Sample records for biological weapons threat

  1. The bioscience revolution & the biological weapons threat: levers & interventions

    Directory of Open Access Journals (Sweden)

    Martin Greg


    Full Text Available Abstract In December 2008, the US Commission on the Prevention of Weapons of Mass Destruction Proliferation and Terrorism, released a report, World At Risk. The Report points to the fact that, not only is the use of a weapon of mass destruction in a terrorist attack before the end of 2013, more likely than not, but also to the fact that terrorists are more likely to be able to obtain and use biological weapons than nuclear. This paper examines the recommendations of the report in the context of the historic and geopolitical changes, in particular globalization. The authors highlight the "dual-use" dilemma, as described in the report, as the paradoxical use of technology developed for the benefit of mankind being used for sinister purposes. The mitigation of such a threat lies in broad stakeholder involvement and cooperation, including non-state actors, governments and the bio-tech industry itself. The importance of vigilance measures within the life science community is emphasized and, the authors propose, could include a web-based didactic course in bioterrorism and weapons of mass destruction identification. The site could outline safety protocols, have detailed disaster management tutorials, and could be specifically tailored for different subsets of industry and health professionals. The paper concludes with an endorsement of a multi-pronged approach including strong international guidelines and intelligence cooperation and preparatory measures such as the wide-spread use of detection systems as well as diagnostic decision support systems for bioterrorism detection at the local level.

  2. [Biological weapons]. (United States)

    Kerwat, K; Becker, S; Wulf, H; Densow, D


    Biological weapons are weapons of mass destruction that use pathogens (bacteria, viruses) or the toxins produced by them to target living organisms or to contaminate non-living substances. In the past, biological warfare has been repeatedly used. Anthrax, plague and smallpox are regarded as the most dangerous biological weapons by various institutions. Nowadays it seems quite unlikely that biological warfare will be employed in any military campaigns. However, the possibility remains that biological weapons may be used in acts of bioterrorism. In addition all diseases caused by biological weapons may also occur naturally or as a result of a laboratory accident. Risk assessment with regard to biological danger often proves to be difficult. In this context, an early identification of a potentially dangerous situation through experts is essential to limit the degree of damage.

  3. Historical precedence and technical requirements of biological weapons use : a threat assessment.

    Energy Technology Data Exchange (ETDEWEB)

    Estes, Daniel P.; Vogel, Kathleen Margaret; Gaudioso, Jennifer Marie; Hickok, Lauren T.; Jung, Danielle F.; Barnett, Natalie Beth; Frerichs, Rebecca L.; Salerno, Reynolds Mathewson


    The threat from biological weapons is assessed through both a comparative historical analysis of the patterns of biological weapons use and an assessment of the technological hurdles to proliferation and use that must be overcome. The history of biological weapons is studied to learn how agents have been acquired and what types of states and substate actors have used agents. Substate actors have generally been more willing than states to use pathogens and toxins and they have focused on those agents that are more readily available. There has been an increasing trend of bioterrorism incidents over the past century, but states and substate actors have struggled with one or more of the necessary technological steps. These steps include acquisition of a suitable agent, production of an appropriate quantity and form, and effective deployment. The technological hurdles associated with the steps present a real barrier to producing a high consequence event. However, the ever increasing technological sophistication of society continually lowers the barriers, resulting in a low but increasing probability of a high consequence bioterrorism event.

  4. Childhood maltreatment and threats with weapons. (United States)

    Casiano, Hygiea; Mota, Natalie; Afifi, Tracie O; Enns, Murray W; Sareen, Jitender


    The relationship between childhood maltreatment and future threats with weapons is unknown. We examined data from the nationally representative National Comorbidity Survey Replication (n = 5692) and conducted multiple logistic regression analyses to determine the association between childhood maltreatment and lifetime behavior of threatening others with a gun or other weapon. After adjusting for sociodemographic variables, physical abuse, sexual abuse, and witnessing domestic violence were significantly associated with threats made with a gun (adjusted odds ratios [AOR] ranging between 3.38 and 4.07) and other weapons (AOR ranging between 2.16 and 2.83). The greater the number of types of maltreatment experienced, the stronger the association with lifetime threats made to others with guns and any weapons. Over 94% of respondents who experienced maltreatment and made threats reported that the maltreatment occurred prior to threatening others with weapons. Prevention efforts that reduce exposure to maltreatment may reduce violent behavior in later life.

  5. [New challenges in the biological weapons convention]. (United States)

    Sissonen, Susanna; Raijas, Tiina; Haikala, Olli; Hietala, Heikki; Virri, Markku; Nikkari, Simo


    Microbes and their toxins are biological weapons that can cause disease in humans, animals or plants, and which can be used with hostile intent in warfare and terrorism. Biological agents can be used as weapons of mass destruction and therefore, immense human and social and major economical damage can be caused. Rapid development of life sciences and technologies during the recent decades has posed new challenges to the Biological Weapons Convention. The Convention states that the States Parties to the BWC strive to ensure that the Convention remains relevant and effective, despite changes in science, technology or politics.

  6. Reassessing biological threats: Implications for cooperative mitigation strategies

    Directory of Open Access Journals (Sweden)

    Catharine Grace Young


    Full Text Available Multiple factors ranging from globalization to ecosystem disruption are presenting the global community with evolving biological threats to local, national, and global security that reach beyond the realm of traditional bioweapons threats. As a result, mitigation strategies have adapted necessarily to the increased diversity of biological threats. In general, response and preparedness strategies have largely shifted from being primarily reactive to traditional biological weapons to more proactive in nature. In this review, we briefly explore biological threats through a wider aperture, to embrace a deeper appreciation of viral pathogens, antimicrobial resistance, and agricultural pathogens, and their potential to cause civil, economic, and political devastation. In addition we discuss current mitigation strategies codified by the Global Health Security Agenda and the One Health paradigm, as well as some of the available tools to assist with their sustainable implementation.

  7. Characterization and Detection of Biological Weapons with Atomic Force Microscopy

    Energy Technology Data Exchange (ETDEWEB)

    Malkin, A J; Plomp, M; Leighton, T J; McPherson, A


    Critical gaps exist in our capabilities to rapidly characterize threat agents which could be used in attacks on facilities and military forces. DNA-based PCR and immunoassay-based techniques provide unique identification of species, strains and protein signatures of pathogens. However, differentiation between naturally occurring and weaponized bioagents and the identification of formulation signatures are beyond current technologies. One of the most effective and often the only definitive means to identify a threat agent is by its direct visualization. Atomic force microscopy (AFM) is a rapid imaging technique that covers the size range of most biothreat agents (several nanometers to tens of microns), is capable of resolving pathogen morphology and structure, and could be developed into a portable device for biological weapons (BW) field characterization. AFM can detect pathogens in aerosol, liquid, surface and soil samples while concomitantly acquiring their weaponization and threat agent digital signatures. BW morphological and structural signatures, including modifications to pathogen microstructural architecture and topology that occur during formulation and weaponization, provide the means for their differentiation from crude or purified unformulated agent, processing signatures, as well as assessment of their potential for dispersion, inhalation and environmental persistence. AFM visualization of pathogen morphology and architecture often provides valuable digital signatures and allows direct detection and identification of threat agents. We have demonstrated that pathogens, spanning the size range from several nanometers for small agricultural satellite viruses to almost half micron for pox viruses, and to several microns for bacteria and bacterial spores, can be visualized by AFM under physiological conditions to a resolution of {approx}20-30 {angstrom}. We have also demonstrated that viruses from closely related families could be differentiated by AFM on

  8. Detecting Chemical Weapons: Threats, Requirements, Solutions, and Future Challenges (United States)

    Boso, Brian


    Although chemicals have been reportedly used as weapons for thousands of years, it was not until 1915 at Ypres, France that an industrial chemical, chlorine, was used in World War I as an offensive weapon in significant quantity, causing mass casualties. From that point until today the development, detection, production and protection from chemical weapons has be an organized endeavor of many of the world's armed forces and in more recent times, non-governmental terrorist organizations. The number of Chemical Warfare Agents (CWAs) has steadily increased as research into more toxic substances continued for most of the 20 th century. Today there are over 70 substances including harassing agents like tear gas, incapacitating agents, and lethal agents like blister, blood, chocking, and nerve agents. The requirements for detecting chemical weapons vary depending on the context in which they are encountered and the concept of operation of the organization deploying the detection equipment. The US DoD, for example, has as a requirement, that US forces be able to continue their mission, even in the event of a chemical attack. This places stringent requirements on detection equipment. It must be lightweight (<2 lbs), detect a large array of chemical warfare agents and toxic industrial chemicals, detect and warn at concentration levels and time duration to prevent acute health effects, meet military ruggedness specifications and work over a wide range of temperature and humidity, and have a very high probability of detection with a similarly low probability of false positives. The current technology of choice to meet these stringent requirements is Ion Mobility Spectrometry. Many technologies are capable of detecting chemicals at the trace levels required and have been extensively developed for this application, including, but not limited to: mass spectroscopy, IR spectroscopy, RAMAN spectroscopy, MEMs micro-cantilever sensors, surface acoustic wave sensors, differential

  9. Biological Weapons -- Still a Relevant Threat (United States)


    sunlight can weaken the effects and persistency of the chemical agents. 9 Winds can also send the agent in the wrong direction or even back onto the...and those in the area fell unconscious and were crushed to death. Then they were blown up in the air and hurled back to the ground. The roaring...include fever, coughing, headache, muscle or joint pain , sore throat, chills, fatigue, and running nose. These are not only symptoms from a potential

  10. Assessing the Biological Weapons and Bioterrorism Threat (United States)


    unsuccessful. 66. Brad Roberts, “The Outpacing of Negotiations by Circumstance,” in K. M. Jensen and David Wurmser, eds., Is It Feasible to...Controlling Dangerous Pathogens,” gens%20project%20monograph_092203.pdf. 231. Personal communication, 2005. 232. Liz

  11. [Botulinum toxin as a biological weapon]. (United States)

    Rossow, Heidi; Kinnunen, Paula M; Nikkari, Simo


    Botulism is caused by botulinum neurotoxin produced by the bacterium Clostridium botulinum. It is a flaccid paralysis in which consciousness and nociception are preserved. Natural botulism typically results from ingestion of inadequately heated or unheated vacuum-packed foods. In addition, botulinum toxin is one of the most feared biological weapons. In the diagnosis and treatment of botulism early suspicion is essential. Several coinciding or local clusters without a typical connecting source, or an uncommon type of toxin may indicate an intentionally caused epidemic.

  12. Advances in Neuroscience and the Biological and Toxin Weapons Convention

    Directory of Open Access Journals (Sweden)

    Malcolm Dando


    Full Text Available This paper investigates the potential threat to the prohibition of the hostile misuse of the life sciences embodied in the Biological and Toxin Weapons Convention from the rapid advances in the field of neuroscience. The paper describes how the implications of advances in science and technology are considered at the Five Year Review Conferences of the Convention and how State Parties have developed their appreciations since the First Review Conference in 1980. The ongoing advances in neurosciences are then assessed and their implications for the Convention examined. It is concluded that State Parties should consider a much more regular and systematic review system for such relevant advances in science and technology when they meet at the Seventh Review Conference in late 2011, and that neuroscientists should be much more informed and engaged in these processes of protecting their work from malign misuse.

  13. Advances in neuroscience and the biological and toxin weapons convention. (United States)

    Dando, Malcolm


    This paper investigates the potential threat to the prohibition of the hostile misuse of the life sciences embodied in the Biological and Toxin Weapons Convention from the rapid advances in the field of neuroscience. The paper describes how the implications of advances in science and technology are considered at the Five Year Review Conferences of the Convention and how State Parties have developed their appreciations since the First Review Conference in 1980. The ongoing advances in neurosciences are then assessed and their implications for the Convention examined. It is concluded that State Parties should consider a much more regular and systematic review system for such relevant advances in science and technology when they meet at the Seventh Review Conference in late 2011, and that neuroscientists should be much more informed and engaged in these processes of protecting their work from malign misuse.

