank vessels, asbestos-related activities, organic solvent use, and ethylene oxide sterilization; and emissions of air toxics from municipal waste combustors. The possible implications of Title III regulations for the coal, natural gas, petroleum, uranium, and electric utility industries are examined. The report discusses five major databases of HAP emissions: (1) TRI (EPA's Toxic Release Inventory); (2) PISCES (Power Plant Integrated Systems: Chemical Emissions Studies developed by the Electric Power Research Institute); (3) 1985 Emissions Inventory on volatile organic compounds (used for the National Acid Precipitation Assessment Program); (4) Particulate Matter Species Manual (EPA); and (5) Toxics Emission Inventory (National Aeronautics and Space Administration). It also offers information on emission control technologies for municipal waste combustors

  5. Air emission points for facilities in Iowa with operating permits for Title V of the Federal Clean Air Act_considered MAJOR permits

    Data.gov (United States)

    Iowa State University GIS Support and Research Facility — Air emission points for facilities in Iowa with operating permits for Title V of the Federal Clean Air Act, considered "major" permits. Also includes emission points...

  6. Dynamical Adaptation in Terrorist Cells/Networks

    DEFF Research Database (Denmark)

    Hussain, Dil Muhammad Akbar; Ahmed, Zaki

    2010-01-01

    Typical terrorist cells/networks have dynamical structure as they evolve or adapt to changes which may occur due to capturing or killing of a member of the cell/network. Analytical measures in graph theory like degree centrality, betweenness and closeness centralities are very common and have long...

  7. Forensic Analysis of Terrorist Counter-Financing to Combat Nuclear Proliferation

    Energy Technology Data Exchange (ETDEWEB)

    Drame, B. [Brookhaven National Lab. (BNL), Upton, NY (United States); Toler, L. [Brookhaven National Lab. (BNL), Upton, NY (United States); Bachner, Katherine [Brookhaven National Lab. (BNL), Upton, NY (United States)

    2016-02-01

    The single greatest threat to U.S. homeland security remains the proliferation of nuclear weapons, especially among terrorists and other non-state actors who are not governed by the Non-Proliferation Treaty. One of the most important tools for combating terrorism among such rogue actors is counter-financing. Without funding, terrorists cannot acquire, maintain, or deploy nuclear weapons. According to the official report of the 9/11 Commission, counter-financing could have prevented the attacks of September 11, 2001. Unfortunately, no single country can defeat global terrorism. Successful counter-financing requires significant international cooperation. Since 2001, the United States and the European Union, despite vastly different approaches to intelligence gathering, have shared information through the Terrorist Finance Tracking Program (TFTP). That shared information allows authorities to trace suspicious transactions, identify culprits, and map out global terrorist networks. The TFTP successfully thwarted a 2011 plot to assassinate the Saudi Arabian Ambassador to the U.S. and multiple threats during the 2012 Summer Olympics in London; it also aided in the investigation of the 2013 Boston Marathon bombing. That program is necessary but not sufficient. To strengthen our ability to detect and disrupt terrorist plotting and prevent nuclear proliferation, we must expand and coordinate two additional transnational measures: (1) the Society for Worldwide Interbank Financial Telecommunications (SWIFT), a standardized global messaging network for financial institutions to quickly, accurately, and securely send and receive money transfer instructions, and (2) International Bank Account Numbers (IBAN) to identify individual accounts involved in international transactions. Both initiatives were incompletely adopted in the wake of 9/11, but most global banks use one or neither. More fully implementing and coordinating these two systems would allow for coherent information

  8. The Proliferation of Unmanned Aerial Vehicles: Terrorist Use, Capability, and Strategic Implications

    Energy Technology Data Exchange (ETDEWEB)

    Ball, Ryan Jokl [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2017-10-16

    There has been unparalleled proliferation and technological advancement of consumer unmanned aerial vehicles (UAVs) across the globe in the past several years. As witnessed over the course of insurgency tactics, it is difficult to restrict terrorists from using widely available technology they perceive as advantageous to their overall strategy. Through a review of the characteristics, consumer market landscape, tactics, and countertactics, as well as operational use of consumer-grade UAVs, this open-source report seeks to provide an introductory understanding of the terrorist-UAV landscape, as well as insights into present and future capabilities. The caveat is evaluating a developing technology haphazardly used by terrorists in asymmetric conflicts.

  9. The Dynamics of the Creation, Evolution, and Disappearance of Terrorist Internet Forums

    Directory of Open Access Journals (Sweden)

    Manuel Ricardo Torres-Soriano

    2013-06-01

    Full Text Available An examination of the organizational nature of the threat posed by jihadi terrorism, supplying quantitative and qualitative data on the dynamics behind the creation, evolution, and disappearance of the main jihadi Internet forums during the period 2008–2012. An analysis of the origins and functions of the forums, their links with terrorist organizations, their internal structures, and the processes accounting for their stability in cyberspace shows that far from representinga horizontal structure where the main actors are a network of followers, the terrorist presence on the Internet is in fact a hierarchical organization in which intervention by formal terrorist organizations plays a crucial role.

  10. Terrorist Capabilities for Cyberattack: Overview and Policy Issues

    National Research Council Canada - National Science Library

    Rollins, John; Wilson, Clay

    2005-01-01

    .... Persistent Internet and computer security vulnerabilities, which have been widely publicized, may gradually encourage terrorists to develop new computer skills, or develop alliances with criminal...

  11. Threat Assessment: Do Lone Terrorists Differ from Other Lone Offenders?

    OpenAIRE

    Diane M. Zierhoffer

    2014-01-01

    This study evaluates the viability of a threat assessment model developed to calculate the risk of targeted violence as a predictor of violence by potential lone terrorists. There is no profile, to date, which would assist in the identification of a lone terrorist prior to an attack. The threat assessment model developed by Borum, Fein, Vossekuil, and Berglund and described in “Threat Assessment: Defining an approach for evaluating risk of targeted violence” (1999) poses ten questions about t...

  12. TePiTri : a screening method for assessing terrorist-related pipeline transport risks

    NARCIS (Netherlands)

    Reniers, G.; Dullaert, W.E.H.

    2012-01-01

    The article proposes an approach to determine relative terrorist-related security risk levels of pipeline transportation. Pipeline routes are divided into smaller route segments. Subsequently, likelihood scores of possible terrorist-related incidents are determined per route segment and per

  13. Training, SEVIS, and NSEERS: Will They Stop Terrorists from Entering the U.S

    National Research Council Canada - National Science Library

    Bugarin, Darwina S

    2007-01-01

    .... Stopping their entry is key to preventing attacks. The 9/11 Commission's Staff Report of the National Commission on Terrorist Attacks Upon the United States, 9/11 and Terrorist Travel, identified pre-9/11 gaps/weaknesses in U.S...

  14. 78 FR 69709 - Notice of Extension to Public Comment Period for Consent Decree Under the Clean Air Act and the...

    Science.gov (United States)

    2013-11-20

    ... Clean Air Act and the Emergency Planning and Community Right- To Know Act'' On September 30, 2013, the... lawsuit filed under the Clean Air Act and the Emergency Planning & Community Right to Know Act, the United... would receive comments concerning the settlement for a period of thirty (30) days from the date of...

  15. Mass casualty response in the 2008 Mumbai terrorist attacks.

    Science.gov (United States)

    Roy, Nobhojit; Kapil, Vikas; Subbarao, Italo; Ashkenazi, Isaac

    2011-12-01

    The November 26-29, 2008, terrorist attacks on Mumbai were unique in its international media attention, multiple strategies of attack, and the disproportionate national fear they triggered. Everyone was a target: random members of the general population, iconic targets, and foreigners alike were under attack by the terrorists. A retrospective, descriptive study of the distribution of terror victims to various city hospitals, critical radius, surge capacity, and the nature of specialized medical interventions was gathered through police, legal reports, and interviews with key informants. Among the 172 killed and 304 injured people, about four-fifths were men (average age, 33 years) and 12% were foreign nationals. The case-fatality ratio for this event was 2.75:1, and the mortality rate among those who were critically injured was 12%. A total of 38.5% of patients arriving at the hospitals required major surgical intervention. Emergency surgical operations were mainly orthopedic (external fixation for compound fractures) and general surgical interventions (abdominal explorations for penetrating bullet/shrapnel injuries). The use of heavy-duty automatic weapons, explosives, hostages, and arson in these terrorist attacks alerts us to new challenges to medical counterterrorism response. The need for building central medical control for a coordinated response and for strengthening public hospital capacity are lessons learned for future attacks. These particular terrorist attacks had global consequences, in terms of increased security checks and alerts for and fears of further similar "Mumbai-style" attacks. The resilience of the citizens of Mumbai is a critical measure of the long-term effects of terror attacks.

  16. The Lord’s Resistance Army: an African Terrorist Group?

    Directory of Open Access Journals (Sweden)

    Emma Leonard

    2011-01-01

    Full Text Available The years since 9/11 have been characterised by the increasing threat of terrorist action in the  Middle East and South Asia. Yet Sub-Saharan Africa was has also become a region of concern. In 1998, it had been the scene of two Al-Qaeda attacks against US embassies; besides Africa is home to large Muslim populations. Since 9/11 African violent non-state groups unrelated to Al- Qaeda or to the wider Islamist movement have been recast as terrorist organisations. These groups primarily operate in conflict zones, an area of research that traditionally has not been the main focus of Terrorism Studies. Protagonists have at various times been called freedom fighters, rebels, warlords, insurgents or simply violent gangs. This article looks at the most notorious of African groups – the Lord’s Resistance Army (LRA. It argues that some groups like the LRA have been recast as terrorist organisations not because of a change in their activities but due to a change in the geo-strategic environment they found themselves in the post-9/11 period. The LRA’s ideology and tactics will be judged against a broad definition of terrorism in order to test whether the group can, in an objective way, be called a terrorist organisation. It is concluded that the LRA is too ambiguous an organisation to be simply labelled in such a way. It is also suggested that the terrorism label has in fact been an obstacle to attempts to end successfully a confrontation that is now going into its 24th year. 

  17. Severe accidents and terrorist threats at nuclear reactors

    International Nuclear Information System (INIS)

    Pollack, G.L.

    1987-01-01

    Some of the key areas of uncertainty are the nature of the physical and chemical interactions of released fission products and of the interactions between a molten core and concrete, the completeness and validity of the computer codes used to predict accidents, and the behavior of the containment. Because of these and other uncertainties, it is not yet possible to reliably predict the consequences of reactor accidents. It is known that for many accident scenarios, especially less severe ones or where the containment is not seriously compromised, the amount of radioactive material expected to escape the reactor is less, even much less, than was previously calculated. For such accidents, the predictions are easier and more reliable. With severe accidents, however, there is considerable uncertainty as to the predicted results. For accidents of the type that terrorists might cause - for example, where the sequence of failure would be unexpected or where redundant safety features are caused to fail together - the uncertainties are still larger. The conclusion, then, is that there are potential dangers to the public from terrorist actions at a nuclear reactor; however, because of the variety of potential terrorist threats and the incompleteness of the knowledge about the behavior of reactor components and fission products during accidents, the consequences cannot yet be assessed quantitatively

  18. Comparison between penalties coming from malevolent act against nuclear materials and facilities in Japan, US, Italy and France

    International Nuclear Information System (INIS)

    Rossi, Fabiana

    2013-01-01

    In the last years, some relevant terrorist events have demonstrated that an attack on a nuclear facility might be attempted and that terrorists have formidable capabilities and dedication. As a consequence, these events have served as a catalyst for the development of the global nuclear security regime in all countries. This has led to an increased focus on defenses against terrorists at nuclear facilities, as well as at other critical infrastructures. This intention of increase defense is carried out from both an operational and a legislative point of view. In addition to, and following the IAEA recommendations, national law starts considering these events in term of penalties of these acts. In this framework, this work aimed to compare the sanctions and punishments provided from law coming not only from the non-conformity with the legislation, but also from malevolent act against nuclear materials and facilities, in different countries. Taking as reference the US (with the Atomic Energy Act of 1954 as amended) and France (with the French Defense Code), the Italian and Japanese case will be compared showing similarities, differences and vacancies in their legislations. (author)

  19. Notification: Background Investigation Services New Assignment Notification: EPA’s Efforts to Incorporate Environmental Justice Into Clean Air Act Inspections for Air Toxics

    Science.gov (United States)

    The purpose of this memorandum is to notify you that the EPA OIG plans to begin the preliminary research phase of an evaluation of the U.S. EPA's efforts to incorporate environmental justice into Clean Air Act inspections for air toxics.

  20. 40 years of terrorist bombings - A meta-analysis of the casualty and injury profile.

    Science.gov (United States)

    Edwards, D S; McMenemy, L; Stapley, S A; Patel, H D L; Clasper, J C

    2016-03-01

    Terrorists have used the explosive device successfully globally, with their effects extending beyond the resulting injuries. Suicide bombings, in particular, are being increasingly deployed due to the devastating effect of a combination of high lethality and target accuracy. The aim of this study was to identify trends and analyse the demographics and casualty figures of terrorist bombings worldwide. Analysis of the Global Terrorism Database (GTD) and a PubMed/Embase literature search (keywords "terrorist", and/or "suicide", and/or "bombing") from 1970 to 2014 was performed. 58,095 terrorist explosions worldwide were identified in the GTD. 5.08% were suicide bombings. Incidents per year are increasing (Pprofile of survivors to guide the immediate response by the medical services and the workload in the coming days. Copyright © 2016 Elsevier Ltd. All rights reserved.

  1. Restaurant employment before and after the New York City Smoke-Free Air Act.

    Science.gov (United States)

    Hyland, A; Cummings, K M

    1999-01-01

    The purpose of this study was to observe trends in the number of restaurants and restaurant employees two years before and two years after the New York City Smoke-Free Air Act took effect in April, 1995. Between April 1993 and April 1997, New York City added 19,347 new restaurant jobs (18% increase) while the rest of the state outside the immediate metropolitan area added 7,423 new jobs (5% increase). The rate of growth in the number of restaurants was comparable among New York City, neighboring counties, and the rest of the state. The data suggest that the New York City Smoke-Free Air Act did not result in job losses for the city's restaurant industry.

  2. 78 FR 43200 - Proposed Settlement Agreement, Clean Air Act Citizen Suit

    Science.gov (United States)

    2013-07-19

    ... Social Responsibility--Los Angeles v. EPA, No. 12-56175, upon receipt of written notice from EPA that the... ENVIRONMENTAL PROTECTION AGENCY [EPA-HQ-OGC-2013-0484; FRL-9835-6] Proposed Settlement Agreement, Clean Air Act Citizen Suit AGENCY: Environmental Protection Agency (EPA). ACTION: Notice of proposed...

  3. Assessment of terrorist threats to the Canadian energy sector

    Energy Technology Data Exchange (ETDEWEB)

    Shull, A. [Carleton Univ., Ottawa, ON (Canada). Norman Paterson School of International Affairs]|[Ottawa Univ., ON (Canada). Faculty of Law

    2006-03-15

    A critical terrorist threat assessment of Canadian energy systems was presented, as well as an analysis of integrated continental systems. Recent responses to heightened threat levels on the part of the Canadian government have ranged from information sharing to emergency preparedness and disaster mitigation strategies. This paper examined threats that the energy sector has traditionally encountered and argued that response capabilities do not match current threats posed by terrorism. The potential of a terrorist attack on the Canadian energy infrastructure is significant and has been referred to as a possible target by terrorist organizations. Actions taken by the Canadian government in response to heightened threat levels were examined. A review of energy industry security measures included outlines of: the natural gas industry, the electric sector, and nuclear reactors and waste. It was noted that not all elements of the critical energy infrastructure share the same level of risk. Recommendations included increased information sharing between government agencies and the private sector; resiliency standards in densely populated areas; and insulating the energy grid against a cascading blackout through the use of DC rather than AC lines. 59 refs.

  4. Assessment of terrorist threats to the Canadian energy sector

    International Nuclear Information System (INIS)

    Shull, A.

    2006-01-01

    A critical terrorist threat assessment of Canadian energy systems was presented, as well as an analysis of integrated continental systems. Recent responses to heightened threat levels on the part of the Canadian government have ranged from information sharing to emergency preparedness and disaster mitigation strategies. This paper examined threats that the energy sector has traditionally encountered and argued that response capabilities do not match current threats posed by terrorism. The potential of a terrorist attack on the Canadian energy infrastructure is significant and has been referred to as a possible target by terrorist organizations. Actions taken by the Canadian government in response to heightened threat levels were examined. A review of energy industry security measures included outlines of: the natural gas industry, the electric sector, and nuclear reactors and waste. It was noted that not all elements of the critical energy infrastructure share the same level of risk. Recommendations included increased information sharing between government agencies and the private sector; resiliency standards in densely populated areas; and insulating the energy grid against a cascading blackout through the use of DC rather than AC lines. 59 refs

  5. A data-stream classification system for investigating terrorist threats

    Science.gov (United States)

    Schulz, Alexia; Dettman, Joshua; Gottschalk, Jeffrey; Kotson, Michael; Vuksani, Era; Yu, Tamara

    2016-05-01

    The role of cyber forensics in criminal investigations has greatly increased in recent years due to the wealth of data that is collected and available to investigators. Physical forensics has also experienced a data volume and fidelity revolution due to advances in methods for DNA and trace evidence analysis. Key to extracting insight is the ability to correlate across multi-modal data, which depends critically on identifying a touch-point connecting the separate data streams. Separate data sources may be connected because they refer to the same individual, entity or event. In this paper we present a data source classification system tailored to facilitate the investigation of potential terrorist activity. This taxonomy is structured to illuminate the defining characteristics of a particular terrorist effort and designed to guide reporting to decision makers that is complete, concise, and evidence-based. The classification system has been validated and empirically utilized in the forensic analysis of a simulated terrorist activity. Next-generation analysts can use this schema to label and correlate across existing data streams, assess which critical information may be missing from the data, and identify options for collecting additional data streams to fill information gaps.

  6. Defense against terroristic hazards and risk by building planning law

    International Nuclear Information System (INIS)

    Hopkins, Richard

    2012-01-01

    The book on defense against terroristic hazards and risk by building planning law includes the following issues: Introduction: civil engineering and safety. Risk, hazards and urban planning: historical and actual examples for the constructional danger prevention, terroristic threat and urban planning. Risk, hazards and terrorism: sociology and risk, law and risk, terrorism - risk or hazard? Answer to uncertainty - risk prevention, catastrophe law as link. Risk, hazard, terrorism and the public building and regional planning law: regional planning law as point of origin, building law and terrorism, possibility of control by the legal building regulations.

  7. 75 FR 62421 - Notice of Lodging of Consent Decree Under the Clean Air Act

    Science.gov (United States)

    2010-10-08

    ... States of America v. James Valley Ethanol, LLC, Northern Lights Ethanol, LLC, and Poet Plant Management... Ethanol, LLC (``James Valley''), Northern Lights Ethanol, LLC (``Northern Lights''), and POET Plant Management (``POET'') pursuant to Sections 111 and 502(a) of the Clean Air Act (the ``Act''), 42 U.S.C. 7411...

  8. 77 FR 39262 - Notice of Lodging of Consent Decree Under the Clean Air Act

    Science.gov (United States)

    2012-07-02

    ... Frozen Bakery Products, Inc. (collectively ``Cottage'') for violations of the federal Clean Air Act, 42 U... Joaquin Valley Unified Air Pollution Control District v. Cottage Bakery, Inc. and Ralcorp Frozen Bakery Products, Inc., case number 2:12-at-00895, was lodged with the United States District Court for the Eastern...

  9. Terrorist Capabilities for Cyberattack: Overview and Policy Issues

    National Research Council Canada - National Science Library

    Rollins, John; Wilson, Clay

    2005-01-01

    ... organizations and consider attempting a cyberattack against the critical infrastructure. Cybercrime increased dramatically between 2004 and 2005, and several recent terrorist events appear to have been funded partially through online credit card fraud...

  10. Analysing Personal Characteristics of Lone-Actor Terrorists: Research Findings and Recommendations

    OpenAIRE

    Roy, de, van Zuijdewijn J.; Bakker, E.

    2016-01-01

    This Research Note presents the outcome of a project that looked at the personal characteristics of lone-actor terrorists. It is part of the larger Countering Lone-Actor Terrorism (CLAT) project. The project described here aimed to improve understanding of, and responses to, the phenomenon of (potentially) violent lone-actors based on an analysis of 120 cases from across Europe. The Research Note focuses on the personal characteristics of lone-actor terrorists.[1] First of all, it presents th...

  11. Simulation studies of an air Cherenkov telescope, IceACT, for future IceCube surface extensions

    Energy Technology Data Exchange (ETDEWEB)

    Hansmann, Bengt; Auffenberg, Jan; Bekman, Ilja; Kemp, Julian; Roegen, Martin; Schaufel, Merlin; Stahlberg, Martin; Wiebusch, Christopher [III. Physikalisches Institut B, RWTH Aachen, Aachen (Germany); Bretz, Thomas; Hebbeker, Thomas; Middendorf, Lukas; Niggemann, Tim; Schumacher, Johannes [III. Physikalisches Institut A, RWTH Aachen, Aachen (Germany); Collaboration: IceCube-Collaboration

    2015-07-01

    IceACT is a compact air Cherenkov telescope using silicon photomultipliers. The Fresnel lens based design has been adopted from the fluorescence telescope FAMOUS. The goal of IceACT is the efficient detection of cosmic ray induced air showers above the IceCube Neutrino Observatory at the geographic South Pole. This allows to distinguish cosmic ray induced muons and neutrinos in the southern sky from astrophysical neutrinos in the deep ice detector. This leads to an increase in low-background astrophysical neutrinos of several dozen events per year for a detection threshold of several 100 TeV cosmic ray primary energy. To determine the actual telescope performance, dedicated CORSIKA air shower simulations incorporating the full Cherenkov light information are performed.

  12. Can a Copycat Effect be Observed in Terrorist Suicide Attacks?

    Directory of Open Access Journals (Sweden)

    Nicholas Farnham

    2017-03-01

    Full Text Available The purpose of this paper is to explore how a copycat effect – established within the field of suicide studies – may manifest itself in terrorist suicide attacks, and takes an exploratory approach in evaluating the prospect of incorporating open-data resources in future counter-terrorism research. This paper explores a possible ‘copycat effect’ in cases of suicide terrorism, which entails a perpetrator being inspired by a preceding attack to carry out a similar attack not long after the original. In the wake of mounting risks of lone wolf terrorist attacks today and due to the general difficulties faced in preventing such attacks, in this paper we explore a potential area of future prevention in media reporting, security and anti-terrorism policies today. Using the START Global Terrorism Database (GTD, this paper investigates terrorist suicide-attack clusters and analyses the relationship between attacks found within the same cluster. Using a mixed-method approach, our analyses did not uncover clear evidence supporting a copycat effect among the studied attacks. These and other findings have numerous policy and future research implications.

  13. How States Carry Out Acts of Terror: Wars, Strategies and Tactics in Bosnia and Herzegovina and Kosovo

    Directory of Open Access Journals (Sweden)

    MA. Astrit Lleshi

    2016-01-01

    Full Text Available Terrorism is a notoriously difficult concept that defies single universal definition. Terrorists intentionally employ violence in order to instill fear in their victims and the wider public. Terrorist movements aim to achieve their political, social and/or religious goals through use of violent acts. (Hoffman, 1998: 43 In most cases terrorism is perpetrated by non-state actors and is "bottom up" challenge to the existing political order. However this article argues that the nature of the crime and not the perpetrator should determine whether some criminal act constitutes terrorism and acts of terror can also be committed by states and/or state actors. In this article, the author will examine the overall strategy and tactics used by the Milosevic and Karadzic regimes in BiH and Kosovo to fulfil their wartime ambitions of maintaining and consolidating control over Serb and Serb-occupied territory, relying primarily upon the indictments and judgments of the ICTY in which they and members of their armed forces acting under their authority have been charged and/or convicted of war crimes and terror, along with reports from international organizations such as the United Nations and other sources. Through an analysis of these tactics against leading definitions of terrorism, it will be demonstrated that rather than fighting against terrorists and insurgents, the Milosevic and Karadzic regimes carried out acts of terror during the wars in Kosovo and BiH, respectively, and furthermore Milosevic was sponsoring state-terrorism in BiH (Blakely, 2012: 3-4.

  14. The regulation of hazardous air pollutants under the Clean Air Act Amendments of 1990: Effects on the Portland cement industry

    International Nuclear Information System (INIS)

    Mikols, E.H.; Gill, A.S.; Dougherty, A.

    1996-01-01

    Title III of the 1990 Clean Air Act Amendments (CAAA) addresses the control of hazardous air pollutants (HAPs) from major sources of air pollution in the US. In the CAAA, Congress defined 189 compounds as hazardous air pollutants in need of additional control by the Environmental Protection Agency (EPA). Congress directed EPA to identify the major source categories which emit HAPs and to prepare regulations that would reduce and control future HAP emissions. This paper outlines the activities undertaken by EPA to regulate HAP emissions from Portland cement plants and the program developed by the Portland cement manufacturing industry to cope with Title III

  15. Suits Against Terrorist States by Victims of Terrorism

    National Research Council Canada - National Science Library

    Elsea, Jennifer K

    2008-01-01

    ... assets to satisfy judgments. After a court ruled that Congress never created a cause of action against terrorist States themselves, but only against their officials, employees, and agents, plaintiffs have based claims on state law...

  16. Clean Air Act compliance issues/panel

    International Nuclear Information System (INIS)

    Anon.

    1992-01-01

    This morning, four panelists will discuss the birth of the free market allowance trading system, how it was formed, when it was formed, how it was sold, how allowance trading has worked, how it is expected to work, and how utilities are planning based on allowance trading. We will also hear from a utility commissioner who will make some of the final decisions on cost recovery. So we will have various perspectives today on allowance trading. Many of you are here to learn more about how to comply with the Clean Air Act Amendments of 1990. Allowance trading is the cornerstone of the entire Title 4, the acid deposition title of the amendments, in which SO 2 emission allowances are a tradeable right. Following the four presentations, we will entertain questions to the four participants from the audience

  17. Chemical Plants Remain Vulnerable to Terrorists: A Call to Action

    Science.gov (United States)

    Lippin, Tobi Mae; McQuiston, Thomas H.; Bradley-Bull, Kristin; Burns-Johnson, Toshiba; Cook, Linda; Gill, Michael L.; Howard, Donna; Seymour, Thomas A.; Stephens, Doug; Williams, Brian K.

    2006-01-01

    U.S. chemical plants currently have potentially catastrophic vulnerabilities as terrorist targets. The possible consequences of these vulnerabilities echo from the tragedies of the Bhopal incident in 1984 to the terrorist attacks on 11 September 2001 and, most recently, Hurricanes Katrina and Rita. Findings from a 2004 nationwide participatory research study of 125 local union leaders at sites with very large volumes of highly hazardous chemicals suggest that voluntary efforts to achieve chemical plant security are not succeeding. Study respondents reported that companies had only infrequently taken actions that are most effective in preventing or in preparing to respond to a terrorist threat. In addition, companies reportedly often failed to involve key stakeholders, including workers, local unions, and the surrounding communities, in these efforts. The environmental health community thus has an opportunity to play a key role in advocating for and supporting improvements in prevention of and preparation for terrorist attacks. Policy-level recommendations to redress chemical site vulnerabilities and the related ongoing threats to the nation’s security are as follows: a) specify detailed requirements for chemical site assessment and security; b) mandate audit inspections supported by significant penalties for cases of noncompliance; c) require progress toward achieving inherently safer processes, including the minimizing of storage of highly hazardous chemicals; d) examine and require additional effective actions in prevention, emergency preparedness, and response and remediation; e) mandate and fund the upgrading of emergency communication systems; and f) involve workers and community members in plan creation and equip and prepare them to prevent and respond effectively to an incident. PMID:16966080

  18. 31 CFR 594.310 - Specially designated global terrorist; SDGT.

    Science.gov (United States)

    2010-07-01

    ... (Continued) OFFICE OF FOREIGN ASSETS CONTROL, DEPARTMENT OF THE TREASURY GLOBAL TERRORISM SANCTIONS REGULATIONS General Definitions § 594.310 Specially designated global terrorist; SDGT. The term specially...

  19. Reflection in phraseological neology of traumatic historical events connected with the terrorist threat

    Directory of Open Access Journals (Sweden)

    Skorobogatova Taisiya Ivanovna

    2016-03-01

    Full Text Available The article is devoted to the analysis of phraseological units - neologisms which are associated with such traumatic historical events, as the implementation of terrorist acts. Particular emphasis is placed on the description of English, Russian and French phraseological units that have introduced the memory of the terrorist threat in the XX-XXI centuries.: Eng. That’s so 10th September (lit. today September 10, fig: Do not worry ahead of time about nothing; Rus. мочить в сортире (descriptor: беспощадно расправиться; фр. le prince s’est mari, le m chant est mort, c’est une semaine Walt Disney (lit. prince married the villain died, week Walt Disney; descriptor: Idyll, g n ration Bataclan (lit. Bataklan generation; descriptor: young people age of the victims who died in the “Bataklane”, i.e. young people aged 25-35. Phraseology description of new, emerging units is one of the most important problems in theoretical linguistics, namely: to illustrate and confirm the fact that the phrasebook body of a single national language is the result of the two memories - historical and linguistic. At the same time important to consider such a significant factor that determines the specificity of the national phraseological fund as memory selectivity in general and historical memory in particular.

  20. 75 FR 75463 - Clean Air Act Operating Permit Program; Petition To Object to Title V Permit for Luke Paper...

    Science.gov (United States)

    2010-12-03

    ... ENVIROMENTAL PROTECTION AGENCY [FRL-9234-9] Clean Air Act Operating Permit Program; Petition To Object to Title V Permit for Luke Paper Company, Luke, MD AGENCY: Environmental Protection Agency (EPA). ACTION: Notice of final action. SUMMARY: Pursuant to section 505(b)(2) of the Clean Air Act (CAA), the...

  1. Analytical technique to address terrorist threats by chemical weapons of mass destruction

    Science.gov (United States)

    Dempsey, Patrick M.

    1997-01-01

    Terrorism is no longer an issue without effect on the American mind. We now live with the same concerns and fears that have been commonplace in other developed and third world countries for a long time. Citizens of other countries have long lived with the specter of terrorism and now the U.S. needs to be concerned and prepared for terrorist activities.T he terrorist has the ability to cause great destructive effects by focusing their effort on unaware and unprepared civilian populations. Attacks can range from simple explosives to sophisticated nuclear, chemical and biological weapons. Intentional chemical releases of hazardous chemicals or chemical warfare agents pose a great threat because of their ready availability and/or ease of production, and their ability to cause widespread damage. As this battlefront changes from defined conflicts and enemies to unnamed terrorists, we must implement the proper analytical tools to provide a fast and efficient response. Each chemical uses in a terrorists weapon leaves behind a chemical signature that can be used to identify the materials involved and possibly lead investigators to the source and to those responsible. New tools to provide fast and accurate detection for battlefield chemical and biological agent attack are emerging. Gas chromatography/mass spectrometry (GC/MS) is one of these tools that has found increasing use by the military to respond to chemical agent attacks. As the technology becomes smaller and more portable, it can be used by law enforcement personnel to identify suspected terrorist releases and to help prepare the response; define contaminated areas for evacuation and safety concerns, identify the proper treatment of exposed or affected civilians, and suggest decontamination and cleanup procedures.

  2. In Their Own Words? Methodological Considerations in the Analysis of Terrorist Autobiographies

    Directory of Open Access Journals (Sweden)

    Mary Beth Altier

    2012-01-01

    Full Text Available Despite the growth of terrorism literature in the aftermath of the 9/11 attacks, there remain several methodological challenges to studying certain aspects of terrorism. This is perhaps most evident in attempts to uncover the attitudes, motivations, and intentions of individuals engaged in violent extremism and how they are sometimes expressed in problematic behavior. Such challenges invariably stem from the fact that terrorists and the organizations to which they belong represent clandestine populations engaged in illegal activity. Unsurprisingly, these qualities make it difficult for the researcher to identify and locate willing subjects of study—let alone a representative sample. In this research note, we suggest the systematic analysis of terrorist autobiographies offers a promising means of investigating difficult-to-study areas of terrorism-related phenomena. Investigation of autobiographical accounts not only offers additional data points for the study of individual psychological issues, but also provides valuable perspectives on the internal structures, processes, and dynamics of terrorist organizations more broadly. Moreover, given most autobiographies cover critical events and personal experiences across the life course, they provide a unique lens into how terrorists perceive their world and insight into their decision-making processes. We support our advocacy of this approach by highlighting its methodological strengths and shortcomings.

  3. 75 FR 25855 - Clean Air Act Advisory Committee (CAAAC): Notice of Meeting

    Science.gov (United States)

    2010-05-10

    ...) Permits/NSR/Toxics Integration--Liz Naess, (919) 541-1892; (2) Economic Incentives and Regulatory... Air Act of 1990. The Committee advises on economic, environmental, technical scientific, and...., Washington, DC. Seating will be available on a first come, first served basis. The Economic Incentives and...

  4. The personality profile of terrorist leaders: theoretical aspects and ways of measuring

    OpenAIRE

    Dimitrovska, Aleksandra; Dojcinovski, Metodija

    2015-01-01

    The main task of the psychology of terrorism is to explain the psychological aspects of terrorism, trying to provide answers about the behavior of the persons involved in terrorist activities. The literature suggests that there is no a single theory that explains the reasons and the way of "making the terrorists." While the first generation of research have viewed on terrorism as a pathology, explaining it predominantly through mental illness and psychopathic personality, th...

  5. Revised Clean Air Act - Consequent enforcement necessary

    International Nuclear Information System (INIS)

    Keel, A.

    2008-01-01

    This article discusses the stipulations of the Swiss Clean Air Act regarding wood-fired combustion systems. In particular, the regulations on fine-dust emissions from wood-fired systems are discussed and its influence on the market for wood-fired heating systems is examined. Conformity statements can be issued for heating systems with a power of less than 70 kW that are tested to meet EN standards by accredited testing facilities. The history of the Swiss Association for Wood Energy and its efforts to introduce quality labels in this area of business are discussed. The situation regarding equipment with a power of less than 70 kW is addressed, as are large-scale wood-fired furnaces with ratings up to over 1,000 kW.

  6. Impunity for International Terrorists? Key Legal Questions and Practical Considerations

    Directory of Open Access Journals (Sweden)

    Christophe Paulussen

    2012-04-01

    Full Text Available This Research Paper discusses several of the key questions related to the subject of impunity of international terrorists, taking both a fundamental and a more practical approach within the context of international law. First, it reflects on a number of core definitional and theoretical questions which have been pushed into the background of day‐to‐day reality, by the actual fight against terrorism. For instance: what does the concept of impunity entail exactly and which kinds of standards could be used in measuring impunity? Is it clear what falls under the header of international terrorism and can it in fact be argued that international terrorists enjoy impunity? In practical terms, the paper explores a number of questions related to the actual prosecution of terrorism. What are the obstacles that national prosecutors face every day when prosecuting suspects of international terrorism? To what extent does a rule that prima facie seems ideal to fight terrorism (aut dedere aut judicare: either extradite or prosecute apply to terrorist offences? And what is the role of international criminal law – and the international criminal tribunals – in fighting terrorism? The Paper concludes with a series of recommendations.

  7. Vulnerability analysis and critical areas identification of the power systems under terrorist attacks

    Science.gov (United States)

    Wang, Shuliang; Zhang, Jianhua; Zhao, Mingwei; Min, Xu

    2017-05-01

    This paper takes central China power grid (CCPG) as an example, and analyzes the vulnerability of the power systems under terrorist attacks. To simulate the intelligence of terrorist attacks, a method of critical attack area identification according to community structures is introduced. Meanwhile, three types of vulnerability models and the corresponding vulnerability metrics are given for comparative analysis. On this basis, influence of terrorist attacks on different critical areas is studied. Identifying the vulnerability of different critical areas will be conducted. At the same time, vulnerabilities of critical areas under different tolerance parameters and different vulnerability models are acquired and compared. Results show that only a few number of vertex disruptions may cause some critical areas collapse completely, they can generate great performance losses the whole systems. Further more, the variation of vulnerability values under different scenarios is very large. Critical areas which can cause greater damage under terrorist attacks should be given priority of protection to reduce vulnerability. The proposed method can be applied to analyze the vulnerability of other infrastructure systems, they can help decision makers search mitigation action and optimum protection strategy.

  8. Clean/alternative fueled fleet programs - 1990 Amendments to the Clean Air Act, the Colorado Air Pollution Prevention and Control Act, and Denver City and County regulations

    International Nuclear Information System (INIS)

    Bowles, S.L.; Manderino, L.A.