  14. Monoclonal Antibodies to Prevent Use of Mycotoxins as Biological Weapons (United States)


    Mycotoxins as Biological Weapons PRINCIPAL INVESTIGATOR: Marta Feldmesser, M.D. CONTRACTING ORGANIZATION: Albert Einstein College of...Monoclonal Antibodies to Prevent Use of Mycotoxins as Biological Weapons 5b. GRANT NUMBER W81XWH-06-1-0085 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR

  15. China's ASAT Weapon: Capabilities and the Potential Threat (United States)

    Forden, Geoffrey


    Much has been said about China's 11 January 2007 test of an anti-satellite (ASAT) weapon but few analysts have based their comments on a scientific determination of the weapons capabilities. This paper presents such an analysis derived from the observed pattern of debris, as observed by NORAD and posted on-line by NASA. It is clear that this was a direct hit-to-kill weapon (as opposed to a fragmentation-type explosive warhead), it massed about 600 kg, and was capable of accelerations of at least 6 Gs. It can be inferred with a reasonable degree of confidence that it used an on-board optical tracker, most likely operating in visible light. Furthermore, since the closing speed between the target satellite and the interceptor was 8 km/s during the test, this weapon could be used to attack satellites at higher altitude orbits, such as NAVSTAR/GPS and geostationary satellites that include communications and early warning satellites. This test produced ten times as many pieces of debris as an earlier US hit-to-kill ASAT test which, because of their higher altitudes, will last thousands of years---hundreds of times longer than the debris in the US test. China's test increased the chances of some low earth orbit satellite being hit by a piece of debris by 50%, from about 12% to 18% each year. Given this weapon's capabilities, it is possible to ``war game'' what an all-out Chinese ASAT attack would look like and what responses the US could take. (It is important to emphasize that this is a capabilities-based exercise and not based on Chinese intentions.) If China did launch such an attack, it could eliminate a large fraction of US military satellites in low earth orbit including photo-reconnaissance and electronic intelligence satellites, but not all of them, in the first 24 hours; the requirement that the target satellites be illuminated by the sun limits the attack. Furthermore, the US could maneuver its LEO satellites in the first hours of the attack and greatly

  16. Threat is in the sex of the beholder: men find weapons faster than do women. (United States)

    Sulikowski, Danielle; Burke, Darren


    In visual displays, people locate potentially threatening stimuli, such as snakes, spiders, and weapons, more quickly than similar benign stimuli, such as beetles and gadgets. Such biases are likely adaptive, facilitating fast responses to potential threats. Currently, and historically, men have engaged in more weapons-related activities (fighting and hunting) than women. If biases of visual attention for weapons result from selection pressures related to these activities, then we would predict such biases to be stronger in men than in women. The current study reports the results of two visual search experiments, in which men showed a stronger bias of attention toward guns and knives than did women, whether the weapons were depicted wielded or not. When the weapons were depicted wielded, both sexes searched for them with more caution than when they were not. Neither of these effects extended reliably to syringes, a non-weapon-yet potentially threatening-object. The findings are discussed with respect to the "weapons effect" and social coercion theory.

  17. Arms Control: US and International efforts to ban biological weapons

    Energy Technology Data Exchange (ETDEWEB)


    The Bacteriological (Biological) and Toxin Weapons Convention, the treaty that bans the development, production, and stockpiling and acquisition of biological weapons was opened for signature in 1972 and came into force in 1975 after being ratified by 22 governments, including the depository nations of the USA, the United Kingdom, and the former Soviet Union. In support of the Convention, the USA later established export controls on items used to make biological weapons. Further, in accordance with the 1990 President`s Enhanced Proliferation Control Initiative, actions were taken to redefine and expand US export controls, as well as to encourage multilateral controls through the Australia Group. Thus far, the Convention has not been effective in stopping the development of biological weapons. The principal findings as to the reasons of the failures of the Convention are found to be: the Convention lacks universality, compliance measures are effective, advantage of verification may outweigh disadvantages. Recommendations for mitigating these failures are outlined in this report.

  18. Threat is in the Sex of the Beholder: Men Find Weapons Faster than do Women

    Directory of Open Access Journals (Sweden)

    Danielle Sulikowski


    Full Text Available In visual displays, people locate potentially threatening stimuli, such as snakes, spiders, and weapons, more quickly than similar benign stimuli, such as beetles and gadgets. Such biases are likely adaptive, facilitating fast responses to potential threats. Currently, and historically, men have engaged in more weapons-related activities (fighting and hunting than women. If biases of visual attention for weapons result from selection pressures related to these activities, then we would predict such biases to be stronger in men than in women. The current study reports the results of two visual search experiments, in which men showed a stronger bias of attention toward guns and knives than did women, whether the weapons were depicted wielded or not. When the weapons were depicted wielded, both sexes searched for them with more caution than when they were not. Neither of these effects extended reliably to syringes, a non-weapon—yet potentially threatening—object. The findings are discussed with respect to the “weapons effect” and social coercion theory.

  19. Threat evaluation and weapon assignment decision support: A review of the state of the art

    Directory of Open Access Journals (Sweden)

    JN Roux


    Full Text Available In a military environment an operator is typically required to evaluate the tactical situation in real-time and protect defended assets against enemy threats by assigning available weapon systems to engage enemy craft. This environment requires rapid operational planning and decision making under severe stress conditions, and the associated responsibilities are usually divided between a number of operators and computerized decision support systems that aid these operators during the decision making processes. The aim in this paper is to review the state of the art of this kind of threat evaluation and weapon assignment decision support process as it stands within the context of a ground based air defence system (GBADS at the turn of the twenty first century. However, much of the contents of the paper may be generalized to military environments other than a GBADS one.

  20. Chemical and biological weapons in the 'new wars'. (United States)

    Ilchmann, Kai; Revill, James


    The strategic use of disease and poison in warfare has been subject to a longstanding and cross-cultural taboo that condemns the hostile exploitation of poisons and disease as the act of a pariah. In short, biological and chemical weapons are simply not fair game. The normative opprobrium is, however, not fixed, but context dependent and, as a social phenomenon, remains subject to erosion by social (or more specifically, antisocial) actors. The cross cultural understanding that fighting with poisons and disease is reprehensible, that they are taboo, is codified through a web of interconnected measures, principal amongst these are the 1925 Geneva Protocol; the Biological Weapons Convention; and the Chemical Weapons Convention. Whilst these treaties have weathered the storm of international events reasonably well, their continued health is premised on their being 'tended to' in the face of contextual changes, particularly facing changes in science and technology, as well as the changed nature and character of conflict. This article looks at the potential for normative erosion of the norm against chemical and biological weapons in the face of these contextual changes and the creeping legitimization of chemical and biological weapons.

  1. The nuclear terrorist, radiological, biological, chemical threat. Medical approach; Menace terroriste nucleaire, radiologique, biologique, chimique. Approche medicale

    Energy Technology Data Exchange (ETDEWEB)

    Gourmelon, P.; Vidal, D.; Renaudeau, C


    This book illustrates the cooperation of the civil and the military experts in the domain of the NBRC (nuclear, biological, radiological and chemical threat). The different aspects bond to the use of nuclear, biological and chemical weapons, are discussed. Al topics of each domains (NRBC) are presented: historical and fundamental aspects, diagnostic, therapeutic and prevention. (A.L.B.)

  2. A Novel Two-Staged Decision Support based Threat Evaluation and Weapon Assignment Algorithm, Asset-based Dynamic Weapon Scheduling using Artificial Intelligence Techinques


    Naeem, Huma; Masood, Asif; Hussain, Mukhtar; Shoab A. Khan


    Surveillance control and reporting (SCR) system for air threats play an important role in the defense of a country. SCR system corresponds to air and ground situation management/processing along with information fusion, communication, coordination, simulation and other critical defense oriented tasks. Threat Evaluation and Weapon Assignment (TEWA) sits at the core of SCR system. In such a system, maximal or near maximal utilization of constrained resources is of extreme importance. Manual TEW...

  3. A proposal for the classification of biological weapons sensu lato. (United States)

    Rozsa, Lajos


    Due to historical and legislation reasons, the category of bioweapons is rather poorly defined. Authors often disagree on involving or excluding agents like hormones, psychochemicals, certain plants and animals (such as weeds or pests) or synthetic organisms. Applying a wide definition apparently threatens by eroding the regime of international legislation, while narrow definitions abandon several important issues. Therefore, I propose a category of 'biological weapons sensu lato' (BWsl) that is defined here as any tool of human aggression whose acting principle is based on disciplines of biology including particularly microbiology, epidemiology, medical biology, physiology, psychology, pharmacology and ecology, but excluding those based on inorganic agents. Synthetically produced equivalents (not necessarily exact copies) and mock weapons are also included. This definition does not involve any claim to subject all these weapons to international legislation but serves a purely scholarly purpose. BWsl may be properly categorized on the base of the magnitude of the human population potentially targeted (4 levels: individuals, towns, countries, global) and the biological nature of the weapons' intended effects (4 levels: agricultural-ecological agents, and non-pathogenic, pathogenic, or lethal agents against humans).

  4. The Russian biological weapons program: vanished or disappeared? (United States)

    Shoham, Dany; Wolfson, Ze'ev


    The legacy and arsenal of biological weapons Russia inherited from USSR in 1991 became a lingering unsolved issue, in terms of a prime strategic arm that ought to be eliminated, advisably, in accordance with the Biological Weapons Convention Russia is committed to, and considering further undertakings and declarations made by the Russian regime. Indeed, that inheritance was created by USSR as a powerful, highly sophisticated component of utmost importance within the Soviet military paradigm, based on a wide spectrum of virulent, stabilized pathogens and toxins plus delivery systems. Moreover, remarkably advanced biotechnologies were thus applied to procure stockpiles of military-grade pathogens and toxins. Yet, an intriguing debate aroused with regard to the extent of the weaponized biological inventory accumulated by USSR, as well as the in effect attitude of Russia towards perpetuating or wiping out that inheritance. It turned out to form a far reaching and challenging complexity, both strategically and scientifically. The present study concentrates on the strategic as well as scientific spheres shaping that overall issue at large, attempting to thoroughly analyze it through an innovative methodology. One main conclusion thereby reached at is that the Russian military still poses a potential menance, in terms of both stockpiled, probably deployable biological weapons, and prevailing production capacities.

  5. Looming Threat of Chemical and Biological Warfare Agents

    Directory of Open Access Journals (Sweden)

    A.K. Goel


    Full Text Available In the recent past, a dramatic shift has been observed in the strategies of warfare from conventional to non-conventional. Now-a-days, traditional power is of less importance than it used to be earlier. Weapons of mass destruction, which comprise of nuclear weapons, and chemical and biological warfare agents, are posing a great peril to the world due to their devastating potential. Though, there are several bilateral as well as multilateral treaties to control the use and proliferation of these weapons, yet the risk of use of such agents by non-state actors cannot be overlooked. Chances of use of chemical and biological agents are more likely than the nuclear weapons. A comparison of nuclear, chemical and biological weapons in terms of technology, cost, signature, effectiveness on protected and un-protected troops shows that chemical and biological weapon programmes require much lower level of technology and cost than the nuclear weapon programme. Further, there is no or least distinctive and readily observable signature in biological weapon programme in comparison to nuclear and chemical weapon facilities. There can be two possibilities of use of these agents in terrorist attacks. First, there is a risk of transfer of material or know-how of these weapons to terrorists for using against the adversaries and second, the risk of these agents being pilfered due to poor security, thereby sabotaging the national security. The International Committee of Red Cross in February 1918 reckoned these agents as ‘barbarous inventions’ that can ‘only be called criminal’.

  6. 15 CFR 744.4 - Restrictions on certain chemical and biological weapons end-uses. (United States)


    ... biological weapons end-uses. 744.4 Section 744.4 Commerce and Foreign Trade Regulations Relating to Commerce... and biological weapons end-uses. (a) General prohibition. In addition to the license requirements for... biological weapons in or by any country or destination, worldwide. (b) Additional prohibition on...

  7. A Novel Two-Staged Decision Support based Threat Evaluation and Weapon Assignment Algorithm, Asset-based Dynamic Weapon Scheduling using Artificial Intelligence Techinques

    CERN Document Server

    Naeem, Huma; Hussain, Mukhtar; Khan, Shoab A


    Surveillance control and reporting (SCR) system for air threats play an important role in the defense of a country. SCR system corresponds to air and ground situation management/processing along with information fusion, communication, coordination, simulation and other critical defense oriented tasks. Threat Evaluation and Weapon Assignment (TEWA) sits at the core of SCR system. In such a system, maximal or near maximal utilization of constrained resources is of extreme importance. Manual TEWA systems cannot provide optimality because of different limitations e.g.surface to air missile (SAM) can fire from a distance of 5Km, but manual TEWA systems are constrained by human vision range and other constraints. Current TEWA systems usually work on target-by-target basis using some type of greedy algorithm thus affecting the optimality of the solution and failing in multi-target scenario. his paper relates to a novel two-staged flexible dynamic decision support based optimal threat evaluation and weapon assignment...

  8. Psychological casualties resulting from chemical and biological weapons. (United States)

    Romano, J A; King, J M


    This symposium addresses the complications encountered by medical planners when confronted by the use or threat of the use of weapons of mass destruction. The types of chemical warfare agents (CWA), their principal target organs, and physiological effects are discussed. We have reviewed the use of CWA in 20th century warfare and otherwise with emphasis on five cases: (1) use of sulfur mustard during World War I; (2) use by Italy against Ethiopia; (3) use in the Sino-Japanese War; (4) relatively well-studied use in the Iran-Iraq conflict; and (5) the use of sarin in the Tokyo subway terrorist incident. We reviewed the additional physiological and psychological consequences of their use and threat of use. Results from training and simulation are discussed. Finally, we present our conclusions derived from the analysis of these historical situations.

  9. 15 CFR Supplement No. 1 to Part 742 - Nonproliferation of Chemical and Biological Weapons (United States)


    ... Biological Weapons No. Supplement No. 1 to Part 742 Commerce and Foreign Trade Regulations Relating to...—Nonproliferation of Chemical and Biological Weapons Note: Exports and reexports of items in performance of...: (i) Equipment (for producing chemical weapon precursors and chemical warfare agents) described...

  10. 78 FR 55326 - Determinations Regarding Use of Chemical Weapons in Syria Under the Chemical and Biological... (United States)


    ... Determinations Regarding Use of Chemical Weapons in Syria Under the Chemical and Biological Weapons Control and..., 22 U.S.C. 5604(a), that the Government of Syria has used chemical weapons in violation of... Under Secretary of State for Political Affairs: (1) Determined that the Government of Syria has...

  11. Strengthening the biological weapons convention and implications on the pharmaceutical and biotechnology industry. (United States)

    Zabriskie, D


    The development, production, stockpiling, and use of biological weapons are banned by the 1972 Biological Weapons Convention (BWC). Reflecting the realities of the Cold War era in which it was negotiated, the BWC lacks means for compliance verification or enforcement. International efforts to remedy this deficiency are accelerating in the face of evidence that covert biological weapon programs are proliferating at the national and subnational levels.

  12. South America and the proliferation of biological weapons

    Directory of Open Access Journals (Sweden)

    Tatiana Coutto


    Full Text Available This article focuses on the role of regional institutions and political practices in strengthening multilateral disarmament and non-proliferation regimes. Particular attention is devoted to coordination between Brazil and Argentina with a view to forging a "South American position" vis-à-vis the Biological and Toxins Weapons Convention (BTWC. Empirical evidence suggests that informal arrangements between the two countries were capable of involving other South American leaders and promoting the exchange of information among different groups of states, most notably during the 2006 BTWC review conference. This paper also sheds light on the identification of specific features that allow for increasing visibility and actorness of regional powers in promoting universality of multilateral security regimes (MSR, as well as the limitations faced by these players.

  13. Intergovernmental Unity of Effort in Support of Biological Threat Prevention (United States)


    96  xii THIS PAGE INTENTIONALLY LEFT BLANK xiii LIST OF TABLES Table 1.  Health Security Policy Biological Threat...level. Retrieved September 18, 2012, from Europa a Constitution for Europe...home.html. Europa Summaries of EU Legislation (2008, September). The fight against bioterrorism (communication). Retrieved January 15, 2011, from

  14. Bioforensics: Characterization of biological weapons agents by NanoSIMS

    Energy Technology Data Exchange (ETDEWEB)

    Weber, P K; Ghosal, S; Leighton, T J; Wheeler, K E; Hutcheon, I D


    The anthrax attacks of Fall 2001 highlight the need to develop forensic methods based on multiple identifiers to determine the origin of biological weapons agents. Genetic typing methods (i.e., DNA and RNA-based) provide one attribution technology, but genetic information alone is not usually sufficient to determine the provenance of the material. Non-genetic identifiers, including elemental and isotopic signatures, provide complementary information that can be used to identify the means, geographic location and date of production. Under LDRD funding, we have successfully developed the techniques necessary to perform bioforensic characterization with the NanoSIMS at the individual spore level. We have developed methods for elemental and isotopic characterization at the single spore scale. We have developed methods for analyzing spore sections to map elemental abundance within spores. We have developed rapid focused ion beam (FIB) sectioning techniques for spores to preserve elemental and structural integrity. And we have developed a high-resolution depth profiling method to characterize the elemental distribution in individual spores without sectioning. We used these newly developed methods to study the controls on elemental abundances in spores, characterize the elemental distribution of in spores, and to study elemental uptake by spores. Our work under this LDRD project attracted FBI and DHS funding for applied purposes.

  15. Beyond Nunn-Lugar: Curbing the Next Wave of Weapons Proliferation Threat from Russia (United States)


    Kuntsevich , former head of the Russian chemical weapons program and later adviser to Yeltsin on chemical disarmament, was caught selling chemical precursors to...tons in 1994.2 Still, Kuntsevich did not serve out his jail term. Even more disturbing are reports that Aum Shinrikio, a Japanese doomsday cult

  16. Weapons of mass destruction: Overview of the CBRNEs (Chemical, Biological, Radiological, Nuclear, and Explosives). (United States)

    Prockop, Leon D


    The events of September 11, 2001, made citizens of the world acutely aware of disasters consequent to present-day terrorism. This is a war being waged for reasons obscure to many of its potential victims. The term "NBCs" was coined in reference to terrorist weapons of mass destruction, i.e., nuclear, biological and chemical. The currently accepted acronym is "CBRNE" which includes Chemical, Biological, Radiological, Nuclear, and Explosive weapons. Non-nuclear explosives are the most common terrorist weapon now in use. Nuclear and radiological weapons are beyond the scope of this publication, which focuses on the "CBEs", i.e. chemical, biological and explosive weapons. Although neurologists will not be the first responders to CBEs, they must know about the neurological effects in order to provide diagnosis and treatment to survivors. Neurological complications of chemical, biological and explosive weapons which have or may be used by terrorists are reviewed by international experts in this publication. Management and treatment profiles are outlined.

  17. Biological weapons and bioterrorism in the first years of the twenty-first century. (United States)

    Leitenberg, Milton


    This paper evaluates four recent developments in biological-weapons politics and bioterrorism. First is American opposition to finalization of a verification protocol for the Biological Weapons Convention; second, a successful attempt at mass-casualty terrorism; third, an ongoing investigation into the bioterrorist capabilities of the al Qaeda network; and, fourth, a series of fatal anthrax attacks in the United States. The first of these evaluations is informed by interviews conducted between 2000 and 2002 with policy principals in the United States and elsewhere.

  18. Prospects for improved detection of chemical, biological, radiological, and nuclear threats

    Energy Technology Data Exchange (ETDEWEB)

    Wuest, Craig R. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Hart, Brad [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Slezak, Thomas R. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)


    Acquisition and use of Chemical, Biological, Radiological, and Nuclear (CBRN) weapons continue to be a major focus of concern form the security apparatus of nation states because of their potential for mass casualties when used by a determined adversary.

  19. Exploring the Possible Use of Information Barriers for future Biological Weapons Verification Regimes

    Energy Technology Data Exchange (ETDEWEB)

    Luke, S J


    This report describes a path forward for implementing information barriers in a future generic biological arms-control verification regime. Information barriers have become a staple of discussion in the area of arms control verification approaches for nuclear weapons and components. Information barriers when used with a measurement system allow for the determination that an item has sensitive characteristics without releasing any of the sensitive information. Over the last 15 years the United States (with the Russian Federation) has led on the development of information barriers in the area of the verification of nuclear weapons and nuclear components. The work of the US and the Russian Federation has prompted other states (e.g., UK and Norway) to consider the merits of information barriers for possible verification regimes. In the context of a biological weapons control verification regime, the dual-use nature of the biotechnology will require protection of sensitive information while allowing for the verification of treaty commitments. A major question that has arisen is whether - in a biological weapons verification regime - the presence or absence of a weapon pathogen can be determined without revealing any information about possible sensitive or proprietary information contained in the genetic materials being declared under a verification regime. This study indicates that a verification regime could be constructed using a small number of pathogens that spans the range of known biological weapons agents. Since the number of possible pathogens is small it is possible and prudent to treat these pathogens as analogies to attributes in a nuclear verification regime. This study has determined that there may be some information that needs to be protected in a biological weapons control verification regime. To protect this information, the study concludes that the Lawrence Livermore Microbial Detection Array may be a suitable technology for the detection of the

  20. 78 FR 38782 - Lifting of Chemical and Biological Weapons (CBW) Proliferation Sanctions Against Chinese Entities (United States)


    ... These restrictions were imposed on July 9, 2002 (see Volume 67 FR Public Notice 4071). Dated: June 21... of Chemical and Biological Weapons (CBW) Proliferation Sanctions Against Chinese Entities AGENCY... lift nonproliferation measures on Chinese entities. DATES: Effective Date: Upon publication in...

  1. Global patterns in threats to vertebrates by biological invasions. (United States)

    Bellard, C; Genovesi, P; Jeschke, J M


    Biological invasions as drivers of biodiversity loss have recently been challenged. Fundamentally, we must know where species that are threatened by invasive alien species (IAS) live, and the degree to which they are threatened. We report the first study linking 1372 vertebrates threatened by more than 200 IAS from the completely revised Global Invasive Species Database. New maps of the vulnerability of threatened vertebrates to IAS permit assessments of whether IAS have a major influence on biodiversity, and if so, which taxonomic groups are threatened and where they are threatened. We found that centres of IAS-threatened vertebrates are concentrated in the Americas, India, Indonesia, Australia and New Zealand. The areas in which IAS-threatened species are located do not fully match the current hotspots of invasions, or the current hotspots of threatened species. The relative importance of biological invasions as drivers of biodiversity loss clearly varies across regions and taxa, and changes over time, with mammals from India, Indonesia, Australia and Europe are increasingly being threatened by IAS. The chytrid fungus primarily threatens amphibians, whereas invasive mammals primarily threaten other vertebrates. The differences in IAS threats between regions and taxa can help efficiently target IAS, which is essential for achieving the Strategic Plan 2020 of the Convention on Biological Diversity.

  2. Preparedness for terrorism: managing nuclear, biological and chemical threats. (United States)

    Koenig, Kristi L


    The management of nuclear, biological and chemical (NBC) terrorism events is critical to reducing morbidity and mortality in the next decade; however, initial patient care considerations and protective actions for staff are unfamiliar to most front-line clinicians. High explosive events (bomb and blast) remain the most common type of terrorism and are easy to detect. Conversely, some types of terrorist attacks are more likely to be unsuspected or covert. This paper explains the current threat of terrorism and describes clues for detection that an event has occurred. Specific criteria that should lead to a high suspicion for terrorism are illustrated. The manuscript outlines initial actions and clinical priorities for management and treatment of patients exposed to nuclear/radiological, biological, chemical and combined agents (for example an explosion involving a chemical agent). Examples of terrorist events include: a nuclear explosion, an aerosolised release of anthrax (biological), dissemination of sarin in a subway (chemical), and the detonation of a radiologic dispersion device or "dirty bomb" (combined explosive and radiological). Basic principles of decontamination include potential risks to healthcare providers from secondary exposure and contamination. Unique issues may hinder clinical actions. These include coordination with law enforcement for a crime scene, public health entities for surveillance and monitoring, hazardous materials teams for decontamination, and the media for risk communications. Finally, the importance of personal preparedness is discussed.

  3. Bioterrorism: pathogens as weapons. (United States)

    Anderson, Peter D; Bokor, Gyula


    Biowarfare has been used for centuries. The use of biological weapons in terrorism remains a threat. Biological weapons include infectious agents (pathogens) and toxins. The most devastating bioterrorism scenario would be the airborne dispersal of pathogens over a concentrated population area. Characteristics that make a specific pathogen a high-risk for bioterrorism include a low infective dose, ability to be aerosolized, high contagiousness, and survival in a variety of environmental conditions. The most dangerous potential bioterrorism agents include the microorganisms that produce anthrax, plague, tularemia, and smallpox. Other diseases of interest to bioterrorism include brucellosis, glanders, melioidosis, Q fever, and viral encephalitis. Food safety and water safety threats are another area of concern.

  4. On the implementation of the Biological Threat Reduction Program in the Republic of Uzbekistan


    Tuychiev, Laziz; Madaminov, Marifjon


    Objective To review the implementation of the Biological Threat Reduction Program (BTRP) of the U.S. Defense Threat Reduction Agency in the Republic of Uzbekistan since 2004. Introduction The Biological Threat Reduction Program (BTRP) has been being implemented in the Republic of Uzbekistan since 2004 within the framework of the Agreement between the Government of the Republic of Uzbekistan and the Government of the United States of America Concerning Cooperation in the Area of the Promotion ...

  5. Comment on "Invasive harlequin ladybird carries biological weapons against native competitors". (United States)

    de Jong, Peter W; van Lenteren, Joop C; Raak-van den Berg, C Lidwien


    We comment on the implications that Vilcinskas et al. (Reports, 17 May 2013, p. 862) attach to the finding that the exotic, invasive ladybird Harmonia axyridis carries microsporidia to which this species is insensitive but that is lethal to species that are native to the invaded areas. The authors suggest that these microsporidia might serve as "biological weapons" against the native competitors, but we cast doubt on the importance of this suggestion in the field.