    1993-01-01

    Despite substantial regulations for nearly two decades, attainment of this ambient standards for ozone and carbon monoxide (CO) remain difficult goals to achieve, Even with of ozone precursors and CO. The 1990 Amendments to the Clean Air Act (CAA90) prescribe further reductions of mobile source emissions. One such reduction strategy is using clean fuels, such as methanol, ethanol, or other alcohols (in blends of 85 percent or more alcohol with gasoline or other fuel), reformulated gasoline or diesel, natural gas, liquified petroleum gas, hydrogen, or electricity. There are regulatory measures involving special fuels which will be required in areas heavily polluted with ozone and CO. The state of Colorado recently passed the 1992 Air Pollution Prevention and Control Act which included provisions for the use of alternative fuels which will be implemented in 1994. In addition to adhering to the Colorado state regulations, the city and county of Denver also have regulations pertaining to the use of alternative fuels in fleets of 10 or more vehicles. Denver's program began in 1992. This paper will address the issue of fleet conversion and its impact on industry in Colorado, and Denver in particular

  9. ANTI-TERROR POLICY OF UZBEKISTAN IN THE FRAMEWORK OF THE REGIONAL ANTI-TERRORIST POLICY OF THE SCO

    Directory of Open Access Journals (Sweden)

    С П Базылева

    2017-12-01

    Full Text Available The beginning of the XXI century was marked by a number of serious problems, including cancer, world hunger, environmental problems and increasing every year the problem of global terrorism, which poses a great threat to the security of the modern multipolar world. Uzbekistan today occupies a firm position in fight against terrorist threat. The principled position of Uzbekistan in the fight against terrorism is that “no country should exclude their participation in the fight against global terrorism, there must be no transit zones and "green corridors" for terrorist organizations”. The Central Asian region is one of the most vulnerable, because it is necessary to pay special attention to the strategy of the anti-terrorist security of the countries included in the structure of the Central Asian region. In this article, we consider the anti-terrorist policy of Uzbekistan in the framework of the regional anti-terrorist policy of the SCO.

  10. Closing the Gap: Measuring the Social Identity of Terrorists

    National Research Council Canada - National Science Library

    Ludwick, Keith W

    2008-01-01

    .... However, using two well-established theories from social psychology, Social Identity Theory and Social Distance Theory, allows the development of a practical model to develop a social profile of a terrorist group...

  11. California Clean Air Act: A compliance strategy for the City of San Diego`s non-emergency fleet

    Energy Technology Data Exchange (ETDEWEB)

    1992-12-31

    Historically, parts of California have had the worst air quality in the nation. The California Energy Commission began experimenting with alternate fuels in the 1970`s in an effort to reduce harmful automobile emissions and hence, improve air quality. It is recognized that the costs to California which result from our air quality problems are immense. Ten to twenty billion dollars each year is the estimated damage in terms of health impacts, materials damages, lost agricultural crop output and forest damages. As the California population increases and health care costs escalate, the total monetary damages from air pollution will increase. The California Energy Commission goal to improve air quality became a mandate in 1988 with the passage of the California Clean Air Act (CCAA). The CCAA requires a revised air quality strategy for the San Diego district since we do not meet State air quality standards for smog, carbon monoxide and nitrogen dioxide. Smog remains San Diego`s major air quality problem, even though the annual number of days each year over the Federal standard has been reduced by 55 percent in the past ten years. Ten years ago about two-thirds of San Diego`s smog was transported from Los Angeles. Today more than 60 per cent of the days San Diego exceeds the State standard are from locally generated smog. It is estimated that 57% of the reactive hydrocarbon emissions (which react with nitrogen dioxide in the presence of sunlight to form smog) is from cars, trucks and buses. The Air Pollution Control District (part of the County of San Diego) is the office that the Air Resources Board has put in charge of creating regulations and designing strategy to reduce polluting emissions. The purpose of this project is to determine the full cost of acquiring and operating a municipal fleet which meets the mandates of the California Clean Air Act. With that information, a plan to meet the Clear Air Act (CCAA) requirements can be formulated by local government.

  12. The Internet information infrastructure: Terrorist tool or architecture for information defense?

    Energy Technology Data Exchange (ETDEWEB)

    Kadner, S.; Turpen, E. [Aquila Technologies Group, Albuquerque, NM (United States); Rees, B. [Los Alamos National Lab., NM (United States)

    1998-12-01

    The Internet is a culmination of information age technologies and an agent of change. As with any infrastructure, dependency upon the so-called global information infrastructure creates vulnerabilities. Moreover, unlike physical infrastructures, the Internet is a multi-use technology. While information technologies, such as the Internet, can be utilized as a tool of terror, these same technologies can facilitate the implementation of solutions to mitigate the threat. In this vein, this paper analyzes the multifaceted nature of the Internet information infrastructure and argues that policymakers should concentrate on the solutions it provides rather than the vulnerabilities it creates. Minimizing risks and realizing possibilities in the information age will require institutional activities that translate, exploit and convert information technologies into positive solutions. What follows is a discussion of the Internet information infrastructure as it relates to increasing vulnerabilities and positive potential. The following four applications of the Internet will be addressed: as the infrastructure for information competence; as a terrorist tool; as the terrorist`s target; and as an architecture for rapid response.

  13. Lone Actor Terrorist Attack Planning and Preparation: A Data-Driven Analysis.

    Science.gov (United States)

    Schuurman, Bart; Bakker, Edwin; Gill, Paul; Bouhana, Noémie

    2017-10-23

    This article provides an in-depth assessment of lone actor terrorists' attack planning and preparation. A codebook of 198 variables related to different aspects of pre-attack behavior is applied to a sample of 55 lone actor terrorists. Data were drawn from open-source materials and complemented where possible with primary sources. Most lone actors are not highly lethal or surreptitious attackers. They are generally poor at maintaining operational security, leak their motivations and capabilities in numerous ways, and generally do so months and even years before an attack. Moreover, the "loneness" thought to define this type of terrorism is generally absent; most lone actors uphold social ties that are crucial to their adoption and maintenance of the motivation and capability to commit terrorist violence. The results offer concrete input for those working to detect and prevent this form of terrorism and argue for a re-evaluation of the "lone actor" concept. © 2017 The Authors. Journal of Forensic Sciences published by Wiley Periodicals, Inc. on behalf of American Academy of Forensic Sciences.

  14. Modeling Requirements for Simulating the Effects of Extreme Acts of Terrorism: A White Paper

    Energy Technology Data Exchange (ETDEWEB)

    Allen, M.; Hiebert-Dodd, K.; Marozas, D.; Paananen, O.; Pryor, R.J.; Reinert, R.K.

    1998-10-01

    This white paper presents the initial requirements for developing a new computer model for simulating the effects of extreme acts of terrorism in the United States. General characteristics of the model are proposed and the level of effort to prepare a complete written description of the model, prior to coding, is detailed. The model would simulate the decision processes and interactions of complex U. S. systems engaged in responding to and recovering from four types of terrorist incidents. The incident scenarios span the space of extreme acts of terrorism that have the potential to affect not only the impacted area, but also the entire nation. The model would be useful to decision-makers in assessing and analyzing the vulnerability of the nation's complex infrastructures, in prioritizing resources to reduce risk, and in planning strategies for immediate response and for subsequent recovery from terrorist incidents.

  15. Clean Air Act : historical information on EPA's process for reviewing California waiver requests and making waiver determinations

    Science.gov (United States)

    2009-01-01

    Emissions from mobile sources, such as automobiles and trucks, contribute to air quality degradation and can threaten public health and the environment. Under the Clean Air Act, the Environmental Protection Agency (EPA) regulates these emissions. The...

  16. Closing the Gap: Measuring the Social Identity of Terrorists

    National Research Council Canada - National Science Library

    Ludwick, Keith W

    2008-01-01

    .... From that, it is further possible to use the resulting social profile to compare terrorist groups against each other in order to develop predictive models as to the propensity of violence of a particular group...

  17. First data from IceAct, an imaging air Cherenkov telescope with SiPMs at the South Pole

    Energy Technology Data Exchange (ETDEWEB)

    Auffenberg, Jan; Bretz, Thomas; Hansmann, Bengt; Hansmann, Tim; Hebbeker, Thomas; Kemp, Julian; Middendorf, Lukas; Niggemann, Tim; Raedel, Leif; Schaufel, Merlin; Schumacher, Johannes; Stahlberg, Martin; Werhan, Ansgar; Wiebusch, Christopher [RWTH Aachen University (Germany)

    2016-07-01

    IceCube-Gen2 is planned to extend the IceCube Neutrino Observatory at the geographic South Pole. For neutrino astronomy, a large background-free sample of well-reconstructed astrophysical neutrinos is essential. The main background for this signal are muons and neutrinos which are produced in cosmic-ray air showers in the Earth's atmosphere. The coincident detection of these air showers by the surface detector IceTop has been proven to be a powerful veto for atmospheric neutrinos and muons in the field of view of the Southern Hemisphere. This motivates a large extension of IceTop to more efficiently detect cosmic rays, IceVeto. Part of these extension plans is an array of imaging air Cherenkov telescopes, IceAct. A first IceAct prototype is consisting of an SiPM camera and lens optics optimized for harsh environments. Compared to IceTop stations, these telescopes potentially lower the detection threshold for air showers at the cost of a lower duty cycle. We present first data, taken during the commissioning of an IceAct prototype in December 2015 at the South Pole.

  18. Game Theoretic Centrality Analysis of Terrorist Networks : The Cases of Jemaah Islamiyah and Al Qaeda

    NARCIS (Netherlands)

    Lindelauf, R.; Hamers, H.J.M.; Husslage, B.G.M.

    2011-01-01

    The identification of key players in a terrorist network can lead to prevention of attacks, due to efficient allocation of surveillance means or isolation of key players in order to destabilize the network. In this paper we introduce a game theoretic approach to identify key players in terrorist

  19. What we need to know ...and when. Educating the public about nuclear terrorist risks can help raise levels of security

    International Nuclear Information System (INIS)

    Khripunov, I.

    2006-01-01

    Nuclear power infrastructures could be the target of terrorist acts of theft, sabotage, unauthorized access or other malicious acts given their radiological and chemical content and potential for building weapons. Attacks on its major components, including fuel production, reactors, waste handling, and reprocessing facilities, would lead to serious consequences-even if there is little or no damage to a nuclear power plant itself and other related structures. Public fear of nuclear radiation, in combination with a possibly massive resultant blackout and other aggravating factors, could create significant distress and panic. In other words, successful terrorist attempts to attack nuclear power infrastructure can easily bring about systemic disaster. Systemic risks impact society on a large scale and their effects may spread much further from the original hazardous source. Those risks widely affect systems that society depends on, such as health, transport, environment, telecommunications. Their consequences may be technical, social, environmental, psychological and economic and involve different stakeholders. In this context, however, one important stakeholder has been under-appreciated, under-utilized and somewhat misunderstood: the general public. The nuclear power infrastructure must learn how to efficiently communicate to the public and develop better options for public risk communication that relate to deliberate attacks or accidents. The public is also a challenging stockholder because citizens are deeply split regarding the acceptability and value of nuclear power generation and tend to express their feelings emotionally. However, there is growing recognition that because of skyrocketing oil prices and evidence of the greenhouse effect, nuclear power may be approaching renaissance. Hence, the public must no longer be looked upon only as potential victims or panicked masses but rather as an important contributing factor for better nuclear security throughout

  20. An analysis of candidates for addition to the Clean Air Act list of hazardous air pollutants

    Energy Technology Data Exchange (ETDEWEB)

    Sonya Lunder; Tracey J. Woodruff; Daniel A. Axelrad [University of California, Berkeley, CA (United States). School of Public Health

    2004-02-01

    There are 188 air toxics listed as hazardous air pollutants (HAPs) in the Clean Air Act (CAA), based on their potential to adversely impact public health. This paper presents several analyses performed to screen potential candidates for addition to the HAPs list. We analyzed 1086 HAPs and potential HAPs, including chemicals regulated by the state of California or with emissions reported to the Toxics Release Inventory (TRI). HAPs and potential HAPs were ranked by their emissions to air, and by toxicity-weighted (tox-wtd) emissions for cancer and noncancer, using emissions information from the TRI and toxicity information from state and federal agencies. Separate consideration was given for persistent, bioaccumulative toxins (PBTs), reproductive or developmental toxins, and chemicals under evaluation for regulation as toxic air contaminants in California. Forty-four pollutants were identified as candidate HAPs based on three ranking analyses and whether they were a PBT or a reproductive or developmental toxin. Of these, nine qualified in two or three different rankings (ammonia (NH{sub 3}), copper (Cu), Cu compounds, nitric acid (HNO{sub 3}), N-methyl-2-pyrrolidone, sulfuric acid (H{sub 2}SO{sub 4}), vanadium (V) compounds, zinc (Zn), and Zn compounds). This analysis suggests further evaluation of several pollutants for possible addition to the CAA list of HAPs. 28 refs., 2 figs., 11 tabs.

  1. A Basic Study on Countermeasure Against Aerodynamic Force Acting on Train Running Inside Tunnel Using Air Blowing

    Science.gov (United States)

    Suzuki, Masahiro; Nakade, Koji

    A basic study of flow controls using air blowing was conducted to reduce unsteady aerodynamic force acting on trains running in tunnels. An air blowing device is installed around a model car in a wind tunnel. Steady and periodic blowings are examined utilizing electromagnetic valves. Pressure fluctuations are measured and the aerodynamic force acting on the car is estimated. The results are as follows: a) The air blowing allows reducing the unsteady aerodynamic force. b) It is effective to blow air horizontally at the lower side of the car facing the tunnel wall. c) The reduction rate of the unsteady aerodynamic force relates to the rate of momentum of the blowing to that of the uniform flow. d) The periodic blowing with the same frequency as the unsteady aerodynamic force reduces the aerodynamic force in a manner similar to the steady blowing.

  2. A survey of the extent of compliance with Title V of the Clean Air Act Amendments of 1990

    Energy Technology Data Exchange (ETDEWEB)

    Goss, Carol; Sandhu, Ravinder [Department of Environmental Analysis and Management, Troy State University, Troy (United States)

    1999-04-01

    As public awareness of environmental issues increases, the federal government is faced with continually renewing and redesigning the air quality regulations for the betterment of air quality. This study was designed to survey the compliance of Title V of the 1990 Clean Air Act by industries in Alabama, California, Pennsylvania, and South Carolina. Forty survey forms per state were sent out to facilities selected at random. The maximum number of responses were obtained from South Carolina followed by Alabama, California, and Pennsylvania. The study showed that large industries, with an average annual revenue in excess of ?10 million and more than 300 employees, responded with higher frequency and these companies were more in compliance with Title V of the 1990 Clean Air Act

  3. Protecting chemical plants against terrorist attacks: a review

    NARCIS (Netherlands)

    Khakzad Rostami, N.; Reniers, G.L.L.M.E.

    2015-01-01

    Protection of hazardous establishments such as chemical plants intentional incidents has drawn attention from safety and security experts since 9/11 terrorist attacks in the U.S. Although major steps have been taken since, the recent intentional incidents in two chemical plants in France in June and

  4. When Do Governments Concede to Terrorists

    Science.gov (United States)

    2014-06-01

    crisis, 146 people were taken hostage by the terrorist group Tupac Amaru (MRTA) at the Japanese Embassy in Peru . Six of those were American...hispanic_heritage/article-9475994 FARC-EP. (2009). Chronology of resistance: FARC-EP, a history of struggle. Retrieved from http://resistencia- colombia.org...index.php?option=com_content&view=article&id=463: chronology - of-resistance-farc-ep-a-history-of-struggle&catid=50&Itemid=85 Gladwell, M. (2000). The

  5. Anticipating Terrorist Safe Havens from Instability Induced Conflict

    Science.gov (United States)

    Shearer, Robert; Marvin, Brett

    This chapter presents recent methods developed at the Center for Army Analysis to classify patterns of nation-state instability that lead to conflict. The ungoverned areas endemic to failed nation-states provide terrorist organizations with safe havens from which to plan and execute terrorist attacks. Identification of those states at risk for instability induced conflict should help to facilitate effective counter terrorism policy planning efforts. Nation-states that experience instability induced conflict are similar in that they share common instability factors that make them susceptible to experiencing conflict. We utilize standard pattern classification algorithms to identify these patterns. First, we identify features (political, military, economic and social) that capture the instability of a nation-state. Second, we forecast the future levels of these features for each nation-state. Third, we classify each future state’s conflict potential based upon the conflict level of those states in the past most similar to the future state.

  6. 77 FR 20625 - Air Pollution Control: Proposed Action on Clean Air Act Grants to the Idaho Department of...

    Science.gov (United States)

    2012-04-05

    ...The U.S. EPA has made a proposed determination that reduction in expenditures of non-Federal funds for the Idaho Department of Environmental Quality (IDEQ) in support of its continuing air program under Clean Air Act (CAA) Section 105 for the period of calendar year 2010 was not selective relative to the expenditures of all other executive branch agencies in the State for the same period. This determination, when final, will reset IDEQ's required recipient maintenance of effort level for 2010 and 2011, retain its federal award for the 2010 and 2011 grant years, and allow IDEQ to remain eligible for a Sec. 105 grant for 2012 and beyond.

  7. A data fusion approach to indications and warnings of terrorist attacks

    Science.gov (United States)

    McDaniel, David; Schaefer, Gregory

    2014-05-01

    Indications and Warning (I&W) of terrorist attacks, particularly IED attacks, require detection of networks of agents and patterns of behavior. Social Network Analysis tries to detect a network; activity analysis tries to detect anomalous activities. This work builds on both to detect elements of an activity model of terrorist attack activity - the agents, resources, networks, and behaviors. The activity model is expressed as RDF triples statements where the tuple positions are elements or subsets of a formal ontology for activity models. The advantage of a model is that elements are interdependent and evidence for or against one will influence others so that there is a multiplier effect. The advantage of the formality is that detection could occur hierarchically, that is, at different levels of abstraction. The model matching is expressed as a likelihood ratio between input text and the model triples. The likelihood ratio is designed to be analogous to track correlation likelihood ratios common in JDL fusion level 1. This required development of a semantic distance metric for positive and null hypotheses as well as for complex objects. The metric uses the Web 1Terabype database of one to five gram frequencies for priors. This size requires the use of big data technologies so a Hadoop cluster is used in conjunction with OpenNLP natural language and Mahout clustering software. Distributed data fusion Map Reduce jobs distribute parts of the data fusion problem to the Hadoop nodes. For the purposes of this initial testing, open source models and text inputs of similar complexity to terrorist events were used as surrogates for the intended counter-terrorist application.

  8. The Counter Terrorist Classroom: Religion, Education, and Security

    Science.gov (United States)

    Gearon, Liam

    2013-01-01

    The article identifies international cases--from the United States, Europe, and the United Nations--of an emergent interface of religion, education, and security. This is manifest in the uses of religion in education to counter religious extremism, the notional "counter terrorist classroom." To avoid an over-association of extremism with…

  9. Terrorist Capabilities for Cyberattack: Overview and Policy Issues

    Science.gov (United States)

    2007-01-22

    called “Digital Pearl Harbor” (DPH), with the result that 79% of the gamers said that a strategic cyberattack against the United States was likely...terrorist sponsors, five of them — North Korea , Sudan, Syria, Libya, and Cuba — are described as a diminishing concern for terrorism. Only Iran remains

  10. Terrorists and Sponsors. An Inquiry into Trust and Double-Crossing

    Science.gov (United States)

    McCormick, Gordon H.; Owen, Guillermo

    We consider the conditions that lead to the dissolution of state-terrorist coalitions. While such coalitions have well known advantages, they also have structural weaknesses that are largely ignored in the literature on the state sponsorship of terrorism. Each player in the coalition has interests that are only partially shared and, in some cases, at odds with those of its partner. Long term cooperation must be based on mutual advantage and mutual trust, both of which are subject to change over time.We examine the conditions that are needed to begin and maintain a cooperative strategy and the circumstances that lead a state and a terrorist group to leave the coalition and double-cross its partner. Equilibrium strategies for both players are defined and interpreted.

  11. 78 FR 6817 - Clean Air Act Operating Permit Program; Petition for Objection to State Operating Permit for...

    Science.gov (United States)

    2013-01-31

    ... Wisconsin Public Service Corporation--JP Pulliam Plant. Pursuant to section 505(b)(2) of the Act, a... ENVIRONMENTAL PROTECTION AGENCY [FRL 9774-6] Clean Air Act Operating Permit Program; Petition for Objection to State Operating Permit for Wisconsin Public Service Corporation--JP Pulliam Plant AGENCY...

  12. The meaning of collective terrorist threat : Understanding the subjective causes of terrorism reduces its negative psychological impact

    NARCIS (Netherlands)

    Fischer, Peter; Postmes, Tom; Koeppl, Julia; Conway, Lianne; Fredriksson, Tom

    This article hypothesized that the possibility to construct intellectual meaning of a terrorist attack (i.e., whether participants can cognitively understand why the perpetrators did their crime) reduces the negative psychological consequences typically associated with increased terrorist threat.

  13. A Geographic Information Science (GISc) Approach to Characterizing Spatiotemporal Patterns of Terrorist Incidents in Iraq, 2004-2009

    Energy Technology Data Exchange (ETDEWEB)

    Medina, Richard M [ORNL; Siebeneck, Laura K. [University of Utah; Hepner, George F. [University of Utah

    2011-01-01

    As terrorism on all scales continues, it is necessary to improve understanding of terrorist and insurgent activities. This article takes a Geographic Information Systems (GIS) approach to advance the understanding of spatial, social, political, and cultural triggers that influence terrorism incidents. Spatial, temporal, and spatiotemporal patterns of terrorist attacks are examined to improve knowledge about terrorist systems of training, planning, and actions. The results of this study aim to provide a foundation for understanding attack patterns and tactics in emerging havens as well as inform the creation and implementation of various counterterrorism measures.

  14. 75 FR 10794 - Clean Air Act Advisory Committee (CAAAC) Request for Nominations to the CAAAC

    Science.gov (United States)

    2010-03-09

    ... Clean Air Act Advisory Committee (CAAAC) on November 19, 1990, to provide independent advice and counsel... Nominations: The U.S. Environmental Protection Agency (EPA) invites nominations of qualified candidates to be...

  15. Vulnerability to terrorist attacks in European electricity decarbonisation scenarios: Comparing renewable electricity imports to gas imports

    International Nuclear Information System (INIS)

    Lilliestam, Johan

    2014-01-01

    The decarbonised future European electricity system must remain secure: reliable electricity supply is a prerequisite for the functioning of modern society. Scenarios like Desertec, which partially rely on solar power imports from the Middle East and North Africa, may be attractive for decarbonisation, but raise concerns about terrorists interrupting supply by attacking the long, unprotected transmission lines in the Sahara. In this paper, I develop new methods and assess the European vulnerability to terrorist attacks in the Desertec scenario. I compare this to the vulnerability of today's system and a decarbonisation scenario in which Europe relies on gas imports for electricity generation. I show that the vulnerability of both gas and electricity imports is low, but electricity imports are more vulnerable than gas imports, due to their technical characteristics. Gas outages (and, potentially, resulting blackouts) are the very unlikely consequence even of very high-number attacks against the gas import system, whereas short blackouts are the potential consequence of a few attacks against the import electricity lines. As the impacts of all except extreme attacks are limited, terrorists cannot attack energy infrastructure and cause spectacular, fear-creating outages. Both gas and electricity import infrastructure are thus unattractive and unlikely terrorist targets. - Highlights: • A comparison of terrorism risks of importing solar power and gas for power generation. • Both scenarios show low vulnerability to terrorist attacks. • Within low vulnerabilities, gas imports are less vulnerable than electricity imports. • Causing spectacular, large and long outages is very difficult for attacker. • The attractiveness of gas and power import infrastructure as terrorist target is low

  16. Asian Organized Crime and Terrorist Activity in Canada, 1999-2002

    National Research Council Canada - National Science Library

    Helfand, Neil S

    2003-01-01

    This study is based on open source research into the scope of Asian organized crime and terrorist activity in Canada during the period 1999 to 2002, and the extent of cooperation and possible overlap...

  17. Exploitation of Free Markets and Globalization to Finance Terrorists

    Science.gov (United States)

    2008-09-01

    is their capability to exploit the black market peso exchange or the international foreign exchange arbitrage . Under the scenario of a weak U.S...appears legitimate. By using intermediaries or legitimate businesses, the financial markets are wide open for terrorists to hedge funds and

  18. Will the US Clean Air Act come to Australia?

    International Nuclear Information System (INIS)

    Saxby, Bill

    1992-01-01

    This article examines the Clean Air Act and whether the emerging situation in Sydney and Melbourne is likely to require similar radical action to prevent a decline in public health of city dwellers. It is concluded that both Sydney and Melbourne are in the league of the world's polluted cities. The pollutants of concern are mainly carbon monoxide and ozone. Emissions reduction in these two cities during the 1980s has reduced photochemical smog formation to near the guidelines, but both these cities retain the potential to form high levels of photochemical smog under the right weather conditions, as shown by Sydney in 1990. 2 tabs., ills

  19. 78 FR 51184 - Air Pollution Control: Proposed Actions on Clean Air Act Section 105 Grant to the Lane Regional...

    Science.gov (United States)

    2013-08-20

    ...The EPA has made a proposed determination that a reduction in recurring expenditures of non-Federal funds for the Lane Regional Air Protection Agency (LRAPA) in Eugene, Oregon is a result of agency wide non-selective reductions in expenditures. This determination, when final, will permit the LRAPA to continue to receive grant funding under Section 105 of the Clean Air Act for the state fiscal year (SFY) 2014. This determination will also reset the LRAPA required maintenance of effort level for SFY 2012 and 2013 to reflect the non-selective reductions made to address reductions in revenue due to adverse economic conditions in Lane County, Oregon.

  20. Political terrorism and affective polarization in "black" and "red" terrorists in Italy during the years 1968-1988.

    Science.gov (United States)

    Pacini, Matteo; Maremmani, Icro

    2018-04-01

    Psychiatric evaluations of violent political crime were mostly performed on a case-by-case basis in a forensic environment, which made them unduly dependent on categories of presumed dangerousness and legal responsibility, rather than on a clinical definition of their mental status. In referring to such "clinical" definitions, the disorder we have in mind is not limited to the major, agitated psychotic manias or mixed states. The presence of a dominant temperament, or protracted hypomania, is enough by itself to explain an individual's engagement in a wide range of activities, not necessarily sociopathic or violent. We put forward the hypothesis that formal and transpolitical radical choices, either in favor of an illegal lifestyle or of activities involving a high level of risk, may be linked with certain mental states, especially when considering small clandestine groups showing a high level of internal ideological consensus, and a no-return attitude toward a commitment to radical choices. Available data about the psycho(patho)logical profile of terrorists are still hard to come by. The only available studies are those on identified living terrorists (judging by the trials of those who personally admitted to having been terrorists), and statistical data imply a number of documented cases belonging to the same terrorist organization. In Italy, the period often called the "years of lead [bullets]" displays an interesting viewpoint for the study of terrorist psychology, for two main reasons: first of all, it is a historically defined period (1968-1988), and second, the number of ascertained participants in terrorist activities was quite large.

  1. The Next Terrorist Attack: Not If, But When...Are We Prepared?

    National Research Council Canada - National Science Library

    Lynch, David

    2004-01-01

    .... Since lessons learned from past attacks call attention to the terrorists' ability to overcome military defenses, the importance of well-developed, exercised response plans cannot be overstated...

  2. The Terrorist War against Islam: Clarifying Academic Confusions

    Science.gov (United States)

    Schwartz, Stephen

    2011-01-01

    Since the terrorist atrocities of September 11, 2001, Westerners have been challenged to understand the ideological and theological concepts, derived from Islam, that motivated the actions of Al-Qaida on that day and in other attacks before and since. Differences in taxonomy have proven to be a major issue. In the author's view, it is insufficient…

  3. Identifying foreign terrorist fighters: The Role of Public-Private Partnership, Information Sharing and Financial Intelligence

    Directory of Open Access Journals (Sweden)

    Tom Keatinge

    2015-07-01

    Full Text Available Since 9/11, financial institutions have found themselves placed squarely on the front line of efforts to combat terrorism: countering terrorist financing has been a core element of the global counter-terrorism architecture since President George W Bush signed Executive Order 13224 promising to starve terrorists of funding. Financial institutions have played valuable “post-event” forensic roles, but despite the apparently immense troves of data they hold, their effective involvement in the identification and disruption of terrorist intentions or activity remains elusive. With global authorities consumed with the mushrooming growth of “foreign terrorist fighters” (FTFs, it seems timely to revisit the question of how financial institutions can play a more preventative role in countering terrorist threats. As the intergovernmental Financial Action Task Force (FATF noted recently, “greater domestic cooperation among AML/CFT [anti-money laundering and countering the financing of terrorism] bodies and other authorities” is needed to tackle funding of FTFs. Banks must play a key role in the development of this architecture. The issue of FTFs flowing to and from the conflict in Syria is likely to shape the international security agenda for the foreseeable future. Identifying citizens who have joined terrorist groups in Syria and Iraq pose a threat to the UK. The UK is certainly not alone in Europe in facing this threat. Evidence suggests these fears are now being realised. Both the scale of the issue in the context of the Syrian conflict and the speed with which the numbers have risen have caught international security authorities off guard, which – it would seem – have only belatedly appreciated the magnitude of the challenge. Whilst there has been much discussion and debate about who these travelling fighters are, their motivations, and the threats they pose, the majority of this analysis has focused on the role of social media in this

  4. Waste Management Policy Framework to Mitigate Terrorist Intrusion Activities

    International Nuclear Information System (INIS)

    Redus, Kenneth S.

    2003-01-01

    A policy-directed framework is developed to support US Department of Energy (DOE) counterterrorism efforts, specifically terrorist intrusion activities that affect of Environmental Management (EM) programs. The framework is called the Security Effectiveness and Resource Allocation Definition Forecasting and Control System (SERAD-FACS). Use of SERAD-FACS allows trade-offs between resources, technologies, risk, and Research and Development (R and D) efforts to mitigate such intrusion attempts. Core to SERAD-FACS is (1) the understanding the perspectives and time horizons of key decisionmakers and organizations, (2) a determination of site vulnerabilities and accessibilities, and (3) quantifying the measures that describe the risk associated with a compromise of EM assets. The innovative utility of SERAD-FACS is illustrated for three integrated waste management and security strategies. EM program risks, time delays, and security for effectiveness are examined to demonstrate the significant cost and schedule impact terrorist activities can have on cleanup efforts in the DOE complex

  5. 77 FR 32135 - Notice of Lodging of Consent Decree Under the Clean Air Act and the Emergency Planning and...

    Science.gov (United States)

    2012-05-31

    ... Emergency Planning and Community Right to Know Act. Notice is hereby given that on May 23, 2012, a proposed..., was lodged with the United States District Court for the Northern District of Indiana. The settlement... the Clean Air Act and under the Emergency Planning and Community Right to Know Act related to the...

  6. A First Look on iMiner's Knowledge base and Detecting Hidden Hierarchy of Riyadh Bombing Terrorist Network

    DEFF Research Database (Denmark)

    Memon, Nasrullah

    2007-01-01

      - Data collection is difficult to any network analysis because it is difficult to create a complete network.  It is not easy to gain information on terrorist networks.  It is fact that terrorist organizations do not provide information on their members and the government rarely allows researche...

  7. The Nation That Cried Lone Wolf : A Data-Driven Analysis of Individual Terrorists in the United States Since 9/11

    OpenAIRE

    Eby, Charles A.

    2012-01-01

    Approved for public release; distribution is unlimited Lone-wolf terrorist attacks have occurred in the United States throughout the countrys history. Attempted attacks from individual terrorists unaffiliated with terrorist groups may be becoming more prevalent. Both the general public and government officials acknowledge the presence and importance of these attacks; however, relatively little literature exists on the subject compared to group terrorism. Much of the information on lone wol...

  8. Computing Optimal Mixed Strategies for Terrorist Plot Detection Games with the Consideration of Information Leakage

    OpenAIRE

    Li MingChu; Yang Zekun; Lu Kun; Guo Cheng

    2017-01-01

    The terrorist’s coordinated attack is becoming an increasing threat to western countries. By monitoring potential terrorists, security agencies are able to detect and destroy terrorist plots at their planning stage. Therefore, an optimal monitoring strategy for the domestic security agency becomes necessary. However, previous study about monitoring strategy generation fails to consider the information leakage, due to hackers and insider threat. Such leakage events may lead to failure of watch...

  9. Meeting blood requirements following terrorist attacks: the Israeli experience.

    Science.gov (United States)

    Shinar, Eilat; Yahalom, Vered; Silverman, Barbara G

    2006-11-01

    Blood services worldwide must be prepared to meet surges in demand for blood components needed by casualties of domestic disasters and acts of terrorism. Israel's National Blood Services, operated by Magen David Adom, has extensive experience in managing blood collections and supply in emergencies. This review summarizes the structure and function of Magen David Adom's national blood program, and relates its experience to other practices that have been reported in the medical literature. Between 2000 and 2005, 7497 victims (85% civilians) were involved in 1645 terrorist attacks in Israel. On-site triage resulted in 967 (13%) deaths at the scene, 615 (8%) with severe injuries, 897 (12%) with moderate injuries and 5018 (67%) with mild injuries. Requests for blood averaged 1.3 blood units and 0.9 components per casualty, or 6.7 units and 4.5 components per severe and moderately injured patient. Public appeals for blood donations were managed centrally to match supply with demand and prevent wastage. This experience illustrates the advantages of a comprehensive program for managing blood operations in emergency situations. A coordinated national program can stabilize in-hospital inventories during routine activities, ensure instant access to precisely defined inventories, facilitate sufficient supply in times of disasters, and minimize outdating and wastage.

  10. Freed: Ripples of the Convicted and Released Terrorist in America

    Science.gov (United States)

    2011-03-01

    Singapore, Malaysia , Indonesia, Thailand, and the Philippines (The International Conference on Terrorist Rehabilitation, 2009). No single methodology to...2009, p. 16). Care Rehabilitation Centers include group meals, art therapy, recreation and other leisure activity to “build teamwork but also

  11. Interaction between Titles 2 and 3 of the Clean Air Act as amended, 1990

    Energy Technology Data Exchange (ETDEWEB)

    Szpunar, C.B.

    1996-02-01

    This report examines Some issues that would I affect the refining industry if the requirements for hazardous air pollutants set out in Title III of the Clean Air Act Amendments were to impede the market entrance of oxygenated fuels, as me; required by Title II. It describes the mandate for reformulated gasoline; considers gasoline characteristics in light of component shifts in refining; examines the supply of, demand for, and cost of various feedstocks and blendstocks; and identifies the emissions and atmospheric impacts that might result from the production and use of reformulated gasoline. Attention is focused on methanol and MTBE, two potential blendstocks that are also hazardous air pollutants, and on maximum achievable control technology standards, which might be applied to the stationary sources that produce them.

  12. Interaction between Titles 2 and 3 of the Clean Air Act as amended, 1990

    International Nuclear Information System (INIS)

    Szpunar, C.B.

    1996-02-01

    This report examines Some issues that would I affect the refining industry if the requirements for hazardous air pollutants set out in Title III of the Clean Air Act Amendments were to impede the market entrance of oxygenated fuels, as me; required by Title II. It describes the mandate for reformulated gasoline; considers gasoline characteristics in light of component shifts in refining; examines the supply of, demand for, and cost of various feedstocks and blendstocks; and identifies the emissions and atmospheric impacts that might result from the production and use of reformulated gasoline. Attention is focused on methanol and MTBE, two potential blendstocks that are also hazardous air pollutants, and on maximum achievable control technology standards, which might be applied to the stationary sources that produce them

  13. The Use of Structures in Communication Networks to Track Membership in Terrorist Groups

    Directory of Open Access Journals (Sweden)

    H.A Eiselt

    2015-02-01

    Full Text Available This concept paper investigates possibilities to detect terrorist cells based on communications between individuals without the need for wiretapping. The advantages of such procedure are apparent: fewer (if any legal requirements, and, most importantly, the possibility to automate the surveillance. After a brief review of the pertinent literature, we offer three approaches that are designed to aid in the detection of not only terrorist cells, but also the command structures within the cells. The techniques are demonstrated by using a small illustration. The paper concludes by outlining limitations of the procedures described here.