  6. The Role of Health Educators in Dealing with Biological Threats in the United States (United States)

    Perez, Miguel A.; Pinzon-Perez, Helda; Sowby, Sherman


    Health educators play a key role in assisting the nation deal with and be prepared for potential biological attacks. This article summarizes information found in the literature about likely bioterrorist threats to the U.S. population and discusses the responsibilities of health educators in regard to these threats. Among the important roles health…

  7. The indoor as a scene for biological threats

    DEFF Research Database (Denmark)

    Storgaard, Kresten; Gunnarsen, Lars; Bräuner, Elvira


    The paper presents the result of involving users in developing a user-friendly device for easy and fast detection of bio-threats in indoor settings. Bio-protect is a project supported by the European Commission, with the concept of developing a fast-alert, mobile, easy-to-use device to detect...

  8. Re-evaluating Russia's biological weapons policy, as reflected in the Criminal Code and Official Admissions: insubordination leading to a president's subordination. (United States)

    Knoph, Jan T; Westerdahl, Kristina S


    Half-heartedly acknowledged by the Russian Federation, the Soviet Union ran the world's largest offensive program for biological weapons, breaching the Biological and Toxin Weapons Convention. Russia criminalized biological weapons in 1993 only to decriminalize them in 1996, but in 2003 president Putin partly recriminalized them. None of these changes were declared within the Convention. Several well-known official statements, when reviewed in their context, turned out to admit to neither an offensive program nor a breach of the Convention. Thus, the Russian biological weapons policy is more ambiguous than usually depicted, and various policy shapers can be discerned.

  9. The evolution of legal approaches to controlling nuclear and radiological weapons and combating the threat of nuclear terrorism

    NARCIS (Netherlands)

    J. Herbach


    This chapter traces the evolution of international law related to the weaponization of nuclear and other radioactive materials, focusing in particular on the law pertaining to preventing acts of nuclear terrorism. International efforts to control atomic energy have evolved substantially since the on

  10. North Korea’s Military Threat: Pyongyang’s Conventional Forces, Weapons of Mass Destruction, and Ballistic Missiles (United States)


    eternalize their rule. They have a large stockpile and we are to be forbidden even to think about the manufacture of nuclear weapons.321 Any modest...Chinhae.” Additionally, in light with South Korea’s Sunshine Policy (overtures that past ROK President Kim Dae Jung made to North Korea), officially

  11. Chemical or Biological Terrorist Attacks: An Analysis of the Preparedness of Hospitals for Managing Victims Affected by Chemical or Biological Weapons of Mass Destruction

    Directory of Open Access Journals (Sweden)

    Russell L. Bennett


    Full Text Available The possibility of a terrorist attack employing the use of chemical or biological weapons of mass destruction (WMD on American soil is no longer an empty threat, it has become a reality. A WMD is defined as any weapon with the capacity to inflict death and destruction on such a massive scale that its very presence in the hands of hostile forces is a grievous threat. Events of the past few years including the bombing of the World Trade Center in 1993, the Murrah Federal Building in Oklahoma City in 1995 and the use of planes as guided missiles directed into the Pentagon and New York’s Twin Towers in 2001 (9/11 and the tragic incidents involving twentythree people who were infected and five who died as a result of contact with anthrax-laced mail in the Fall of 2001, have well established that the United States can be attacked by both domestic and international terrorists without warning or provocation. In light of these actions, hospitals have been working vigorously to ensure that they would be “ready” in the event of another terrorist attack to provide appropriate medical care to victims. However, according to a recent United States General Accounting Office (GAO nationwide survey, our nation’s hospitals still are not prepared to manage mass causalities resulting from chemical or biological WMD. Therefore, there is a clear need for information about current hospital preparedness in order to provide a foundation for systematic planning and broader discussions about relative cost, probable effectiveness, environmental impact and overall societal priorities. Hence, the aim of this research was to examine the current preparedness of hospitals in the State of Mississippi to manage victims of terrorist attacks involving chemical or biological WMD. All acute care hospitals in the State were selected for inclusion in this study. Both quantitative and qualitative methods were utilized for data collection

  12. The development of Army relevant peptide-based surface enhanced Raman scattering (SERS) sensors for biological threat detection (United States)

    Farrell, Mikella E.; Strobbia, Pietro; Sarkes, Deborah A.; Stratis-Cullum, Dimitra N.; Cullum, Brian M.; Pellegrino, Paul M.


    The utility of peptide-based molecular sensing for the development of novel biosensors has resulted in a significant increase in their development and usage for sensing targets like chemical, biological, energetic and toxic materials. Using peptides as a molecular recognition element is particularly advantageous because there are several mature peptide synthesis protocols that already exist, peptide structures can be tailored, selected and manipulated to be highly discerning towards desired targets, peptides can be modified to be very stable in a host of environments and stable under many different conditions, and through the development of bifunctionalized peptides can be synthesized to also bind onto desired sensing platforms (various metal materials, glass, etc.). Two examples of the several Army relevant biological targets for peptide-based sensing platforms include Ricin and Abrin. Ricin and Abrin are alarming threats because both can be weaponized and there is no antidote for exposure. Combining the sensitivity of SERS with the selectivity of a bifunctional peptide allows for the emergence of dynamic hazard sensor for Army application.

  13. Toxins as biological weapons for terror-characteristics, challenges and medical countermeasures: a mini-review. (United States)

    Berger, Tamar; Eisenkraft, Arik; Bar-Haim, Erez; Kassirer, Michael; Aran, Adi Avniel; Fogel, Itay


    Toxins are hazardous biochemical compounds derived from bacteria, fungi, or plants. Some have mechanisms of action and physical properties that make them amenable for use as potential warfare agents. Currently, some toxins are classified as potential biological weapons, although they have several differences from classic living bio-terror pathogens and some similarities to manmade chemical warfare agents. This review focuses on category A and B bio-terror toxins recognized by the Centers for Disease Control and Prevention: Botulinum neurotoxin, staphylococcal enterotoxin B, Clostridium perfringens epsilon toxin, and ricin. Their derivation, pathogenesis, mechanism of action, associated clinical signs and symptoms, diagnosis, and treatment are discussed in detail. Given their expected covert use, the primary diagnostic challenge in toxin exposure is the early detection of morbidity clusters, apart from background morbidity, after a relatively short incubation period. For this reason, it is important that clinicians be familiar with the clinical manifestations of toxins and the appropriate methods of management and countermeasures.

  14. Biological Weapons and Bioterorism Threats: The Role of Vaccines in Protecting the Military and Civilian Sectors (United States)


    lowest risk, most effective protection – More effective with fewer adverse effects than antibiotics or other treatments – Enable force projection by...Plague • Anthrax Vaccine Adsorbed • Botulinum Toxoids* • Tularemia Vaccine* • Smallpox vaccine (Vaccinia Virus, Cell Culture-derived)* • Equine

  15. 78 FR 74218 - Imposition of Additional Sanctions on Syria Under the Chemical and Biological Weapons Control and... (United States)


    ... Imposition of Additional Sanctions on Syria Under the Chemical and Biological Weapons Control and Warfare.... ACTION: Notice. SUMMARY: On August 2, 2013, a determination was made that the Government of Syria used... Notice 8460. That determination resulted in sanctions against the Government of Syria. Section 307(b)...

  16. A New Approach to Ballistic Missile Defense for Countering Antiaccess/Area-Denial Threats from Precision-Guided Weapons (United States)


    Congress, CRS Report for Congress (Washington, DC: Congressional Research Ser- vice, 18 March 2012), 3–5. 5. Mohammad-Ali Massoumnia, Q- Guidance in Rotating...NUMBER 5e. TASK NUMBER 5f. WORK UNIT NUMBER 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) Air Force Research Institute (AFRI),155 N. Twining...Furthermore, the MDA has dedicated nearly all of its re- cent development to the midcourse phase of flight, where the threat has the greatest freedom to

  17. Fiber Optic Sensors For Detection of Toxic and Biological Threats

    Directory of Open Access Journals (Sweden)

    Jianming Yuan


    Full Text Available Protection of public and military personnel from chemical and biological warfareagents is an urgent and growing national security need. Along with this idea, we havedeveloped a novel class of fiber optic chemical sensors, for detection of toxic and biologicalmaterials. The design of these fiber optic sensors is based on a cladding modificationapproach. The original passive cladding of the fiber, in a small section, was removed and thefiber core was coated with a chemical sensitive material. Any change in the opticalproperties of the modified cladding material, due to the presence of a specific chemicalvapor, changes the transmission properties of the fiber and result in modal powerredistribution in multimode fibers. Both total intensity and modal power distribution (MPDmeasurements were used to detect the output power change through the sensing fibers. TheMPD technique measures the power changes in the far field pattern, i.e. spatial intensitymodulation in two dimensions. Conducting polymers, such as polyaniline and polypyrrole,have been reported to undergo a reversible change in conductivity upon exposure tochemical vapors. It is found that the conductivity change is accompanied by optical propertychange in the material. Therefore, polyaniline and polypyrrole were selected as the modifiedcladding material for the detection of hydrochloride (HCl, ammonia (NH3, hydrazine(H4N2, and dimethyl-methl-phosphonate (DMMP {a nerve agent, sarin stimulant},respectively. Several sensors were prepared and successfully tested. The results showeddramatic improvement in the sensor sensitivity, when the MPD method was applied. In thispaper, an overview on the developed class of fiber optic sensors is presented and supportedwith successful achieved results.

  18. Terrorist threat, chemical, biological, radiological, nuclear medical approach; Menace terroriste, approche medicale nucleaire, radiologique, biologique, chimique

    Energy Technology Data Exchange (ETDEWEB)

    Revel, Th. de [Hopital d' Instruction des Armees Percy, 92 - Clamart (France); Gourmelon, P. [Institut de Radioprotection et de Surete Nucleaire (IRSN), 92 - Clamart (France); Vidal, D. [Centre de Recherche du Service de Sante des Armees, 38 - La Tronche (France); Renaudeau, C. [Ecole du Val de Grace, 92 - Clamart (France)


    The different aspects linked to the use of nuclear, radiological, biological and or chemical weapons are gathered in this work. They concern history, fundamental aspect, diagnosis, therapy and prevention. The part devoted to the nuclear aspect concern the accidents in relation with ionizing radiations, the radiation syndrome, the contribution and limits of dosimetry, the treatment of medullary aplasia, the evaluation and treatment of an internal contamination, new perspectives on the use of cytokine for the treatment of accidental irradiated persons, alternative to the blood transfusion. (N.C.)

  19. Biological Threats (United States)

    ... on if it is running or turn the fan on if it is not running. Moving the air in the house through the filter will help remove the agents from the air. If you have a portable HEPA filter, take it with you to the ...

  20. Interfacing a biosurveillance portal and an international network of institutional analysts to detect biological threats


    Riccardo, Flavia; Shigematsu, Mika; Chow, Catherine; Linge, Jens; Doherty, Brian; DENTE Maria Grazia; Declich, Silvia; BARKER Mike; Barboza, Philippe; Vaillant, Laetitia; Donachie, Alastair; Mawudeku, Abla; Arthur, Ray; MCKNIGHT Jason


    The Early Alerting and Reporting (EAR) project launched in 2008, is aimed at improving global early alerting and risk assessment and evaluating the feasibility and opportunity of integrating the analysis of biological, chemical, radio-nuclear (CBRN) and pandemic influenza threats. At a time when no international collaborations existed in the field of event based surveillance, EAR’s innovative approach consisted in the involvement of both epidemic intelligence experts and internet-based biosur...

  1. Interfacing a biosurveillance portal and an international network of institutional analysts to detect biological threats. (United States)

    Riccardo, Flavia; Shigematsu, Mika; Chow, Catherine; McKnight, C Jason; Linge, Jens; Doherty, Brian; Dente, Maria Grazia; Declich, Silvia; Barker, Mike; Barboza, Philippe; Vaillant, Laetitia; Donachie, Alastair; Mawudeku, Abla; Blench, Michael; Arthur, Ray


    The Early Alerting and Reporting (EAR) project, launched in 2008, is aimed at improving global early alerting and risk assessment and evaluating the feasibility and opportunity of integrating the analysis of biological, chemical, radionuclear (CBRN), and pandemic influenza threats. At a time when no international collaborations existed in the field of event-based surveillance, EAR's innovative approach involved both epidemic intelligence experts and internet-based biosurveillance system providers in the framework of an international collaboration called the Global Health Security Initiative, which involved the ministries of health of the G7 countries and Mexico, the World Health Organization, and the European Commission. The EAR project pooled data from 7 major internet-based biosurveillance systems onto a common portal that was progressively optimized for biological threat detection under the guidance of epidemic intelligence experts from public health institutions in Canada, the European Centre for Disease Prevention and Control, France, Germany, Italy, Japan, the United Kingdom, and the United States. The group became the first end users of the EAR portal, constituting a network of analysts working with a common standard operating procedure and risk assessment tools on a rotation basis to constantly screen and assess public information on the web for events that could suggest an intentional release of biological agents. Following the first 2-year pilot phase, the EAR project was tested in its capacity to monitor biological threats, proving that its working model was feasible and demonstrating the high commitment of the countries and international institutions involved. During the testing period, analysts using the EAR platform did not miss intentional events of a biological nature and did not issue false alarms. Through the findings of this initial assessment, this article provides insights into how the field of epidemic intelligence can advance through an

  2. The role of genomics in the identification, prediction, and prevention of biological threats. (United States)

    Fricke, W Florian; Rasko, David A; Ravel, Jacques


    In all likelihood, it is only a matter of time before our public health system will face a major biological threat, whether intentionally dispersed or originating from a known or newly emerging infectious disease. It is necessary not only to increase our reactive "biodefense," but also to be proactive and increase our preparedness. To achieve this goal, it is essential that the scientific and public health communities fully embrace the genomic revolution, and that novel bioinformatic and computing tools necessary to make great strides in our understanding of these novel and emerging threats be developed. Genomics has graduated from a specialized field of science to a research tool that soon will be routine in research laboratories and clinical settings. Because the technology is becoming more affordable, genomics can and should be used proactively to build our preparedness and responsiveness to biological threats. All pieces, including major continued funding, advances in next-generation sequencing technologies, bioinformatics infrastructures, and open access to data and metadata, are being set in place for genomics to play a central role in our public health system.

  3. The role of genomics in the identification, prediction, and prevention of biological threats.

    Directory of Open Access Journals (Sweden)

    W Florian Fricke


    Full Text Available In all likelihood, it is only a matter of time before our public health system will face a major biological threat, whether intentionally dispersed or originating from a known or newly emerging infectious disease. It is necessary not only to increase our reactive "biodefense," but also to be proactive and increase our preparedness. To achieve this goal, it is essential that the scientific and public health communities fully embrace the genomic revolution, and that novel bioinformatic and computing tools necessary to make great strides in our understanding of these novel and emerging threats be developed. Genomics has graduated from a specialized field of science to a research tool that soon will be routine in research laboratories and clinical settings. Because the technology is becoming more affordable, genomics can and should be used proactively to build our preparedness and responsiveness to biological threats. All pieces, including major continued funding, advances in next-generation sequencing technologies, bioinformatics infrastructures, and open access to data and metadata, are being set in place for genomics to play a central role in our public health system.

  4. Arms Control without Arms Control: The Failure of the Biological Weapons Convention Protocol and a New Paradigm for Fighting the Threat of Biological Weapons (United States)


    and in 1990, soon-to-be-retired President F.W. de Klerk ordered all work halted on lethal agents.53 Arguably the most disconcerting and dangerous...anything that provides for a level of assurance exceeding 50 percent makes sense.” 93 Frederick Aandahl et al., eds., “Formulation of a United States

  5. Integrated biological-behavioural surveillance in pandemic-threat warning systems. (United States)

    Miller, Maureen; Hagan, Emily


    Economically and politically disruptive disease outbreaks are a hallmark of the 21st century. Although pandemics are driven by human behaviours, current surveillance systems for identifying pandemic threats are largely reliant on the monitoring of disease outcomes in clinical settings. Standardized integrated biological-behavioural surveillance could, and should, be used in community settings to complement such clinical monitoring. The usefulness of such an approach has already been demonstrated in studies on human immunodeficiency virus, where integrated surveillance contributed to a biologically based and quantifiable understanding of the behavioural risk factors associated with the transmission dynamics of the virus. When designed according to Strengthening the Reporting of Observational Studies in Epidemiology criteria, integrated surveillance requires that both behavioural risk factors - i.e. exposure variables - and disease-indicator outcome variables be measured in behavioural surveys. In the field of pandemic threats, biological outcome data could address the weaknesses of self-reported data collected in behavioural surveys. Data from serosurveys of viruses with pandemic potential, collected under non-outbreak conditions, indicate that serosurveillance could be used to predict future outbreaks. When conducted together, behavioural surveys and serosurveys could warn of future pandemics, potentially before the disease appears in clinical settings. Traditional disease-outcome surveillance must be frequent and ongoing to remain useful but behavioural surveillance remains informative even if conducted much less often, since behaviour change occurs slowly over time. Only through knowledge of specific behavioural risk factors can interventions and policies that can prevent the next pandemic be developed.

  6. Bioterrorism and biological threats dominate federal health security research; other priorities get scant attention. (United States)

    Shelton, Shoshana R; Connor, Kathryn; Uscher-Pines, Lori; Pillemer, Francesca Matthews; Mullikin, James M; Kellermann, Arthur L


    The federal government plays a critical role in achieving national health security by providing strategic guidance and funding research to help prevent, respond to, mitigate, and recover from disasters, epidemics, and acts of terrorism. In this article we describe the first-ever inventory of nonclassified national health security-related research funded by civilian agencies of the federal government. Our analysis revealed that the US government's portfolio of health security research is currently weighted toward bioterrorism and emerging biological threats, laboratory methods, and development of biological countermeasures. Eight of ten other priorities identified in the Department of Health and Human Services' National Health Security Strategy-such as developing and maintaining a national health security workforce or incorporating recovery into planning and response-receive scant attention. We offer recommendations to better align federal spending with health security research priorities, including the creation of an interagency working group charged with minimizing research redundancy and filling persistent gaps in knowledge.

  7. A Systematic Screen of FDA-Approved Drugs for Inhibitors of Biological Threat Agents (United States)

    Madrid, Peter B.; Chopra, Sidharth; Manger, Ian D.; Gilfillan, Lynne; Keepers, Tiffany R.; Shurtleff, Amy C.; Green, Carol E.; Iyer, Lalitha V.; Dilks, Holli Hutcheson; Davey, Robert A.; Kolokoltsov, Andrey A.; Carrion, Ricardo; Patterson, Jean L.; Bavari, Sina; Panchal, Rekha G.; Warren, Travis K.; Wells, Jay B.; Moos, Walter H.; Burke, RaeLyn L.; Tanga, Mary J.


    Background The rapid development of effective medical countermeasures against potential biological threat agents is vital. Repurposing existing drugs that may have unanticipated activities as potential countermeasures is one way to meet this important goal, since currently approved drugs already have well-established safety and pharmacokinetic profiles in patients, as well as manufacturing and distribution networks. Therefore, approved drugs could rapidly be made available for a new indication in an emergency. Methodology/Principal Findings A large systematic effort to determine whether existing drugs can be used against high containment bacterial and viral pathogens is described. We assembled and screened 1012 FDA-approved drugs for off-label broad-spectrum efficacy against Bacillus anthracis; Francisella tularensis; Coxiella burnetii; and Ebola, Marburg, and Lassa fever viruses using in vitro cell culture assays. We found a variety of hits against two or more of these biological threat pathogens, which were validated in secondary assays. As expected, antibiotic compounds were highly active against bacterial agents, but we did not identify any non-antibiotic compounds with broad-spectrum antibacterial activity. Lomefloxacin and erythromycin were found to be the most potent compounds in vivo protecting mice against Bacillus anthracis challenge. While multiple virus-specific inhibitors were identified, the most noteworthy antiviral compound identified was chloroquine, which disrupted entry and replication of two or more viruses in vitro and protected mice against Ebola virus challenge in vivo. Conclusions/Significance The feasibility of repurposing existing drugs to face novel threats is demonstrated and this represents the first effort to apply this approach to high containment bacteria and viruses. PMID:23577127

  8. A systematic screen of FDA-approved drugs for inhibitors of biological threat agents.

    Directory of Open Access Journals (Sweden)

    Peter B Madrid

    Full Text Available BACKGROUND: The rapid development of effective medical countermeasures against potential biological threat agents is vital. Repurposing existing drugs that may have unanticipated activities as potential countermeasures is one way to meet this important goal, since currently approved drugs already have well-established safety and pharmacokinetic profiles in patients, as well as manufacturing and distribution networks. Therefore, approved drugs could rapidly be made available for a new indication in an emergency. METHODOLOGY/PRINCIPAL FINDINGS: A large systematic effort to determine whether existing drugs can be used against high containment bacterial and viral pathogens is described. We assembled and screened 1012 FDA-approved drugs for off-label broad-spectrum efficacy against Bacillus anthracis; Francisella tularensis; Coxiella burnetii; and Ebola, Marburg, and Lassa fever viruses using in vitro cell culture assays. We found a variety of hits against two or more of these biological threat pathogens, which were validated in secondary assays. As expected, antibiotic compounds were highly active against bacterial agents, but we did not identify any non-antibiotic compounds with broad-spectrum antibacterial activity. Lomefloxacin and erythromycin were found to be the most potent compounds in vivo protecting mice against Bacillus anthracis challenge. While multiple virus-specific inhibitors were identified, the most noteworthy antiviral compound identified was chloroquine, which disrupted entry and replication of two or more viruses in vitro and protected mice against Ebola virus challenge in vivo. CONCLUSIONS/SIGNIFICANCE: The feasibility of repurposing existing drugs to face novel threats is demonstrated and this represents the first effort to apply this approach to high containment bacteria and viruses.

  9. President Nixon’s Decision to Renounce the U.S. Offensive Biological Weapons Program (United States)


    fever and the virus that causes Venezuelan equine encephalitis); and two types of anticrop weapons (the fungi that cause wheat rust and rice blast...countermeasures, such as vaccines or antibiotics . At the same time, the PSAC favored keeping BW production facilities in a standby state of readiness and...Venezuelan equine encephalitis virus; liquid suspensions of Venezuelan equine encephalitis virus and Q-fever rickettsia; and tens of thousands of

  10. Biological Defense: DOD Has Strengthened Coordination on Medical Countermeasures but Can Improve Its Process for Threat Prioritization (United States)


    diseases such as equine encephalitis and Ebola have contributed to concerns about the nation’s vulnerability to biological attacks and naturally occurring...the traditional egg-based production techniques that require much more lead time and Emerging and Genetically Modified Biological Threat Agents...pharmaceuticals, biologics, medical and surgical supplies and equipment that are needed by HHS or DOD to prepare for, respond to, or recover from a public

  11. Good Bugs, Bad Bugs: A Modern Approach for Detecting Offensive Biological Weapons Research (United States)


    research and the pharmaceutical/ biotechnology industry The changing threat environment since the end of the Cold War, coupled with revolutions seek dual-use biotechnology materials, equipment, and expertise consistent with its growing legitimate biotechnology industry but these

  12. 贫信息下空袭兵器威胁能力评估方法%Research on Assessment for Threat Ability of Air Raid Weapon under Lacking Information

    Institute of Scientific and Technical Information of China (English)

    赵喜; 李修和; 沈阳


    Nowadays, at aerial defense combat, the air raid weapons become more and more powerful,which bring more menace to our key target. So it is badly needed to evaluate the menace ability of air raid weapons, so as to assign aerial defense power and protect our target. This paper researches the process of assessment for threat ability of aerial raid weapon, provides the arithmetic and math model under the background of modern aerial-defense combat and lacking information. The example given in the end shows the practicability of the model.%现代防空作战中,各种空袭兵器突袭能力不断增强,对我方目标构成了极大威胁.因此,需要对空袭兵器的威胁能力进行评估,合理分配各种防空火力,以达到保护我方目标的目的.研究了现代防空作战背景下,空袭兵器威胁能力评估的全过程,给出了贫信息下,威胁能力评估的算法,建立了数学模型,最后用实例说明了该评估方法的实用性.

  13. Of owl or ostrich. The U.S. policy of calculated ambiguity to deter the use of chemical and biological weapons

    Energy Technology Data Exchange (ETDEWEB)

    Lakamp, M.A.


    The United States has adopted a policy of calculated ambiguity regarding the role of nuclear weapons in response to a potential chemical or biological weapons (CBW) attack. Many factors affect decisions about the role nuclear weapons play in US counterproliferation strategy. This thesis describes the policy of calculated ambiguity and offers some observations about its prospects and pitfalls. The thesis presents evidence that suggests nuclear weapons could play a positive role in the US counterproliferation strategy, at least in some circumstances. It also explains how such a role could conflict with the US nonproliferation strategy. Such a role would also violate the nuclear taboo and be seen by a majority of countries as illegal and immoral. The United States has chosen a policy of calculated ambiguity in an attempt to retain the deterrent value of nuclear weapons without paying the political, legal, and moral costs of explicit reliance on nuclear weapons to deter the use of CBW. This may have short-term benefits, but ultimately may damage the national interest.