  14. Preemption and Retribution: Precision-Guided Munitions to Counter Terrorist Threats

    Science.gov (United States)

    1998-04-01

    story are told. Terrorists have become skilled at cultivating 18 the " underdog " image and portraying their adversaries as ruthless aggressors...Frontiers, Israel’s War Against Terrorism, London: Arms and Armour Publications, 1990. Schmemann, Serge. " Netanyahu Defiantly Defending Botched

  15. Surgical resource utilization in urban terrorist bombing: a computer simulation.

    Science.gov (United States)

    Hirshberg, A; Stein, M; Walden, R

    1999-09-01

    The objective of this study was to analyze the utilization of surgical staff and facilities during an urban terrorist bombing incident. A discrete-event computer model of the emergency room and related hospital facilities was constructed and implemented, based on cumulated data from 12 urban terrorist bombing incidents in Israel. The simulation predicts that the admitting capacity of the hospital depends primarily on the number of available surgeons and defines an optimal staff profile for surgeons, residents, and trauma nurses. The major bottlenecks in the flow of critical casualties are the shock rooms and the computed tomographic scanner but not the operating rooms. The simulation also defines the number of reinforcement staff needed to treat noncritical casualties and shows that radiology is the major obstacle to the flow of these patients. Computer simulation is an important new tool for the optimization of surgical service elements for a multiple-casualty situation.

  16. [Treatment strategies for mass casualty incidents and terrorist attacks in trauma and vascular surgery : Presentation of a treatment concept].

    Science.gov (United States)

    Friemert, B; Franke, A; Bieler, D; Achatz, A; Hinck, D; Engelhardt, M

    2017-10-01

    The treatment of patients in the context of mass casualty incidents (MCI) represents a great challenge for the participating rescue workers and clinics. Due to the increase in terrorist activities it is necessary to become familiar with this new kind of threat to civilization with respect to the medical treatment of victims of terrorist attacks. There are substantial differences between a "normal" MCI and a terrorist MCI with respect to injury patterns (blunt trauma vs. penetrating/perforating trauma), the type and form of the incident (MCI=static situation vs. terrorist attack MCI= dynamic situation) and the different security positions (rescue services vs. police services). This article is concerned with question of which changes in the surgical treatment of patients are made necessary by these new challenges. In this case it is necessary that physicians are familiar with the different injury patterns, whereby priority must be given to gunshot and explosion (blast) injuries. Furthermore, altered strategic and tactical approaches (damage control surgery vs. tactical abbreviated surgical care) are necessary to ensure survival for as many victims of terrorist attacks as possible and also to achieve the best possible functional results. It is only possible to successfully counter these new challenges by changing the mindset in the treatment of terrorist MCI compared to MCI incidents. An essential component of this mindset is the acquisition of a maximum of flexibility. This article would like to make a contribution to this problem.

  17. Health effects of technologies for power generation: Contributions from normal operation, severe accidents and terrorist threat

    International Nuclear Information System (INIS)

    Hirschberg, Stefan; Bauer, Christian; Burgherr, Peter; Cazzoli, Eric; Heck, Thomas; Spada, Matteo; Treyer, Karin

    2016-01-01

    As a part of comprehensive analysis of current and future energy systems we carried out numerous analyses of health effects of a wide spectrum of electricity supply technologies including advanced ones, operating in various countries under different conditions. The scope of the analysis covers full energy chains, i.e. fossil, nuclear and renewable power plants and the various stages of fuel cycles. State-of-the-art methods are used for the estimation of health effects. This paper addresses health effects in terms of reduced life expectancy in the context of normal operation as well as fatalities resulting from severe accidents and potential terrorist attacks. Based on the numerical results and identified patterns a comparative perspective on health effects associated with various electricity generation technologies and fuel cycles is provided. In particular the estimates of health risks from normal operation can be compared with those resulting from severe accidents and hypothetical terrorist attacks. A novel approach to the analysis of terrorist threat against energy infrastructure was developed, implemented and applied to selected energy facilities in various locations. Finally, major limitations of the current approach are identified and recommendations for further work are given. - Highlights: • We provide state-of-the-art comparative assessment of energy health risks. • The scope of the analysis should to the extent possible cover full energy chains. • Health impacts from normal operation dominate the risks. • We present novel approach to analysis of terrorist threat. • Limitations include technology choices, geographical coverage and terrorist issues.

  18. ‘Let the Punishment Match the Offence’: Determining Sentences for Australian Terrorists

    Directory of Open Access Journals (Sweden)

    Nicola McGarrity

    2013-04-01

    Full Text Available To date, 38 men have been charged with terrorism offences in Australia. Twenty-six have been convicted. The article commences with an overview of the factual circumstances leading to these convictions. This provides important background for the following discussion of a largely unexplored issue in Australian anti-terrorism law and policy, namely, the difficulties faced by the Australian courts in adapting traditional sentencing principles to the (for the most part, preparatory terrorism offences enacted by the Commonwealth Parliament after the 9/11 terrorist attacks. Of particular interest are how the courts determine the objective seriousness of these offences and the respective weight placed upon deterrence (both specific and general and the rehabilitation of convicted terrorists.

  19. Prison Radicalization in County Jails: Disrupting Terrorist Acts Through Information Sharing

    Science.gov (United States)

    2014-12-01

    States Attorney’s Office, March 26, 2014, http://www.justice.gov/usao/ cae /news/docs/2014/2014_03/03-26-14Teausant.html. 11 Leslie Holland, “California...have reached an all-time high as a result of the Public Safety Realignment Act. In the first quarter of 2014, the average daily population reached...by the ACLU, the Sheriff’s Department has recently made significant improvements regarding the treatment of Muslim inmates. Previously, other faiths

  20. Narratives from caregivers of children surviving the terrorist attack in Beslan: issues of health, culture, and resilience.

    Science.gov (United States)

    Moscardino, Ughetta; Axia, Giovanna; Scrimin, Sara; Capello, Fabia

    2007-04-01

    Acts of terrorism have an extremely negative impact on the mental health of children and families. The school siege in Beslan, Russia, in 2004, represents a particularly traumatizing event as it was directed specifically at children and involved the entire community. This qualitative study aims to: (a) examine caregiver reactions to the terrorist attack in Beslan as reported 3 months after the traumatic event; (b) determine the extent to which indigenous cultural values and religious belief systems play a role in Beslan's caregivers' reactions to such event; and (c) identify variables that may function as sources of resilience to caregivers. A convenience sample of 17 primary caregivers from Beslan with at least one child who survived the school siege were asked to participate in semi-structured interviews. Narratives generated from the interviews were qualitatively analyzed using a thematic approach; nine major themes were identified. Caregivers' concerns centered on children's physical and psychological well-being, the reorganization of family life, and the disruption of community ties. Cultural values of pride, heroism, courage, and revenge emerged as relevant aspects shaping caregivers' reactions to the traumatic event. Possible sources of resilience included the willingness to return to normality, social support, and the reaffirmation of positive, culturally shared values in face of the perceived threat of future terrorist attacks. Findings are discussed in terms of their theoretical implications on the effects of trauma on children and families as well as interventions with highly traumatized populations in diverse cultural settings.

  1. Computing Optimal Mixed Strategies for Terrorist Plot Detection Games with the Consideration of Information Leakage

    Directory of Open Access Journals (Sweden)

    Li MingChu

    2017-01-01

    Full Text Available The terrorist’s coordinated attack is becoming an increasing threat to western countries. By monitoring potential terrorists, security agencies are able to detect and destroy terrorist plots at their planning stage. Therefore, an optimal monitoring strategy for the domestic security agency becomes necessary. However, previous study about monitoring strategy generation fails to consider the information leakage, due to hackers and insider threat. Such leakage events may lead to failure of watching potential terrorists and destroying the plot, and cause a huge risk to public security. This paper makes two major contributions. Firstly, we develop a new Stackelberg game model for the security agency to generate optimal monitoring strategy with the consideration of information leakage. Secondly, we provide a double-oracle framework DO-TPDIL for calculation effectively. The experimental result shows that our approach can obtain robust strategies against information leakage with high feasibility and efficiency.

  2. Seeing Through Smoke: Sorting through the Science and Politics in the Making of the 1956 British Clean Air Act (Invited)

    Science.gov (United States)

    Kenny, D. A.

    2010-12-01

    The 1952 “Killer Smog” left over 4000 citizens of Greater London dead in a single week. It was a highly visible environmental disaster, which pinned the British government with responsibility over factory and domestic coal smoke pollution. Within four years of the Smog, the British parliament passed the 1956 Clean Air Act, which was designed primarily to prevent the release of dark smoke from the chimneys of private dwellings and factories. This act is considered a significant turning point in the history of environmental regulation. Through the analysis of confidential documents from government ministries and Members of Parliament, my research has focused on how decisions were made following this man-made environmental catastrophe. The primary focus of this presentation will be to explore why the British government appeared lethargic in the face of its long-standing coal pollution problem and why it finally passed the first clean air act in the world. In this case, establishing responsibility and organizing research were the major time constraints on policy action. In the months following the 1952 Smog, government departments passed off responsibility and quarreled over jurisdiction in the smog matter. Ministries held responsible for air pollution jointly established the Committee on Air Pollution to find a solution to urban smog. In the years following, the Committee on Air Pollution compiled research on the health effects and economic impact of air pollution, deriving its information from a variety of sources. In its 1954 final report, the committee named smoke and sulfur dioxide the most likely culprits of the 1952 deaths, and it recommended the elimination of smoke-producing coal from the British market, a major change to how the British fueled their homes and factories. The resulting 1956 Clean Air Act was the product of numerous compromises over the economic, political, and social issues present in Great Britain at the time. The British government

  3. The Political Economy of Clean Air Legislation. An Analysis of Voting in the U.S. Senate on Amendments to the 1990 Clean Air Act

    International Nuclear Information System (INIS)

    Burkey, M.L.; Durden, G.C.

    1998-01-01

    Much research in political science and economics has attempted to explain voting patterns among members of legislative bodies. In this paper we extend the existing analysis in three ways. First, we address the subject of voting on air quality regulation by the U.S. Senate. A subject of great importance and significance, such votes have not previously been the focus of much empirical investigation. Second, we develop an arguably more correct and effective methodology for measuring and understanding the ideological preferences of individual Senators, as revealed by their voting patterns on 1990 amendments to the Clean Air Act. Third, we apply the minimum chi-square methodology for estimating the determinants of Senator voting patterns on the issue. In Section 2, the economic theory of regulation is elaborated as it is specifically related to 1990 senate voting on amendments to the Clean Air Act. In Section 3, we provide a brief literature review, focusing on the principal-agent model and how voting patterns are influenced by campaign contributions, constituent socio-economic characteristics, and individual legislator ideology. In Section 4 we present a very simple model of the principal-agent relationship which underlies legislative voting behavior. In this section (supplemented by information in an appendix) we introduce a new methodology for creating a proxy variable to represent legislator ideology, comparing the new method with those previously used. Section 5 provides a chronological background on clean air legislation, and Section 6 discusses the data and proxy variables used for the empirical estimations. Section 7 contains a presentation and evaluation of three empirical techniques, including one not previously used, the minimum chi-square method which, we argue, is both appropriate and easily interpretable. This claim is based upon the fact that the dependent variable, SCORE, is neither continuous nor dichotomous, but ordered and categorical, constructed

  4. The game-theoretic national interstate economic model : an integrated framework to quantify the economic impacts of cyber-terrorist behavior.

    Science.gov (United States)

    2014-12-01

    This study suggests an integrated framework to quantify cyber attack impacts on the U.S. airport security system. A cyber attack by terrorists on the U.S. involves complex : strategic behavior by the terrorists because they could plan to invade an ai...

  5. The Sociology and Psychology of Terrorism: Who Becomes a Terrorist and Why?

    National Research Council Canada - National Science Library

    Hudson, Rex A

    1999-01-01

    ...) and the new recruitment patterns of some groups, such as recruiting suicide commandos, female and child terrorists, and scientists capable of developing weapons of mass destruction, provide a measure...

  6. Can a Copycat Effect be Observed in Terrorist Suicide Attacks?

    NARCIS (Netherlands)

    Farnham, N.T.; Liem, M.C.A.

    2017-01-01

    The purpose of this paper is to explore how a copycat effect – established within the field of suicide studies – may manifest itself in terrorist suicide attacks, and takes an exploratory approach in evaluating the prospect of incorporating open-data resources in future counter-terrorism research.

  7. The Effect Terrorist Labels Have on Military Operations

    Science.gov (United States)

    2012-05-17

    Department until 2008.44 Nelson Mandela , the renowned member of the ANC and Nobel Prize laureate, became president of South Africa in 1994 and is...celebrated internationally as one of the most prolific and revolutionary leaders of the 20th century. Mandela received all these awards and accolades—many...models or key players during 44 Mimi Hall, "U.S. has Mandela on Terrorist List," USA Today, http

  8. 75 FR 51483 - Notice of Lodging of Consent Decree Under the Clean Air Act

    Science.gov (United States)

    2010-08-20

    ... given that on August 9, 2010, a proposed Consent Decree in United States v. Middlesex County Utilities... Air Pollution Control Act, N.J.S.A. 26:2C-1 et seq., at the Middlesex County landfill in East... to the United States and New Jersey, and shall upgrade the Middlesex County Landfill Gas Collection...

  9. 41 CFR 304-3.8 - Must I adhere to the provisions of the Fly America Act when I receive air transportation to a...

    Science.gov (United States)

    2010-07-01

    ... 41 Public Contracts and Property Management 4 2010-07-01 2010-07-01 false Must I adhere to the provisions of the Fly America Act when I receive air transportation to a meeting furnished or paid by a non... provisions of the Fly America Act when I receive air transportation to a meeting furnished or paid by a non...

  10. Terror i tvillingtårnene – dystopi og ironi? 9/11 i Darlah og En terrorist i senga

    Directory of Open Access Journals (Sweden)

    Lersbryggen Mørk, Kjersti

    2011-03-01

    Full Text Available Terror in the Twin Towers – dystopia and irony? 9/11 in Darlah and En terrorist i senga. Through globalization of our media society, children as well as adults are endlessly exposed to information and images from all over the world. In Norway, signs of the terrorist attack on the Twin Towers in USA on September 11th 2001 are now to be found in literature for children and young adults. With globalization theory and post-colonial theory I will examine how two novels present global challenges in general and 9/11 in particular. What does globalization mean for the construction of identity? Who are “we”, and who are “the others”? The novel for young adults, Darlah – 172 timer på månen [Darlah – 172 hours on the moon] (2008 by Johan Harstad, is a dystopia where 9/11 points forward to a full scale catastrophe for humanity. En terrorist i senga [There's a terrorist in my bed] (2008, a novel for children by Endre Lund Eriksen, makes explicit references to 9/11 – but with playfulness and ironic revelation of xenophobia. Both books use aliens from outer space as “the other”, but where Darlah presents a pessimistic view of our global future, En terrorist i senga is optimistic on behalf of the humankind.

  11. Urban planning after terrorism:The case of Oslo with focus on the impacts of the terrorist attack on the consideration of security, memorialisation and conservation in urban planning

    OpenAIRE

    Paizs, Franziska

    2013-01-01

    Terrorism is a targeted way to hurt a population but also to destroy and annihilate a part of the civilization by attacking the built environment, especially iconic and symbolic buildings with its values of collective memory and cultural heritage, which is at the latest created by the iconic act of destruction. The resilient city with its integrated plans and programs but also technical, personal or physical security aims to reduce the probability and the dimension of terrorist attacks. Howev...

  12. Learning from 25 years of experience with the United States clean air act

    Energy Technology Data Exchange (ETDEWEB)

    Schulze, R.H. [Trinity Consultants Incorporated, Dallas, TX (United States)

    1995-12-31

    Twenty-five years ago, the United States embarked on a quest to attain clean air. President Nixon, in signing the Clean Air Act of 1970, defined clean air as the objective for the `70s. Although enormous progress has been made, much remains to be done. Newly constructed industry is quite clean, but many older facilities continue to operate with antiquated controls. Significant advances have been made in cleaning up the emissions from new automobiles, but two factors have impaired progress. First, cars last longer than they did in 1970, so the average age of the fleet has increased. Second, travel has increased as people have moved to the suburbs. Thus, the emission decreases from clean cars have not been as great as expected. This presentation will address some of the lessons learned from the efforts in the United States to implement clean air programs. In a large number of countries, excessively elaborate studies have been substituted for action programs. Since much is now known about air quality, fairly brief studies can define programs that should be undertaken. What may take longer is developing public support and enthusiasm for improved air quality. In most cases, it is desirable to reduce spending on studies and increase spending on devising and implementing plans, as well as effectively communicating the necessary changes to the public. Balanced spending on studies- and action programs is essential to a sound air quality control program. (author)

  13. Learning from 25 years of experience with the United States clean air act

    Energy Technology Data Exchange (ETDEWEB)

    Schulze, R H [Trinity Consultants Incorporated, Dallas, TX (United States)

    1996-12-31

    Twenty-five years ago, the United States embarked on a quest to attain clean air. President Nixon, in signing the Clean Air Act of 1970, defined clean air as the objective for the `70s. Although enormous progress has been made, much remains to be done. Newly constructed industry is quite clean, but many older facilities continue to operate with antiquated controls. Significant advances have been made in cleaning up the emissions from new automobiles, but two factors have impaired progress. First, cars last longer than they did in 1970, so the average age of the fleet has increased. Second, travel has increased as people have moved to the suburbs. Thus, the emission decreases from clean cars have not been as great as expected. This presentation will address some of the lessons learned from the efforts in the United States to implement clean air programs. In a large number of countries, excessively elaborate studies have been substituted for action programs. Since much is now known about air quality, fairly brief studies can define programs that should be undertaken. What may take longer is developing public support and enthusiasm for improved air quality. In most cases, it is desirable to reduce spending on studies and increase spending on devising and implementing plans, as well as effectively communicating the necessary changes to the public. Balanced spending on studies- and action programs is essential to a sound air quality control program. (author)

  14. The Rise and the Fall of Terrorist Organizations in Post-Dictatorial Greece: The Role and the Lessons for the Intelligence Services

    National Research Council Canada - National Science Library

    Fakitsas, Miltiadis

    2003-01-01

    The Greek government unsuccessfully battled leftist terrorist groups from 1975 to 2002, The two most notorious terrorist organizations during this period were the "November 17" group and another group...

  15. Do terrorist attacks affect ethnic discrimination in the labour market? Evidence from two randomized field experiments.

    Science.gov (United States)

    Birkelund, Gunn Elisabeth; Chan, Tak Wing; Ugreninov, Elisabeth; Midtbøen, Arnfinn H; Rogstad, Jon

    2018-01-24

    Terrorist attacks are known to influence public opinion. But do they also change behaviour? We address this question by comparing the results of two identical randomized field experiments on ethnic discrimination in hiring that we conducted in Oslo. The first experiment was conducted before the 2011 terrorist attacks in Norway; the second experiment was conducted after the attacks. In both experiments, applicants with a typical Pakistani name were significantly less likely to get a job interview compared to those with a typical Norwegian name. But the ethnic gap in call-back rates were very similar in the two experiments. Thus, Pakistanis in Norway still experienced the same level of discrimination, despite claims that Norwegians have become more positive about migrants after the far-right, anti-migrant terrorist attacks of 2011. © London School of Economics and Political Science 2018.

  16. 76 FR 39315 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security/ALL-030 Use of...

    Science.gov (United States)

    2011-07-06

    ... the Terrorist Screening Database System of Records relates to official DHS national security and law... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary 6 CFR Part 5 [Docket No. DHS-2011-0060] Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security/ALL--030 Use of the...

  17. Changing the story the role of the narrative in the success or failure of terrorist groups

    OpenAIRE

    Mellen, Brian C.

    2009-01-01

    Approved for public release, distribution unlimited This thesis focuses on the nexus between a terrorist group's narrative and the group's success or failure in achieving its strategic goals. This work theorizes that the interaction of competing narratives exerts a systematic impact on the ability of the terrorist group to achieve its strategic goals through the influence that the narratives have over a group's members, the group's adversary, and the affected population. Although a te...

  18. 77 FR 33638 - Amendment to the Bank Secrecy Act Regulations-Exemption From the Requirement To Report...

    Science.gov (United States)

    2012-06-07

    ... effectiveness of its anti-money laundering and counter-terrorist financing policies. \\1\\ These customers are... enforcement purposes. \\6\\ See section 402 of the Money Laundering Suppression Act of 1994 (the ``Money...\\ 31 U.S.C. 5311. \\4\\ Treasury Order 180-01 (Sept. 26, 2002). \\5\\ 31 U.S.C. 5318(h)(2). The Money...

  19. International Convention for the Suppression of Acts of Nuclear Terrorism. United Nations 2005: International Convention for the Suppression of Acts of Nuclear Terrorism

    International Nuclear Information System (INIS)

    Anon.

    2005-01-01

    The International Convention for the Suppression of Acts of Nuclear Terrorism is a 2005 United Nations treaty designed to criminalize acts of nuclear terrorism and to promote police and judicial cooperation to prevent, investigate and punish those acts. As of September 2016, the convention has 115 signatories and 106 state parties, including the nuclear powers China, France, India, Russia, the United Kingdom, and the United States. The Convention covers a broad range of acts and possible targets, including nuclear power plants and nuclear reactors; covers threats and attempts to commit such crimes or to participate in them, as an accomplice; stipulates that offenders shall be either extradited or prosecuted; encourages States to cooperate in preventing terrorist attacks by sharing information and assisting each other in connection with criminal investigations and extradition proceedings; and, deals with both crisis situations, assisting States to solve the situations and post-crisis situations by rendering nuclear material safe through the International Atomic Energy Agency (IAEA)

  20. Controlled air incineration

    International Nuclear Information System (INIS)

    Seitz, K.A.

    1991-01-01

    From 1960 to 1970, incineration was recognized as an economical method of solid waste disposal with many incinerators in operation through the country. During this period a number of legislation acts began to influence the solid waste disposal industry, namely, the Solid Waste Disposal Act of 1965; Resource Conservation Recovery Act (RCRA) of 1968; Resource Recovery Act of 1970; and Clean Air Act of 1970. This period of increased environmental awareness and newly created regulations began the closure of many excess air incineration facilities and encouraged the development of new controlled air, also known as Starved-Air incinerator systems which could meet the more stringent air emission standards without additional emission control equipment. The Starved-Air technology initially received little recognition because it was considered unproven and radically different from the established and accepted I.I.A. standards. However, there have been many improvements and developments in the starved-air incineration systems since the technology was first introduced and marketed, and now these systems are considered the proven technology standard

  1. MOTIVATION SPECIFIC FOR YOUNGSTERS INVOLVED INTO TERRORIST OPERATION

    OpenAIRE

    Beslan Alexeyevich Tarchokov

    2015-01-01

    The paper made an attempt to explore preconditions, motives, reasons and factors capable of facilitating youth’ involvement into terrorist operations, emergence of youth terrorism and its spreading around, including the specifics of social and economic domains, of ideology and politics, psychology and law, etc. all of them taken on the scene of nowadays globalized society. Specifying in greater detail the causes and circumstances that contributed to involvement of young Russians into terroris...

  2. Aviation safety and ICAO

    NARCIS (Netherlands)

    Huang, Jiefang

    2009-01-01

    The thesis addresses the issue of aviation safety under the rule of law. Aviation safety is a global concern. While air transport is considered a safe mode of travel, it is susceptible to inherent risks of flight, the use of force, and terrorist acts. Consequently, within the framework of the

  3. 78 FR 38074 - Notice of Lodging of Proposed Consent Decree Under the Clean Air Act

    Science.gov (United States)

    2013-06-25

    ... manufacturing plants operating in as many states. The states of Arkansas, Idaho, Kansas, Montana, Nebraska... DEPARTMENT OF JUSTICE Notice of Lodging of Proposed Consent Decree Under the Clean Air Act On June... Court for the District of Kansas in the lawsuit entitled United States et al. v. Ash Grove Cement...

  4. Comment on the first anniversary of the terrorist attacks in the United States of America. Vienna, 11 September 2002

    International Nuclear Information System (INIS)

    ElBaradei, M.

    2002-01-01

    The IAEA has long been active in encouraging States to make security an integral part of the management of their nuclear programmes. The attacks in September 2001 were, however, a wake-up call to the world nuclear community that more can and must be done. In the wake of the terrorist attacks, Member States of the IAEA meeting in the Agency's General Conference adopted a resolution requesting that the IAEA Director General initiate a thorough review of the Agency's activities and programmes relevant to preventing acts of terrorism involving nuclear and other radioactive materials. The Agency moved rapidly to respond. It devised and is presently implementing an integrated action plan which includes enhanced and new activities to upgrade nuclear security worldwide and to combat nuclear terrorism. The plan covers eight areas: (1) physical protection of nuclear material and nuclear facilities; (2) detection of malicious activities (such as illicit trafficking) involving nuclear and other radioactive materials; (3) strengthening of State systems for nuclear material accountancy and control; (4) security of radioactive sources; (5) the assessment of safety and security related vulnerabilities at nuclear facilities; (6) response to malicious acts or threats thereof; (7) the adherence to international agreements and guidelines; and (8) co-ordination and information management for nuclear security related matters. National measures for protecting nuclear material and facilities remain uneven in their substance and application. There is wide recognition that the international physical protection regime needs to be further strengthened. Through its International Physical Protection Advisory Service (IPPAS), the Agency provides Member States with assessment services, together with associated advice and follow up actions to improve security arrangements at nuclear facilities. It also provides training and workshops, notably in assessing threats, as well as other supporting

  5. Detection of Hidden Hostile/Terrorist Groups in Harsh Territories by Using Animals as Mobile Biological Sensors.

    Science.gov (United States)

    Sahin, Yasar Guneri; Ercan, Tuncay

    2008-07-25

    Terrorism is the greatest threat to national security and cannot be defeated by conventional military force alone. In critical areas such as Iraq, Afghanistan and Turkey, regular forces cannot reach these hostile/terrorist groups, the instigators of terrorism. These groups have a clear understanding of the relative ineffectiveness of counter-guerrilla operations and rely on guerrilla warfare to avoid major combat as their primary means of continuing the conflict with the governmental structures. In Internal Security Operations, detection of terrorist and hostile groups in their hiding places such as caves, lairs, etc. can only be achieved by professionally trained people such as Special Forces or intelligence units with the necessary experience and tools suitable for collecting accurate information in these often harsh, rugged and mountainous countries. To assist these forces, commercial micro-sensors with wireless interfaces could be utilized to study and monitor a variety of phenomena and environments from a certain distance for military purposes. In order to locate hidden terrorist groups and enable more effective use of conventional military resources, this paper proposes an active remote sensing model implanted into animals capable of living in these environments. By using these mobile sensor devices, improving communications for data transfer from the source, and developing better ways to monitor and detect threats, terrorist ability to carry out attacks can be severely disrupted.

  6. Detection of Hidden Hostile/Terrorist Groups in Harsh Territories by Using Animals as Mobile Biological Sensors

    Directory of Open Access Journals (Sweden)

    Tuncay Ercan

    2008-07-01

    Full Text Available Terrorism is the greatest threat to national security and cannot be defeated by conventional military force alone. In critical areas such as Iraq, Afghanistan and Turkey, regular forces cannot reach these hostile/terrorist groups, the instigators of terrorism. These groups have a clear understanding of the relative ineffectiveness of counter-guerrilla operations and rely on guerrilla warfare to avoid major combat as their primary means of continuing the conflict with the governmental structures. In Internal Security Operations, detection of terrorist and hostile groups in their hiding places such as caves, lairs, etc. can only be achieved by professionally trained people such as Special Forces or intelligence units with the necessary experience and tools suitable for collecting accurate information in these often harsh, rugged and mountainous countries. To assist these forces, commercial micro-sensors with wireless interfaces could be utilized to study and monitor a variety of phenomena and environments from a certain distance for military purposes. In order to locate hidden terrorist groups and enable more effective use of conventional military resources, this paper proposes an active remote sensing model implanted into animals capable of living in these environments. By using these mobile sensor devices, improving communications for data transfer from the source, and developing better ways to monitor and detect threats, terrorist ability to carry out attacks can be severely disrupted.

  7. Suits Against Terrorist States by Victims of Terrorism

    Science.gov (United States)

    2008-05-01

    Nat’l City Bank v. Banco Para El Comercio Exterior de Cuba, 462 U.S. 611 (1983) (“Bancec”) to judgments against designated terrorist States. Bancec held...to determine both whether an exception to the Cuban Government’s immunity from garnishment also applies to [ Empresa de Telecomunicaciones de Cuba, S.A...was eventually reversed on other grounds by the U.S. Court of Appeals for the Eleventh Circuit — Alejandre v. Telefonica Larga Distancia de Puerto Rico

  8. Terrorist Threats in the Basque Country: its Impact on the Psychosocial Sphere of Victims

    Directory of Open Access Journals (Sweden)

    Javier Martín-Peña

    2014-07-01

    Full Text Available The ceasefire of armed activities announced by ETA (Basque Homeland and Freedom in 2011 has fostered a debate about the violence and the victims of the terrorist organization. During those years, the violence perpetrated by ETA was characterized by bomb attacks and assassinations. In addition to this blatant violent behavior, a low-intensity violence was also taking place in the Basque Country, consisting of terrorist threats against their targets. There is, however, a lack of evidence-based research into this phenomenon. This investigation studies the impact of terrorist threats on the psychosocial functioning of people threatened by ETA in the Basque Country. Seventy-six people targeted by ETA completed self-reported survey. Terrorist threats and their derived psychosocial consequences were assessed by this way. The findings point out a relationship between terrorist threats and their psychosocial effects, which greatly affected the immediate environment of the targets too. The implications of these findings are discussed. El cese de la actividad armada anunciado por ETA (Euskadi ta Askatasuna – Euskadi y Libertad en 2011 ha promovido un debate sobre la violencia y las víctimas de la organización terrorista. Durante esos años, la violencia perpetrada por ETA se caracterizó por ataques con bombas y asesinatos. Además de este comportamiento claramente violento, en el País Vasco también se estaba produciendo una violencia de baja intensidad, consistente en amenazas terroristas contra sus objetivos. Sin embargo, no hay una investigación basada en la evidencia sobre este fenómeno. Esta investigación estudia el impacto de las amenazas terroristas en el funcionamiento psicosocial de las personas amenazadas por ETA en el País Vasco. Setenta y seis personas amenazadas por ETA completaron una encuesta de autoevaluación. Se evaluaron de esta forma las amenazas terroristas y sus consecuencias psicosociales derivadas. Los resultados indicaron

  9. 75 FR 28757 - Security Zone; Potomac River, Washington Channel, Washington, DC

    Science.gov (United States)

    2010-05-24

    ... potential terrorist acts, and enhance public and maritime safety and security. The Coast Guard was unable to...-ranking government officials, mitigating potential terrorist acts and enhancing public and maritime safety... terrorist acts and enhancing public and maritime safety and security. Basis and Purpose The Coast Guard will...

  10. Scientific Support of Terrorist Actions by Commercial Grey Area Literature

    International Nuclear Information System (INIS)

    Katzung, W.

    2007-01-01

    The publication of the Al-Quaida handbook and time and time again notes of the possibility for getting special scientific knowledge from the internet have decreased the attention for an other important source of scientific support for terrorist education and/or actions. This is the commercial available and distributed grey area literature provided by a huge amount of (book) sellers and publishing houses. Most of this literature (hard copies and CDs) with dangerous subject matter is published in the US and may be ordered fast and with low costs using the internet. This kind of support for real and potential terrorists stands strongly in contradiction to the official policy and the 'unconditional' war against terrorism. With the presented poster the above described problem should be a little bit put in the focus of the CBMTS community and so to the authorities, too. By means of selected examples from different branches, such as Narcotics, Explosives, unusual Killing Methods, special Poisons / Toxins and, last not least, CW agents inclusive application methods and devices the highly charged situation is tried to shown. (author)

  11. Underlying Reasons for Success and Failure of Terrorist Attacks: Selected Case Studies

    National Research Council Canada - National Science Library

    McCleskey, Edward; McCord, Diana; Leetz, Jennifer; Markey, John

    2007-01-01

    .... This is the second of a two-phased effort: Phase I focused on assessing the underlying reasons for the success and failure of terrorist attacks against targets within the United States and against U.S. interests abroad...

  12. Effectiveness of Using Red-Teams to Identify Maritime Security Vulnerabilities to Terrorist Attack

    National Research Council Canada - National Science Library

    Culpepper, Anna

    2004-01-01

    .... Moreover, there have been no attacks on homeland U.S. targets since September 11. The red team concept provides an innovative method to examine these vulnerabilities from the terrorist perspective...

  13. Breaching the Fortress Wall. Understanding Terrorist Efforts to Overcome Defensive Technologies

    Science.gov (United States)

    2007-01-01

    that affect, in overlapping ways, sequential parts of the terrorist activity chain (Figure 1.2). The purposes of each of these types of technologies...fication lineup .51 The ways in which PIRA chose to manage operations also contrib- uted to its overall counterforensic effort. For example, although

  14. Lone Actor Terrorist Attack Planning and Preparation : A Data-Driven Analysis

    NARCIS (Netherlands)

    Schuurman, B.W.; Bakker, E.; Gill, P.; Bouhana, N.

    2017-01-01

    This article provides an in-depth assessment of lone actor terrorists’ attack planning and preparation. A codebook of 198 variables related to different aspects of pre-attack behavior is applied to a sample of 55 lone actor terrorists. Data were drawn from open-source materials and complemented

  15. Analysing Personal Characteristics of Lone-Actor Terrorists : Research Findings and Recommendations

    NARCIS (Netherlands)

    Roy, de van Zuijdewijn J.; Bakker, E.

    2016-01-01

    This Research Note presents the outcome of a project that looked at the personal characteristics of lone-actor terrorists. It is part of the larger Countering Lone-Actor Terrorism (CLAT) project. The project described here aimed to improve understanding of, and responses to, the phenomenon of

  16. Cross-Milieu Terrorist Collaboration: Using Game Theory to Assess the Risk of a Novel Threat.

    Science.gov (United States)

    Ackerman, Gary A; Zhuang, Jun; Weerasuriya, Sitara

    2017-02-01

    This article uses a game-theoretic approach to analyze the risk of cross-milieu terrorist collaboration-the possibility that, despite marked ideological differences, extremist groups from very different milieus might align to a degree where operational collaboration against Western societies becomes possible. Based upon theoretical insights drawn from a variety of literatures, a bargaining model is constructed that reflects the various benefits and costs for terrorists' collaboration across ideological milieus. Analyzed in both sequential and simultaneous decision-making contexts and through numerical simulations, the model confirms several theoretical arguments. The most important of these is that although likely to be quite rare, successful collaboration across terrorist milieus is indeed feasible in certain circumstances. The model also highlights several structural elements that might play a larger role than previously recognized in the collaboration decision, including that the prospect of nonmaterial gains (amplification of terror and reputational boost) plays at least as important a role in the decision to collaborate as potential increased capabilities does. Numerical simulation further suggests that prospects for successful collaboration over most scenarios (including operational) increase when a large, effective Islamist terrorist organization initiates collaboration with a smaller right-wing group, as compared with the other scenarios considered. Although the small number of historical cases precludes robust statistical validation, the simulation results are supported by existing empirical evidence of collaboration between Islamists and right- or left-wing extremists. The game-theoretic approach, therefore, provides guidance regarding the circumstances under which such an unholy alliance of violent actors is likely to succeed. © 2016 Society for Risk Analysis.

  17. International legal problem in combating 'Islamic State' terrorist group in Syria

    Directory of Open Access Journals (Sweden)

    Stevanović Miroslav

    2015-01-01

    Full Text Available 'Islamic State of Iraq and Syria' (ISIS has occupied parts of internationally recognized states and exerts further territorial pretensions. ISIS, also, implements a repressive rule, through violations of human rights and humanitarian law, which may constitute international crimes. In facing the threat od ISIS, the perception of international terrorism is important since this group has the features of a territorial entity. So far, facing with the threat of ISIS has been reduced to a model that is adopted by the UN Security Council against the terrorist network Al-Qaida. An international coalition of states, led by the United States, has undertaken air strikes on positions ISIS, on several grounds: the responsibility to protect, the protection of national security, and at the request of Iraq. At the same time, the strikes are applied in Syria, which can not be accountable for the actions of ISIS and has not requested international assistance. International law does not allow actions which would aim to destroy or jeopardize the territorial integrity or political independence of any sovereign and independent state, which is acting in accordance with the principle of equal rights and self-determination of peoples, and is hence governed by a representative government. The UNSC resolution 2249 remains short of recommending international armed action under the aegis of UNSC, but represents a step forward in recognizing the responsibility of this body in facing ISIS, at least as far as the 'destruction of refuge' is concerned. The use of force in the territory of Syria, without the express authorization of the UNSC is illegal, because terrorism does not constitute grounds for the use of force against countries. But, it opens broader issues of responsibility for the development of ISIS and the humanitarian crisis in the Middle East, as well as the functioning of the system of collective security. Overcoming the current crisis UNSC implies not just a

  18. 77 FR 2450 - Security Zone; Potomac and Anacostia Rivers, Washington, DC

    Science.gov (United States)

    2012-01-18

    ... terrorist acts, and enhance public and maritime safety and security. The Coast Guard was unable to publish a... terrorist acts and enhancing public and maritime safety security. Under 5 U.S.C. 553(d)(3), the Coast Guard...-ranking government officials, mitigating potential terrorist acts and enhancing public and maritime safety...