  14. Bioterrorism: is it a real threat? (United States)

    Gottschalk, René; Preiser, Wolfgang


    The Geneva Protocol of 1925 commits the signatory nations to refraining from the use of biological weapons. However, the terrorist assaults of September 2001 and, subsequently, the anthrax-containing letters are cause for great concerns: new threats to the security of nations are expected, as terrorist organizations seem to increasingly explore novel ways of spreading terror. In this context, naturally emerging diseases such as SARS, monkeypox or West Nile fever assume new importance because it is difficult to distinguish between natural epidemics and possible bioweapon assaults. Great efforts on the part of governments and public health authorities are necessary to counteract these threats.

  15. The Implications of a Biological Weapons Convention Verification Protocol on U.S. Biological Warfare Nonproliferation Strategy (United States)


    legitimate concerns of the pharmaceutical and biotechnology industry and research groups. Effectiveness of Other Means to Identify BW Threats The U.S...tripled in size since 1992. Finally the U.S. biotechnology industry is heavily engaged in research and development, having spent $15.6 billion on new...projects in 2001 ( Biotechnology Industry Organization 2003). The DNA genome patent alone could be worth billions of dollars (National Review (New York

  16. The terrorist threat nuclear, radiological, biological, chemical - a medical approach; Menace terroriste nucleaire, radiologique, biologique, chimique - approche medicale

    Energy Technology Data Exchange (ETDEWEB)

    Revel, M.C. de; Gourmelon, M.C.S.; Vidal, P.C.; Renaudeau, P.C.S


    Since September 11, 2001, the fear of a large scale nuclear, biological and/or chemical terrorism is taken again into consideration at the highest level of national policies of risk prevention. The advent of international terrorism implies a cooperation between the military defense and the civil defense. The nuclear, radiological, biological and chemical (NRBC) experts of the health service of army and of civil defense will have to work together in case of major terror attack. This book presents this cooperation between civil and military experts in the NRBC domain: risk analysis, national defense plans, crisis management, syndromes and treatments. The different aspects linked with the use of nuclear, biological and chemical weapons are analyzed by the best experts from French medical and research institutes. All topics of each NRBC domain are approached: historical, basic, diagnostic, therapeutic and preventive. (J.S.)

  17. Applications of Quantum Cascade Laser Scanners for Remote Detection of Chemical and Biological Threats and Weapons of Mass Destruction (United States)


    tested were detected in the field with a minimum of 500 ng∕cm2 [20]. OPUS 6.0™ software package for data acquisition and analysis (Bruker Optics...residuals versus Hotelling’s T2 plot on PLS Toolbox™ software for MATLAB®. According to the plot, the data with both high-residual variance and high...will recruit students at Universidad Metropolitana, a Hispanic Serving Institution in San Juan, Puerto Rico and offer a program during the academic

  18. United States Army Chemical Biological Radiological and Nuclear Corps Capability Combating the Contemporary Weapons of Mass Destruction Threat (United States)


    of nerve agent exposure; one involving the death of sheep , and one involving Soldiers on the island of Okinawa, continued to raise questions about the...the CBRN enterprise, train CBRN warriors, develop CBRN leaders, synchronize CBRN school operations, and take care of people/ensure quality of life...these mission specific areas. “Planning for WMD elimination operations requires close synchronization with select CBRN-trained personnel and

  19. Diversion of Nuclear, Biological, and Chemical Weapons Expertise from the Former Soviet Union: Understanding an Evolving Problem (United States)


    Chemical cases - Syria and Gen. Kuntsevich - Aum RAND 3. DEMAND FOR PROLIFERATION-CRITICAL KNOWLEDGE This section examines the scope and nature of...prominent example of demand for chemical weapons knowledge is Syria, where General Anatoly Kuntsevich , head of Russia’s chemical weapons program, built a

  20. The Principle of Integration in International Sustainable Development Law (ISDL with Reference to the Biological Weapons Convention (BWC

    Directory of Open Access Journals (Sweden)

    Marina Abdul Majid


    Full Text Available The Biological Weapons Convention (BWC does not explicitly refer to sustainable development despite the fact that other United Nations (UN disarmament documents prescribe that international environmental law principles and sustainable development be considered among arms control agreements. This study’s objective is to utilize the principle of integration’s three components of environmental, economic, and social development, as found in the International Sustainable Development Law (ISDL from the New Delhi Declaration (Delhi Declaration of Principles of International Law Relating to Sustainable Development, in order to evaluate whether the BWC contains such components; thereby, making it possible for the BWC to contribute to sustainable development. The methodology of this study is necessarily qualitative, given that it is a socio-legal research that relies on international agreements such as the BWC, declarations, resolutions, plans of implementation, other non-binding documents of the UN, and secondary resources—all of which are analyzed through a document analysis. The results show that the BWC addresses the environment (Article II, prohibits transfers relating to export controls, international trade, and economic development (Article III, while at the same time, covering social development concerns, health, and diseases that make up the international social law (Article X. Since the BWC is found to be capable of contributing to sustainable development, it is concluded that ISDL cannot be restricted to international environmental, economic, and social law, but should be expanded to include international arms control law.

  1. Biological Treatments: New Weapons in the Management of Monogenic Autoinflammatory Disorders

    Directory of Open Access Journals (Sweden)

    Antonio Vitale


    Full Text Available Treatment of monogenic autoinflammatory disorders, an expanding group of hereditary diseases characterized by apparently unprovoked recurrent episodes of inflammation, without high-titre autoantibodies or antigen-specific T cells, has been revolutionized by the discovery that several of these conditions are caused by mutations in proteins involved in the mechanisms of innate immune response, including components of the inflammasome, cytokine receptors, receptor antagonists, and oversecretion of a network of proinflammatory molecules. Aim of this review is to synthesize the current experience and the most recent evidences about the therapeutic approach with biologic drugs in pediatric and adult patients with monogenic autoinflammatory disorders.

  2. The Anthrax Terror. DOD’s Number-One Biological Threat (United States)


    large quantities of anthrax and glanders organisms were grown. A Ger­ man agent, Capt Frederick Hinsch, used these to inoculate horses in Baltimore...program began receiv­ ing scrutiny under President F. W. de Klerk in the early 1990s, which led to the firing of nu­ merous scientists working the program...Rise of CB Weapons (New York: Humanities Press, 1971), 216; and Frederick R. Sidell, Ernest T. Takafuji, and David R. Franz, eds., Textbook of

  3. AB Blanket for Cities (for continual pleasant weather and protection from chemical, biological and radioactive weapons)

    CERN Document Server

    Bolonkin, Alexander


    In a series of previous articles (see references) the author offered to cover a city or other important large installations or subregions by a transparent thin film supported by a small additional air overpressure under the form of an AB Dome. The building of a gigantic inflatable AB Dome over an empty flat surface is not difficult. However, if we want to cover a city, garden, forest or other obstacle course we cannot easily deploy the thin film over building or trees. In this article is suggested a new method which solves this problem. The idea is to design a double film blanket filled by light gas (for example, methane, hydrogen, or helium). Sections of this AB Blanket are lighter then air and fly in atmosphere. They can be made on a flat area (serving as an assembly area) and delivered by dirigible or helicopter to station at altitude over the city. Here they connect to the already assembled AB Blanket subassemblies, cover the city in an AB Dome and protect it from bad weather, chemical, biological and rad...

  4. Preventing biological weapon development through the governance of life science research. (United States)

    Epstein, Gerald L


    The dual-use dilemma in the life sciences-that illicit applications draw on the same science and technology base as legitimate applications-makes it inherently difficult to control one without inhibiting the other. Since before the September 11 attacks, the science and security communities in the United States have struggled to develop governance processes that can simultaneously minimize the risk of misuse of the life sciences, promote their beneficial applications, and protect the public trust. What has become clear over that time is that while procedural steps can be specified for assessing and managing dual-use risks in the review of research proposals, oversight of ongoing research, and communication of research results, the actions or decisions to be taken at each of these steps to mitigate dual-use risk defy codification. Yet the stakes are too high to do nothing, or to be seen as doing nothing. The U.S. government should therefore adopt an oversight framework largely along the lines recommended by the National Science Advisory Board for Biosecurity almost 5 years ago-one that builds on existing processes, can gain buy-in from the scientific community, and can be implemented at modest cost (both direct and opportunity), while providing assurance that a considered and independent examination of dual-use risks is being applied. Without extraordinary visibility into the actions of those who would misuse biology, it may be impossible to know how well such an oversight system will actually succeed at mitigating misuse. But maintaining the public trust will require a system to be established in which reasonably foreseeable dual-use consequences of life science research are anticipated, evaluated, and addressed.

  5. Bioterrorism: toxins as weapons. (United States)

    Anderson, Peter D


    The potential for biological weapons to be used in terrorism is a real possibility. Biological weapons include infectious agents and toxins. Toxins are poisons produced by living organisms. Toxins relevant to bioterrorism include ricin, botulinum, Clostridium perfrigens epsilson toxin, conotoxins, shigatoxins, saxitoxins, tetrodotoxins, mycotoxins, and nicotine. Toxins have properties of biological and chemical weapons. Unlike pathogens, toxins do not produce an infection. Ricin causes multiorgan toxicity by blocking protein synthesis. Botulinum blocks acetylcholine in the peripheral nervous system leading to muscle paralysis. Epsilon toxin damages cell membranes. Conotoxins block potassium and sodium channels in neurons. Shigatoxins inhibit protein synthesis and induce apoptosis. Saxitoxin and tetrodotoxin inhibit sodium channels in neurons. Mycotoxins include aflatoxins and trichothecenes. Aflatoxins are carcinogens. Trichothecenes inhibit protein and nucleic acid synthesis. Nicotine produces numerous nicotinic effects in the nervous system.

  6. Special Weapons (United States)

    Federal Laboratory Consortium — Supporting Navy special weapons, the division provides an array of engineering services, technical publication support services, logistics support services, safety...

  7. [The experiments conducted by Japanese on human guinea pigs, and the use of biological weapons during the Sino-Japanese war (1937-1945)]. (United States)

    Sabbatani, Sergio


    Starting from the end of the nineteenth century, and during the first four decades of the past century, Japan showed considerable military expansion, on the back of a pan-Asiatic and imperialistic ideology, comparable only to those expressed by Wilhelmian and Nazi Germany. This growth led to Japan playing an extremely important role in the Asia-Pacific continent, which unavoidably brought the country onto a collision course with the British Empire and the United States of America. The Japanese general Shiro Ishii, who had undoubted organisational abilities but also a propensity for crimes against mankind, starting from the end of the 1920s and during the subsequent decade, under the suggestion of a military physician, developed a research programme to obtain biological weapons, since he was aware of the lack of raw materials, technology and scientific background in nuclear weapons. This project was taken forward despite Japan's ratification of the Geneva protocol, undersigned by 70 nations, which posed strict limits to the use of both biological and chemical weapons. In actual fact, the protocol allowed these weapons for defensive purposes, and permitted their experimental development. The research programme, developed with the support of the high command of the Japanese army and certainly known by the Emperor (Tenno) Hirohito, had its operative basis from the year 1932 in the satellite state of Manchukuo, but later and paralleling the increased, aggressive behaviour towards China and the English and American colonies during World War II, spread towards other Asian provinces occupied by the Japanese armies, with other operative units. In these dedicated bases, which were true concentration camps, numerous experiments were carried out on human guinea pigs, frequently concluding with vivisection. Among others, experiments of freezing, thirst, hunger, loss of blood, wounding with firearms, and bone fractures, were performed, as well as the inoculation of

  8. A Biological Security Motivation System for Potential Threats: Are There Implications for Policy-Making?


    Woody, Erik Z.; Henry eSzechtman


    Research indicates that there is a specially adapted, hard-wired brain circuit, the security motivation system, which evolved to manage potential threats, such as the possibility of contamination or predation. The existence of this system may have important implications for policy-making related to security. The system is sensitive to partial, uncertain cues of potential danger, detection of which activates a persistent, potent motivational state of wariness or anxiety. This state motivates ...

  9. A Biological Security Motivation System for Potential Threats: Are There Implications for Policy-Making?

    Directory of Open Access Journals (Sweden)

    Erik Z Woody


    Full Text Available Research indicates that there is a specially adapted, hard-wired brain circuit, the security motivation system, which evolved to manage potential threats, such as the possibility of contamination or predation. The existence of this system may have important implications for policy-making related to security. The system is sensitive to partial, uncertain cues of potential danger, detection of which activates a persistent, potent motivational state of wariness or anxiety. This state motivates behaviours to probe the potential danger, such as checking, and to correct for it, such as washing. Engagement in these behaviours serves as the terminating feedback for the activation of the system. Because security motivation theory makes predictions about what kinds of stimuli activate security motivation and what conditions terminate it, the theory may have applications both in understanding how policy-makers can best influence others, such as the public, and also in understanding the behavior of policy-makers themselves.

  10. Population size, breeding biology and on-land threats of Cape Verde petrel (Pterodroma feae) in Fogo Island, Cape Verde (United States)

    Zango, Laura; Calabuig, Pascual; Stefan, Laura M.; González-Solís, Jacob


    Cape Verde petrel (Pterodroma feae) is currently considered near threatened, but little is known about its population size, breeding biology and on land threats, jeopardizing its management and conservation. To improve this situation, we captured, marked and recaptured (CMR) birds using mist-nets over 10 years; measured and sexed them; monitored up to 14 burrows, deployed GPS devices on breeders and analyzed activity data of geolocators retrieved from breeders in Fogo (Cape Verde). We set cat traps over the colony and investigated their domestic/feral origin by marking domestic cats from a nearby village with transponders, by deploying GPS devices on domestic cats and by performing stable isotope analyses of fur of the trapped and domestic cats. The population of Fogo was estimated to be 293 birds, including immatures (95% CI: 233–254, CMR modelling). Based on geolocator activity data and nest monitoring we determined the breeding phenology of this species and we found biometric differences between sexes. While monitoring breeding performance, we verified a still ongoing cat predation and human harvesting. Overall, data gathered from trapped cats without transponder, cats GPS trips and the distinct isotopic values between domestic and trapped cats suggest cats visiting the colony are of feral origin. GPS tracks from breeders showed birds left and returned to the colony using the sector NE of the islands, where high level of public lights should be avoided specially during the fledging period. Main threats for the Cape Verde petrel in the remaining breeding islands are currently unknown but likely to be similar to Fogo, calling for an urgent assessment of population trends and the control of main threats in all Cape Verde Islands and uplisting its conservation status. PMID:28369105

  11. Tactical Nuclear Weapons: Their Purpose and Placement (United States)


    still perceived the potential spread of these clashes as a threat to its security. Volatility was expected to come from ethnic, religious, cultural...nuclear weapons in this new global environment. NATO’s 1999 and 2010 strategic concepts describe a change in concern from the spillover threats of the

  12. A new threat to bees? Entomopathogenic nematodes used in biological pest control cause rapid mortality in Bombus terrestris

    Directory of Open Access Journals (Sweden)

    Alexandrea Dutka


    Full Text Available There is currently a great deal of concern about population declines in pollinating insects. Many potential threats have been identified which may adversely affect the behaviour and health of both honey bees and bumble bees: these include pesticide exposure, and parasites and pathogens. Whether biological pest control agents adversely affect bees has been much less well studied: it is generally assumed that biological agents are safer for wildlife than chemical pesticides. The aim of this study was to test whether entomopathogenic nematodes sold as biological pest control products could potentially have adverse effects on the bumble bee Bombus terrestris. One product was a broad spectrum pest control agent containing both Heterorhabditis sp. and Steinernema sp., the other product was specifically for weevil control and contained only Steinernema kraussei. Both nematode products caused ≥80% mortality within the 96 h test period when bees were exposed to soil containing entomopathogenic nematodes at the recommended field concentration of 50 nematodes per cm2 soil. Of particular concern is the fact that nematodes from the broad spectrum product could proliferate in the carcasses of dead bees, and therefore potentially infect a whole bee colony or spread to the wider environment.

  13. A new threat to bees? Entomopathogenic nematodes used in biological pest control cause rapid mortality in Bombus terrestris. (United States)

    Dutka, Alexandrea; McNulty, Alison; Williamson, Sally M


    There is currently a great deal of concern about population declines in pollinating insects. Many potential threats have been identified which may adversely affect the behaviour and health of both honey bees and bumble bees: these include pesticide exposure, and parasites and pathogens. Whether biological pest control agents adversely affect bees has been much less well studied: it is generally assumed that biological agents are safer for wildlife than chemical pesticides. The aim of this study was to test whether entomopathogenic nematodes sold as biological pest control products could potentially have adverse effects on the bumble bee Bombus terrestris. One product was a broad spectrum pest control agent containing both Heterorhabditis sp. and Steinernema sp., the other product was specifically for weevil control and contained only Steinernema kraussei. Both nematode products caused ≥80% mortality within the 96 h test period when bees were exposed to soil containing entomopathogenic nematodes at the recommended field concentration of 50 nematodes per cm(2) soil. Of particular concern is the fact that nematodes from the broad spectrum product could proliferate in the carcasses of dead bees, and therefore potentially infect a whole bee colony or spread to the wider environment.

  14. Early Warning of Biological Threats via Surface-Enhanced Raman Spectroscopy: A Case Study of Bacillus Spores

    Directory of Open Access Journals (Sweden)

    Antonia Lai


    Full Text Available A study on the application of surface-enhanced Raman spectroscopy (SERS in detecting biological threats is here reported. Simulants of deadly Bacillus anthracis endospores were used. This study proposes an automated device where SERS is used as a fast, pre-alarm technique of a two-stage sensor equipped with a real-time polymerase chain reaction (PCR. In order to check the potentialities of SERS in terms of sensitivity and specificity for on-site, real-time, automatic detection and identification of biological agents, two strains of genetically and harmless closely B. anthracis-related spores, Bacillus thuringiensis and Bacillus atrophaeus, were used as simulants. In order to assure the selectivity of the SERS substrate against B. thuringiensis spores, the substrate was functionalized by specific peptides. The obtained SERS measurements are classified as positive or negative hits by applying a special data evaluation based on the Euclidian distance between each spectrum and a reference spectrum of blank measurement. Principal component analysis (PCA was applied for discriminating between different strains representing dangerous and harmless spores. The results show that the SERS sensor is capable of detecting a few tenths of spores in a few minutes, and is particularly sensitive and fast for this purpose. Post-process analysis of the spectra allowed for discrimination between the contaminated and uncontaminated SERS sensors and even between different strains of spores, although not as clearly. For this purpose, the use of a non-functionalized SERS substrate is suggested.

  15. Proliferation of massive destruction weapons: fantasy or reality?; La proliferation des armes de destruction massive: fantasme ou realite?

    Energy Technology Data Exchange (ETDEWEB)

    Duval, M


    This article evaluates the threat of massive destruction weapons (nuclear, chemical, biological) for Europe and recalls the existing safeguards against the different forms of nuclear proliferation: legal (non-proliferation treaty (NPT), comprehensive nuclear test ban treaty (CTBT), fissile material cut off treaty (FMCT) etc..), technical (fabrication of fissile materials, delays). However, all these safeguards can be overcome as proven by the activities of some countries. The situation of proliferation for the other type of massive destruction weapons is presented too. (J.S.)

  16. Rapid Detection of Biological and Chemical Threat Agents Using Physical Chemistry, Active Detection, and Computational Analysis

    Energy Technology Data Exchange (ETDEWEB)

    Chung, Myung; Dong, Li; Fu, Rong; Liotta, Lance; Narayanan, Aarthi; Petricoin, Emanuel; Ross, Mark; Russo, Paul; Zhou, Weidong; Luchini, Alessandra; Manes, Nathan; Chertow, Jessica; Han, Suhua; Kidd, Jessica; Senina, Svetlana; Groves, Stephanie


    Basic technologies have been successfully developed within this project: rapid collection of aerosols and a rapid ultra-sensitive immunoassay technique. Water-soluble, humidity-resistant polyacrylamide nano-filters were shown to (1) capture aerosol particles as small as 20 nm, (2) work in humid air and (3) completely liberate their captured particles in an aqueous solution compatible with the immunoassay technique. The immunoassay technology developed within this project combines electrophoretic capture with magnetic bead detection. It allows detection of as few as 150-600 analyte molecules or viruses in only three minutes, something no other known method can duplicate. The technology can be used in a variety of applications where speed of analysis and/or extremely low detection limits are of great importance: in rapid analysis of donor blood for hepatitis, HIV and other blood-borne infections in emergency blood transfusions, in trace analysis of pollutants, or in search of biomarkers in biological fluids. Combined in a single device, the water-soluble filter and ultra-sensitive immunoassay technique may solve the problem of early warning type detection of aerosolized pathogens. These two technologies are protected with five patent applications and are ready for commercialization.

  17. Military and diplomatic roles and options for managing and responding to the proliferation of ballistic missiles and weapons of mass destruction. Final report: Program on Stability and the Offense/Defense Relationship

    Energy Technology Data Exchange (ETDEWEB)

    Hallenbeck, R.A.; Gill, J.M.; Murray, B.L.


    The March seminar, ``Military and Diplomatic Roles and Options`` for managing and responding to proliferation, featured three presentations: the military and diplomatic implications of preemptive force as a counterproliferation option; an in-depth assessment of the threat posed by biological weapons; and, a new proposed US counterproliferation policy.

  18. The Bioterrorism Threat by Non-State Actors: Hype or Horror? (United States)


    Outbreak of Salmonellosis Caused by Intentional Contamination of Restaurant Salad Bars,” in Biological Weapons: Limiting the Threat, ed. Joshua...cult succeeded with tactically employing the S. typhimurium bioweapon as clearly shown by the outbreak of salmonellosis infecting at least 751...Birkness, M. R. Skeels, J. M. Horan, and L. R. Foster. “A Large Community Outbreak of Salmonellosis Caused by Intentional Contamination of Restaurant

  19. Occurrence of exotic carriers arbovirus fevers – new insufficiently estimated biological threat to southern regions of Russia

    Directory of Open Access Journals (Sweden)

    V. P. Sergiev


    Full Text Available Delivery of originators of infectious and parasitic illnesses on new territories can pass by means of mosquitoes which in modern conditions extend quickly. Getting on new territories they take roots and provide transfer of this or that originator. Or they provide initial case rate, and then viruses start to circulate among mosquitoes – natural representatives of local fauna. As it was with virus Denge delivered to Greece with mosquitoes Aedes aegypti. This kind of a mosquito by 1950 has been destroyed at the Black Sea coast of Caucasus. In the beginning of 21 centuries this kind again began to be found out in earlier free territories. Occurrence after 50-years absence of an effective carrier in the south of Russia is serious biological threat to epidemic well-being of the country in case of delivery of originators arbovirus infections.

  20. Non-Proliferation Regimes: A Comparative Analysis of Policies to Control the Spread of Nuclear, Chemical and Biological Weapons and Missiles (United States)


    of Nuclear Weapons in Latin America (Treaty of Tlatelolco ), entered into force April 22, 1968 The Treaty for the Prohibition of Nuclear Weapons in...and the Treaty of Tlatelolco may contribute to future regime-building efforts. 5) Nuclear Suppliers Guidelines (NSG): The Zangger Committee and the

  1. Metal Detector Searches: An Effective Means To Help Keep Weapons Out of Schools. (United States)

    Johnson, Robert S.