  19. Air Base Defense: Different Times Call for Different Methods

    Science.gov (United States)

    2006-12-01

    small explosives in an attempt to drive U.S. forces from their territories. Many of these attacks were successful, resulting in the loss of human ...value.27 As the war rages on in Iraq, Matthew Levitt argues that the U.S. cannot afford to be distracted by the situation there, as terrorists may...serious and more difficult to defend.101 Air bases typically employ infrared and thermal imagers, security sentries, canine patrols and motion-tracking

  20. 75 FR 75904 - Global Terrorism Sanctions Regulations; Terrorism Sanctions Regulations; Foreign Terrorist...

    Science.gov (United States)

    2010-12-07

    ... Terrorism Sanctions Regulations; Terrorism Sanctions Regulations; Foreign Terrorist Organizations Sanctions... Foreign Assets Control (``OFAC'') of the U.S. Department of the Treasury is amending the Global Terrorism Sanctions Regulations (``GTSR'') and the Terrorism Sanctions Regulations (``TSR'') to expand the scope of...

  1. The challenge of preparation for a chemical, biological, radiological or nuclear terrorist attack

    Directory of Open Access Journals (Sweden)

    Alexander David

    2006-01-01

    Full Text Available Terrorism is not a new phenomenon, but, in the contemporary scene, it has established itself in a manner which commands the most serious attention of the authorities. Until relatively recently, the major threat has been through the medium of conventional weaponry and explosives. Their obvious convenience of use and accessibility guarantees that such methods will continue to represent a serious threat. However, over the last few years, terrorists have displayed an enthusiasm for higher levels of carnage, destruction and publicity. This trend leads inexorably to the conclusion that chemical, biological, radiological and nuclear (CBRN methods will be pursued by terrorist organisations, particularly those which are well organised, are based on immutable ideological principles, and have significant financial backing. Whilst it is important that the authorities and the general public do not risk over-reacting to such a threat (otherwise, they will do the work of the terrorists for them, it would be equally ill-advised to seek comfort in denial. The reality of a CBRN event has to be accepted and, as a consequence, the authorities need to consider (and take seriously how individuals and the community are likely to react thereto and to identify (and rehearse in a realistic climate what steps would need to be taken to ameliorate the effects of such an event.

  2. Media participation and mental health in terrorist attack survivors.

    Science.gov (United States)

    Thoresen, Siri; Jensen, Tine K; Dyb, Grete

    2014-12-01

    Terrorism and disasters receive massive media attention, and victims are often approached by reporters. Not much is known about how terror and disaster victims perceive the contact with media and whether such experiences influence mental health. In this study, we describe how positive and negative experiences with media relate to posttraumatic stress (PTS) reactions among survivors of the 2011 Utøya Island terrorist attack in Norway. Face-to-face interviews were conducted with 285 survivors (47.0% female and 53.0% male) 14-15 months after the terrorist attack. Most survivors were approached by reporters (94%), and participated in media interviews (88%). The majority of survivors evaluated their media contact and participation as positive, and media participation was unrelated to PTS reactions. Survivors who found media participation distressing had more PTS reactions (quite distressing: B = 0.440, extremely distressing: B = 0.611, p = .004 in adjusted model). Perceiving media participation as distressing was slightly associated with lower levels of social support (r = -.16, p = .013), and regretting media participation was slightly associated with feeling let down (r = .18, p = .004). Reporters should take care when interviewing victims, and clinicians should be aware of media exposure as a potential additional strain on victims. Copyright © 2014 International Society for Traumatic Stress Studies.

  3. Terrorist threat and perceived Islamic support for terrorist attacks as predictors of personal and institutional out-group discrimination and support for anti-immigration policies: evidence from 9 European countries

    NARCIS (Netherlands)

    Doosje, B.; Zimmermann, A.; Küpper, B.; Zick, A.; Meertens, R.

    2009-01-01

    Traditionally, research has shown that subtle and blatant prejudices are important predictors of out-group discrimination and support for anti-immigration policies. The present paper shows that, when controlling for these types of prejudices and for political conservatism, terrorist threat and

  4. 77 FR 73459 - California State Motor Vehicle Pollution Control Standards; Notice of Waiver of Clean Air Act...

    Science.gov (United States)

    2012-12-10

    ... ENVIRONMENTAL PROTECTION AGENCY [FRL-9759-4] California State Motor Vehicle Pollution Control Standards; Notice of Waiver of Clean Air Act Preemption; California's 2010 Model Year Heavy-Duty Vehicle and... for CARB's own motor vehicle pollution control program based on lack of compelling and extraordinary...

  5. Terrorists on Trial: A Performative Perspective

    Directory of Open Access Journals (Sweden)

    Beatrice de Graaf

    2011-03-01

    Full Text Available On 30 March 2011, ICCT organised an Expert Meeting entitled “Terrorism Trials as Theatre: A Performative Perspective”. The Expert Meeting applied a performative perspective to three well known and recent trials in different parts of the world: the trials against the Dutch Hofstad Group, the Mumbai 2008 Terrorist Attack Trial and the Guantanamo Military Tribunals. As such, the Expert Meeting did not concentrate solely on the immediate judicial performance of the magistrates and/or the defence; instead, the trials were put in their wider sociological context, adopting notions of social drama and communication sciences. This Expert Meeting Paper is a further adaptation of the Discussion Paper that was used as basis for debate during the Meeting.

  6. Responding to Terrorist Incidents in Your Community: Flammable-Liquid Fire Fighting Techniques for Municipal and Rural Firefighters

    Energy Technology Data Exchange (ETDEWEB)

    Denise Baclawski

    2010-03-08

    The University of Nevada, Reno Fire Science Academy (FSA) applied for grant funding to develop and deliver programs for municipal, rural, and volunteer firefighters. The FSA specializes in preparing responders for a variety of emergency events, including flammable liquid fires resulting from accidents, intentional acts, or natural disasters. Live fire training on full scale burnable props is the hallmark of FSA training, allowing responders to practice critical skills in a realistic, yet safe environment. Unfortunately, flammable liquid live fire training is often not accessible to municipal, rural, or volunteer firefighters due to limited department training budgets, even though most department personnel will be exposed to flammable liquid fire incidents during the course of their careers. In response to this training need, the FSA developed a course during the first year of the grant (Year One), Responding to Terrorist Incidents in Your Community: Flammable-Liquid Fire Fighting Techniques for Municipal and Rural Firefighters. During the three years of the grant, a total of 2,029 emergency responders received this training. In Year Three, two new courses, a train-the-trainer for Responding to Terrorist Incidents in Your Community and Management of Large-Scale Disasters for Public Officials were developed and pilot tested during the Real-World Disaster Management Conference held at the FSA in June of 2007. Two research projects were conducted during Years Two and Three. The first, conducted over a two year period, evaluated student surveys regarding the value of the flammable liquids training received. The second was a needs assessment conducted for rural Nevada. Both projects provided important feedback and a basis for curricula development and improvements.

  7. The impact of the US Clean Air Act - seven years after enactment

    Energy Technology Data Exchange (ETDEWEB)

    Aloe, A.; Ailor, D.

    2000-07-01

    The United States Clean Air Act Amendments of 1990 (CAAA) have added operating expenses, renewed interest in coke battery repair techniques, played a role in new battery technology choices and spurred investigation into non-traditional coke making technologies. United States coke producers have demonstrated compliance with the new standards. The ultimate impact of the CAAA requirements will be known as aging coke batteries in the United States are shut down. At that point the demand for coke coupled with the CAAA requirements will determine if new batteries are built, and if so, what technology will be used. 7 refs., 4 figs., 2 tabs.

  8. Social categorization and fear reactions to the September 11th terrorist attacks

    NARCIS (Netherlands)

    Dumont, M.; Yzerbyt, V.Y.; Wigboldus, D.H.J.; Gordijn, E.H.

    2003-01-01

    Two experiments were run in The Netherlands and Belgium 1 week after the terrorist attacks against the World Trade Center in New York on September 11, 2001. The aim was to investigate whether social categorization affected emotional reactions, behavioral tendencies, and actual behaviors. Results

  9. Air Research

    Science.gov (United States)

    EPA's air research provides the critical science to develop and implement outdoor air regulations under the Clean Air Act and puts new tools and information in the hands of air quality managers and regulators to protect the air we breathe.

  10. Is magnetic resonance imaging safe for patients with retained metal fragments from combat and terrorist attacks?

    International Nuclear Information System (INIS)

    Eshed, Iris; Kushnir, Tamar; Shabshin, Noga; Konen, Eli

    2010-01-01

    Background: Increasing numbers of military confrontations and terrorist attacks have led to increasing reports of retained metal fragments among patients referred for magnetic resonance imaging (MRI). The potential hazard of retained metal fragments for patients undergoing MRI has been studied among patients with retained metal fragments from domestic violence but not from combat and terrorist attacks. Purpose: To retrospectively evaluate the safety of MRI in patients with subcutaneous warfare-metal fragments. Material and Methods: 10,322 consecutive metal screening forms of patients scheduled for 1.5 Tesla (T) MR examination were retrospectively reviewed. All patients reported to have retained metal fragments were contacted by telephone and asked to describe the event in which they were exposed to the fragments and for any adverse sequelae or sensations during and after MRI. Their radiographs were evaluated for the number and size of the fragments. The data were analyzed for correlations between these factors. Results: Seven of the 24 patients who reported retained metal fragments were excluded, since there was no validating evidence of their presence. Fragments in the remaining 17 patients (18 MRI examinations) were inflicted by military or terrorist attacks that occurred 2-39 years prior to the MRI. The fragment size ranged between 1 and 10 mm. One patient reported a superficial migration of a 10-mm fragment after MRI. No other adverse reactions were reported. Conclusion: Conducting 1.5T MRI examinations is safe in patients with retained metal fragments from combat and terrorist attacks not in the vicinity of vital organs. However, caution is advised.

  11. Is magnetic resonance imaging safe for patients with retained metal fragments from combat and terrorist attacks?

    Energy Technology Data Exchange (ETDEWEB)

    Eshed, Iris; Kushnir, Tamar; Shabshin, Noga; Konen, Eli (Dept. of Diagnostic Imaging, Sheba Medical center, Tel Hashomer, Sackler School of Medicine, Tel Aviv Univ., Tel Aviv (Israel)), e-mail: iris.eshed@sheba.health.gov.il

    2010-03-15

    Background: Increasing numbers of military confrontations and terrorist attacks have led to increasing reports of retained metal fragments among patients referred for magnetic resonance imaging (MRI). The potential hazard of retained metal fragments for patients undergoing MRI has been studied among patients with retained metal fragments from domestic violence but not from combat and terrorist attacks. Purpose: To retrospectively evaluate the safety of MRI in patients with subcutaneous warfare-metal fragments. Material and Methods: 10,322 consecutive metal screening forms of patients scheduled for 1.5 Tesla (T) MR examination were retrospectively reviewed. All patients reported to have retained metal fragments were contacted by telephone and asked to describe the event in which they were exposed to the fragments and for any adverse sequelae or sensations during and after MRI. Their radiographs were evaluated for the number and size of the fragments. The data were analyzed for correlations between these factors. Results: Seven of the 24 patients who reported retained metal fragments were excluded, since there was no validating evidence of their presence. Fragments in the remaining 17 patients (18 MRI examinations) were inflicted by military or terrorist attacks that occurred 2-39 years prior to the MRI. The fragment size ranged between 1 and 10 mm. One patient reported a superficial migration of a 10-mm fragment after MRI. No other adverse reactions were reported. Conclusion: Conducting 1.5T MRI examinations is safe in patients with retained metal fragments from combat and terrorist attacks not in the vicinity of vital organs. However, caution is advised.

  12. Iraagi väitel tuleb iga teine terrorist Süüriast / Igor Taro

    Index Scriptorium Estoniae

    Taro, Igor

    2007-01-01

    Bagdadis elurajooni turul hukkus enesetapurünnakus 130 inimest. Iraagi kõrge valitsusametniku sõnul tuleb 50% terrorist üle Süüria piiri. Iraagi peaminister Nuri al-Maliki arvamus. Vt. samas: Mässulised leiavad tuge internetist

  13. Trash can bomb can fall into the hands of terrorists

    CERN Multimedia

    2001-01-01

    Leading scientists from CERN described how if terrorists were able to get their hands on plutonium or uranium, they would be able to manufacture a 'trash can' nuclear bomb simply by inserting the radioactive material into a normal bomb. Once detonated a large area could be contaminated leading to the immediate deaths of many with many more future casualties due to cancers caused by the radiation.

  14. The Sociology and Psychology of Terrorism: Who Becomes a Terrorist and Why?

    Science.gov (United States)

    1999-09-01

    for School Killers,” New York Times, June 21, 1999, A10. Della Porta, Donatella. “ Political Socialization in Left-Wing Underground Organizations...Newsletter of the Association of Former Intelligence Officers, 22, No. 1, 1997. Wasmund, Klaus. “The Political Socialization of West German Terrorists.” In

  15. A Balancing Act: Anti-Terror Financing Guidelines and Their Effects on Islamic Charities

    Science.gov (United States)

    2006-12-01

    wayfarers; those in bondage or in debt ; newcomers to Islam; and, to facilitate and enhance Jihad. Zakat has become an important component of the... reason for this is that terrorist financing is not only an indicator but also the source and means of enabling those who carry out violent acts. As... reasons or for “preserving family wealth.”31 The long history of the waqf, fourteen centuries after the death of the Prophet, and the permanent

  16. Radiological preparedness in the case of a terrorist attack or an accident

    International Nuclear Information System (INIS)

    Cizmek, A.

    2005-01-01

    During the Cold War, every information about weapons of mass destruction was treated as top secret, regardless of whether the information concerned friend or foe. The most serious threat in our post Cold War era are terrorist radiological dispersal devices. Dirty nukes are what you may choose to build if you're unable to create a real nuclear bomb, i.e. one whose explosion is based on a nuclear reaction. A dirty bomb is a conventional explosive salted with radioactive isotopes in order to spew out that nuclear material and contaminate a wide area. The military usefulness of such devices have always been in dispute. In fact, the TNT in such a bomb may still be more dangerous than the nuclear material. Its destructive power would really depend on the size of the conventional bomb, and the volume and nature of nuclear material. This paper addresses the possibilities of decontamination and preparedness in the case of a terrorist attack or accident.(author)

  17. Defense against terroristic hazards and risk by building planning law; Abwehr terroristischer Gefahren und Risiken durch Bauplanungsrecht

    Energy Technology Data Exchange (ETDEWEB)

    Hopkins, Richard

    2012-07-01

    The book on defense against terroristic hazards and risk by building planning law includes the following issues: Introduction: civil engineering and safety. Risk, hazards and urban planning: historical and actual examples for the constructional danger prevention, terroristic threat and urban planning. Risk, hazards and terrorism: sociology and risk, law and risk, terrorism - risk or hazard? Answer to uncertainty - risk prevention, catastrophe law as link. Risk, hazard, terrorism and the public building and regional planning law: regional planning law as point of origin, building law and terrorism, possibility of control by the legal building regulations.

  18. EPA (Environmental Protection Agency) Indoor-Air Quality Implementation Plan. A report to Congress under Title IV of the Superfund Amendments and Reauthorization Act of 1986: radon gas and indoor air-quality research. Final report

    International Nuclear Information System (INIS)

    1987-06-01

    The EPA Indoor Air Quality Implementation Plan provides information on the direction of EPA's indoor air program, including the Agency's policy on indoor air and priorities for research and information dissemination over the next two years. EPA submitted the report to Congress on July 2, 1987 as required by the Superfund Amendments and Reauthorization Act of 1986. There are five appendices to the report: Appendix A--Preliminary Indoor Air Pollution Information Assessment; Appendix B--FY 87 Indoor Air Research Program; Appendix C--EPA Radon Program; Appendix D--Indoor Air Resource History (Published with Appendix C); Appendix E--Indoor Air Reference Data Base

  19. A New Forensic Picture Polygraph Technique for Terrorist and Crime Deception System

    Science.gov (United States)

    Costello, R. H. Brian; Axton, JoAnn; Gold, Karen L.

    2006-01-01

    The Forensic Terrorist Detection System called Pinocchio Assessment Profile (PAP) employs standard issue polygraphs for a non-verbal picture technique originated as a biofeedback careers interest instrument. The system can be integrated readily into airport screening protocols. However, the method does not rely on questioning or foreign language…

  20. Conceptualizing Terrorist Violence and Suicide Bombing

    Directory of Open Access Journals (Sweden)

    Murad Ismayilov

    2010-01-01

    Full Text Available This article presents an analysis of different approaches to terrorist violence, with a particular focus on suicide terrorism, using the above mentioned levels of analysis as a conceptual framework to organize this study. In doing so, the article focuses primarily on four selected studies: Khashan's theory of collective Palestinian frustration operating at individual and structural levels; Pape's strategic theory of suicide terrorism, Devji's notion of global jihad, and Hammes' conceptualization of suicide terrorism as one of the strategies of Fourth Generation Warfare, all studied at a strategic level. Drawing on these analyses, as well as on Tilly, this article attempts to address the question of whether suicide terrorism represents a "coherent phenomenon," and whether there is, or may be, a generalized pattern which could account for all possible causes of martyrdom operations.

  1. Playing the villain : understanding the punishment and portrayal of terrorists

    OpenAIRE

    Spens, Christiana

    2017-01-01

    Playing the Villain argues that the portrayal and punishment of terrorists in the Western media perpetuates colonialist attitudes, due to the visual connections between these modern images and past or fictional representations of iconic, punished villains. A theory of scapegoating related to intervisuality supports this argument, by explaining that as a ritual dependent on and developed by cultural history and mythology, scapegoating requires engagement with recognisable visual motifs that...

  2. Have the Mexican Drug Cartels Evolved into a Terrorist Insurgency?

    Science.gov (United States)

    2013-06-14

    individual police officers and journalists.55 Originally, the Gulf Cartel recruited them from Mexico’s Special Operations Forces, known as Grupo Aeromóvil de ...fluid situation surrounding the Mexican drug war has led to much speculation about how to classify the powerful drug cartels conducting it. There is... conducting it. There is literature debating whether the cartels are merely a criminal enterprise or whether the cartels represent a new terrorist

  3. Developing Health-Based Pre-Planning Clearance Goals for Airport Remediation Following Chemical Terrorist Attack: Introduction and Key Assessment Considerations

    OpenAIRE

    Watson, Annetta; Hall, Linda; Raber, Ellen; Hauschild, Veronique D.; Dolislager, Fredrick; Love, Adam H.; Hanna, M. Leslie

    2011-01-01

    In the event of a chemical terrorist attack on a transportation hub, post-event remediation and restoration activities necessary to attain unrestricted facility reuse and re-entry could require hours to multiple days. While restoration timeframes are dependent on numerous variables, a primary controlling factor is the level of pre-planning and decision-making completed prior to chemical terrorist release. What follows is the first of a two-part analysis identifying key considerations, critica...

  4. Evaluating impacts of Clean Air Act compliance strategies

    International Nuclear Information System (INIS)

    Shirer, D.A.; Evans, R.J.; Harrison, C.D.; Kehoe, D.B.

    1993-01-01

    The Clean Air Act Amendments of 1990 requires that by the year 2000, US SO 2 emissions must be reduced by 10 million tons. This requirement will have significant impact on coal-fired electric utilities. As a result, most utilities are currently evaluating numerous compliance options, including buying allowances, coal cleaning/blending/switching, and flue gas scrubbing. Moreover, each utility must address its own unique circumstances with regard to competition, efficiency, capital expenditures, reliability, etc. and many utilities may choose a combination of compliance options to simultaneously satisfy their environmental, performance, and financial objectives. The Coal Quality Expert, which is being developed under a clean coal technology project funded by US DOE and EPRI, will predict the economic, operational, and environmental benefits of using higher-quality coals and provides an assessment of the merits of various post-combustion control technologies for specific utility applications. This paper presents background on how utilities evaluate their compliance options, and it describes how the Coal Quality Expert could be used for such evaluations in the future to assure that each utility can select the best combination of coal specifications and emission control technologies to meet its compliance objectives

  5. Can environmental investment and expenditure enhance financial performance of US electric utility firms under the clean air act amendment of 1990?

    International Nuclear Information System (INIS)

    Sueyoshi, Toshiyuki; Goto, Mika

    2009-01-01

    This study investigates the causality from environmental investment (as a long-term effort) and expenditure (as a short-term effort) to financial performance in the US electric utility industry. The industry is one of the large air polluters in the United States. This empirical study finds that the environmental expenditure under the US Clean Air Act has had a negative impact from 1989 to 2001. The negative impact has become much effective after the implementation of the Title IV Program (1995) of the US Clean Air Act. This study cannot find the influence of environmental investment on financial performance by a statistical test although it indicates a positive impact. In the United States, fossil-fueled power plants such as coal-fired ones still produce a large portion of electricity. The generation structure is inconsistent with the betterment in the US environmental protection and imposes a financial burden to electric utility firms.

  6. CAROLIN GOERZIG. TALKING TO TERRORISTS: CONCESSIONS AND THE RENUNCIATION OF VIOLENCE. REVIEWED BY: SCOTT NICHOLAS ROMANIUK

    Directory of Open Access Journals (Sweden)

    Scott Nicholas Romaniuk

    2016-03-01

    Full Text Available “Talking to terrorists remains a taboo” (Goerzig, 2010: p. 125. The adoption and reinforcement of such a moral position by many Western and non-Western governments alike has played no small role in, to a large extent, states to contain the violence and insecurity bred by terror activist in the post-Cold war and post-9/11 periods. Yet, few policymakers seem to recognize the danger in building political and social environments in which dialogue between states and terrorist groups and organizations is little more than depravity or even a betrayal to entire populations. To be sure, the protection of civilian populations has been entrusted to states that might otherwise learn better means of terrorism deterrence if lines of communication between states and terrorists were less constrained. The taboo of which Carolin Goerzig speaks, is one that “has been institutionalized in a legal framework in which … academics are being asked to report on their students and in which attempting to understand the subjectivities of ‘terrorist’ suspects could be interpreted as a ‘glorification of terrorism’” (Jackson quoted in Goerzig, 2010: p. 125.

  7. Act no 388 to amend Section 15 of the Nuclear Liability Act

    International Nuclear Information System (INIS)

    1986-01-01

    Finland is ratifying the Montreal Protocols Nos 3 and 4 to the Warsaw Convention concerning carriage by air; protocol No 4 contains no exclusion clause for nuclear damage. This Act amends the 1972 Nuclear Liability Act to the effect that air carriers of nuclear substances have a right of recourse against the operator liable under nuclear legislation. In this way the principle of channelling liability onto the nuclear operator is maintained. (NEA) [fr

  8. Overview of the terrorist threat to international peace and security

    International Nuclear Information System (INIS)

    Wilkinson, P.

    2001-01-01

    This contribution deals with the implications of terrorism for international peace and security and the escalation to mass terrorism. The topics covered are: impact of the latest terrorist events on the United States, impact on the international community; illegitimacy of terrorism; need for global action; the role of the united Nations; the crucial role for disarmament and counter-proliferation activities, especially in finding means of enhancing the security of materials that could easily be misused

  9. 75 FR 22400 - Clean Air Act Operating Permit Program; Petition To Object to Title V Permit for Wheelabrator...

    Science.gov (United States)

    2010-04-28

    ... ENVIROMENTAL PROTECTION AGENCY [FRL-9142-6] Clean Air Act Operating Permit Program; Petition To Object to Title V Permit for Wheelabrator Baltimore, L.P., Baltimore City, MD AGENCY: Environmental Protection Agency (EPA). ACTION: Notice of final action. SUMMARY: Pursuant to section 505(b)(2) of the Clean...

  10. Can environmental investment and expenditure enhance financial performance of US electric utility firms under the clean air act amendment of 1990?

    Energy Technology Data Exchange (ETDEWEB)

    Sueyoshi, Toshiyuki [New Mexico Institute of Mining and Technology, Department of Management, 801 Leroy Place, Socorro, NM 87801 (United States); National Cheng Kung University, College of Business, Department of Industrial and Information Management, Tainan (China); Goto, Mika [Central Research Institute of Electric Power Industry, 2-11-1, Iwado Kita, Komae-shi, Tokyo, 201-8511 (Japan)

    2009-11-15

    This study investigates the causality from environmental investment (as a long-term effort) and expenditure (as a short-term effort) to financial performance in the US electric utility industry. The industry is one of the large air polluters in the United States. This empirical study finds that the environmental expenditure under the US Clean Air Act has had a negative impact from 1989 to 2001. The negative impact has become much effective after the implementation of the Title IV Program (1995) of the US Clean Air Act. This study cannot find the influence of environmental investment on financial performance by a statistical test although it indicates a positive impact. In the United States, fossil-fueled power plants such as coal-fired ones still produce a large portion of electricity. The generation structure is inconsistent with the betterment in the US environmental protection and imposes a financial burden to electric utility firms. (author)

  11. Authoritarian reactions to terrorist threat: who is being threatened, the Me or the We?

    Science.gov (United States)

    Asbrock, Frank; Fritsche, Immo

    2013-01-01

    Endorsement of authoritarian attitudes has been observed to increase under conditions of terrorist threat. However, it is not clear whether this effect is a genuine response to perceptions of personal or collective threat. We investigated this question in two experiments using German samples. In the first experiment (N = 144), both general and specific authoritarian tendencies increased after asking people to imagine that they were personally affected by terrorism. No such effect occurred when they were made to think about Germany as a whole being affected by terrorism. This finding was replicated and extended in a second experiment (N = 99), in which personal and collective threat were manipulated orthogonally. Authoritarian and ethnocentric (ingroup bias) reactions occurred only for people highly identified with their national ingroup under personal threat, indicating that authoritarian responses may operate as a group-level coping strategy for a threat to the personal self. Again, we found no effects for collective threat. In both studies, authoritarianism mediated the effects of personal threat on more specific authoritarian and ethnocentric reactions. These results suggest that the effects of terrorist threat on authoritarianism can, at least in part, be attributed to a sense of personal insecurity, raised under conditions of terrorist threat. We discuss the present findings with regard to basic sociomotivational processes (e.g., group-based control restoration, terror management) and how these may relate to recent models of authoritarianism.

  12. Activist or Terrorist? Negotiating Discourses of Eco-Terror in "If a Tree Falls"

    Science.gov (United States)

    Olson, Jade

    2018-01-01

    Environmentalist voices like the Earth Liberation Front have been labeled "eco-terrorists." The 2011 documentary film "If a Tree Falls" explores how "eco-terrorism" troubles the unstable border between activism and terrorism. This essay offers a textual analysis of the film's negotiation of the activism/terrorism…

  13. A Terrorist-fraud Resistant and Extractor-free Anonymous Distance-bounding Protocol

    OpenAIRE

    Avoine , Gildas; Bultel , Xavier; Gambs , Sébastien; Gerault , David; Lafourcade , Pascal; Onete , Cristina; Robert , Jean-Marc

    2017-01-01

    International audience; Distance-bounding protocols have been introduced to thwart relay attacks against contactless authentication protocols. In this context, veri-fiers have to authenticate the credentials of untrusted provers. Unfortunately , these protocols are themselves subject to complex threats such as terrorist-fraud attacks, in which a malicious prover helps an accomplice to authenticate. Provably guaranteeing the resistance of distance-bounding protocols to these attacks is a compl...

  14. Cooperative international arrangements: prevention of nuclear terrorism and the extradition and prosecution of terrorists

    International Nuclear Information System (INIS)

    Murphy, J.F.

    1987-01-01

    In considering the problems associated with prosecuting and punishing nuclear terrorists, it is noted that nuclear terrorism per se is not currently a crime under international law. To be sure, the Convention on the Physical Protection of Nuclear Material would probably cover any act of nuclear terrorism that involved nuclear material used for peaceful purposes. However, nuclear material used for military purposes or military nuclear reactors is outside the scope of the convention. US legislation implementing the convention goes beyond its terms in this respect and covers crimes involving nuclear material for nonpeaceful purposes if the offense is committed within US territorial, special maritime, special territorial, or special aircraft jurisdiction or if the offense is committed by nationals of the US. The author feels an effort should be made, under the auspices of the United Nations, to conclude a convention that would define nuclear terrorism, declare it a crime under international law, and obligate state parties to extradite or prosecute those who commit the crime. Such a convention would fill the large gap in the coverage of the Convention on the Physical Protection of Nuclear Material

  15. Public opinion and terrorist acts

    Czech Academy of Sciences Publication Activity Database

    Malečková, Jitka; Stanišić, Dragana

    2011-01-01

    Roč. 27, Sup. 1 (2011), S107-S121 ISSN 0176-2680 R&D Projects: GA MŠk LC542 Institutional research plan: CEZ:AV0Z70850503 Keywords : support for terrorism * public opinion * international terrorism Subject RIV: AH - Economics Impact factor: 1.437, year: 2011

  16. Air classifier technology (ACT) in dry powder inhalation. Part 1 : Introduction of a novel force distribution concept (FDC) explaining the performance of a basic air classifier on adhesive mixtures

    NARCIS (Netherlands)

    de Boer, A H; Hagedoorn, P; Gjaltema, D; Goede, J; Frijlink, H W

    2003-01-01

    Air classifier technology (ACT) is introduced as part of formulation integrated dry powder inhaler development (FIDPI) to optimise the de-agglomeration of inhalation powders. Carrier retention and de-agglomeration results obtained with a basic classifier concept are discussed. The theoretical

  17. 76 FR 53452 - Clean Air Act Operating Permit Program; Response to Petition To Reopen the 2001 Title V Permit...

    Science.gov (United States)

    2011-08-26

    ... ENVIROMENTAL PROTECTION AGENCY [FRL-9457-3 ] Clean Air Act Operating Permit Program; Response to Petition To Reopen the 2001 Title V Permit for Reliant Portland Generating Station, Upper Mount Bethel Township, Northampton County, PA AGENCY: Environmental Protection Agency (EPA). ACTION: Notice of action...

  18. VULNERABILITIES, TERRORIST AND BIOTERRORIST THREATS AND RISKS

    Directory of Open Access Journals (Sweden)

    Viorel ORDEANUL

    2014-12-01

    Full Text Available The contemporary society has been, is and will probably be dominated "urbi et orbi " (everywhere and for everybody by conflicts expressed through violence, social confrontations, permissiveness, authority collapse, collapse of moral norms. Paradoxically, although it is spoken and written much about terrorism and terrorists, there is still no complete and accepted definition of these terms, and the legal classification is approximate. The analysis of threats is an extremely important decisional asset when setting up plans of direct protection or objective security strategies or institutions suitable to become targets of violent actions, but today's intelligence community has not yet established a clear set of procedures and principles that constitute the expert main frame for a comprehensive analysis of threats and vulnerabilities.

  19. Reasoning about Emotional Contents Following Shocking Terrorist Attacks: A Tale of Three Cities

    Science.gov (United States)

    Blanchette, Isabelle; Richards, Anne; Melnyk, Laura; Lavda, Anastasia

    2007-01-01

    The authors examined reasoning following the terrorist attacks carried out in London in July 2005. They tested participants in London (United Kingdom), Manchester (United Kingdom), and London (Canada) within 1 week of the attacks and again 6 months later. Participants reasoned about syllogisms of 3 types: neutral, generally emotional, and…

  20. Are there SO2 externality costs beyond the Clean Air Act Amendments of 1990?

    International Nuclear Information System (INIS)

    Sanghi, A.; Joseph, A.L.

    1992-01-01

    Inclusion of environmental externality costs in the selection of utility resources has become a reality in New York, Massachusetts, Nevada and California. Soon several other jurisdictions are likely to join these states in using environmental externality costs in decision-making. The consideration of environmental externalities are bound to profoundly affect utility decision-making in the future. So far attention has focused largely on air emission externalities of SO 2 , NO x and CO 2 . However, the recent Clean Air Act Amendments (CAAA) will reduce SO 2 emissions from utilities by about 50 percent. With such a large reduction in SO 2 loading, the question has been raised as to the need to further consider SO 2 externality costs in decision-making. This paper comments on this issue. By using generation and emission data from New York utilities, the paper shows that SO 2 emission externalities exist even after complying with requirements of the CAAA

  1. Consequence Assessment for Potential Scenarios of Radiological Terrorists Events

    International Nuclear Information System (INIS)

    Shin, Hyeongki; Kim, Juyoul

    2007-01-01

    Radiological dispersal device (RDD) means any method used to deliberately disperse radioactive material to create terror or harm. Dirty bomb is an example of RDD, which usually consists of radioactive material and unconventional explosive. Dirty bomb was a problem long before September 11, 2001. In 1987, the Iraqi government tested a one-ton radiological bomb. The Iraqi tests confirmed that a dirty bomb is not effective as weapons of mass destruction (WMD) and that its main value is as a psychological weapon. In 1995, Chechen rebels buried a dirty bomb in a park in Moscow threatening to detonate one in the future if their demands were not met. Another good example of potential dirty bomb effects was an incident in Goiania, Brazil on September 18, 1987, where an orphaned medical source containing 1,375 Ci of Cs-137 resulted the death of four people and extensive environmental contamination. The purposes of radiological terrorists events are not to destroy or damage the target but to disperse radioactivity in the environment. They inflict panic on a public and economic damage by disruption of business. They also have influence on enormous clean-up costs by spreading radioactive contamination including secondary impacts on water supply reservoirs. Generally, two major long-term concerns following a RDD are human health and economic impacts. In this study, we developed potential scenarios of radiological terrorists events and performed their radiological consequence assessments in terms of total effective dose equivalent (TEDE), projected cumulative external and internal dose, and ground deposition of radioactivity

  2. Consequence Assessment for Potential Scenarios of Radiological Terrorists Events

    Energy Technology Data Exchange (ETDEWEB)

    Shin, Hyeongki [Korea Institute of Nuclear Safety, Daejeon (Korea, Republic of); Kim, Juyoul [Seoul National University, Seoul (Korea, Republic of)

    2007-07-01

    Radiological dispersal device (RDD) means any method used to deliberately disperse radioactive material to create terror or harm. Dirty bomb is an example of RDD, which usually consists of radioactive material and unconventional explosive. Dirty bomb was a problem long before September 11, 2001. In 1987, the Iraqi government tested a one-ton radiological bomb. The Iraqi tests confirmed that a dirty bomb is not effective as weapons of mass destruction (WMD) and that its main value is as a psychological weapon. In 1995, Chechen rebels buried a dirty bomb in a park in Moscow threatening to detonate one in the future if their demands were not met. Another good example of potential dirty bomb effects was an incident in Goiania, Brazil on September 18, 1987, where an orphaned medical source containing 1,375 Ci of Cs-137 resulted the death of four people and extensive environmental contamination. The purposes of radiological terrorists events are not to destroy or damage the target but to disperse radioactivity in the environment. They inflict panic on a public and economic damage by disruption of business. They also have influence on enormous clean-up costs by spreading radioactive contamination including secondary impacts on water supply reservoirs. Generally, two major long-term concerns following a RDD are human health and economic impacts. In this study, we developed potential scenarios of radiological terrorists events and performed their radiological consequence assessments in terms of total effective dose equivalent (TEDE), projected cumulative external and internal dose, and ground deposition of radioactivity.

  3. Radical Islam as a Means of Self-Realization for the North Caucasian Youth: From the Terrorist-Criminal Groups to the Beginnings of the Creation of a New, Less Controlled Subculture

    Directory of Open Access Journals (Sweden)

    Nikoloz Janelidze

    2015-11-01

    Full Text Available Radical Islam with its various types of manifestations is one of the significant challenges facing the modern world. This problem has also affected the societies of autonomous republics bordering Georgia to the north. In today’s North Caucasus, the activity of radical Islam followers has reached beyond the political (in many cases terrorist niche and has acquired quasi-social characteristics. Furthermore, the facts and tendencies indicate that this part of the society (in this case youth purposefully or unintentionally creates the so-called uncontrolled and/or less controlled subculture with different opinions, views, ideology, behaviors, in many cases clothes, hairstyle, etc. Radical Islam (in this case as a doctrine regulates human conduct – provides advice, dictates how to act, and in fact it sets a dogma how to dress, how to behave in public, how to live, etc. Wahhabis/Salafis are forbidden to smoke tobacco, hashish, to use beads, sing loudly, dance, etc. It is worth to separately note the so-called aggressive wing of Wahhabism/Salafism or the terrorists, field commanders, etc.One of the motives for writing the article is to show readers the fact that radical Islam in North Caucasus is not solely a terrorist activity. It encompasses a much broader spectrum of the society, and at the same time it is much more than a religion. It sets the norms of social behavior and thinking, which in itself limits the formation of subjective attitudes. Exactly the lack of the latter generates the negative trend of their activities, which quite often are used for political actions by the respective forces.

  4. Guerilla Warfare & Law Enforcement: Combating the 21st Century Terrorist Cell within the U.S.

    Directory of Open Access Journals (Sweden)

    Major Richard Hughbank

    2009-01-01

    Full Text Available Both domestic and international terrorist organizations employ guerrilla warfare tactics, techniques, and procedures. Thus, the ability to identify and defeat the members of these organizations, cripple their infrastructures, and disrupt their financial resources lies in the understanding of modern guerrilla warfare as it develops in the twenty-first century within the United States.3 The forms of asymmetric warfare4 adopted by domestic and international terrorist groups alike is no longer intended to gain simple media exposure or governmental manipulation; they want to make an overpowering impact by causing massive loss of life and severe damage to infrastructure and are often motivated by religious imperatives and political goals. As terrorism analyst Stephen Flynn has observed, "Throughout the 20th century [Americans] were able to treat national security as essentially an out-of-body experience. When confronted by threats, [America] dealt with them on the turf of our allies or our adversaries. Aside from the occasional disaster and heinous crime, civilian life [in the United States] has been virtually terror-free." With the turn of the twenty-first century, terrorist operations have become more prevalent in the United States and are taking shape in the form of modern guerrilla warfare, thus creating new challenges for federal, state, and local law enforcement agencies. After reviewing the origin and nature of these challenges, this article will offer some suggestions for countering guerilla warfare in the United States.

  5. Colombian Army Transformation and the Inflection Point of the Terrorist Groups

    Science.gov (United States)

    2011-03-30

    Prince (Cambridge: Cambridge University Press, 1988), 24. 2 James D Henderson, La Modernizacion en Colombia: Los años de Laureano Gomez, 1889-1965...prime factor that permits the terrorist´s isolation from the social base, as well as the legitimate use of force by the State. In summary, the FARC...his dismissal, for alleged meddling in political affairs. 23 3 Francisco Leal Buitrago, La Inseguridad de la Seguridad. Colombia 1958-2005

  6. Transnational Crime and the Criminal-Terrorist Nexus: Synergies and Corporate Trends

    Science.gov (United States)

    2004-04-01

    are forced into prostitution, pornography and sweatshop labor, it becomes an obvious and direct threat to the fabric of our society.3 Add terrorists... impacts the U.S. Finally, many nation states are on the brink of thriving or failing, and their fate depends either on us…or the “help” of organized...and social fabric of societies came to light in the mid-1990s. Aggravating factors include globalization of business networks, lowered trade

  7. Estimation of terrorist attack resistibility of dual-purpose cask TP-117 with DU (depleted uranium) gamma shield

    International Nuclear Information System (INIS)

    Alekseev, O.G.; Matveev, V.Z.; Morenko, A.I.; Il'kaev, R.I.; Shapovalov, V.I.

    2004-01-01

    Report is devoted to numerical research of dual-purpose unified cask (used for SFA transportation and storage) resistance to terrorist attacks. High resistance of dual-purpose unified cask has been achieved due to the unique design-technological solutions and implementation of depleted uranium in cask construction. In suggested variant of construction depleted uranium fulfils functions of shielding and constructional material. It is used both in metallic and cermet form (basing on steel and depleted uranium dioxide). Implementation of depleted uranium in cask construction allows maximal load in existing overall dimensions of the cask. At the same time: 1) all safety requirements (IAEA) are met, 2) dual-purpose cask with SFA has high resistance to terrorist attacks

  8. Estimation of terrorist attack resistibility of dual-purpose cask TP-117 with DU (depleted uranium) gamma shield

    Energy Technology Data Exchange (ETDEWEB)

    Alekseev, O.G.; Matveev, V.Z.; Morenko, A.I.; Il' kaev, R.I.; Shapovalov, V.I. [Russian Federal Nuclear Center - All-Russian Research Inst. of Experimental Physics, Sarov (Russian Federation)

    2004-07-01

    Report is devoted to numerical research of dual-purpose unified cask (used for SFA transportation and storage) resistance to terrorist attacks. High resistance of dual-purpose unified cask has been achieved due to the unique design-technological solutions and implementation of depleted uranium in cask construction. In suggested variant of construction depleted uranium fulfils functions of shielding and constructional material. It is used both in metallic and cermet form (basing on steel and depleted uranium dioxide). Implementation of depleted uranium in cask construction allows maximal load in existing overall dimensions of the cask. At the same time: 1) all safety requirements (IAEA) are met, 2) dual-purpose cask with SFA has high resistance to terrorist attacks.

  9. Hidden Markov models for the activity profile of terrorist groups

    OpenAIRE

    Raghavan, Vasanthan; Galstyan, Aram; Tartakovsky, Alexander G.

    2012-01-01

    The main focus of this work is on developing models for the activity profile of a terrorist group, detecting sudden spurts and downfalls in this profile, and, in general, tracking it over a period of time. Toward this goal, a $d$-state hidden Markov model (HMM) that captures the latent states underlying the dynamics of the group and thus its activity profile is developed. The simplest setting of $d=2$ corresponds to the case where the dynamics are coarsely quantized as Active and Inactive, re...

  10. Protecting facilities against terrorism and sabotage. Is Jamaica prepared to deal with this potential threat?

    International Nuclear Information System (INIS)

    Powell, E.D.

    2001-01-01

    Full text: Jamaica, a developing Caribbean country, is presently experiencing an economic recession. This has lead to the government having considerable difficulty in acquiring much needed financing, even financing that is necessary to protect the county's resources and facilities from terrorist and sabotage. Essential national facilities include our international airports, embassies and High Commission, hospitals, utility plants - electricity, water and telecommunications, oil-refineries, government ministries, parliamentary houses and educational facilities. These facilities are vulnerable to terrorist attacks and sabotages. Terrorist acts and acts of sabotage can come from internal as well as external sources, they can be commandeered from the air, land or sea. They can be politically, socio-economically or otherwise motivated. As a third world developing nation, Jamaica does not have the capability or the resources necessary to secure all its assets, the government must prioritize on such resource allocation. With its high level of debt servicing, dealing with recurrent and capital expenditure and addressing other social issues, some important issues will be placed on the back burner, dealing with terrorism and sabotage will fall in the category. One contributing factor is the fact that to date the incidents of terrorism and sabotage have been few to non-existent. This has encouraged the government to become somewhat complacent, subscribing to the belief that acts of terrorism and sabotage will never happen. This practice can be detrimental to the country, as one cannot underestimate the threat of terrorism and sabotage. With the steady increase in drug related incidents and with the deportation agreement the government has with some first world countries such as the USA and England, this threat is very realistic. Drug 'Lords'/'Dons' are known to promote terrorism and sabotage as revenge mechanism against governments for unfavorable decision handed down by the

  11. The quest for significance model of radicalization: implications for the management of terrorist detainees.

    Science.gov (United States)

    Dugas, Michelle; Kruglanski, Arie W

    2014-01-01

    Radicalization and its culmination in terrorism represent a grave threat to the security and stability of the world. A related challenge is effective management of extremists who are detained in prison facilities. The major aim of this article is to review the significance quest model of radicalization and its implications for management of terrorist detainees. First, we review the significance quest model, which elaborates on the roles of motivation, ideology, and social processes in radicalization. Secondly, we explore the implications of the model in relation to the risks of prison radicalization. Finally, we analyze the model's implications for deradicalization strategies and review preliminary evidence for the effectiveness of a rehabilitation program targeting components of the significance quest. Based on this evidence, we argue that the psychology of radicalization provides compelling reason for the inclusion of deradicalization efforts as an essential component of the management of terrorist detainees. Copyright © 2014 John Wiley & Sons, Ltd.

  12. Operation the laboratory for NBC protection and bio monitoring in the case of terrorist attack with NBC weapons

    International Nuclear Information System (INIS)

    Tusek, D.; Vucemilovic, A; Klobucar, J.

    2009-01-01

    The aim of this study was to develop efficacy of Operation the Laboratory for NBC protection and Bio monitoring in the case of terrorist attack with chemical weapons. When is necessary quickly, adeptly Operation and unambiguous confirmation about use chemical warfare agent, the Laboratory must be ready and qualified for reaction. The Laboratory had to develop capability for the timely sampling and unambiguous identification chemical warfare agents in a battlefield or in case of the terrorist attack. The need for quality sample collection and analyses is critical to verify use of chemical weapon (CW) by an enemy or terrorists. Collection, packaging, transport and analysis of samples must be carried out on proper way and quickly enough for military, medical or political purposes. Precise records must accompany each sample but these records must not contaminate samples anyway. All sampling team personnel have to be equipped with appropriate equipment and qualified in its handling. After arriving samples at our Laboratory, we will handle with them on standard procedures; carry out preparation such as Headspace, Liquid/liquid extraction, Solid phase extraction, Liquid/solid extraction, concentration and derivatization. After that we will analyze samples by gas-chromatography mass-spectrometry (GC/MS) method.(author)

  13. [Stories and drawings by children after the 2015 terrorist attacks in Paris].

    Science.gov (United States)

    Poget, Marc; Bouaziz, Nora; Apter, Gisèle

    2016-01-01

    Through the stories and drawings of children in a medical-psychological centre, it is possible to explore their psychological representations of the terrorist attacks which took place in Paris in January 2015. This work highlights the need to rethink the methods of care provided to these children in order to adapt them to their specific needs. Copyright © 2016 Elsevier Masson SAS. All rights reserved.

  14. 78 FR 1759 - Notice of Approval of Clean Air Act Outer Continental Shelf Minor Source/Title V Minor Permit...

    Science.gov (United States)

    2013-01-09

    ... documents relevant to the above-referenced permits are available for public inspection during normal... permit decisions, to the extent it is available, may be sought by filing a petition for review in the... ENVIRONMENTAL PROTECTION AGENCY 40 CFR PART 52 [FRL-9767-5] Notice of Approval of Clean Air Act...

  15. Spatial proximity and the risk of psychopathology after a terrorist attack

    OpenAIRE

    DiMaggio, Charles; Galea, Sandro; Emch, Michael

    2010-01-01

    Previous studies concerned with the relation of proximity to the September 11, 2001 terrorist attacks and subsequent psychopathology have produced conflicting results. The goals of this analysis are to assess the appropriateness of using Bayesian hierarchical spatial techniques to answer the question of the role of proximity to a mass trauma as a risk factor for psychopathology. Using a set of individual-level Medicaid data for New York State, and controlling for age, gender, median household...

  16. Offensive Counterterrorism Targeted killing in eliminating terrorist target: the case of the USA and Israel

    Directory of Open Access Journals (Sweden)

    Hermínio Matos

    2012-01-01

    Full Text Available Due to the "global terrorism project", some States have adopted offensive counterterrorism measures which, though within national strategies on security and defense, contemplate the use of military power and the use of lethal force against non-state actors - individuals, groups or terrorist organizations - beyond their national borders. Reformulating the security paradigm has led, in these cases, to policies against terrorism. This is the case of targeted killing - the killing of selected targets - by the USA and Israel. Targeted killing actions - using essentially but not only drones - in Pakistan and Yemen by the American administration, a well as the Israeli response to Palestinian terrorism, are under heated debate in terms of their efficiency and legality. Thus, this paper aims to not only provide an analytical framework on this theme but also analyze the scope and impact of these counter terrorist strategies by the two countries.

  17. Pollution prevention incentives and disincentives created by the Clean Air Act

    International Nuclear Information System (INIS)

    Webb, C.F.; Wolffe, G.S.

    1998-01-01

    Environmental laws and regulations have not always been implemented in a manner that allows for the consideration of pollution prevention (P2) alternatives as a means of achieving progress toward air quality goals. Recently, the US Environmental Protection Agency (EPA) has been making strides to reinterpret laws and regulations to be more flexible and encourage P2 projects that do not involve end-of-the-pipe controls. For instance, when conducting control technology evaluations such as best available control technology (BACT) and lowest achievable emission rate (LAER), facilities can and should take into consideration P2 options that accomplish the same emission reduction goals as traditional end-of-the-pipe controls. There are also new emissions trading provisions building on those allowed in the acid rain and offset trading programs that promise to make P2 projects much more cost-effective. Several traditional 'command-and-control' programs of the Clean Air Act (CAA) also promote P2 projects. For instance, emission reductions realized through P2 projects show managers a direct cost savings due to reductions in Title V facility annual emissions fees and possibly a direct cost benefit through sale of emission credits. Furthermore, the CAA encourages P2 indirectly through the detail understanding of processes gained from emissions inventories and risk management plans (RMPs). However, many CAA prescriptive programs create disincentives for industry to select P2 alternatives. 30 refs

  18. PROSECUTING SOMALIA PIRATES AS TERRORISTS

    Directory of Open Access Journals (Sweden)

    ODHIAMBO E.O.S., ONKWARE K., KASSILLY J., NTABO O. M.

    2011-01-01

    Full Text Available This article starts from the assumption that piracy resembles terrorism in many aspects and attempts to support it through both a theoretical investigation and practical examples. The argument it makes is that Somali pirates should be prosecuted as terrorists. Moreover, it emphasizes the idea that for Somalia’s neighboring countries and not only the implementation of such an approach consists in resorting to the antiterrorist conventions already in place. Thus, for example, Kenya Navy as a piracyfi ghting agency should rely on these conventions to justify the capture and prosecution of pirates in Kenyan courts. In this respect, we emphasize the idea that only by resorting to an established international legal framework can Kenya identify the tools to counter pirates’ actions within legal limits. Moreover, this should be paralleled by efforts towards rebuilding Somalia and its institutions if long-term solutions are to be envisaged in the eradication of piracy in the Indian Ocean. In conclusion, the article looks at the concepts of piracy, terrorism and development in the Horn of Africa, suggests that piracy is a form of Terrorism and, makes a series of recommendations.

  19. We Bomb, Therefore We Are: The Evolution of Terrorist Group Life Cycles

    Science.gov (United States)

    1994-03-24

    34 Political Socialization in Left-Wing Underground Organizations: Biographies of Italian and German Militants," International Social Movement Research... Political Socialization of Terrorist Groups in West Germany," Journal of Political and Military Sociology, v. 11, n. 2, Fall 1983, 236. See also Giorgio...Love?, 30-31. 7 Quoted in Wasmund, " Political Socialization ," 236. 88Irving L. Horowitz, "The Routinization of Terrorism and Its Unanticipated

  20. Plastic Surgery Management of Victims of Terrorist Violence in Ankara, Turkey.

    Science.gov (United States)

    İğde, Murat; Kaplan, Ahmet

    2017-12-01

    Terror attacks have been progressively increasing worldwide through the present era. The management of the consequences of terrorism events is under debate in almost every scientific area. The organization and advancement of health services constitute important components of the crisis management. Similar to other specialty areas in medicine, the medical management of terrorist attacks is becoming important in terms of plastic and reconstructive surgery.Ankara, the capital of Turkey, has been subject to 2 terrorist events in public places within a year. The total number of patients involved in both cases was 434. Ankara Numune Training and Research Hospital is a tertiary health care institution and one of the most important trauma centers in the region. A total of 178 Patients exposed to these events referred to our hospital. Of the total, 34 patients were completely or partially treated in the plastic and reconstructive surgery clinic. In this study, we tried to discuss the difficulties encountered in the classification of patients and plastic surgery during the treatment period of patients who experienced these attacks.Data were obtained from The National News Agency, hospital, and our own clinic registries. Patient classification was based on the injured parts of the body. Statistical analysis was performed for all data. In conclusion, the role and the importance of plastic surgery department especially in trauma management have been emphasized in the light of our findings.

  1. Combating the terrorist use of mass destruction weapons, particularly nuclear weapons

    International Nuclear Information System (INIS)

    Barakat, M.

    2008-01-01

    The risks of mass destruction weapons vary and also forms of damages resulting therefrom. While the effects of nuclear weapons are focused, sudden and comprehensive, the chemical weapons have limited impacts relatively unless used intensively severe prejudice to the element of surprise, and thus impaired the efficacy of their influences,especially that they affect exceptionally the individuals in the area of injury and biological weapons do not announce themselves except through their effect that appears later than the time of use as they affect exceptionally the organisms in the area of injury.The mass destruction weapons have turned from being a purely military means in the early twentieth century and have now become the means of violence against governments and countries that they should prepare themselves for and respond in ways of successful and effective countermeasures. Despite the fact that the acquisition of mass destruction weapons can be considered as a priority objective, which terrorist groups and organizations steadily seek but their accessibility is flanked by a lot of difficulties. Addressing the risk of further spread of nuclear weapons, and especially after doubling the power of those high-risk weapons, the international community has an approach to take a number of arrangements that complement each other to control and resist nuclear proliferation, either for the states or for terrorist groups.

  2. Attention and Memory in School-Age Children Surviving the Terrorist Attack in Beslan, Russia

    Science.gov (United States)

    Scrimin, Sara; Moscardino, Ughetta; Capello, Fabia; Axia, Giovanna

    2009-01-01

    Little is known about the impact of terrorism on children's cognitive functioning and school learning. The primary purpose of this study was to report on cognitive functioning among school-age children 20 months after a terrorist attack against their school. Participants included 203 directly and indirectly exposed children from Beslan and 100…

  3. Early Warning Report: Use of Contractors to Conduct Clean Air Act Risk Management Program Inspections in Certain States Goes Against Court Decisions

    Science.gov (United States)

    Report #12-P-0376, March 28, 2012. The OIG is currently evaluating whether the EPA has adequate management controls for ensuring the effectiveness of its Clean Air Act (CAA) Section 112(r) risk management program inspections.

  4. A baseline evaluation of casino air quality after enactment of Nevada's Clean Indoor Air Act.

    Science.gov (United States)

    York, Nancy L; Lee, Kiyoung

    2010-01-01

    The U.S. Surgeon General reports that there is no safe level of exposure to secondhand smoke (SHS). The purpose of this study was to measure levels of fine particulate matter in nonsmoking casino restaurants after enactment of Nevada's Clean Indoor Air Act (NCIAA). Fine particulate mattercasino hotel restaurants and gaming areas for a total of 32 venues. A battery-operated SidePak aerosol monitor was discreetly used for at least 30 min in each venue. Nonsmoking restaurant PM2.5 levels ranged from 5 to 101 microg/m3 (M=31; SD=22.9) while gaming areas ranged from 20 to 73 microg/m3 (M=48; SD=15.9). There was a significant difference in PM2.5 between restaurants and gaming areas, t30=-2.54, p=.017. There was also a strong correlation between the levels of restaurant PM2.5 and gaming area PM2.5 (r=.71; p=.005). Fine PM2.5 in all casino areas was above what the Environmental Protection Agency recommends as healthy. This information can be used to educate policy decision makers when discussing potential strengthening of the law.

  5. [Terrorist attack trauma - an individual entity of polytrauma : A 10-year update].

    Science.gov (United States)

    Güsgen, C; Franke, A; Hentsch, S; Kollig, E; Schwab, R

    2017-10-01

    The incidence of terrorist attacks is increasing worldwide, and they have also become a permanent threat in European cities. Due to its complexity, terrorist attack trauma places high demands on the strategy of surgical treatment. The combination of various mechanisms, explosions and gunshot injuries, with the characteristic pressure (blast) damage and a high proportion of penetrating trauma with simultaneous burns are characteristic features. Unlike in military conflicts, injuries to people of all ages and without ballistic body protection (body armor) are to be expected. The mechanism of the attack and its local conditions are of relevance for the assessment of the situation and the expected injury patterns. Thus, suicide attacks result in several times higher numbers of fatalities and casualties. Explosions on free ground lead to different types of injury than those in closed or semi-enclosed spaces. The treatment principles of the Advanced Trauma Life Support (ATLS®) are based on the intrahospital care of casualties as well as damage control strategies with trigger factors. In order to prepare and educate clinics and surgeons in Germany for such scenarios, various course formats of the professional societies, the German Society for General and Visceral Surgery (DGAV) and the German Society for Trauma Surgery (DGU) have now been established.

  6. Clean Air Act Standards and Guidelines for Sterilizers

    Science.gov (United States)

    This page contains the stationary sources of air pollution for the sterilizer industries, and their corresponding air pollution regulations. To learn more about the regulations for each industry, just click on the links below.

  7. Terrorists or cowards: negative portrayals of male Syrian refugees in social media

    OpenAIRE

    Rettberg, Jill Walker; Gajjala, Radhika

    2015-01-01

    This paper examines images and words shared on the Twitter hashtag #refugeesNOTwelcome to understand the portrayal of male Syrian refugees in a post-9/11 context where the Middle-Eastern male is often primarily cast as a potential terrorist. Queer theorist Jasbir Puar (2007) and Middle- East scholar Paul Amar (2011) provide us with a theoretical approach to make sense of the contradictions we see emerging in this social media context.

  8. The 'overlooked trio' of hypothetical terrorist nuclear weapons - reactor grade plutonium, neptunium-237 and tritium

    International Nuclear Information System (INIS)

    Sholly, S.

    2002-01-01

    Full text: Considerations revolving around physical protection of nuclear material are quite commonly and naturally focused on protecting weapons-grade plutonium (WGPu) and highly enriched uranium (HEU) from theft and diversion. These two materials are the center of attention because of their well-known (and demonstrated) potential for use in first-generation nuclear explosive devices of which potential terrorists are widely thought to be capable. They are also the center of attention because of retirements of these materials from military use as the Russian Federation and the United States reduce the number of nuclear weapons in their arsenals. Three other materials - an 'overlooked trio' - must also be borne in mind within this context: (1) reactor-grade plutonium (RGPu); (2) neptunium-237 (Np-237); and (3) tritium (H-3). Although there are still some authorities who either contend that RGPu cannot be used in a nuclear explosive or that there are (for a terrorist) insurmountable difficulties in doing so, the knowledgeable scientific and technical community, recognizes the potential utility of RGPu for hypothetical terrorist nuclear devices. A much smaller community of experts recognizes the usefulness of Np-237 for nuclear devices, but Np-237 is as straight-forwardly and easily usable as HEU and similarly abundant (but not often in separated form). Tritium can be used (with a modest increase in design sophistication) in a conventional first-generation nuclear device with any of the weapons-usable materials (WGPu, HEU, RGPu or Np-237) to increase the yield and/or increase the reliability of a non-fizzle yield. Given the presence of RGPu and Np-237 in abundant quantities in spent commercial reactor fuel, widely available knowledge of how to separate these materials, and a world-wide total of more than 400 nuclear power plants, spent reactor fuel also requires stringent controls. This is especially true of old spent fuel which has far less radiation dose

  9. Air quality impacts of increased use of ethanol under the United States’ Energy Independence and Security Act

    Science.gov (United States)

    Cook, Rich; Phillips, Sharon; Houyoux, Marc; Dolwick, Pat; Mason, Rich; Yanca, Catherine; Zawacki, Margaret; Davidson, Ken; Michaels, Harvey; Harvey, Craig; Somers, Joseph; Luecken, Deborah

    2011-12-01

    Increased use of ethanol in the United States fuel supply will impact emissions and ambient concentrations of greenhouse gases, "criteria" pollutants for which the U. S. EPA sets ambient air quality standards, and a variety of air toxic compounds. This paper focuses on impacts of increased ethanol use on ozone and air toxics under a potential implementation scenario resulting from mandates in the U. S. Energy Independence and Security Act (EISA) of 2007. The assessment of impacts was done for calendar year 2022, when 36 billion gallons of renewable fuels must be used. Impacts were assessed relative to a baseline which assumed ethanol volumes mandated by the first renewable fuels standard promulgated by U. S. EPA in early 2007. This assessment addresses both impacts of increased ethanol use on vehicle and other engine emissions, referred to as "downstream" emissions, and "upstream" impacts, i.e., those connected with fuel production and distribution. Air quality modeling was performed for the continental United States using the Community Multi-scale Air Quality Model (CMAQ), version 4.7. Pollutants included in the assessment were ozone, acetaldehyde, ethanol, formaldehyde, acrolein, benzene, and 1,3-butadiene. Results suggest that increased ethanol use due to EISA in 2022 will adversely increase ozone concentrations over much of the U.S., by as much as 1 ppb. However, EISA is projected to improve ozone air quality in a few highly-populated areas that currently have poor air quality. Most of the ozone improvements are due to our assumption of increases in nitrogen oxides (NO x) in volatile organic compound (VOC)-limited areas. While there are some localized impacts, the EISA renewable fuel standards have relatively little impact on national average ambient concentrations of most air toxics, although ethanol concentrations increase substantially. Significant uncertainties are associated with all results, due to limitations in available data. These uncertainties are

  10. Strengthening Hospital Surge Capacity in the Event of Explosive or Chemical Terrorist Attacks

    Science.gov (United States)

    2009-03-01

    and become more specialized and efficient over the past decade in order to survive in the tight financial markets . Capacity is not keeping pace...Surge Capacity for Terrorist Bombings,” Atlanta, Georgia, (April 2007): 6. 197 S. Einav, Z. Feigenberg, C. Weissman, D. Zolchik, G. Caspi, D. Kotler ...activated in several bombings, 200 S. Einav, Z. Feigenberg, C. Weissman, D. Zolchik, G. Caspi, D. Kotler

  11. The Clean Air Act Amendments of 1990: Opportunities for Promoting Renewable Energy; Final Report: December 11, 2000

    Energy Technology Data Exchange (ETDEWEB)

    Wooley, D.R.; Morss, E.M. (Young, Sommer, Ward, Ritzenberg, Wooley, Baker and Moore, LLC, Albany, New York)

    2001-01-08

    This report explores key aspects of the intersection between the nation's clean air and energy goals and proposes alternatives for encouraging renewable energy in the context of the federal Clean Air Act (CAA). As with most environmental statutes enacted in the early 1970s, the 1970 CAA embraced a somewhat rigid ''command-and-control'' approach to achieving its clean air goals. Although effective, this approach has been criticized for discouraging creative and cost-effective solutions to reducing air emissions. In response to this concern, Congress included the first significant market-based program to address an environmental problem-in this case, acid rain caused by sulfur dioxide (SO2) emissions from power plants-in the 1990 CAA Amendments. This program prompted the federal government and various state governments to pursue other market-based programs to address air pollution problems. Ten years have elapsed since the passage of the 1990 CAA Amendments, so the time is ripe to consider expanding opportunities for renewable energy development in the reform of clean air policies. A significant potential for renewables exists in conjunction with international efforts to reduce emissions of greenhouse gases (GHG), including CO2. Unfortunately, Congressional opposition to international GHG reduction agreements makes it difficult to develop GHG emission-reduction programs, including a cap-and-trade alternative, that would enable the renewables industry to harness this potential. The renewable industry can, however, track developments both nationally and internationally to ensure that the programs developed adequately address renewables.

  12. The Clean Coal Program's contributions to addressing the requirements of the Clean Air Act Amendments of 1990

    International Nuclear Information System (INIS)

    Miller, R.L.

    1992-01-01

    The purpose of this paper is to examine the potential contributions of the US Department of Energy's Clean Coal Program (CCP) to addressing the requirements of the Clean Air Act (CAA) Amendments of 1990 (CAA90). Initially funded by Congress in 1985, the CCP is a government and industry co-funded effort to demonstrate a new generation of more efficient, economically feasible, and environmentally acceptable coal technologies in a series of full- scale ''showcase'' facilities built across the country. The CCP is expected to provide funding for more than $5 billion of projects during five rounds of competition, with at least half of the funding coming from the private sector. To date, 42 projects have been selected in the first 4 rounds of the CCP. The CAA and amendments form the basis for regulating emissions of air pollutants to protect health and the environment throughout the United States. Although the origin of the CAA can be traced back to 1955, many amendments passed since that time are testimony to the iterative process involved in the regulation of air pollution. Three key components of CAA90, the first major amendments to the CAA since 1977, include mitigation measures to reduce levels of (1) acid deposition, (2) toxic air pollutants, and (3) ambient concentrations of air pollutants. This paper focuses on the timeliness of clean coal technologies in contributing to these provisions of CAA90

  13. 76 FR 51255 - Security Zone; Potomac River, Georgetown Channel, Washington, DC

    Science.gov (United States)

    2011-08-18

    ... officials, mitigate potential terrorist acts, and enhance public and maritime safety and security. The Coast... officials, mitigating potential terrorist acts and enhancing public and maritime safety security. Under 5 U... and enhancing public and maritime safety and security. Background and Purpose The President of the...

  14. Air Quality Facilities

    Data.gov (United States)

    Iowa State University GIS Support and Research Facility — Facilities with operating permits for Title V of the Federal Clean Air Act, as well as facilities required to submit an air emissions inventory, and other facilities...

  15. Tracking and Analyzing Individual Distress Following Terrorist Attacks Using Social Media Streams.

    Science.gov (United States)

    Lin, Yu-Ru; Margolin, Drew; Wen, Xidao

    2017-08-01

    Risk research has theorized a number of mechanisms that might trigger, prolong, or potentially alleviate individuals' distress following terrorist attacks. These mechanisms are difficult to examine in a single study, however, because the social conditions of terrorist attacks are difficult to simulate in laboratory experiments and appropriate preattack baselines are difficult to establish with surveys. To address this challenge, we propose the use of computational focus groups and a novel analysis framework to analyze a social media stream that archives user history and location. The approach uses time-stamped behavior to quantify an individual's preattack behavior after an attack has occurred, enabling the assessment of time-specific changes in the intensity and duration of an individual's distress, as well as the assessment of individual and social-level covariates. To exemplify the methodology, we collected over 18 million tweets from 15,509 users located in Paris on November 13, 2015, and measured the degree to which they expressed anxiety, anger, and sadness after the attacks. The analysis resulted in findings that would be difficult to observe through other methods, such as that news media exposure had competing, time-dependent effects on anxiety, and that gender dynamics are complicated by baseline behavior. Opportunities for integrating computational focus group analysis with traditional methods are discussed. © 2017 Society for Risk Analysis.

  16. Clean Air Act amendments of 1991: Detailed summary of titles

    International Nuclear Information System (INIS)

    1990-01-01

    ;Contents: Provisions for Attainment and Maintenance of National Ambient Air Quality Standards; Provisions Relating to Mobile Sources; Hazardous Air Pollutants; Acid Deposition Control; Permits; Stratospheric Ozone Protection; Provisions Relating to Enforcement; Miscellaneous Provisions; Clean Air Research; Disadvantaged Business Concerns; Clean Air Employment Transition Assistance

  17. 14 CFR 1260.34 - Clean air and water.

    Science.gov (United States)

    2010-01-01

    ... 14 Aeronautics and Space 5 2010-01-01 2010-01-01 false Clean air and water. 1260.34 Section 1260... AGREEMENTS General Provisions § 1260.34 Clean air and water. Clean Air and Water October 2000 (Applicable... the Clean Air Act (42 U.S.C. 1857c-8(c)(1) or the Federal Water Pollution Control Act (33 U.S.C. 1319...

  18. How Belfius Bank's response to the terrorist attacks in Brussels helped embed business continuity in the company culture.

    Science.gov (United States)

    Jappens, Ludo

    2017-01-01

    Until 2015, major terrorist incidents in Belgium were considered a 'black swan'. However, the suicide attacks in Paris on 13th November, 2015 provided a wake-up call. Investigations revealed that the raid was prepared in Belgium by jihadists who grew up in Brussels and was coordinated by Belgian ISIS fighters in Syria. In an instant, it became clear that terror had been embedded in Belgian society and could erupt at any moment. At Belfius Bank Belgium, the subsequent months were a rollercoaster ride of terrorist-related events. Business activities were strongly affected, as the company's head office is located in the centre of Brussels. This paper focuses on the way Belfius responded to the events and how the lessons learned have helped to improve its business continuity and crisis management capability.

  19. Cultural Memory of Sorrow in Advertising after the Terrorist Attacks

    Directory of Open Access Journals (Sweden)

    Esther Martínez Pastor

    2015-09-01

    Full Text Available The general objective of this research study is to do a comparative research to investigate the perception of sorrow in the advertising in the press after the terrorist attacks: 11/09/2001 (U.S. and 11/04/2004 (Spain. The general hypothesis considers that there are similar perceptions of the sorrow towards the ads although there are cultural differences. On a computer program the subject was shown these images about announcement advertisement published in the press after the 09/11 and 11/04 in a random order and was asked different questions that explored their perception and attitudes with regard to these advertisements

  20. BACT analysis under the Clean Air Act's PCD program

    Energy Technology Data Exchange (ETDEWEB)

    Simms, P.; Walke, J. [National Resources Development Council, Washington, DC (United States)

    2006-11-15

    Before a company may build a new major industrial source of air pollution, or make modifications to an existing major source in the USA it must apply for and receive a Clean Air Act (CAA) Prevention of Significant Deterioration (PSD) permit. State environmental agencies typically issue such permits, either under state law or by exercising delegated authority to implement the federal PSD program. To fully comply with the CAA, the emissions limits identified as BACT must incorporate consideration of more than just add-on emissions control technology, they must also reflect appropriate considerations of fuel quality (e.g. low-sulfur coal) and process changes (e.g. advanced combustion techniques) as a means of controlling emissions, and must consider the other environmental and public welfare benefits of the identified emissions control options. Several states including New Mexico and Illinois have already determined that innovated technologies, such as Integrated Gasification Combined Cycle (IGCC), must be considered in connection with the BACT analysis for new coal-fired power plants. Even the notion that BACT is categorically limited in scope to the general type of facility proposed is contrary to EPA precedent. For example, the Environmental Appeals Board (EAB) has explained that permitting authorities retain the discretion under the definition of BACT to require dramatically different facility designs (e.g. a natural gas plant instead of a coal-fired power plant). The best advice for any permit applicant is to include in the BACT analysis a careful and honest examination of better performing alternative processes and/or innovative combustion techniques and to aggressively pursue such options wherever feasible. 17 refs.

  1. Characterising the UK Terrorist Threat: The Problem with Non-Violent Ideology as a Focus for Counter-Terrorism and Terrorism as the product of ‘Vulnerability’

    Directory of Open Access Journals (Sweden)

    Anthony Richards

    2012-07-01

    Full Text Available This article investigates two particular aspects as to how the terrorist threat in the UK has been characterised, arguing that they both challenge conventional academic wisdom as to how terrorism should be conceptualised. While such conventional wisdom should always be open to challenge, and policymaking perspectives are different to those of academics, these two particular aspects as to how the terrorist threat has been perceived in the UK merit scrutiny, especially as counter-terrorism strategies have been premised on them. They are: i the contemporary and explicit concern with ‘extremist’ but 'non-violent' ideas that are said to be ‘conducive’ to terrorism as a focus for a counter-terrorism response and ii the notion that terrorism has increasingly been seen as the product of ‘vulnerability’. The first, and the main focus of this article, appears to challenge the widely held view within terrorism studies that, when defining terrorism, reference to the cause or the perpetrator is unhelpful because terrorism should first and foremost (and more objectively be seen as a particular 'method' of violence that has been used by a wide variety of actors, regardless of the ideology or the belief systems of its perpetrators. The second aspect – the impetus towards viewing terrorism as the product of vulnerability or individual fallibility - arguably implies a diminished capacity for rational behaviour, which challenges a further commonly held view within terrorism studies: that terrorism entails the use of calculated and rational acts of violence.

  2. Optimizing Visits to the Site of Death for Bereaved Families After Disasters and Terrorist Events.

    Science.gov (United States)

    Kristensen, Pål; Dyregrov, Atle; Weisæth, Lars; Straume, Marianne; Dyregrov, Kari; Heir, Trond; Bugge, Renate Grønvold

    2017-09-13

    In recent years it has been common after disasters and terrorist events to offer bereaved families the opportunity to visit the place where their loved ones died. Many report that such visits are beneficial in processing their loss. Various factors, both cognitive (eg, counteracting disbelief) and existential or emotional (eg, achieving a sense of closeness to the deceased), are associated with the experienced benefit. Nonetheless, exacerbations of trauma and grief reactions (eg, re-enactment fantasies) are common, with some of the bereaved also reporting adverse reactions after the visit. Subsequently, proper preparations are a prerequisite before such visits take place. This article describes how to optimize collective visits to the site of death after disasters or terrorist events for bereaved families. Important questions-for example, concerning those who should be responsible for organizing a visit and those who should be invited, the timing of the visit, what can be done at the site, the need for support personnel, and other practical issues-are discussed and general guidelines are recommended. (Disaster Med Public Health Preparedness. 2017;page 1 of 5).

  3. Evaluation of risk from acts of terrorism :the adversary/defender model using belief and fuzzy sets.

    Energy Technology Data Exchange (ETDEWEB)

    Darby, John L.

    2006-09-01

    Risk from an act of terrorism is a combination of the likelihood of an attack, the likelihood of success of the attack, and the consequences of the attack. The considerable epistemic uncertainty in each of these three factors can be addressed using the belief/plausibility measure of uncertainty from the Dempster/Shafer theory of evidence. The adversary determines the likelihood of the attack. The success of the attack and the consequences of the attack are determined by the security system and mitigation measures put in place by the defender. This report documents a process for evaluating risk of terrorist acts using an adversary/defender model with belief/plausibility as the measure of uncertainty. Also, the adversary model is a linguistic model that applies belief/plausibility to fuzzy sets used in an approximate reasoning rule base.

  4. Characterising the UK Terrorist Threat: The Problem with Non-Violent Ideology as a Focus for Counter-Terrorism and Terrorism as the product of ‘Vulnerability’

    OpenAIRE

    Anthony Richards

    2012-01-01

    This article investigates two particular aspects as to how the terrorist threat in the UK has been characterised, arguing that they both challenge conventional academic wisdom as to how terrorism should be conceptualised. While such conventional wisdom should always be open to challenge, and policymaking perspectives are different to those of academics, these two particular aspects as to how the terrorist threat has been perceived in the UK merit scrutiny, especially as counter-terrorism stra...

  5. Securing public transportation systems an integrated decision analysis framework for the prevention of terrorist attacks as example

    CERN Document Server

    Brauner, Florian

    2017-01-01

    Florian Brauner addresses the risk reduction effects of security measures (SecMe) as well as economic and social effects using terrorist threats in public transportation as use case. SecMe increase the level of security but cause interferences and restrictions for customers (e.g. privacy). This study identifies the interferences and analyzes the acceptance with an empirical survey of customers. A composite indicator for the acceptance of different SecMe is developed and integrated into a risk management framework for multi-criteria decision analysis achieving the right balance of risk reduction, costs, and social acceptance. Contents Assessment of Security Measures for Risk Management Measurement of Objective Effectiveness of Security Measures Against Terrorist Attacks Determination of Subjective Effects of Security Measures (Customer Acceptance Analysis) Cost Analysis of Security Measures Multi-Criteria Decision Support Systems Target Groups Scientists with Interest in Civil Security Research Providers and S...

  6. Variance, Violence, and Democracy: A Basic Microeconomic Model of Terrorism

    Directory of Open Access Journals (Sweden)

    John A. Sautter

    2010-01-01

    Full Text Available Much of the debate surrounding contemporary studies of terrorism focuses upon transnational terrorism. However, historical and contemporary evidence suggests that domestic terrorism is a more prevalent and pressing concern. A formal microeconomic model of terrorism is utilized here to understand acts of political violence in a domestic context within the domain of democratic governance.This article builds a very basic microeconomic model of terrorist decision making to hypothesize how a democratic government might influence the sorts of strategies that terrorists use. Mathematical models have been used to explain terrorist behavior in the past. However, the bulk of inquires in this area have only focused on the relationship between terrorists and the government, or amongst terrorists themselves. Central to the interpretation of the terrorist conflict presented here is the idea that voters (or citizens are also one of the important determinants of how a government will respond to acts of terrorism.

  7. Clean Air Act Standards and Guidelines for Electric Utilities

    Science.gov (United States)

    This page contains the stationary sources of air pollution for theelectric utilitiesr industries, and their corresponding air pollution regulations. To learn more about the regulations for each industry, just click on the links below.

  8. Motor vehicle-related air toxics study. Final report

    International Nuclear Information System (INIS)

    1993-04-01

    Section 202 (1)(1) of the Clean Air Act (CAA), as amended (Section 206 of the Clean Air Act Amendments) (CAAA) of 1990 added paragraph (1) to Section 202 of the (CAA), directs the Environmental Protection Agency (EPA) to complete a study by May 15, 1992 of the need for, and feasibility of, controlling emissions of toxic air pollutants which are unregulated under the Act and associated with motor vehicles and motor vehicle fuels. The report has been prepared in response to Section 202 (1)(1). Specific pollutants or pollutant categories which are discussed in the report include benezene, formaldehyde, 1,3-butadiene, acetaldehyde, diesel particulate matter, gasoline particulate matter, and gasoline vapors as well as certain of the metals and motor vehicle-related pollutants identified in Section 112 of the Clean Air Act. The focus of the report is on carcinogenic risk. The study attempts to summarize what is known about motor vehicle-related air toxics and to present all significant scientific opinion on each issue

  9. Clean Air Act Guidelines and Standards for Waste Management

    Science.gov (United States)

    This page contains the stationary sources of air pollution for the waste management industries, and their corresponding air pollution regulations. To learn more about the regulations for each industry, just click on the links below.

  10. Clean Air Act Standards and Guidelines for Mineral Processing

    Science.gov (United States)

    This page contains the stationary sources of air pollution for the mineral processing industries, and their corresponding air pollution regulations. To learn more about the regulations for each industry, just click on the links below.

  11. Air quality information system (AQIS) for Gauteng: defining best practice

    CSIR Research Space (South Africa)

    Kganyago, P

    2006-10-01

    Full Text Available The National Environmental Management: Air Quality Act, 2004 (Act No 39 of 2004), need for national framework. The national framework will include the norms and standards for air quality information management. NAQIS (National Air Quality...

  12. Potential Impact of Clean Air Act Regulations on Nitrogen Fate and Transport in the Neuse River Basin: a Modeling Investigation Using CMAQ and SWAT

    Science.gov (United States)

    There has been extensive analysis of Clean Air Act Amendment (CAAA) regulation impacts to changes in atmospheric nitrogen deposition; however, few studies have focused on watershed nitrogen transfer particularly regarding long-term predictions. In this study, we investigated impa...

  13. 77 FR 12524 - Approval and Promulgation of Air Quality Implementation Plans; Indiana; Lead Ambient Air Quality...

    Science.gov (United States)

    2012-03-01

    ... Promulgation of Air Quality Implementation Plans; Indiana; Lead Ambient Air Quality Standards AGENCY... Indiana State Implementation Plan (SIP) for lead (Pb) under the Clean Air Act (CAA). This submittal incorporates the National Ambient Air Quality Standards (NAAQS) for Pb promulgated by EPA in 2008. DATES...

  14. 75 FR 65594 - Approval and Promulgation of Air Quality Implementation Plans; Ohio; Ohio Ambient Air Quality...

    Science.gov (United States)

    2010-10-26

    ... Promulgation of Air Quality Implementation Plans; Ohio; Ohio Ambient Air Quality Standards AGENCY... the Ohio Administrative Code (OAC) relating to the consolidation of Ohio's Ambient Air Quality Standards (AAQS) into Ohio's State Implementation Plan (SIP) under the Clean Air Act. On April 8, 2009, and...

  15. 14 CFR 399.73 - Definition of small business for Regulatory Flexibility Act.

    Science.gov (United States)

    2010-01-01

    ... 14 Aeronautics and Space 4 2010-01-01 2010-01-01 false Definition of small business for Regulatory... Rulemaking Proceedings § 399.73 Definition of small business for Regulatory Flexibility Act. For the purposes... Flexibility Act), a direct air carrier or foreign air carrier is a small business if it provides air...

  16. Review of the Estimates for the Impact of the September 11, 2001, Terrorist Attacks on New York Tax Revenues

    National Research Council Canada - National Science Library

    2002-01-01

    As a follow-up to our May 2002 report, reviewing the estimates of the economic impact of the September 11, 2001, terrorist attacks on New York, Congress requested additional information on New York tax revenues...

  17. The Representation of Islam in Western Media: The Coverage of Norway Terrorist Attacks

    Directory of Open Access Journals (Sweden)

    Emad A. Alghamdi

    2015-05-01

    Full Text Available Undeniably mass media have become the primary source of information and communication for the majority of, if not all, members of modern societies. The nature of the information thus communicated and the manner in which it is dispensed through media certainly have a profound influence on people’s perceptions of the world around them. The relation between the media, on one hand, and culture, social life, and politics on the other, is an interesting one in which media fulfills dual functions, reflecting and also shaping issues occurring within these three domains (Bell & Garrett, 1998. In the initial media coverage of the 2011 Norway terrorist attacks, some western media authors, inaccurately and unjustly, held Muslims and Islamic groups as being responsible for the attacks. Using Critical Discourse Analysis (CDA, this study seeks to ascertain how language was manipulated in this coverage of the terrorist attacks in order to give expression to blind prejudice against Islam and Muslims. As findings of the analyses reveal, the tones of allegation in these articles and reports differed dramatically from one article to another ranging from tones of mere suspicion to those of overt accusation. The varying degrees of uncertainty or assertion of the authors’ statements were reflected in the varied linguistic forms and devices used within the discourse.

  18. The need to counter extremist terrorist manifestations in society and in the penal system

    Directory of Open Access Journals (Sweden)

    Kazberov P.N.

    2013-09-01

    Full Text Available The article discusses the need for inter-agency work to minimize the extremist-terrorist activities in the community. The problem of the psychology of extremism and terrorism are increasingly in the spotlight representatives of various scientific disciplines. First of all, there is no single legal science in all respects understanding of phenomena such as extremism and terrorism, their classification and evaluation, although a number of positive examples in this respect international cooperation is present. According to current data provided by the Investigative Committee of the Russian Federation, the General Prosecutor of the Russian Federation, the Russian Ministry of Internal Affairs, as well as the Moscow Bureau for Human Rights, extremism is a real threat to the national security of the Russian Federation. From the data of law enforcement should be the fact that most of the crimes of extremist and terrorist nature committed by persons of young age, the consciousness of which are susceptible to nationalist propaganda. A significant increase in informal youth movements extremist-nationalist orientation. The problem of expansion of extremism is also relevant for the penitentiary system of modern society. The very fact that a significant number of prisoners serving sentences for extremism and terrorism, illustrates the need for them special psychological and educational work

  19. The Politics of International Terrorism in the Security Complexes in ...

    African Journals Online (AJOL)

    sulaiman.adebowale

    2006-06-13

    Jun 13, 2006 ... International Relations and Security Studies, Department of Political Science and .... porary international relations in the Greater Horn of Africa. ..... In the case .... terrorist organisation, and all its sponsors and supporters as terrorist col- ... every act of violence to the label of terrorist, to the extent that public.

  20. 40 CFR Appendix H to Subpart A of... - Clean Air Act Amendments of 1990 Phaseout Schedule for Production of Ozone-Depleting Substances

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 17 2010-07-01 2010-07-01 false Clean Air Act Amendments of 1990 Phaseout Schedule for Production of Ozone-Depleting Substances H Appendix H to Subpart A of Part 82... STRATOSPHERIC OZONE Production and Consumption Controls Pt. 82, Subpt. A, App. H Appendix H to Subpart A of Part...

  1. Cyberspace as a new arena for terroristic propaganda: an updated examination.

    Science.gov (United States)

    Minei, Elizabeth; Matusitz, Jonathan

    2012-11-01

    This paper analyzes the role of propaganda use in cyberterrorism. The main premise is that cyberterrorists display various semiotic gestures (e.g., the use of images and Internet videos) to communicate their intents to the public at large. In doing so, they communicate themes-these themes range from hate to anger. Cyberterrorism, then, is a form of theater or spectacle in which terrorists exploit cyberspace to trigger feelings of panic and overreaction in the target population. In many cases, this form of propaganda is the primary means of communication for various cyberterrorist groups to convey their intents. Internet sites also produce numerous opportunities for in-group communication and publicity.

  2. 18 CFR 1316.5 - Clean Air and Water Acts.

    Science.gov (United States)

    2010-04-01

    ... the Federal Water Pollution Control Act (33 U.S.C. 1319), offeror shall include in its offer a...(c) of the Federal Water Pollution Control Act. As used in this clause “facilities” shall have the... Violating Facilities. Prompt notification shall be required prior to contract award. (End of clause) ...

  3. A guide for determining compliance with the Clean Air Act Standards for radionuclide emissions from NRC-licensed and non-DOE federal facilities (Rev. 1)

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1989-10-01

    The Environmental Protection Agency (EPA) issued standards under Section 112 of the Clean Air Act of February 6, 1985 that limit airborne emissions of radionuclides to the atmosphere. In February 1989 these standards were re proposed , and in November 1989 final standards may be promulgated. This document provides guidance for determining compliance with one of the National Emissions for Hazardous Air Pollutants covering facilities that are licensed by NRC, and federal facilities not operated by the DOE, that could emit radionuclides to the ai00.

  4. Training Blueprint of an Air Command

    Science.gov (United States)

    2016-06-01

    BIBLIOGRAPHY…………………………………………………………. 86 Appendix A Kirkpatrick’s four-level Implementation Guidelines……………. 85 Illustrations Table 1 Air Power ...rather have those because we have acted rightly. We are what we repeatedly do. Excellence, then, is not an act but a habit . --Aristotle A...Call to the Future: The New Air Force Strategic Framework. Senior Leader Perspective. Air and Space Power Journal. May-Jun 2015: 3-9. http

  5. 32 CFR 989.30 - Air quality.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Air quality. 989.30 Section 989.30 National... ENVIRONMENTAL IMPACT ANALYSIS PROCESS (EIAP) § 989.30 Air quality. Section 176(c) of the Clean Air Act..., Air Quality Compliance. 10 10 See footnote 1 to § 989.1. ...

  6. Hazardous air pollutant handbook: measurements, properties, and fate in ambient air

    Energy Technology Data Exchange (ETDEWEB)

    Spicer, C.W. (ed.); Gordon, S.M.; Kelly, T.J.; Holdren, M.W.; Mukund, R. [Battelle, Columbus, OH (United States)

    2002-07-01

    Focussing on the 188 hazardous air pollutants (HAPs) identified in the Title III of the US Clean Air Act Amendments, this work reviews the methods used to identify, measure, and locate the presence of toxics in ambient air. After a classification and characterization of the HAPs, the current status of ambient measurement methods are surveyed and categorized according to applicable, likely, and potential methods. The results of studies of ambient air concentrations of the HAPs are presented. Methods used to study atmospheric transformations of toxic air pollutants are reviewed and the concept of atmospheric lifetimes of HAPs is discussed.

  7. The Americans With Disabilities Act Amendments Act of 2008: implications for the forensic psychiatrist.

    Science.gov (United States)

    Scott, Charles L

    2010-01-01

    The Americans With Disabilities Act Amendments Act of 2008 (ADAAA) significantly modifies the 1990 Americans With Disabilities Act. As a result of this legislation, more Americans are likely to qualify as disabled and to be further protected from discrimination under the ADA. The ADAAA also effectively overturns key rulings in the U.S. Supreme Court cases of Sutton v. United Air Lines, Inc. and Toyota Motor Manufacturing v. Williams. This article summarizes important changes resulting from the ADAAA legislation that psychiatrists and psychologists must understand when evaluating ADA disability claims.

  8. Finding the Wolves in Sheeps Clothing: Ways to Distinguish and Deter Lone-Wolf Terrorists

    Science.gov (United States)

    2015-03-01

    Mark Hamm, “Lone-wolf Terrorism in America: Forging a New Way of Looking at an Old Problem,” YouTube video, 7:32, posted by the National Institute...that factors that influence most lone-wolf terrorists include, “to varying degrees and in variable combinations: personal aversion or depression ...Russia.”97 Also discovered after the bombings, “Tamerlan had a YouTube account that he used to post and watch violent Islamic extremist videos starting

  9. 32 CFR 806b.4 - Privacy Act complaints.

    Science.gov (United States)

    2010-07-01

    ... be identified, the local Privacy Act officer will assume these duties. Issues that cannot be resolved... 32 National Defense 6 2010-07-01 2010-07-01 false Privacy Act complaints. 806b.4 Section 806b.4 National Defense Department of Defense (Continued) DEPARTMENT OF THE AIR FORCE ADMINISTRATION PRIVACY ACT...

  10. Posse Comitatus and the Use of the Military in Denying Terrorist Access to the United States Along the Border with Mexico

    National Research Council Canada - National Science Library

    Thomas, Greg A

    2005-01-01

    .... The largely unsecured border we share with Mexico is an enticing avenue for illegal immigrants and drug smugglers but also, and more importantly, for potential terrorists hostile to the United States...

  11. The Rise and the Fall of Terrorist Organizations in Post-Dictatorial Greece: The Role and the Lessons for the Intelligence Services

    National Research Council Canada - National Science Library

    Fakitsas, Miltiadis

    2003-01-01

    ... and business elite, The government's failure to curtail these groups resulted from the enormous belief that these terrorists were not a direct threat to Greek's democracy Fortunately, in June of 2002...

  12. Rapid diagnostics of the bacteria in air

    Energy Technology Data Exchange (ETDEWEB)

    Belov Nikolai, N. [ATECH KFT, Budapest (Hungary)

    2000-07-01

    Presence of the bacteria and viruses in the air is great problem now. Terrorists are going to use the bacteria weapon. Now biotechnology provides very cheap equipment ({approx} $500) for modification of the bacteria sorts. It may be used for receiving of new variants of the bacteriological weapon. And presence of one small bacteria aerosol generator in the international airport during several days will start the dangerous epidemic incidence the entire world. From another side - poor countries with hot and wet weather are continuously producing new and new dangerous bacteria. Every year epidemic waves of influence are going from China, India or Africa. And once up a time it will be epidemic explosive with fast lethal finish. Methods of estimation of the bio-aerosols in Air of City are very poor. Standard Bio-aerosol sampler has two conflicting demands. From one side the bio-sampler needs in great air volume of sample with great efficiency of separation of aerosol particles from measured air. From another side all selected particles needs in great care. This demand carried out from method of measurement of bacteria in sample by counting of colonies that grew from bacteria on nutrient media after incubation time. It is a problem to prevent bacterial flora from death during collecting aerosol sample. This time of growth and counting of colony is so long that result of this measurement will be unusable if it will be terrorist action of start of bacteriological was. Here presented new methods for fast diagnostics of the bacteria in the air. It consists from 4 general parts: (1) Micro-droplet method for diagnostics of biological active substances in aerosol sample. This method allows to control the bio-particle position on the plate, to use series of biochemistry species for analytical reaction for this small bio-particle. Small volume of biochemical reaction reduces noise. This method provides extremely high sensitivity for discovering of biological material. (2

  13. Addressing the Foreign Terrorist Fighters Phenomenon From a European Union Perspective

    Directory of Open Access Journals (Sweden)

    Mark Singleton

    2014-12-01

    Full Text Available With the outbreak of civil war and sectarian violence in Syria, Iraq, and Libya, over 15,000 men and women from more than 80 countries around the world have left their homes to become foreign fighters. The security challenge they pose is immense and there are concerns about radicalised fighters returning to their countries of origin or residence, hardened by experience and with the possible intent – and the know-how – to engage in terrorist activities. On 24 September, the UN Security Council unanimously adopted Resolution 2178 (2014 with the support of over 120 states representing a broad cross-section of the UN membership. Resolution 2178 called on all UN member states to ensure increased border security and to screen for or arrest so-called “foreign terrorist fighters” (FTFs travelling to or returning from conflict areas. Rightly so, it also urges states to counter violent extremism by taking preventive measures, such as engaging with communities at the local level to stop the spread of extremist ideologies. On 23 October 2014, the Global Center on Cooperative Security, the Human Security Collective, and ICCT convened an expert meeting at the European Union (EU in Brussels to discuss the implications of the resolution and to explore appropriate and effective responses to the threat of FTFs, both within the EU and as part of the Union’s foreign security and development programming. Building upon the discussion in Brussels, this policy brief is a compilation of essays from all three organisations on the challenges and opportunities for addressing the FTF threat from a European Union perspective. It also examines the implementation of Resolution 2178 as an integral part of national and multilateral foreign security and development policies and initiatives.

  14. Air Quality Case Studies Report

    Science.gov (United States)

    1995-08-01

    The Federal Highway Administration (FHWA) recognizes that many metropolitan areas are struggling with how to respond adequately to the 1990 Clean Air Act Amendments (CAAA) and the 1991 Intermodal Surface Transportation Efficiency Act (ISTEA), particu...

  15. Identification of critical locations across multiple infrastructures for terrorist actions

    International Nuclear Information System (INIS)

    Patterson, S.A.; Apostolakis, G.E.

    2007-01-01

    This paper presents a possible approach to ranking geographic regions that can influence multiple infrastructures. Once ranked, decision makers can determine whether these regions are critical locations based on their susceptibility to terrorist acts. We identify these locations by calculating a value for a geographic region that represents the combined values to the decision makers of all the infrastructures crossing through that region. These values, as well as the size of the geographic region, are conditional on an assumed destructive threat of a given size. In our case study, the threat is assumed to be minor, e.g., a bomb that can affect objects within 7 m of it. This approach first requires an assessment of the users of the system. During this assessment, each user is assigned a performance index (PI) based on the disutility of the loss of each infrastructure's resource via multi-attribute utility theory (MAUT). A Monte Carlo network analysis is then performed to develop importance measures (IM) for the elements of each infrastructure for their ability to service each user. We combine the IMs with the user PIs to a value that we call valued worth (VW) for each infrastructure's elements independently. Then we use spatial analysis techniques within a geographic information system (GIS) to combine the VWs of each infrastructure's elements in a geographic area, conditional on the threat, into a total value we call geographic valued worth (GVW). The GVW is displayed graphically in the GIS system in a color scheme that shows the numerical ranking of these geographic areas. The map and rankings are then submitted to the decision makers to better allocate anti-terrorism resources. A case study of this methodology is performed on the Massachusetts Institute of Technology (MIT) campus. The results of the study show how the methodology can bring attention to areas that are important when several infrastructures are considered, but may be ignored when infrastructures

  16. The effect of the September 11 terrorist attacks on suicide and deliberate self-harm : A time trend study

    NARCIS (Netherlands)

    De Lange, AW; Neeleman, J

    2004-01-01

    Suicide rates may be affected by world news. Our objective was to investigate the possible impact of the terrorist attacks of September 11, 2001, on suicidal behavior in the Netherlands. There was evidence of an increase in rates of suicide and deliberate self-harm in the weeks immediately following

  17. Stochastic nanopore sensors for the detection of terrorist agents: Current status and challenges

    Energy Technology Data Exchange (ETDEWEB)

    Liu Aihua; Zhao Qitao [Department of Chemistry and Biochemistry, University of Texas at Arlington, Arlington, TX 76019-0065 (United States); Guan Xiyun, E-mail: xguan@uta.edu [Department of Chemistry and Biochemistry, University of Texas at Arlington, Arlington, TX 76019-0065 (United States)

    2010-08-24

    Nanopore stochastic sensor works by monitoring the ionic current modulations induced by the passage of analytes of interest through a single pore, which can be obtained from a biological ion channel by self-assembly or artificially fabricated in a solid-state membrane. In this minireview, we overview the use of biological nanopores and artificial nanopores for the detection of terrorist agents including explosives, organophosphorus nerve agents, nitrogen mustards, organoarsenic compounds, toxins, and viruses. We also discuss the current challenge in the development of deployable nanopore sensors for real-world applications.

  18. Future refining impacts of the Clean Air Act amendments of 1990

    International Nuclear Information System (INIS)

    Hadder, G.R.

    1992-01-01

    An assessment of the future refining impacts of the U.S. Clean Air Act Amendments of 1990 has been performed with the Navy Mobility Fuels Forecasting System. In 1992, the Environmental Protection Agency (EPA) should finalize precise requirements for Phase I reformulated gasoline, to be produced in 1995-1999. EPA requirements for Phase II reformulated gasoline, to be produced after 1999, will not be established until 1993. The assessment of refining impacts assumes that reformulated gasoline with likely Phase I specifications will be produced for markets projected for the year 2000. The assessment suggests that gasoline reformulation costs in U.S. coastal and near-coastal refining regions could be 3.5 to 5.6 cents per gallon (1989 U.S. currency). The relative value of MTBE is the most important determinant of the reformulation cost. For mileage equivalent to one gallon of conventional gasoline, the regional total added costs (including reformulation costs) for reformulated gasoline could be 5.2 to 7.6 cents. In blending reformulated gasolines, the reduction of butane for lower Reid vapor pressure and the reduction of reformate for lower aromatics are generally compensated by increased percentages of alkylate and/or straight run naphthas. Relatively larger refinery process capacity additions are required for butane isomerization alkylation aromatics recovery, and distillate hydrotreating. (Author)

  19. Analysis of the Clean Air Act Amendments of 1990: A forecast of the electric utility industry response to Title IV, Acid Deposition Control

    International Nuclear Information System (INIS)

    Molburg, J.C.; Fox, J.A.; Pandola, G.; Cilek, C.M.

    1991-10-01

    The Clean Air Act Amendments of 1990 incorporate, for the first time, provisions aimed specifically at the control of acid rain. These provisions restrict emissions of sulfur dioxide (SO 2 ) and oxides of nitrogen (NO x ) from electric power generating stations. The restrictions on SO 2 take the form of an overall cap on the aggregate emissions from major generating plants, allowing substantial flexibility in the industry's response to those restrictions. This report discusses one response scenario through the year 2030 that was examined through a simulation of the utility industry based on assumptions consistent with characterizations used in the National Energy Strategy reference case. It also makes projections of emissions that would result from the use of existing and new capacity and of the associated additional costs of meeting demand subject to the emission limitations imposed by the Clean Air Act. Fuel-use effects, including coal-market shifts, consistent with the response scenario are also described. These results, while dependent on specific assumptions for this scenario, provide insight into the general character of the likely utility industry response to Title IV

  20. Simulation of a terrorist attack with intent to a source of Iridium-192 and Radium Sulphate-226: procedures for radiation emergency actions

    International Nuclear Information System (INIS)

    Aguiar, Bruno Dias de

    2013-01-01

    The accomplishment of major public events comprises a previous radiological safety planning network, since both public safety and safeguards criteria are based upon risk factors, to which individuals and even the environment may be exposed to, moreover in radiological, nuclear and/or terrorist threats. Therefore, a preventive and extensive local radiological survey must be performed, aiming the detection of unexpected radioactive material, being it a sealed or unsealed source or even in the dispersed form. Once confirmed its presence, protective actions must be started up, with monitoring and restraint of the source/material, followed by dose and dose rate assessment in environment, as well as contamination in air and in surfaces in general. As a consequence, such measures must be carried out at once, according to specific protocols adopted by the responding team, as soon as the incident is confirmed. Aiming a better qualification in the attendance of major events, a simulated scenario is proposed in this study, comprising an incident with the malicious presence of a radioactive source in the Mario Filho Stadium (Maracana). (author)

  1. Investigating the Aftermath of Terror: Fundamental Outcomes, Methodological Choices, and Future Directions.

    Science.gov (United States)

    Gradus, Jaimie L; Marx, Brian P; Sloan, Denise M

    2016-06-01

    Acts of terrorism are becoming increasingly common throughout the world. These events represent a significant public health concern given the associated health consequences. Although it is clear that terrorist attacks have mental and physical health sequelae, the exact nature and prevalence of these consequences are unclear. Epidemiological research can play an important role in better understanding the mental and physical impact of terrorist attacks. In this editorial, we highlight recent epidemiological research on these terrorism-related health outcomes. We also provide suggestions for how future studies can build on the existing literature and describe ways in which epidemiological methods can be harnessed to extend the current literature. Lastly, we offer recommendations on how to best prepare communities for the aftermath of terrorist attacks, highlighting secondary intervention and prevention strategies. Overall, multilevel strategies are needed to adequately cope with the growing rise of terrorist acts, and these strategies will have to be reassessed as the nature of terrorist attacks changes.

  2. Preliminary assessment of future refining impacts of the Clean Air Act Amendments of 1990

    International Nuclear Information System (INIS)

    Hadder, G.R.

    1991-09-01

    A preliminary assessment of the future refining impacts of the Clean Air Act Amendments of 1990 has been performed with the Navy Mobility Fuels Forecasting Systems. The assessment suggests that gasoline reformulation costs in domestic coastal and near-coastal refining regions in the year 2000 could be 3.5 to 5.6 cents per gallon (in terms of 1989 currency). For heating value equivalent to one gallon of conventional gasoline, the regional total added costs (including reformulation costs) for reformulated gasoline could be 5.9 to 8.0 cents. In blending reformulated gasolines, the reduction of butane for lower Reid vapor pressure and the reduction of reformate for lower aromatics are generally compensated by increased percentages of alkylate and/or straight run naphthas. Relatively larger refinery process capacity additions are required for butane isomerization, alkylation, aromatics recovery, and distillate hydrotreating. 21 refs., 3 figs., 18 tabs

  3. Indoor air: Reference bibliography

    International Nuclear Information System (INIS)

    Campbell, D.; Staves, D.; McDonald, S.

    1989-07-01

    The U. S. Environmental Protection Agency initially established the indoor air Reference Bibliography in 1987 as an appendix to the Indoor Air Quality Implementation Plan. The document was submitted to Congress as required under Title IV--Radon Gas and Indoor Air Quality Research of the Superfund Amendments and Reauthorization Act of 1986. The Reference Bibliography is an extensive bibliography of reference materials on indoor air pollution. The Bibliography contains over 4500 citations and continues to increase as new articles appear

  4. Air quality management in Botswana

    Directory of Open Access Journals (Sweden)

    Modupe O. Akinola

    2017-06-01

    Full Text Available This paper examines air pollution situation and the history of air quality management in Botswana. The current air quality management in Botswana is still largely underpinned by the Atmospheric Pollution Prevention Act of 1971, supplemented by the more recently enacted legislations such as the Environmental Impact Assessment (EIA Act of 2010 and the Ambient Air Quality - Limits for Common Pollutants of 2012 published by the Botswana Bureau of Standards. Though commendable efforts have been made toward legislating against air and other forms of pollution, these have not yielded expected results in view of the prevailing levels of air pollutants like sulphur dioxide and fine particulate matters in the country’s atmospheric environment. Legislation as a sole measure may not be effective in tackling this challenge. Rather, government should also address some root-causes of the problem by making policies and programmes that will reduce unemployment and increase the earning capacity of citizenry. This will, among other things, effectively check poverty-induced biomass burning in the country. The paper looks at some other challenges of air pollution management and suggestions are made to tackle the identified problems.

  5. Taking of hostages as an offense in international law and Serbian regulations

    Directory of Open Access Journals (Sweden)

    Cmiljanić Bajo M.

    2012-01-01

    Full Text Available In the development of international relations, hostage-taking was carried out as an insurance against fraud, not keeping obligations, or according to the rules of war law. Earlier taking hostages was more related to armed conflicts, and in modern times it is more related to terrorist acts in international terrorism. The taking of hostages is an international offense, which has its essential elements and characteristics. It is a crime punishable under the national legislation of many countries, and taking of hostages in armed conflicts is a war crime for which the International Criminal Court is responsible. International terrorism is manifested through a variety of terrorist acts, which, through fear and panic aim to achieve a political purpose. The range of these terrorist acts is wide and varied. One of these terrorist activities is the taking of hostages. As an offense established by the norms of international law, this unlawful act must be specifically investigated and clarified, which is the goal of this paper. This paper gives an overview of the features and elements of the offense in the light of international law and the laws of the Republic of Serbia.

  6. Hazards in air-, rail-, and road traffic arising from laserpointers; Gefaehrdungen des Luft-, Schienen- und Strassenverkehrs durch Laserpointer

    Energy Technology Data Exchange (ETDEWEB)

    Reidenbach, H.D. [Fachhochschule Koeln (Germany). Forschungsschwerpunkt Medizintechnik und Nichtionisierende Strahlung; Deutsch-Schweizerischer Fachverband fuer Strahlenschutz e.V., Garching (Germany). Arbeitskreis Nichtionisierende Strahlung (AKNIR)

    2012-07-01

    Visible laser radiation with sufficient irradiance or radiant exposure might result in permanent damage of the eyes especially in the retina. In order to prevent this exposure limit values have been established based on current scientific knowledge. In addition visible laser radiation might result in effects like temporary blinding at even much lower exposure values. In this case irritations, flash-blindness and afterimages appear whose extent might exceed the respective damage level while vision is temporarily compromised in critical visual tasks more or less. The easy accessibility of hand-held laser products (laser pointers) with relatively high power might result in a modification of the security situation especially in air traffic via thoughtless and careless use of such products or in terroristic acts. In addition an increasing number of incidents in rail and road traffic where not only temporary blinding might be anticipated but permanent damage of the eyes as a result of overexposure due to laser pointer irradiation cannot be excluded any longer. Using laser pointers, which are available on the market in the power range up to 1 watt and at different wavelengths new hazard scenarios and threats with serious consequences are possible. Here the radiation protection is in great demand. (orig.)

  7. Decision-making for complying with SO2 provisions of the Clean Air Act

    International Nuclear Information System (INIS)

    Metzler, A.R.; Gallardy, P.B.; Sebesta, J.J.; Mc Laughlin, B.R.; Ireland, P.A.

    1992-01-01

    Prior to the Clean Air Act of 1990 (CAA), SO 2 removal options were based on a command and control approach for each plant. This approach usually resulted in the addition of an FGD system. However, the CAA offers a market based emission allowance program which offers considerable flexibility for compliance with the new regulations. The flexibility for compliance introduces more available options into the evaluation and increases the complexity of the decision-making process. This paper discusses the methodology of a recent analysis which evaluated various strategies for meeting SO 2 compliance. The importance of evaluating options based on certain goals is discussed. An overall goal was established to develop a flexible and least cost compliance plan. However, these goals need to be balanced against constraints for the utility which may include: minimizing SO 2 allowance market risk; optimizing the availability, cost and timing of capital expenditures into the analysis; minimizing site impacts and construction lead time; and coordinating strategies from various units and stations into a cohesive plan

  8. Short and intermediate economic impacts of a terrorist-initiated loss of electric power: Case study of New Jersey

    International Nuclear Information System (INIS)

    Greenberg, Michael; Mantell, Nancy; Lahr, Michael; Felder, Frank; Zimmerman, Rae

    2007-01-01

    The economic impacts of potential terrorist attacks on the New Jersey electric power system are examined using a regional econometric model. The magnitude and duration of the effects vary by type of business and income measure. We assume damage is done during in the summer 2005 quarter, a peak period for energy use. The state economy recovers within a year, if we assume that economic activity is restored in the next time period. However, if the attacks prompt an absolute of loss of activity due to firm relocation, closing, and geographical changes in expansion plans, then the economy does not fully recover by the year 2010. Hence, the electrical power system's resiliency to damage is the key to the extent and duration of any economic consequences of a terrorist attack, at least in New Jersey. The policy implication is that the costs and benefits of making the electric power system more resilient to plausible attacks should be weighed and that the restorative capacity of the system should be strengthened

  9. Short and intermediate economic impacts of a terrorist-initiated loss of electric power: case study of New Jersey

    Energy Technology Data Exchange (ETDEWEB)

    Greenberg, M.; Mantell, N.; Lahr, M.; Felder, F. [Rutgers University, New Brunswick, NJ (United States). Edward J. Bloustein School; Zimmerman, R. [New York University (United States). Robert F. Wagner School of Public Service

    2007-01-15

    The economic impacts of potential terrorist attacks on the New Jersey electric power system are examined using a regional econometric model. The magnitude and duration of the effects vary by type of business and income measure. We assume damage is done during in the summer 2005 quarter, a peak period for energy use. The state economy recovers within a year, if we assume that economic activity is restored in the next time period. However, if the attacks prompt an absolute of loss of activity due to firm relocation, closing, and geographical changes in expansion plans, then the economy does not fully recover by the year 2010. Hence, the electrical power system's resiliency to damage is the key to the extent and duration of any economic consequences of a terrorist attack, at least in New Jersey. The policy implication is that the costs and benefits of making the electric power system more resilient to plausible attacks should be weighed and that the restorative capacity of the system should be strengthened. (author)

  10. Air Warfare

    Science.gov (United States)

    2002-03-01

    genus as its predecessor of pre-war days. It would, however, be erroneous to conclude from this that the military value of each new development was...the paucity of communications, its conduct, when acting alone, has of necessity to be somewhat stereotyped in nature, and to con- form to a pre...the air, the attack commander, provided his command be equipped with defensive air power, has a rôle to perform which is simple and stereotyped in

  11. Analysis of taxable sales receipts: was New York City's Smoke-Free Air Act bad for restaurant business?

    Science.gov (United States)

    Hyland, A; Cummings, K M; Nauenberg, E

    1999-01-01

    This article examines the results of a study to determine if the New York City Smoke-Free Air Act has had an adverse economic impact on the taxable sales receipts from the city's restaurant and hotel industries. The study found that real taxable sales from eating and drinking places and hotels in New York City increased by 2.1 percent and 36.9 percent, respectively, compared with levels two years before the smoke-free law took effect. During the same period, real taxable sales for eating and drinking establishments and hotels in the rest of the state experienced a 3.8 percent decrease and a modest 2.4 percent increase in sales, respectively.

  12. Preventing nuclear terrorism: responses to terrorist grievances

    International Nuclear Information System (INIS)

    Beres, L.R.

    1987-01-01

    The US is vulnerable to nuclear terrorism, despite the presence of physical security and other measures. Although these measures are important, they are insufficient to prevent or deter terrorism. What, then, is the answer? The author feels it lies in a hitherto neglected dimension of terrorism: its underlying political grievances. The principal grievance that potential terrorists have against the US concerns misguided elements of US foreign policy. These elements are moving the US on a seemingly inexorable collision course with terrorism and, more than likely, with nuclear terrorism. The US represents a serious threat to many people and groups who feel directly the effects of a foreign policy mired in strident anti-Sovietism: opponents of the US-NATO Euromissile deployments, populations seeking to secure their human rights from repressive regimes supported by the US, and governments seeking self-determination but embattled by insurgents backed by US arms, equipment, and advisers. In many cases, the US foreign policy stance in one country has aroused suspicion and anger within the region as a whole. The collision course need not be inevitable. The US can take a number of steps in the political arena that would greatly reduce the threat of nuclear terrorism

  13. Review of current and anticipated regulations on air protection in the Czech Republic

    Energy Technology Data Exchange (ETDEWEB)

    Jilek, P.; Novotny, V. [Ministry of the Environment of the Czech Republic, Prague (Czechoslovakia)

    1995-12-01

    Environmental issues, especially the solution of the air pollution problem, have taken on great significance in the Czech Republic (which was a part of the Czech and Slovak Federal Republic until the end of 1992) since the 1989 {open_quotes}Velvet{close_quotes} Revolution. The former CSFR Federal Committee for the Environment and both the Republic Ministries started immediately with creating new environmental legislation, which is the main governmental tool for protecting the environment in the newly developing democracy state system with a market oriented economy. The inspiration for that activity was found in legislation of developed countries - member states of the European Union, and in German environmental law in particular. This paper surveys the major laws and regulations that gradually came into force in the Czech Republic since 1990. The provisions of the primary significance are the Act No.309/1991 S.B., dated July 9, 1991, on the protection of the air against pollutants - The Clean Air Act, the Act No.218/1992 S.B., dated April 27, 1992, which changes and supplements the Act No.309 - The Clean Air Act, the Measure of the Federal Committee for the Environment of October 1, 1991 to the Clean Air Act, and its amended wordings of June 23, 1992, 84/1991 S.B., and 84/1992 S.B., the Act No.389/1991 S.B., dated September 10, 1991 on the state administration of air protection and charges for the pollution of air, and several regulations based on the Act No.389/1991 S.B., issued in the period 1992 -1993.

  14. Phase II Recommendations by the Air Quality Management Subcommittee to the Clean Air Act Advisory Committee

    Science.gov (United States)

    The primary charge of the AQM Subcommittee was to develop recommendations to improve the air quality management system and address the air quality challenges in this country expected over the next 10 to 20 years. This report addresses those challenges.

  15. Analysis of the Clean Air Act Amendments of 1990: A forecast of the electric utility industry response to Title IV, Acid Deposition Control

    Energy Technology Data Exchange (ETDEWEB)

    Molburg, J.C.; Fox, J.A.; Pandola, G.; Cilek, C.M.

    1991-10-01

    The Clean Air Act Amendments of 1990 incorporate, for the first time, provisions aimed specifically at the control of acid rain. These provisions restrict emissions of sulfur dioxide (SO{sub 2}) and oxides of nitrogen (NO{sub x}) from electric power generating stations. The restrictions on SO{sub 2} take the form of an overall cap on the aggregate emissions from major generating plants, allowing substantial flexibility in the industry`s response to those restrictions. This report discusses one response scenario through the year 2030 that was examined through a simulation of the utility industry based on assumptions consistent with characterizations used in the National Energy Strategy reference case. It also makes projections of emissions that would result from the use of existing and new capacity and of the associated additional costs of meeting demand subject to the emission limitations imposed by the Clean Air Act. Fuel-use effects, including coal-market shifts, consistent with the response scenario are also described. These results, while dependent on specific assumptions for this scenario, provide insight into the general character of the likely utility industry response to Title IV.

  16. Analysis of the Clean Air Act Amendments of 1990: A forecast of the electric utility industry response to Title IV, Acid Deposition Control

    Energy Technology Data Exchange (ETDEWEB)

    Molburg, J.C.; Fox, J.A.; Pandola, G.; Cilek, C.M.

    1991-10-01

    The Clean Air Act Amendments of 1990 incorporate, for the first time, provisions aimed specifically at the control of acid rain. These provisions restrict emissions of sulfur dioxide (SO[sub 2]) and oxides of nitrogen (NO[sub x]) from electric power generating stations. The restrictions on SO[sub 2] take the form of an overall cap on the aggregate emissions from major generating plants, allowing substantial flexibility in the industry's response to those restrictions. This report discusses one response scenario through the year 2030 that was examined through a simulation of the utility industry based on assumptions consistent with characterizations used in the National Energy Strategy reference case. It also makes projections of emissions that would result from the use of existing and new capacity and of the associated additional costs of meeting demand subject to the emission limitations imposed by the Clean Air Act. Fuel-use effects, including coal-market shifts, consistent with the response scenario are also described. These results, while dependent on specific assumptions for this scenario, provide insight into the general character of the likely utility industry response to Title IV.

  17. What Are We Really Afraid Of? The Practitioner View of the Terrorist Threat in the United States

    Science.gov (United States)

    2005-03-01

    like intelligence gathering and courier work • 80% single • Familiarity with home ground. Thus terrorists come from both rural and urban areas • 66...codes also help disaggregate intra- - 114 - state regions by identifying urban areas from suburban and rural . Finally, through geographic mapping...National Laboratory for Tourism and eCommerce (NLTEC), University of Illinois at Urbana-Champaign. 2002. Self-Selection Biases in the Internet

  18. Architectural and structural engineering aspects of protective design for nuclear power plants against terrorist attack

    International Nuclear Information System (INIS)

    Musacchio, J.M.; Rozen, A.

    1987-01-01

    This paper presents the results of several threat studies which have been performed, provides collective data on costs, and discusses, in a general sense, architectural/structural aspects of passive protection design measures which have been developed and utilized at several nuclear power plants. By combining relevant architectural and structural measures in the standard design, it is possible to substantially reduce the vulnerability of nuclear power plants to terrorist attack and the estimated damage to a manageable level with a minimal investment. (orig./HP)

  19. 76 FR 45403 - Bank Secrecy Act Regulations-Definitions and Other Regulations Relating to Prepaid Access

    Science.gov (United States)

    2011-07-29

    ... prepaid access products and services posing lower risks of money laundering and terrorist financing from... exceptions to: (1) Establish written anti-money laundering (AML) programs that are reasonably designed to prevent the MSB from being used to facilitate money laundering and the financing of terrorist activities...

  20. 75 FR 36589 - Financial Crimes Enforcement Network; Amendment to the Bank Secrecy Act Regulations-Definitions...

    Science.gov (United States)

    2010-06-28

    ... exempting certain categories of prepaid access products and services posing lower risks of money laundering... potential for the use of prepaid access as a means for furthering money laundering, terrorist financing, and... abuses of terrorist financing, money laundering, and other financial crime. In the course of our...

  1. Pollution Law - Clean Air Act

    International Nuclear Information System (INIS)

    Schmitt Glaeser, W.; Meins, J.W.

    1982-01-01

    This volume deals with how the living space air is kept clean by means of the pollution law, focussing on the documentation of central problems of pollution law by means of selected articles and court decisions. The literature and jurisdiction available on this sector of which we can hardly keep track makes such a documentation look useful and necessary. It will make working easier for those who do not have direct access to large libraries. The only intention of the guide for the pollution law which preceeds the documentation is to outline basic problems. It is intended to provide basic information in this complex field of law. At the same time, it also constitutes a 'guide' for the documentation: By naming the documentation number in the margin of the respective passage reference is made to the documented publications which deal with the legal issues considered. Using this guide, the documentation can be easily tapped. (orig.) [de

  2. 30 CFR 250.302 - Definitions concerning air quality.

    Science.gov (United States)

    2010-07-01

    ... 30 Mineral Resources 2 2010-07-01 2010-07-01 false Definitions concerning air quality. 250.302... Definitions concerning air quality. For purposes of §§ 250.303 and 250.304 of this part: Air pollutant means..., pursuant to section 109 of the Clean Air Act, national primary or secondary ambient air quality standards...

  3. Mrs. Shipley’s Ghost: The Right to Travel and Terrorist Watchlists (by Jeffrey Kahn, University of Michigan Press, 2013

    Directory of Open Access Journals (Sweden)

    Susan Ginsburg

    2014-04-01

    Full Text Available Since 9/11, migration-related security measures, including a growing reliance on watch-lists, have limited the right to travel. Jeffrey Kahn’s book, Mrs. Shipley’s Ghost: The Right to Travel and Terrorist Watchlists, examines the legal and policy questions raised by prohibitions on travel by US citizens. 

  4. 40 CFR 52.683 - Significant deterioration of air quality.

    Science.gov (United States)

    2010-07-01

    ... quality. 52.683 Section 52.683 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR... deterioration of air quality. (a) The State of Idaho Rules for Control of Air Pollution in Idaho, specifically... the Clean Air Act for preventing significant deterioration of air quality. (b) The requirements of...

  5. 40 CFR 52.738 - Significant deterioration of air quality.

    Science.gov (United States)

    2010-07-01

    ... quality. 52.738 Section 52.738 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR... deterioration of air quality. (a) The requirements of sections 160 through 165 of the Clean Air Act are not met... air quality. (b) Regulations for preventing significant deterioration of air quality. The provisions...

  6. 40 CFR 52.793 - Significant deterioration of air quality.

    Science.gov (United States)

    2010-07-01

    ... quality. 52.793 Section 52.793 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR... deterioration of air quality. (a) The requirements of sections 160 through 165 of the Clean Air Act are not met... air quality. (b) Regulations for preventing significant deterioration of air quality. The provisions...

  7. 40 CFR 52.632 - Significant deterioration of air quality.

    Science.gov (United States)

    2010-07-01

    ... quality. 52.632 Section 52.632 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR... deterioration of air quality. (a) The requirements of sections 160 through 165 of the Clean Air Act are not met... air quality. (b) Regulations for preventing significant deterioration of air quality. The provisions...

  8. Indoor air quality and the law in Singapore.

    Science.gov (United States)

    Chan, P

    1999-12-01

    With the greater use of air-conditioned offices in Singapore, achieving good indoor air quality has become an important issue. The laws that impose duties upon designers and contractors with respect to the design and construction of air-conditioning and mechanical ventilation (ACMV) systems are set out in the Building Control Regulations and the Singapore Standard Code of Practice for Mechanical Ventilation and Air-conditioning in Buildings (hereinafter "SS CP 13:1980"). ACMV maintenance is governed by the Environmental Public Health Act, the Building and Common Property (Maintenance and Management) Act, and the Land Titles (Strata) Act, as well as by lease or tenancy agreements. Designers, contractors, developers, building owners and management corporations may also be liable to the workers, occupants and other premises users for indoor air quality (IAQ)-related injuries under the general principles of contract and tort. Recently, the Guidelines for Good Indoor Air Quality in Office Premises was issued by the Ministry of Environment to complement SS CP 13:1980 toward improving the indoor air quality of air-conditioned office premises. Although the Guidelines have no statutory effect, they may be adopted as contractual requirements in construction, lease and maintenance contracts. They may also be used to determine the relevant standard of duty of care required to discharge tortious liability. This paper looks at the existing laws and rules affecting the design, construction and maintenance of air-conditioned offices in light of Part III of the Ministry's Guidelines.

  9. Recovery Act Hospital Alteration Project at Naval Air Station Jacksonville

    Science.gov (United States)

    2010-12-07

    QMAD Quantitative Methods and Analysis Division RLF Rogers Lovelock & Fritz, Incorporated SE Southeast SF Square Feet SOW Statement of Work TMA TRICARE...Finally, the contractor, Rogers Lovelock & Fritz, Incorporated, reported the recipient information required by the Recovery Act. What We Recommend...contractor, Rogers Lovelock & Fritz, Incorporated (RLF), reported the recipient information required by the Recovery Act. Planning: Initially, Project

  10. Screening procedure to evaluate effects of air pollution on Eastern Region wildernesses cited as Class I air quality areas.

    Science.gov (United States)

    Mary Beth Adams; Dale S. Nichols; Anthony C. Federer; Keith F. Jensen; Harry Parrott

    1991-01-01

    The USDA Forest Service's Eastern Region manages eight wilderness areas that have been designated as Class I air quality areas by the Federal Clean Air Act. As part of this legislation, Federal land managers are required to consult with air pollution regulators on the potential impacts of proposed air pollution emissions--including phytotoxic gases and acidic...

  11. 40 CFR 52.96 - Significant deterioration of air quality.

    Science.gov (United States)

    2010-07-01

    ... quality. 52.96 Section 52.96 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR... deterioration of air quality. (a) The State of Alaska Department of Environmental Conservation Air Quality... deterioration of air quality. (b) The requirements of sections 160 through 165 of the Clean Air Act are not met...

  12. 40 CFR 52.432 - Significant deterioration of air quality.

    Science.gov (United States)

    2010-07-01

    ... quality. 52.432 Section 52.432 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR... deterioration of air quality. (a) The requirements of sections 160 through 165 of the Clean Air Act are not met... air quality. (b) Regulation for preventing significant deterioration of air quality. The provisions of...

  13. Learning from history: The Glasgow Airport terrorist attack.

    Science.gov (United States)

    Crichton, Gillies

    Glasgow Airport was the target of a terrorist attack on 30th June, 2007. Many people within Scotland had come to believe that Scotland was immune from terrorism. This perception was in large part informed by Scotland's experience during the protracted Troubles in Northern Ireland, during which the Provisional Irish Republican Army's mainland bombing campaign focused on targets in England, sparing both Scotland and Wales. While Glasgow Airport did not expect such an attack to take place, meticulous planning, organising and testing of plans had taken place to mitigate the unlikely event of such an attack. The attack stands up as a shining example of robust business continuity management, where the airport reopened for business as usual in less than 24 hours from the time of the attack. Little is known about how the airport handled the situation in conjunction with other responding agencies as people tend to want to focus on high-profile disasters only. Yet countless such incidents are happening worldwide on a daily basis, in which there are excellent learning opportunities, and, taken in the spirit of converting hindsight into foresight, the likelihood of similar incidents could potentially be reduced in the future.

  14. 14 CFR 374.3 - Compliance with the Consumer Credit Protection Act and regulations.

    Science.gov (United States)

    2010-01-01

    ... requirements of the Consumer Credit Protection Act, 15 U.S.C. 1601-1693r. Any violation of the following... PROTECTION ACT WITH RESPECT TO AIR CARRIERS AND FOREIGN AIR CARRIERS § 374.3 Compliance with the Consumer... 14 Aeronautics and Space 4 2010-01-01 2010-01-01 false Compliance with the Consumer Credit...

  15. 77 FR 16548 - Clean Air Act Advisory Committee

    Science.gov (United States)

    2012-03-21

    ..., and consensus-building skills. --Ability to volunteer time to attend meetings 2-3 times a year... third term. The CAAAC usually meets 2-3 times annually with workgroups meeting more frequently. The... governments issues. --Experience working with air quality policy issues. --Executive management level...

  16. Electric utilities and clean air

    International Nuclear Information System (INIS)

    Evans, J.E.

    1991-01-01

    This paper reports that electricity has become essential to American life. Approximately 70 percent of the nation's electricity is produced by burning fossil fuels, with coal, the most abundant, domestically-available, extracted natural resource, providing over 55 percent of the total electricity consumed. Emissions resulting from the burning of fossil fuels are regulated by both the federal and state governments. In 1970, Congress passed the comprehensive Clean Air Act which established a national program to protect the nation's air quality. In 1977, additional strict regulations were passed, which mandated even more stringent emission controls for factories, power plants and auto emissions. Prior to passage of the Clean Air Act of 1990, utilities were required to adhere to three major types of clean air regulations: National Ambient Air Quality Standards (NAAQS), New Source Performance Standards (NSPS), and Prevention of Significant Deterioration (PSD) review. NAAQS established limits for the maximum concentration levels of specific air pollutants in the ambient atmosphere. For example, for an area to be in compliance with the NAAQS for sulfur dioxide (SO 2 ), its annual average SO 2 concentration must not exceed 0.03 ppm of SO 2 and a peak 24 hour level of 0.14 ppm of SO 2 must not be exceeded more than once per year

  17. Terrorism and Other Threats to Civilization

    Science.gov (United States)

    Garwin, Richard L.

    2014-07-01

    In the Seminars on Planetary Emergencies, we have for more than a decade had a strong focus on terrorism, and, indeed, on megaterrorism. We realized early that there was much that could be achieved to mitigate the consequences of terrorists' acts, and so our original PMP, ably chaired by Kamal, was split into PMP-MTA (Mitigation of Terrorists Acts) and PMP-Motivation of Terrorism. Clearly, terrorism doesn't just happen, but is performed by people, either relatively spontaneously or in an organized fashion. I will not presume to report on the considerations and accomplishments of our colleagues, chaired by John Alderdice, who have studied terrorist motivations and worked hard to eliminate such motivations...

  18. Clean Air Act Standards and Guidelines for Chemical Production and Distribution

    Science.gov (United States)

    This page contains the stationary sources of air pollution for the chemical production & distribution industries, and their corresponding air pollution regulations. To learn more about the regulations for each industry, click on the links below.

  19. 76 FR 53421 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2011-08-26

    ..., Air Force Privacy Act Office, Office of Warfighting Integration and Chief Information Officer, ATTN...: Name, signatures, personal contact information, individual's employer and institutional, organizational..., Historical Products, Services, and Requirements; Air Force Instruction 84-105, Organizational Lineage, Honors...

  20. 40 CFR 52.1436 - Significant deterioration of air quality.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 4 2010-07-01 2010-07-01 false Significant deterioration of air quality. 52.1436 Section 52.1436 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR... Significant deterioration of air quality. The requirements of sections 160 through 165 of the Clean Air Act...

  1. 40 CFR 52.2303 - Significant deterioration of air quality.

    Science.gov (United States)

    2010-07-01

    ... quality. 52.2303 Section 52.2303 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR... Significant deterioration of air quality. (a) The plan submitted by Texas is approved as meeting the requirements of part C, Clean Air Act for preventing significant deterioration of air quality. The plan...

  2. Clean Air Act Standards and Guidelines for Energy, Engines, and Combustion

    Science.gov (United States)

    This page contains the stationary sources of air pollution for the energy, engines, and combustion industries, and their corresponding air pollution regulations. To learn more about the regulations for each industry, just click on the links below.

  3. Clean Air Act Standards and Guidelines for Agriculture, Food and Forestry

    Science.gov (United States)

    This page contains the stationary sources of air pollution for the agriculture, food, and forestry industries, and their corresponding air pollution regulations. To learn more about the regulations for each industry, just click on the links below.

  4. Terrorism, the Internet and the Social Media Advantage: Exploring how terrorist organizations exploit aspects of the internet, social media and how these same platforms could be used to counter-violent extremism.

    Directory of Open Access Journals (Sweden)

    Luke Bertram

    2016-06-01

    Full Text Available The deeply engrained nature of social media in modern life have provided ease of access to information and speed of use within almost every aspect of a person’s life. These same benefit are also available to terrorists and their organizations. The same technology that allows for a globalized world to interact without regard for distance or physical location is also utilized, exploited and adapted to by terrorist organizations to conduct operations, reach candidates and ensure organizational longevity. This article takes the position of observer of these advancements with the end goal of informing counter-violent extremism strategists of the advances that terrorist groups have already made in digital technology; and where the priority of intervention strategies should be aimed. Further, this is intended to guide policy makers to embrace and utilize digital technologies as a mechanism to carry counter-radicalization and counter-violent extremism interventions through the same digital potential and reach the same audiences as terrorist organizations. What appears strongly apparent is that social media will not abate from its intrinsic position graphed into daily life. This means that counter-terrorism, counter-radicalization and counter-violent extremism strategies must take up the same technology in order to effectively discredit and nullify extremist groups – a digital problem needs a digital solution.

  5. Pesticide Active Ingredient Production Industry: National Emission Standards for Hazardous Air Pollutants (NESHAP)

    Science.gov (United States)

    This action promulgates national emission standards for hazardous air pollutants (NESHAP) for the pesticide active ingredient (PAI) production source category under section 112 of the Clean Air Act as amended (CAA or Act).

  6. The Treatment of Images in 11-M Terrorist Attacks. Terrorism and Violence in the Press

    Directory of Open Access Journals (Sweden)

    Dra. Emma Torres Romay

    2006-01-01

    Full Text Available In this paper we want to analyze the pictures publishing in the Spanish and international newspapers before the Madrid terrorist attack, March, 11. With this research we get some ideas about freedom speech limits: the respect of the privacy and, in special, the respect of the pain. At the same time, we´ll remark the importance of the photography in the press and their communication power. For this research we used the March, 11 and 12 newspapers of most important Spanish editors and the digital edition of international press.

  7. Summary and overview of the allowance program in the Clean Air Act Amendments of 1990

    International Nuclear Information System (INIS)

    Anon.

    1992-01-01

    Title IV of the Clean Air Act Amendments of 1990 (CAAA) created a new regulatory instrument, an emission allowance, that electric power producers will be required to possess and expend to emit sulfur dioxide into the atmosphere. The emission allowance system will be integrated into an already complex system of state and federal electric utility regulation. The way state public utility commissions and the Federal Energy Regulatory Commission respond to utility compliance actions will greatly affect the decisions that electric utilities under their jurisdiction make to comply with the CAAA and the cost of compliance to ratepayers. This chapter summarizes the CAAA, presenting dates for the implementation of the allowance system rule, and discusses conservation and renewable energy bonus allowances, EPA allowance sales and auctions, allowance pooling, exempt power facilities, election by additional resources, nitrogen oxides control, compliance planning third-party ownership, allowance property rights, and an example of utility compliance options with allowances. 11 refs., 6 tabs

  8. ACTS OF TERRORISM AS A TACTIC OF THE ISLAMIC STATE AND IMPLICATIONS FOR RUSSIAN FOREIGN POLICY

    Directory of Open Access Journals (Sweden)

    Aleksandr Nikolaevich Xaribin

    2016-02-01

    Full Text Available In the article the analysis of the Islamic state: emergence, current status, reasons for success, control methods and prospects. The last terrorist attacks: Russian aircraft over the Sinai and the terrorist attack in Paris. A comparative analysis and reasons for election purposes by terrorists to attack, the consequences for Egypt, Europe, the middle East and Russia. At the end of the article gives practical recommendations for Russian foreign policy and the forecast of development of events in this region, it is hypothesized that the further growth of the Islamic state and the inability to move it to the borders of Russia

  9. 40 CFR 52.884 - Significant deterioration of air quality.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 3 2010-07-01 2010-07-01 false Significant deterioration of air quality. 52.884 Section 52.884 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR... deterioration of air quality. (a) The requirements of section 160 through 165 of the Clean Air Act, as amended...

  10. 40 CFR 52.343 - Significant deterioration of air quality.

    Science.gov (United States)

    2010-07-01

    ... quality. 52.343 Section 52.343 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR... deterioration of air quality. (a) The requirements of sections 160 through 165 of the Clean Air Act are not met for the following categories of sources for preventing the significant deterioration of air quality...

  11. 40 CFR 52.833 - Significant deterioration of air quality.

    Science.gov (United States)

    2010-07-01

    ... quality. 52.833 Section 52.833 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR... deterioration of air quality. (a) The requirements of sections 160 through 165 of the Clean Air Act are met... for preventing significant deterioration of air quality. The provisions of § 52.21 except paragraph (a...

  12. Air monitoring activities of the U.S. Environmental Protection Agency/Environmental Response Team during the September 11, 2001 terrorist attacks

    Energy Technology Data Exchange (ETDEWEB)

    Turpin, R.; Mickunas, D.; Campagna, P.; Burchette, S. [U.S. Environmental Protection Agency, Environmental Response Team, Edison, NJ (United States)

    2002-07-01

    The Environmental Response Team (ERT) of the United States Environmental Protection Agency (USEPA) conducted air monitoring activities during the September 11, 2001 attack on the World Trade Center in New York City. This paper describes ERT's response actions and analytical support. It covers ERT activities from the morning of September 11 to October 17, 2001 when ERT was alerted of anthrax activities in Washington, DC and Boca Raton, Florida. ERT members provided technical support regarding respirator/personnel protective equipment selection, decontamination and health and safety protocols. In the first few weeks, ERT was also providing analytical laboratory support to the EPA, the Occupational Safety and Health Administration, the National Institute for Occupational Safety and Health, and the New York City Department of Health. ERT also provided on-site gas chromatography-mass spectrometry analysis via the Trace Atmospheric Gas Analyzer (TAGA) bus, providing real-time direct readings to the EPA and the New York Fire Department. Site boundary air monitoring stations were maintained until early November at which point the EPA Region 2 took over all monitoring responsibilities. Air sampling efforts were initially directed at worker health and safety and the surrounding environments. Air sampling was conducted for asbestos, acid gases, heavy metals, phosgene, mercury, dioxins/furans, volatile organic compounds, and polychlorinated biphenyls. The sampling activities were later expanded to include chlorine, hydrogen chloride, sulfur dioxide, and hydrogen cyanide. Site assessment is still ongoing. What began as a typical emergency response air sampling effort soon became a huge air monitoring effort with the original six stations expanded to more than 20. ERT made every effort to collect, analyze, quality assure and transfer data for posting on publicly accessible website within less than 24 hours. It was noted that one of the lessons learned from the disaster is

  13. Granting Concessions and Paying Ransoms to Terrorists: A Policy Options Analysis of the U.S. Policy on Hostage Recovery

    Science.gov (United States)

    2016-06-01

    businesses like General Motors, which received bailout money from the federal government, and the Catholic Church, which receives tax-exempt status...from gaining independence from France . Other examples of absolute terrorists include the Provisional Irish Republican Army (IRA), Hamas, and al...The conflict began when the IRA, which represented the Catholic minority, felt discriminated against by the Protestant majority, represented by

  14. Der er mening med IS' galskab

    DEFF Research Database (Denmark)

    Schmidt, Søren

    2015-01-01

    I analyse the recent cases of Islamic State terrorism (the immolation of the Jordanian pilot and cutting the throat of 21 Egyptian Christians in Libya) as well as the case of a terrorist act of Irgun in the struggle for Israeli independence. These cases (as well as many of the acts of Al Qaida......) have the purpose of provocation thereby leading Western states to do foolish things and in that process hurting themselves and helping the terrorists....

  15. 75 FR 80809 - Proposed Consent Decree, Clean Air Act Citizen Suit

    Science.gov (United States)

    2010-12-23

    ... Department of Air Quality to the Tennessee Valley Authority's Paradise Fossil Plant in Drakesboro, Kentucky... permit issued by the Kentucky Department of Air Quality to the Tennessee Valley Authority's Paradise...'s policy is that public comments, whether submitted electronically or in paper, will be made...

  16. 40 CFR 52.382 - Significant deterioration of air quality.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 3 2010-07-01 2010-07-01 false Significant deterioration of air quality. 52.382 Section 52.382 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR... deterioration of air quality. (a) The requirements of sections 160 through 165 of the Clean Air Act are not met...

  17. Characterising air quality risk in the City of Johannesburg

    CSIR Research Space (South Africa)

    Ngwenya, NS

    2014-10-01

    Full Text Available of the National Environmental Management: Air Quality Act (AQA). Air quality data that were obtained from the South African Air Quality Information System (SAAQIS) were averaged such that the diurnal, seasonal and annual trends could be identified. Geographic...

  18. 78 FR 40966 - Approval and Promulgation of Air Quality Implementation Plans; New Mexico; Interstate Transport...

    Science.gov (United States)

    2013-07-09

    ... Promulgation of Air Quality Implementation Plans; New Mexico; Interstate Transport of Fine Particulate Matter... a State Implementation Plan (SIP) submittal from the State of New Mexico to address Clean Air Act (CAA or Act) requirements that prohibit air emissions which will contribute significantly to...

  19. Clean air: time for responsible reform

    International Nuclear Information System (INIS)

    Hart, G.

    1982-01-01

    An opinion concerning the renewal of the Clean Air Act by Gary Hart, the U.S. Senator from Colorado, is presented. Hart discusses how effective programs covered by the act can be preserved, how burdensome requirements can be streamlined, and how coverage can be expanded to unforeseen problems

  20. Global rhetorics of disaster: media constructions of Bataclan and the 'Colectiv Revolution' in the wake of 9/11

    OpenAIRE

    Draga Alexandru, Maria-Sabina

    2017-01-01

    This article examines the recent global emergence of a rhetoric of disaster that connects violent events such as terrorist attacks and destructive accidents under an assumption of similarity based on their equally resulting in tragedy and mourning. I will compare discursive constructions of the terrorist attacks on 9/11, often considered the archetypal terrorist act of the new millennium, the Club Colectiv fire in Bucharest (October 30, 2015), followed by the “Colectiv Revolution” that led to...

  1. 75 FR 57159 - Continuation of the National Emergency With Respect to Persons Who Commit, Threaten to Commit, or...

    Science.gov (United States)

    2010-09-20

    ... economy of the United States constituted by the grave acts of terrorism and threats of terrorism committed by foreign terrorists, including the terrorist attacks on September 11, 2001, in New York and... security, foreign policy, and economy of the United States, the national emergency declared on September 23...

  2. 76 FR 58999 - Continuation of the National Emergency With Respect to Persons Who Commit, Threaten To Commit, Or...

    Science.gov (United States)

    2011-09-22

    ... economy of the United States constituted by the grave acts of terrorism and threats of terrorism committed by foreign terrorists, including the terrorist attacks on September 11, 2001, in New York and... security, foreign policy, and economy of the United States, the national emergency declared on September 23...

  3. 75 FR 20601 - Agency Forms Undergoing Paperwork Reduction Act Review

    Science.gov (United States)

    2010-04-20

    .... Proposed Project Asthma Information Reporting System (AIRS)--New--Air Pollution and Respiratory Health... DEPARTMENT OF HEALTH AND HUMAN SERVICES Centers for Disease Control and Prevention [30Day-10-09CK] Agency Forms Undergoing Paperwork Reduction Act Review The Centers for Disease Control and prevention...

  4. 78 FR 24422 - Agency Forms Undergoing Paperwork Reduction Act Review

    Science.gov (United States)

    2013-04-25

    ... System (AIRS) (0920-0853, Expiration 06/30/2013)--Extension--Air Pollution and Respiratory Health Branch... DEPARTMENT OF HEALTH AND HUMAN SERVICES Centers for Disease Control and Prevention [30Day-13-0853] Agency Forms Undergoing Paperwork Reduction Act Review The Centers for Disease Control and Prevention...

  5. 75 FR 4070 - Science Advisory Board Staff Office; Notification of a Public Meeting of the Air Quality Modeling...

    Science.gov (United States)

    2010-01-26

    ... Prospective Analysis of the benefits and costs of the Clean Air Act. DATES: The meeting date is Friday... support the Second Prospective Section 812 Benefit-Cost Analysis of the Clean Air Act. The Council was... studies to assess benefits and costs of the EPA's regulatory actions under the Clean Air Act. The Council...

  6. Women’s Work: Incorporating Females into the United States Military Strategy to Contain and Degrade Boko Haram

    Science.gov (United States)

    2017-06-09

    Wars.” The Washington Post, May 19. Accessed March 5, 2017. https://www.washingtonpost.com/posteverything/wp/2015/ 05/19/the- armys-all- women ...shift in Boko Haram’s tactics is the incorporation and use of women in their organization to help perpetuate terrorist acts. What is the U.S.’ s current...their organization to help perpetuate terrorist acts. What is the U.S.’ s current military strategy to counter Boko Haram? What role do women have in

  7. FIGHTING OF WESTERN INTELLIGENCE WITH ISLAMIC TERRORISM

    OpenAIRE

    Asadi NEJMAH

    2015-01-01

    The state of Israel even prior to its establishment, faces, in daily life, terrorist organizations that want to destroy it. Terrorism and terrorist acts as implied from the original meaning of the word – fear, anxiety, terror, are meant to plant fear amongst the attacked public and bring about its demoralization and confusion, and disruption of routine life. Occasionally it is performed also as an act of revenge in a blood circle of violence. A substantial part of terrorism weapons is the ext...

  8. Prospects for nuclear terrorism: psychological motivations and constraints

    International Nuclear Information System (INIS)

    Post, J.M.

    1987-01-01

    In considering the implications of psychological understandings to the specific case of nuclear terrorism, it is emphasized that distorted decision making does not equate to totally irrational decision making. In certain circumstances, however, the distorted individual and group decision-making psychology could influence the group toward a high-risk option such as nuclear terrorism. For terrorists operating within their own national boundaries, a terrorist act producing mass casualties would generally be counterproductive. For groups acting across national boundaries, however, this constraint does not apply to nearly the same degree. Although the opprobrium of the West will be a constraint for some, it will not be equally so for all terrorist groups. The degree of disincentive will relate in particular to the major audience of influence. Also, there are the terrorist losers who are being shunted aside and losing the recognition they seek. Such a group could justify a terrorist spectacular in order to regain influence on the basis of a what have we got to lose rationale. In thinking about the possibility of nuclear terrorism, it is important to distinguish between the actual detonation of a device and the use of a device for extortion and influence. The constraints against the latter are significantly reduced in contrast to acts producing mass casualties. The constraints are even more reduced in the case of the plausible nuclear hoax, an option that can be expected to become more frequent

  9. Increased Incidence Rate of Trauma- and Stressor-Related Disorders in Denmark After the September 11, 2001, Terrorist Attacks in the United States

    DEFF Research Database (Denmark)

    Hansen, Bertel T; Østergaard, Søren D; Sønderskov, Kim M

    2016-01-01

    The terrorist attacks that occurred on September 11, 2001 (hereafter referred to as 9/11) in the United States had a profound impact on the physical and mental health of Americans, but the effects beyond the United States are largely unknown. To understand the wider aftermath, we examined...

  10. An assessment of the terrorist threat to use a nuclear or radiological device in an attack

    Energy Technology Data Exchange (ETDEWEB)

    Kingshott, B.F. [Grand Valley State University, 275C DeVos Center, 401 West Fulton Street, Grand Rapids, MI 49504 (United States)]. E-mail: kingshob@gvsu.edu

    2006-07-01

    This paper will discuss terrorism from the perspective of a terrorist organisation acquiring nuclear material to build weapons and how security of radiological material world wide will minimise the risk of such devices being used. It will discuss the need to improve security at nuclear waste processing and storage sites and the adequacy of current security. It will also discuss the phenomenon of suicide attacks by the bomb carriers and the role of the media in informing and educating the general public of the consequences should such a device containing nuclear material be detonated. (author)

  11. Examination of utility Phase 1 compliance choices and state reactions to Title IV of the Clean Air Act Amendments of 1990

    International Nuclear Information System (INIS)

    Bailey, K.A.; Elliott, T.J.; Carlson, L.J.; South, D.W.

    1993-11-01

    Title IV (acid rain) of the Clean Air Act Amendments of 1990 is imposing new limitations on the emission of sulfur dioxide (SO 2 ) and nitrogen oxides (N x ) from electric power plants. The act requires utilities to develop compliance plans to reduce these emissions, and indications are that these plans will dramatically alter traditional operating procedures. A key provision of the SO 2 control program deaned in Title IV is the creation of a system of emission allowances, with utilities having the option of complying by adjusting system emissions and allowance holdings. A compilation of SO 2 compliance activities by the 110 utility plants affected by Phase I is summarized in this report. These compliance plans are presented in a tabular form, correlated with age, capacity, and power pool data. A large number of the Phase I units (46%) have chosen to blend or switch to lower sulfur coals. This choice primarily is in response to (1) prices of low-sulfur coal and (2) the need to maintain SO 2 control flexibility because of uncertain future environmental regulations (e.g., air toxics, carbon dioxide) and compliance prices. The report also discusses the responses of state legislatures and public utility commissions to the compliance requirements in Title IV. Most states have taken negligible action regarding the regulatory treatment of allowances and compliance activities. To protect mine employment, states producing high-sulfur coal have enacted regulations encouraging continued use of that coal, but for the most part, this response has had little effect on utility compliance choices

  12. 40 CFR 52.144 - Significant deterioration of air quality.

    Science.gov (United States)

    2010-07-01

    ... quality. 52.144 Section 52.144 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR... deterioration of air quality. (a) The requirements of sections 160 through 165 of the Clean Act are not met... lands does not include approvable procedures for preventing the significant deterioration of air quality...

  13. A new international convention against terrorism: the International Convention for the Suppression of Acts of Nuclear Terrorism. Full text in French, English and Spanish. Introduction to the main elements of the convention

    International Nuclear Information System (INIS)

    Laborde, Jean-Paul; )

    2005-01-01

    The International Convention for the Suppression of Acts of Nuclear Terrorism is a 2005 United Nations treaty designed to criminalize acts of nuclear terrorism and to promote police and judicial cooperation to prevent, investigate and punish those acts. As of September 2016, the convention has 115 signatories and 106 state parties, including the nuclear powers China, France, India, Russia, the United Kingdom, and the United States. The Convention covers a broad range of acts and possible targets, including nuclear power plants and nuclear reactors; covers threats and attempts to commit such crimes or to participate in them, as an accomplice; stipulates that offenders shall be either extradited or prosecuted; encourages States to cooperate in preventing terrorist attacks by sharing information and assisting each other in connection with criminal investigations and extradition proceedings; and, deals with both crisis situations, assisting States to solve the situations and post-crisis situations by rendering nuclear material safe through the International Atomic Energy Agency (IAEA)

  14. Involvement of Russian Organized Crime Syndicates, Criminal Elements in the Russian Military, and Regional Terrorist Groups in Narcotics Trafficking in Central Asia, the Caucasus, and Chechnya

    National Research Council Canada - National Science Library

    Curtis, Glenn E

    2002-01-01

    ... (Armenia, Azerbaijan, and Georgia), and in Chechnya. The purpose of the report is to reveal the role of Russian organized crime and Central Asian terrorist organizations in narcotics trafficking in those areas...

  15. Project of energy saving in compressed air; Proyecto de ahorro de energia en aire comprimido

    Energy Technology Data Exchange (ETDEWEB)

    Automatizacion, Productividad y Calidad S.A. de C.V. Puebla, (Mexico)

    2005-07-01

    The objective of this project is to reduce the operation costs by means of the energy saving through the use of the compressed air system. For this purpose the solenoid valves controlled per time and the manually acted valves of sphere must be replaced by pneumatic purges that remove from the system the condensed humidity without discharging air and which act automatically when the water reaches the level of unloading in its deposit. The pressure level is the reduction of the operation rank of pressure in the compressors, satisfying the operation requirements of the process equipment. [Spanish] El objetivo de este proyecto es reducir el costo de operacion mediante el ahorro de energia en la utilizacion del sistema de aire comprimido. Para ello se tienen que remplazar las valvulas solenoides controladas por tiempo y valvulas de esfera actuadas manualmente por purgas neumaticas que remueven del sistema la humedad condensada sin descargar aire y que actuan en forma automatica al alcanzar el agua el nivel de descarga en su deposito. El nivel de presion es la reduccion del rango de operacion de presion de los compresores, satisfaciendo los requerimientos de operacion de los equipos de proceso.

  16. Hospital Preparedness to Respond to Biological and Chemical Terrorist Attack

    International Nuclear Information System (INIS)

    Florin, P.

    2007-01-01

    There is a growing concern about the terrorist use of chemical or biological agents against civilian population. A large proportion of hospitals are probably poorly prepared to handle victims of chemical or biological terrorism. At national level, starting with 2008 hospitals will be under the administration and control of local authorities. That is good opportunities for local authorities and public health office to tailor the activity of the hospitals to the real needs in the area of responsibility, and to allocate the suitable budget for them. Commonly hospitals are not fully prepared to respond to massive casualty disaster of any kind, either i their capacity to care for large numbers of victims or in their ability to provide care in coordination with a regional or national incident command structure. Preparedness activities to respond properly to chemical or biological attack including the adequate logistic, the principle of training and drill for the hospital emergency units and medical personal, communication and integration of the hospital team in local and regional civil response team are developed by the author.(author)

  17. Review of Studies of the Economic Impact of the September 11, 2001, Terrorist Attacks on the World Trade Center

    Science.gov (United States)

    2002-05-29

    of the Budget, • New York City Partnership and Chamber of Commerce , Washington, DC 20548 Report Documentation Page Report Date 29MAY2002 Report Type...700R Impact of Terrorist Attacks on the World Trade Center 10 Eight Studies (cont’d) ! New York City Partnership and Chamber of Commerce , Economic...Center 29 Observations Observations The New York City Partnership and Chamber of Commerce study generated the most comprehensive estimates—direct and

  18. War on Terror: Fantasy and Fiction Behind the Mythology of Terrorist Financing

    Directory of Open Access Journals (Sweden)

    El-Fatih A. Abdel Salam

    2009-06-01

    Full Text Available Documentary evidence shows that the series of financial crackdowns initiated since 9/11 have had virtually no impact on terrorism. This is because these efforts are based on a fundamental misconception on how terrorism works. The financial warriors’ predisposition to stereotypes about “Arabs and their money” allowed unsubstantiated rumours–such as Bin Laden’s personal fortune of $300 million–to become established as facts. This study exposes the extent to which Washington policymakers simply transposed the template for the war on drugs on to the war on terror, despite the fact that terrorism is not a profit–driven enterprise. The collateral damage inflicted on organisations like Al-Barakaat, the Somali remittance network, wrongly accused of channeling money to the terrorists, and others are counter-productive as they dent the image of the US in the Muslim world.

  19. Nuclear terrorism

    International Nuclear Information System (INIS)

    Watson, C.

    2005-01-01

    This article is aimed at those professional scientists and engineers who believe that issues of international peace and security are too important to be left to the politicians. Nuclear Terrorism is a hostile act (or a threat of such an act) involving nuclear materials (fissile or radioactive) performed by a terrorist, a term which covers a wide range of individuals. What they all have in common is that, for some reason they have become motivated to hurt or destroy sections of society which they have come to regard as the enemy; their motivation varies enormously. They also vary enormously in the extent and nature of their technical/scientific education. There are 'PhD terrorists' and 'Peasant terrorists', and they differ greatly in the threat that they represent, and the steps which can appropriately be taken to counter it. The most serious threat comes from the potential ability of terrorists to steal or manufacture nuclear weapons of mass destruction (e.g. capable of causing thousands of deaths). Unless the underlying causes of terrorism can be quickly removed, we have a duty to mankind to make terrorist access to such weapons, and to the nuclear materials which are their essential ingredients, as difficult as possible. Improvements in the arrangements for denying unauthorised access to radioactive material should be made such that the protective measures made are proportionate to the number of Curies at risk and the likelihood of a terrorist initiative. The preventative measures, sadly, need to take account of the possibility that the terrorist will use lethal force to access the material. (author)

  20. Organizational change in the Ministry of Justice and Public Security after the terrorist attacks on 22 July 2011

    OpenAIRE

    Jensen, Susan Bahia

    2016-01-01

    This paper examines changes in the Ministry of Justice and Public Security (MJ) after the terrorist attacks in Norway 22 July 2011 until 2016. The focus is on the MJ’s internal and external formal organization, internal and external procedures, and demographic profile. A main finding is that the MJ has been subject to several small incremental changes, which collectively have resulted in a considerable development of the Ministry’s governance capacity in the field of societal s...

  1. New source review for stationary sources of air pollution

    National Research Council Canada - National Science Library

    Committee on Changes in New Source Review Programs for Stationary Sources of Air Pollution, National Research Council

    2006-01-01

    The Clean Air Act established a pair of programsâ€"known as New Source Review (NSR)â€"that regulate large stationary sources of air pollution, such as factories and electricity-generating facilities...

  2. 29 CFR 1202.12 - National Air Transport Adjustment Board.

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 4 2010-07-01 2010-07-01 false National Air Transport Adjustment Board. 1202.12 Section... § 1202.12 National Air Transport Adjustment Board. Under section 205, title II, of the Railway Labor Act... four representatives to constitute a Board known as the National Air Transport Adjustment Board. Two...

  3. Screening Cargo Containers to Remove a Terrorist Threat

    International Nuclear Information System (INIS)

    Hazi, A

    2005-01-01

    Each year some 48 million cargo containers move between the world's ports. More than 6 million of these enter the U.S., but only about 2 percent are opened and inspected when they arrive at U.S. seaports. The West Coast ports of Los Angeles-Long Beach, Oakland, and Seattle alone process 11,000 containers per day, or about 8 containers per minute. Because of this high traffic volume, U.S. seaports are especially vulnerable to a terrorist attack. Illicit radioactive materials could be hidden in any one of the cargo-filled containers that arrive at U.S. ports. Yet, searching every shipment would be bring legitimate commercial activities to a halt. Improving security at U.S. ports is thus one of the nation's most difficult technical and practical challenges because the systems developed for screening cargo must operate in concert with ongoing seaport activities. Working at this intersection of commerce and national security, Lawrence Livermore researchers are applying their expertise in radiation science and detection to develop improved technologies for detecting hidden radioactive materials. One new technology being designed and tested at the Laboratory is a neutron interrogation system for cargo containers. This system will quickly screen incoming shipments to ensure that nuclear materials such as plutonium and highly enriched uranium (HEU) are not smuggled into the U.S

  4. 77 FR 21911 - Approval and Promulgation of Implementation Plans; State of Arizona; Prevention of Air Pollution...

    Science.gov (United States)

    2012-04-12

    ...EPA is proposing to approve the State Implementation Plan (SIP) revision submitted by the State of Arizona to address the requirements regarding air pollution emergency episodes in Clean Air Act (CAA or Act) section 110(a)(2)(G). Section 110(a)(2)(G) of the Act requires that each SIP provide for authority comparable to that in section 303 of the Act and adequate contingency plans to implement such authority. EPA is proposing to approve Arizona's SIP revision as meeting the authority and contingency plans for the 1997 8-hour ozone National Ambient Air Quality Standards (NAAQS or standards).

  5. Hanford Site air operating permit application

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1995-05-01

    The Clean Air Act Amendments of 1990, which amended the Federal Clean Air Act of 1977, required that the US Environmental Protection Agency develop a national Air Operating Permit Program, which in turn would require each state to develop an Air Operating Permit Program to identify all sources of ``regulated`` pollutants. Regulated pollutants include ``criteria`` pollutants (oxides of nitrogen, sulfur oxides, total suspended particulates, carbon monoxide, particulate matter greater than 10 micron, lead) plus 189 other ``Hazardous`` Air Pollutants. The Hanford Site, owned by the US Government and operated by the US Department of Energy, Richland Operations Office, is located in southcentral Washington State and covers 560 square miles of semi-arid shrub and grasslands located just north of the confluence of the Snake and Yakima Rivers with the Columbia River. This land, with restricted public access, provides a buffer for the smaller areas historically used for the production of nuclear materials, waste storage, and waste disposal. About 6 percent of the land area has been disturbed and is actively used. The Hanford Site Air Operating Permit Application consists of more than 1,100 sources and in excess of 300 emission points. Before January 1995, the maintenance and operations contractor and the environmental restoration contractor for the US Department of Energy completed an air emission inventory on the Hanford Site. The inventory has been entered into a database so that the sources and emission points can be tracked and updated information readily can be retrieved. The Hanford Site Air Operating Permit Application contains information current as of April 19, 1995.

  6. Hanford Site air operating permit application

    International Nuclear Information System (INIS)

    1995-05-01

    The Clean Air Act Amendments of 1990, which amended the Federal Clean Air Act of 1977, required that the US Environmental Protection Agency develop a national Air Operating Permit Program, which in turn would require each state to develop an Air Operating Permit Program to identify all sources of ''regulated'' pollutants. Regulated pollutants include ''criteria'' pollutants (oxides of nitrogen, sulfur oxides, total suspended particulates, carbon monoxide, particulate matter greater than 10 micron, lead) plus 189 other ''Hazardous'' Air Pollutants. The Hanford Site, owned by the US Government and operated by the US Department of Energy, Richland Operations Office, is located in southcentral Washington State and covers 560 square miles of semi-arid shrub and grasslands located just north of the confluence of the Snake and Yakima Rivers with the Columbia River. This land, with restricted public access, provides a buffer for the smaller areas historically used for the production of nuclear materials, waste storage, and waste disposal. About 6 percent of the land area has been disturbed and is actively used. The Hanford Site Air Operating Permit Application consists of more than 1,100 sources and in excess of 300 emission points. Before January 1995, the maintenance and operations contractor and the environmental restoration contractor for the US Department of Energy completed an air emission inventory on the Hanford Site. The inventory has been entered into a database so that the sources and emission points can be tracked and updated information readily can be retrieved. The Hanford Site Air Operating Permit Application contains information current as of April 19, 1995

  7. 76 FR 39357 - Revisions to the California State Implementation Plan, Imperial County Air Pollution Control...

    Science.gov (United States)

    2011-07-06

    ...EPA is proposing to approve revisions to the Imperial County Air Pollution Control District (ICAPCD), Kern County Air Pollution Control District (KCAPCD), and Ventura County Air Pollution Control District (VCAPCD) portions of the California State Implementation Plan (SIP). These revisions concern volatile organic compound (VOC) emissions from architectural coating operations. We are proposing to approve local rules to regulate these emission sources under the Clean Air Act as amended in 1990 (CAA or the Act).

  8. Air Carrier Traffic Statistics.

    Science.gov (United States)

    2013-11-01

    This report contains airline operating statistics for large certificated air carriers based on data reported to U.S. Department of Transportation (DOT) by carriers that hold a certificate issued under Section 401 of the Federal Aviation Act of 1958 a...

  9. Air Carrier Traffic Statistics.

    Science.gov (United States)

    2012-07-01

    This report contains airline operating statistics for large certificated air carriers based on data reported to U.S. Department of Transportation (DOT) by carriers that hold a certificate issued under Section 401 of the Federal Aviation Act of 1958 a...

  10. 77 FR 26475 - Revisions to the California State Implementation Plan, Antelope Valley Air Quality Management...

    Science.gov (United States)

    2012-05-04

    ...EPA is proposing to approve revisions to the Antelope Valley Air Quality Management District (AVAQMD), Eastern Kern Air Pollution Control District (EKAPCD), and Santa Barbara County Air Pollution Control District (SBCAPCD) portions of the California State Implementation Plan (SIP). We are proposing to approve revisions to local rules that define terms used in other air pollution regulations in these areas and a rule rescission that address Petroleum Coke Calcining Operations--Oxides of Sulfur, under the Clean Air Act as amended in 1990 (CAA or the Act).

  11. 76 FR 5319 - Revisions to the California State Implementation Plan, Santa Barbara Air Pollution Control...

    Science.gov (United States)

    2011-01-31

    ...EPA is proposing to approve revisions to the Santa Barbara Air Pollution Control District (SBAPCD), Placer County Air Pollution Control District (PCAPCD), Antelope Valley Air Quality Management District (AVAQMD), and Ventura County Air Pollution Control District (VCAPCD) portion of the California State Implementation Plan (SIP). These revisions concern volatile organic compound (VOC) emissions from gasoline bulk plants, terminals and vehicle dispensing facilities. We are proposing to approve local rules to regulate these emission sources under the Clean Air Act as amended in 1990 (CAA or the Act).

  12. 75 FR 22569 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2010-04-29

    ... DEPARTMENT OF DEFENSE Department of the Air Force [Docket ID: USAF-2010-0014] Privacy Act of 1974... inventory of record systems subject to the Privacy Act of 1974, (5 U.S.C. 552a), as amended. DATES: This... Internet at http://www.regulations.gov as they are received without change, including any personal...

  13. 76 FR 37329 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2011-06-27

    ... DEPARTMENT OF DEFENSE Department of the Air Force [Docket ID: USAF-2011-0018] Privacy Act of 1974... of record systems subject to the Privacy Act of 1974 (5 U.S.C. 552a), as amended. DATES: This... public is to make these submissions available for public viewing on the Internet at http://www...

  14. Restoration projects for decontamination of facilities from chemical, biological and radiological contamination after terrorist actions

    Energy Technology Data Exchange (ETDEWEB)

    Fingas, M.; Volchek, K.; Lumley, T.; Thouin, G.; Harrison, S.; Kuang, W. [Environment Canada, Ottawa, ON (Canada). Emergencies Science and Technology Division, Environmental Technology Centre, Science and Technology Branch; Payette, P.; Laframboise, D.; Best, M. [Public Health Agency of Canada, Ottawa, ON (Canada); Krishnan, J.; Wagener, S.; Bernard, K.; Majcher, M. [Public Health Agency of Canada, Winnipeg, MB (Canada); Cousins, T.; Jones, T. [Defence Research and Development Canada, Ottawa, ON (Canada); Velicogna, D.; Hornof, M.; Punt, M. [SAIC Canada, Ottawa, ON (Canada)

    2006-07-01

    This paper reviewed studies that identified better decontamination methods for chemical, biological and radiological/nuclear (CBRN) attacks. In particular, it reviewed aspects of 3 projects in which procedures were tested and validated for site restoration. Cleanup targets or standards for decontaminating buildings and materials after a CBRN attack were also developed. The projects were based on physicochemical and toxicological knowledge of potential terrorist agents and selected surface matrices. The projects also involved modeling and assessing environmental and health risks. The first multi-agent project involved gathering information on known procedures for restoration of areas including interiors and exteriors of buildings, contents, parking lots, lawn, and vehicles. Air inside the building was included. The efficacy of some of the proposed concepts was tested. Results included the determination of appropriate surrogates for anthrax and tests of liquid and gaseous biocides on the surrogates. The development of new contamination procedures using peroxyacetic acid were also discussed. The second project involved decontamination tests on CBRN using specially-constructed buildings at the Counter-terrorism Technology Centre at Defence Research and Development Canada in Suffield. The buildings will be contaminated with chemical and biological agents and with short-lived radionuclides. They will be decontaminated using the best-performing technologies known. Information collected will include fate of the contaminant and decontamination products, effectiveness of the restoration methods, cost and duration of cleanup and logistical problems. The third project is aimed at developing cleanup standards for decontaminating buildings and construction materials after a chemical or biological attack. It will create as many as 12 algorithms for the development of 50 standards which will help cleanup personnel and first-responders to gauge whether proposed methods can achieve

  15. Antiterrorism Personal Protection Guide: A Self-Help Guide to Antiterrorism

    National Research Council Canada - National Science Library

    2002-01-01

    .... Terrorism is an indiscriminate act that strikes in varying forms of threats and violence. Terrorists generate fear through intimidation, coercion, and acts of violence such as hijackings, bombings, or kidnappings...

  16. Long-Term Memory for the Terrorist Attack of September 11: Flashbulb Memories, Event Memories, and the Factors that Influence Their Retention

    Science.gov (United States)

    Hirst, William; Phelps, Elizabeth A.; Buckner, Randy L.; Budson, Andrew E.; Cuc, Alexandru; Gabrieli, John D. E.; Johnson, Marcia K.; Lustig, Cindy; Lyle, Keith B.; Mather, Mara; Meksin, Robert; Mitchell, Karen J.; Ochsner, Kevin N.; Schacter, Daniel L.; Simons, Jon S.; Vaidya, Chandan J.

    2009-01-01

    More than 3,000 individuals from 7 U.S. cities reported on their memories of learning of the terrorist attacks of September 11, as well as details about the attack, 1 week, 11 months, and/or 35 months after the assault. Some studies of flashbulb memories examining long-term retention show slowing in the rate of forgetting after a year, whereas…

  17. 75 FR 22570 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2010-04-29

    ... DEPARTMENT OF DEFENSE Department of the Air Force [Docket ID: USAF-2010-0012] Privacy Act of 1974... inventory of record systems subject to the Privacy Act of 1974, (5 U.S.C. 552a), as amended. DATES: This... on the Internet at http://www.regulations.gov as they are received without change, including any...

  18. 76 FR 1411 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2011-01-10

    ... DEPARTMENT OF DEFENSE Department of the Air Force [Docket ID: USAF-2011-0001] Privacy Act of 1974... of record systems subject to the Privacy Act of 1974, (5 U.S.C. 552a), as amended. DATES: This... the public is to make these submissions available for public viewing on the Internet at http://www...

  19. 75 FR 63824 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2010-10-18

    ... DEPARTMENT OF DEFENSE Department of the Air Force [Docket ID: USAF-2010-0026] Privacy Act of 1974... inventory of record systems subject to the Privacy Act of 1974, (5 U.S.C. 552a), as amended. DATES: This... for public viewing on the Internet at http://www.regulations.gov as they are received without change...

  20. Air quality conformity appendix.

    Science.gov (United States)

    2011-05-01

    Under the 1990 Clean Air Act Amendments (CAAA), because of the 8-hour ozone standard, Franklin, Delaware, Licking, Madison, Fairfield and Knox counties were designated as a basic nonattainment area for ozone in 2004. As a result of the PM 2.5 standar...

  1. 76 FR 39303 - Revisions to the California State Implementation Plan, Imperial County Air Pollution Control...

    Science.gov (United States)

    2011-07-06

    ...EPA is taking direct final action to approve revisions to the Imperial County Air Pollution Control District (ICAPCD), Kern County Air Pollution Control District (KCAPCD), and Ventura County Air Pollution Control District (VCAPCD) portions of the California State Implementation Plan (SIP). These revisions concern volatile organic compound (VOC) emissions from architectural coating operations. We are approving local rules that regulate these emission sources under the Clean Air Act as amended in 1990 (CAA or the Act).

  2. 77 FR 26448 - Revisions to the California State Implementation Plan, Antelope Valley Air Quality Management...

    Science.gov (United States)

    2012-05-04

    ...EPA is taking direct final action to approve revisions to the Antelope Valley Air Quality Management District (AVAQMD), Eastern Kern Air Pollution Control District (EKAPCD), and Santa Barbara County Air Pollution Control District (SBCAPCD) portions of the California State Implementation Plan (SIP). Under authority of the Clean Air Act as amended in 1990 (CAA or the Act), we are approving local rules that define terms used in other air pollution regulation in these areas and approving a rule rescission that addresses Petroleum Coke Calcining Operations--Oxides of Sulfur.

  3. 75 FR 24406 - Revisions to the California State Implementation Plan, Placer County Air Pollution Control...

    Science.gov (United States)

    2010-05-05

    ...EPA is taking direct final action to approve revisions to the Placer County Air Pollution Control District (PCAPCD), Sacramento Metropolitan Air Quality Management District (SMAQMD), San Joaquin Valley Unified Air Pollution Control District (SJVUAPCD), and South Coast Air Quality Management District (SCAQMD) portions of the California State Implementation Plan (SIP). These revisions concern volatile organic compound (VOC) emissions from petroleum facilities, chemical plants, and facilities which use organic solvents. We are approving local rules that regulate these emission sources under the Clean Air Act as amended in 1990 (CAA or the Act).

  4. 76 FR 5277 - Revisions to the California State Implementation Plan, Santa Barbara Air Pollution Control...

    Science.gov (United States)

    2011-01-31

    ...EPA is taking direct final action to approve revisions to the Santa Barbara Air Pollution Control District (SBAPCD), Antelope Valley Air Quality Management District (AVAQMD), Ventura County Air Pollution Control District (VCAPCD) and Placer County Air Pollution Control District (PCAPCD) portion of the California State Implementation Plan (SIP). These revisions concern volatile organic compound (VOC) emissions from gasoline bulk plants, terminals and vehicle dispensing facilities. We are approving local rules that regulate these emission sources under the Clean Air Act as amended in 1990 (CAA or the Act).

  5. 75 FR 24544 - Revisions to the California State Implementation Plan, Placer County Air Pollution Control...

    Science.gov (United States)

    2010-05-05

    ...EPA is proposing to approve revisions to the Placer County Air Pollution Control District (PCAPCD), Sacramento Metropolitan Air Quality Management District (SMAQMD), San Joaquin Valley Unified Air Pollution Control District (SJVUAPCD), and South Coast Air Quality Management District (SCAQMD) portions of the California State Implementation Plan (SIP). These revisions concern volatile organic compound (VOC) emissions from petroleum facilities, chemical plants, and facilities which use organic solvents. We are proposing to approve local rules to regulate these emission sources under the Clean Air Act as amended in 1990 (CAA or the Act).

  6. 75 FR 37794 - Science Advisory Board Staff Office; Notification of a Public Teleconference of the Air Quality...

    Science.gov (United States)

    2010-06-30

    ... the Second Section 812 Prospective Benefit-Cost Study of the Clean Air Act. DATES: The AQMS will... particulate matter (PM 2.5 ) emissions and air quality changes for the Second Section 812 Benefit-Cost... Clean Air Act Amendments (CAAA), EPA conducts periodic studies to assess benefits and costs of programs...

  7. 75 FR 9410 - Science Advisory Board Staff Office Notification of a Public Teleconference of the Air Quality...

    Science.gov (United States)

    2010-03-02

    ... advisory report on EPA's air quality modeling work for the Second Section 812 Prospective Benefit-Cost... Section 812 Benefit-Cost Analysis of the Clean Air Act. The Council was established in 1991 pursuant to... assess benefits and costs of the EPA's regulatory actions under the Clean Air Act. The Council has...

  8. The effects of Title IV of the Clean Air Act amendments of 1990 on electric utilities: An update

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1997-03-01

    This report presents data and analyses related to Phase I implementation of the Clean Air Act Amendment by electric utilities. It describes the strategies used to comply with the Acid Rain Program in 1995, the effect of compliance on sulfur dioxide emissions levels, the cost of compliance, and the effects of the program on coal supply and demand. The first year of Phase I demonstrated that the market-based sulfur dioxide emissions control system could achieve significant reductions in emissions at lower than expected costs. Some utilities reduced aggregate emissions below legal requirements due to economic incentives; other utilities purchased additional allowances to avoid noncompliance. More than half of the utilities switched to or blended with lower sulfur coal, due to price reductions in the coal market which were partially due to the allowance trading program. 21 figs., 20 tabs.

  9. Sulfur dioxide emissions and market effects under the Clean Air Act Acid Rain Program

    International Nuclear Information System (INIS)

    Zipper, C.E.; Gilroy, L.

    1998-01-01

    The Clean Air Act Amendments of 1990 (CAAA90) established a national program to control sulfur dioxide (SO 2 ) emissions from electricity generation. CAAA90's market-based approach includes trading and banking of SO 2 -emissions allowances. The paper presents an analysis of data describing electric utility SO 2 emissions in 1995, the first year of the program's Phase I, and market effects over the 1990-95 period. Fuel switching and flue-gas desulfurization were the dominant means used in 1995 by targeted generators to reduce emissions to 51% of 1990 levels. Flue-gas desulfurization costs, emissions allowance prices, low-sulfur coal prices, and average sulfur contents of coals shipped to electric utilities declined over the 1990-95 period. Projections indicate that 13-15 million allowances will have been banked during the programs' Phase I, which ends in 1999, a quantity expected to last through the first decade of the program's stricter Phase II controls. In 1995, both allowance prices and SO 2 emissions were below pre-CAAA90 expectations. The reduction of SO 2 emissions beyond pre-CAAA90 expectations, combined with lower-than-expected allowance prices and declining compliance costs, can be viewed as a success for market-based environmental controls. 21 refs., 6 figs., 3 tabs

  10. 78 FR 21581 - Revisions to the California State Implementation Plan, Antelope Valley Air Quality Management...

    Science.gov (United States)

    2013-04-11

    ...EPA is proposing to approve revisions to the Antelope Valley Air Quality Management District (AVAQMD), Monterey Bay Unified Air Pollution Control District (MBUAPCD) and Santa Barbara County Air Pollution Control District (SCAPCD) portions of the California State Implementation Plan (SIP). We are proposing to approve revisions local rules that address emission statements for AVAQMD, rule rescissions that address public records for MBUAPCD, and define terms for SBCAPCD, under the Clean Air Act as amended in 1990 (CAA or the Act).

  11. Improving and monitoring air quality.

    Science.gov (United States)

    DuPont, André

    2018-05-01

    Since the authorization of the Clean Air Act Amendments of 1990, the air quality in the USA has significantly improved because of strong public support. The lessons learned over the last 25 years are being shared with the policy analysts, technical professionals, and scientist who endeavor to improve air quality in their communities. This paper will review how the USA has achieved the "high" standard of air quality that was envisioned in the early 1990s. This document will describe SO 2 gas emission reduction technology and highlight operation of emission monitoring technology. This paper describes the basic process operation of an air pollution control scrubber. A technical review of measures required to operate and maintain a large-scale pollution control system will be described. Also, the author explains how quality assurance procedures in performance of continuous emission monitoring plays a significant role in reducing air pollution.

  12. Two-phase cross-flow-induced forces acting on a circular cylinder

    International Nuclear Information System (INIS)

    Hara, F.

    1982-01-01

    This paper clarifies the characteristics of unsteady flow-induced lift and drag forces acting on a circular cylinder immersed perpendicular to a two-phase bubbly air-water flow, in conjunction with Karman vortex shedding and pressure fluctuations. Experimental results presented show that Karman vortex shedding disappears over a certain value of air concentration in the two-phase flow. Related to this disappearance, flow-induced forces are rather small and periodical in low air concentration but become very large and random in higher air concentration. 7 refs

  13. Foreign (Terrorist Fighter Estimates: Conceptual and Data Issues

    Directory of Open Access Journals (Sweden)

    Alex P. Schmid

    2015-10-01

    Full Text Available This Policy Brief – a short version of a larger Research Paper to be released by ICCT in late 2015 – focuses on the phenomenon of foreign (terrorist fighters (FTFs as it relates to Syria and Iraq. It concentrates on recruits to jihad and the astonishing growth in numbers from less than 1,000 in 2011 to more than 3,500 in 2012, 8,500+ in 2013, 18,000+ in 2014 to more than 25,000 by fall 2015. By October 2015, nearly 30,000 militants from more than 100 countries had become foreign fighters with the so-called “Islamic State” (IS in Syria and Iraq and other militant groups. This Policy Brief first discusses various definitions of FTFs by disaggregating the “foreign”, “terrorist” and “fighters” elements of FTFs of the UN Security Council definition in resolution 2178 (2014. Subsequently, an attempt is made to bring some structure and order to the widely diverging estimates of the numbers of foreign fighters and their origins, with tables presenting the best available estimates for different sides of the conflict at different moments in time since 2011. UN estimates on foreign fighters are juxtaposed with estimates from other sources. The biggest uncertainty is the ratio of foreign fighters to IS own core manpower. It is likely that at least 40 percent of the fighters of IS are foreigners and many more if Iraqis in Syria are counted as such.

  14. ICIS-Air Download Summary and Data Element Dictionary ...

    Science.gov (United States)

    ECHO, Enforcement and Compliance History Online, provides compliance and enforcement information for approximately 800,000 EPA-regulated facilities nationwide. ECHO includes permit, inspection, violation, enforcement action, and penalty information about facilities regulated under the Clean Air Act (CAA) Stationary Source Program, Clean Water Act (CWA) National Pollutant Elimination Discharge System (NPDES), and/or Resource Conservation and Recovery Act (RCRA). Information also is provided on surrounding demographics when available.

  15. A Long-Life Lithium-Air Battery in Ambient Air with a Polymer Electrolyte Containing a Redox Mediator.

    Science.gov (United States)

    Guo, Ziyang; Li, Chao; Liu, Jingyuan; Wang, Yonggang; Xia, Yongyao

    2017-06-19

    Lithium-air batteries when operated in ambient air generally exhibit poor reversibility and cyclability, because of the Li passivation and Li 2 O 2 /LiOH/Li 2 CO 3 accumulation in the air electrode. Herein, we present a Li-air battery supported by a polymer electrolyte containing 0.05 m LiI, in which the polymer electrolyte efficiently alleviates the Li passivation induced by attacking air. Furthermore, it is demonstrated that I - /I 2 conversion in polymer electrolyte acts as a redox mediator that facilitates electrochemical decomposition of the discharge products during recharge process. As a result, the Li-air battery can be stably cycled 400 times in ambient air (relative humidity of 15 %), which is much better than previous reports. The achievement offers a hope to develop the Li-air battery that can be operated in ambient air. © 2017 Wiley-VCH Verlag GmbH & Co. KGaA, Weinheim.

  16. 76 FR 60376 - Revisions to the California State Implementation Plan, Santa Barbara Air Pollution Control...

    Science.gov (United States)

    2011-09-29

    ...EPA is taking direct final action to approve revisions to the Santa Barbara Air Pollution Control District (SBAPCD), Sacramento Municipal Air Quality Management District (SMAQMD) and South Coast Air Quality Management District (SCAQMD) portions of the California State Implementation Plan (SIP). These revisions concern volatile organic compound (VOC) emissions from solvent cleaning machines and solvent cleaning operations and oil and gas production wells. We are approving local rules that regulate these emission sources under the Clean Air Act as amended in 1990 (CAA or the Act).

  17. 76 FR 60405 - Revisions to the California State Implementation Plan, Santa Barbara Air Pollution Control...

    Science.gov (United States)

    2011-09-29

    ...EPA is proposing to approve revisions to the Santa Barbara Air Pollution Control District (SBAPCD), Sacramento Municipal Air Quality Management District (SMAQMD) and South Coast Air Quality Management District (SCAQMD) portions of the California State Implementation Plan (SIP). These revisions concern volatile organic compound (VOC) emissions from solvent cleaning machines and solvent cleaning operations and oil and gas production wells. We are proposing to approve local rules to regulate these emission sources under the Clean Air Act as amended in 1990 (CAA or the Act).

  18. 28 CFR 0.72 - National Security Division.

    Science.gov (United States)

    2010-07-01

    .... 1203); terrorist acts abroad, including murder, against United States nationals (18 U.S.C. 2332); acts... to murder, kidnap, or maim persons or to damage property overseas (18 U.S.C. 956); providing material...

  19. Developing Health-Based Pre-Planning Clearance Goals for Airport Remediation Following Chemical Terrorist Attack: Introduction and Key Assessment Considerations

    Science.gov (United States)

    Watson, Annetta; Hall, Linda; Raber, Ellen; Hauschild, Veronique D.; Dolislager, Fredrick; Love, Adam H.; Hanna, M. Leslie

    2011-01-01

    In the event of a chemical terrorist attack on a transportation hub, post-event remediation and restoration activities necessary to attain unrestricted facility reuse and re-entry could require hours to multiple days. While restoration timeframes are dependent on numerous variables, a primary controlling factor is the level of pre-planning and decision-making completed prior to chemical terrorist release. What follows is the first of a two-part analysis identifying key considerations, critical information, and decision criteria to facilitate post-attack and post-decontamination consequence management activities. A conceptual site model and human health-based exposure guidelines are developed and reported as an aid to site-specific pre-planning in the current absence of U.S. state or Federal values designated as compound-specific remediation or re-entry concentrations, and to safely expedite facility recovery to full operational status. Chemicals of concern include chemical warfare nerve and vesicant agents and the toxic industrial compounds phosgene, hydrogen cyanide, and cyanogen chloride. This work has been performed as a national case study conducted in partnership with the Los Angeles International Airport and The Bradley International Terminal. All recommended guidelines have been selected for consistency with airport scenario release parameters of a one-time, short-duration, finite airborne release from a single source followed by compound-specific decontamination. PMID:21390292

  20. Developing Health-Based Pre-Planning Clearance Goals for Airport Remediation Following Chemical Terrorist Attack: Introduction and Key Assessment Considerations.

    Science.gov (United States)

    Watson, Annetta; Hall, Linda; Raber, Ellen; Hauschild, Veronique D; Dolislager, Fredrick; Love, Adam H; Hanna, M Leslie

    2011-02-13

    In the event of a chemical terrorist attack on a transportation hub, post-event remediation and restoration activities necessary to attain unrestricted facility reuse and re-entry could require hours to multiple days. While restoration timeframes are dependent on numerous variables, a primary controlling factor is the level of pre-planning and decision-making completed prior to chemical terrorist release. What follows is the first of a two-part analysis identifying key considerations, critical information, and decision criteria to facilitate post-attack and post-decontamination consequence management activities. A conceptual site model and human health-based exposure guidelines are developed and reported as an aid to site-specific pre-planning in the current absence of U.S. state or Federal values designated as compound-specific remediation or re-entry concentrations, and to safely expedite facility recovery to full operational status. Chemicals of concern include chemical warfare nerve and vesicant agents and the toxic industrial compounds phosgene, hydrogen cyanide, and cyanogen chloride. This work has been performed as a national case study conducted in partnership with the Los Angeles International Airport and The Bradley International Terminal. All recommended guidelines have been selected for consistency with airport scenario release parameters of a one-time, short-duration, finite airborne release from a single source followed by compound-specific decontamination.