    Disagrees with Ferraraccio's views and argues that: (1) students do bring illegal weapons to school; (2) metal detectors do detect weapons and help schools to disarm students; (3) disarming students reduces the threat of violence; and (4) courts have repeatedly approved the constitutionality of weapon-related suspicionless student searches…

  2. Concealed weapons detection using electromagnetic resonances (United States)

    Hunt, Allen R.; Hogg, R. Douglas; Foreman, William


    Concealed weapons pose a significant threat to both law enforcement and security agency personnel. The uncontrolled environments associated with peacekeeping and the move toward relaxation of concealed weapons laws here in the U.S. provide a strong motivation for developing weapons detection technologies which are noninvasive and can function noncooperatively. Existing weapons detection systems are primarily oriented to detecting metal and require the cooperation of the person being searched. The new generation of detectors under development that focuses primarily on imaging methods, faces problems associated with privacy issues. There remains a need for a weapons detector which is portable, detects weapons remotely, avoids the issues associated with privacy rights, can tell the difference between car keys and a knife, and is affordable enough that one can be issued to every peacekeeper and law enforcement officer. AKELA is developing a concealed weapons detector that uses wideband radar techniques to excite natural electromagnetic resonances that characterize the size, shape, and material composition of an object. Neural network processing is used to classify the difference between weapons and nuisance objects. We have constructed both time and frequency domain test systems and used them to gather experimental data on a variety of armed and unarmed individuals. These experiments have been performed in an environment similar to the operational environment. Preliminary results from these experiments show that it is possible to detect a weapon being carried by an individual from a distance of 10 to 15 feet, and to detect a weapon being concealed behind the back. The power required is about 100 milliwatts. A breadboard system is being fabricated and will be used by AKELA and our law enforcement partner to gather data in operationally realistic situations. While a laptop computer will control the breadboard system, the wideband radar electronics will fit in a box the

  3. Improving Visual Threat Detection: Research to Validate the Threat Detection Skills Trainer (United States)


    above, these responses included: • “The unsettled dirt,” • “ Grassy area,” and • “Weapons not held properly.” We hypothesized that training would...alternative explanation is that with training, participants narrow their choices to threat relevant cues rather than identifying all possible threats

  4. Bioterrorism and Biological Warfare, from Past to the Present: A classic review

    Directory of Open Access Journals (Sweden)

    Majid Zare Bidaki


    Full Text Available Bioterrorism is defined as any terrorist action of intentional release or dissemination of highly pathogenic biological agents, including a variety of microorganisms or biological toxins. With the growing threat of terrorism, is necessary that the potential danger of various microorganisms – as a powerful tool of aggression and threat- to be taken seriously. This review tries to explain the concept of biological weapons and their historical development process with an emphasis on efforts to control the proliferation of these types of weapons over the last century. Potential impact of infectious diseases on people and armed forces was known from since 600 BC. Using the victims of the plague as a weapon in medieval warfare and spread of smallpox as a weapon during the war against the Indians when initially America was discovered, the development of biological weapons during the World War I, World War II and the Cold War, and even since the beginning of the third millennium, all show the strategic importance of pathogenic microorganisms as a deterrent power for the superiority of some governments and cults. Historical attempts to use infectious diseases as biological weapons reveal that the distinction between a natural outbreak of an infectious disease and that of a deliberate biological attack is very difficult. Abusing this characteristic of infectious diseases has made it possible for the purposes of superiority. International agreements to control the development of biological weapons, such as “the 1925 Geneva Protocol” and “the Convention on the Prohibition of the Development, Production and Stockpiling of Biological and Toxic Weapons” have not been able to control the development and using of biological warfare.  The current paper is a classic review (Overview article aiming at increasing the knowledge and awareness of people especially of health authorities and government officials.

  5. A Concept of a Probable Autoinjector for Bio-threat Agents

    Directory of Open Access Journals (Sweden)

    R.V. Geetha


    Full Text Available Chemical and biological weapons can be used during conflicts and by terrorists to injure or kill humans and animals. Chemical weapons contain toxic chemicals and biological weapons contain pathogenic organisms. With proper protective equipments and training, the lethal effects of chemical and biological warfare agents can be minimised. First aid kit is available that contain detection, decontamination and medical protection for chemical warfare agents including autoinjectors, for rapid administration and faster absorption of drugs. The autoinjectors are safe and available for life saving drugs like atropine sulphate and pralidoxime chloride (nerve agent poisoning, epinephrine (anaphylaxis, diazepam (seizures and sumatriptan (migraine. For bio-threat agents doxycycline alone is available as a broad spectrum antibiotic in the first aid kit. Majority of the bacterial agents are gram negative and hence amikacin drug cartridge was developed for the existing autoinjector. The advantage of amikacin is its safety, stability, can be given prophylactically and supplemented with other antibiotics when medical attention arrives. The usability and tolerability of amikacin administered repeatedly through autoinjector was studied using various haematological, biochemical and oxidative stress parameters in animal models. The results are promising and as there is no antibiotic autoinjector available, amikacin autoinjector can be considered for bio-threat agents.

  6. 3 CFR - Continuation of Emergency With Respect to Weapons of Mass Destruction (United States)


    ... 3 The President 1 2010-01-01 2010-01-01 false Continuation of Emergency With Respect to Weapons of... Continuation of Emergency With Respect to Weapons of Mass Destruction On November 14, 1994, by Executive Order... of nuclear, biological, and chemical weapons (weapons of mass destruction) and the means...

  7. 75 FR 68671 - Continuation of Emergency With Respect to Weapons of Mass Destruction (United States)


    ... Notice of November 4, 2010--Continuation of Emergency With Respect to Weapons of Mass Destruction #0; #0... Continuation of Emergency With Respect to Weapons of Mass Destruction On November 14, 1994, by Executive Order... of nuclear, biological, and chemical weapons (weapons of mass destruction) and the means...

  8. 77 FR 66513 - Continuation of the National Emergency With Respect to Weapons of Mass Destruction (United States)


    ... Documents#0;#0; ] Notice of November 1, 2012 Continuation of the National Emergency With Respect to Weapons... economy of the United States posed by the proliferation of nuclear, biological, and chemical weapons (weapons of mass destruction) and the means of delivering such weapons. On July 28, 1998, the...

  9. Nuclear weapons modernizations

    Energy Technology Data Exchange (ETDEWEB)

    Kristensen, Hans M. [Federation of American Scientists, Washington, DC (United States)


    This article reviews the nuclear weapons modernization programs underway in the world's nine nuclear weapons states. It concludes that despite significant reductions in overall weapons inventories since the end of the Cold War, the pace of reductions is slowing - four of the nuclear weapons states are even increasing their arsenals, and all the nuclear weapons states are busy modernizing their remaining arsenals in what appears to be a dynamic and counterproductive nuclear competition. The author questions whether perpetual modernization combined with no specific plan for the elimination of nuclear weapons is consistent with the nuclear Non-Proliferation Treaty and concludes that new limits on nuclear modernizations are needed.

  10. Biological Weapons Attribution: A Primer (United States)


    person avian bird flu cases since the epidemic had begun in March of 2003.120 In three years, bird flu spread to over forty countries, affecting...February 15, 2006. 120 Associated Press, “Human spread No. 1 suspect in bird flu cluster,” MSNBC (May 24, 2006). Republic of the Congo, and the bird flu spreading like wild-fire across the globe all highlight the intrinsic difficulties in identifying

  11. Reverse zoonotic disease transmission (zooanthroponosis: a systematic review of seldom-documented human biological threats to animals.

    Directory of Open Access Journals (Sweden)

    Ali M Messenger

    Full Text Available BACKGROUND: Research regarding zoonotic diseases often focuses on infectious diseases animals have given to humans. However, an increasing number of reports indicate that humans are transmitting pathogens to animals. Recent examples include methicillin-resistant Staphylococcus aureus, influenza A virus, Cryptosporidium parvum, and Ascaris lumbricoides. The aim of this review was to provide an overview of published literature regarding reverse zoonoses and highlight the need for future work in this area. METHODS: An initial broad literature review yielded 4763 titles, of which 4704 were excluded as not meeting inclusion criteria. After careful screening, 56 articles (from 56 countries over three decades with documented human-to-animal disease transmission were included in this report. FINDINGS: In these publications, 21 (38% pathogens studied were bacterial, 16 (29% were viral, 12 (21% were parasitic, and 7 (13% were fungal, other, or involved multiple pathogens. Effected animals included wildlife (n = 28, 50%, livestock (n = 24, 43%, companion animals (n = 13, 23%, and various other animals or animals not explicitly mentioned (n = 2, 4%. Published reports of reverse zoonoses transmission occurred in every continent except Antarctica therefore indicating a worldwide disease threat. INTERPRETATION: As we see a global increase in industrial animal production, the rapid movement of humans and animals, and the habitats of humans and wild animals intertwining with great complexity, the future promises more opportunities for humans to cause reverse zoonoses. Scientific research must be conducted in this area to provide a richer understanding of emerging and reemerging disease threats. As a result, multidisciplinary approaches such as One Health will be needed to mitigate these problems.

  12. Application of a Dynamic Programming Algorithm for Weapon Target Assignment (United States)


    targets by simply optimizing the total ‘ cost ’ of all assignments (in the WTA case the cost relates to the threat minimisation benefit). LAPs inbound missile or as a weapons system about to launch a missile. Such an approach requires a high degree of situational awareness [14], whereas... costs . 3.1 Static Weapon Target Assignment using Exhaustive Enumeration As previously mentioned, since there is no exact solution to determining the

  13. Prevent, Counter, and Respond - A Strategic Plan to Reduce Global Nuclear Threats (FY 2016-FY2020)

    Energy Technology Data Exchange (ETDEWEB)



    NNSA’s second core mission is reducing global nuclear dangers by preventing the acquisition of nuclear weapons or weapons-usable materials, countering efforts to acquire such weapons or materials, and responding to nuclear or radiological incidents. In 2015, NNSA reorganized its nonproliferation activities based on core competencies and realigned its counterterrorism and counterproliferation functions to more efficiently address both current and emerging threats and challenges. The reorganization accompanied the March 2015 release of the first ever Prevent, Counter, and Respond – A Strategic Plan to Reduce Global Nuclear Threats. This report, which NNSA will update annually, highlights key nuclear threat trends and describes NNSA’s integrated threat reduction strategy.

  14. Re-examining the 1996 ICJ Advisory Opinion: Concerning the Legality of Nuclear Weapons

    Directory of Open Access Journals (Sweden)

    Jasjit Singh


    Full Text Available The primary objections raised against total elimination of nuclear weapons are built around a few arguments mostly of non-technical nature.Nuclear weapons and the strategies for their use have resulted in the establishment of a vicious circle within which the international community is trapped.The argument that the world will be unsafe without nuclear weapons is only meant to further the narrow self-interest of the nuclear weapon states and their allies.The World Court’s far-reaching 1996 advisory opinion concluded that almost any use or threat of use of nuclear weapons would violate international humanitarian law and law applicable in armed conflict, undermining most claims of nuclear weapon states regarding the legitimacy of possession, use or threat of use of nuclear weapons. The next logical step would be an initiative for a nuclear convention banning the use and threat of use of nuclear weapons in Asia and the adjoining oceans. But as long as the dominant elites in society and the nation-state believe in the utility of nuclear weapons for national security or as the currency of power, abolition of nuclear weapons will remain a mirage.

  15. Nuclear Threats and Security

    Directory of Open Access Journals (Sweden)

    Garry Jacobs


    Full Text Available This article presents highlights and insights from the International Conference on “Nuclear Threats and Security” organized by the World Academy of Art and Science in association with the European Leadership Network and the Dag Hammarskjöld University College of International Relations and Diplomacy and sponsored by NATO at the Inter-University Centre, Dubrovnik on September 14-16, 2012. The conference examined important issues related to nuclear non-proliferation and disarmament, the legality of nuclear weapons and their use, illicit trade in nuclear materials, the dangers of nuclear terrorism, nuclear- and cyber-security. Papers and video recordings of the major presentations and session summaries can be found here.

  16. Overall view of chemical and biochemical weapons. (United States)

    Pitschmann, Vladimír


    This article describes a brief history of chemical warfare, which culminated in the signing of the Chemical Weapons Convention. It describes the current level of chemical weapons and the risk of using them. Furthermore, some traditional technology for the development of chemical weapons, such as increasing toxicity, methods of overcoming chemical protection, research on natural toxins or the introduction of binary technology, has been described. In accordance with many parameters, chemical weapons based on traditional technologies have achieved the limit of their development. There is, however, a big potential of their further development based on the most recent knowledge of modern scientific and technical disciplines, particularly at the boundary of chemistry and biology. The risk is even higher due to the fact that already, today, there is a general acceptance of the development of non-lethal chemical weapons at a technologically higher level. In the future, the chemical arsenal will be based on the accumulation of important information from the fields of chemical, biological and toxin weapons. Data banks obtained in this way will be hardly accessible and the risk of their materialization will persist.

  17. Overall View of Chemical and Biochemical Weapons

    Directory of Open Access Journals (Sweden)

    Vladimír Pitschmann


    Full Text Available This article describes a brief history of chemical warfare, which culminated in the signing of the Chemical Weapons Convention. It describes the current level of chemical weapons and the risk of using them. Furthermore, some traditional technology for the development of chemical weapons, such as increasing toxicity, methods of overcoming chemical protection, research on natural toxins or the introduction of binary technology, has been described. In accordance with many parameters, chemical weapons based on traditional technologies have achieved the limit of their development. There is, however, a big potential of their further development based on the most recent knowledge of modern scientific and technical disciplines, particularly at the boundary of chemistry and biology. The risk is even higher due to the fact that already, today, there is a general acceptance of the development of non-lethal chemical weapons at a technologically higher level. In the future, the chemical arsenal will be based on the accumulation of important information from the fields of chemical, biological and toxin weapons. Data banks obtained in this way will be hardly accessible and the risk of their materialization will persist.

  18. Nonstrategic Nuclear Weapons (United States)


    William Potter , and Nikolai Sokov, Reducing and Regulating Tactical (Nonstrategic) Nuclear Weapons in Europe, The James Martin Center For...See William C. Potter and Nikolai Sokov, “Nuclear Weapons that People Forget,” International Herald Tribune, May 31, 2000. 87 Sam Nunn, Igor...their security.97 94 Kent Harris , “NATO Allies Want U.S. Nuclear Weapons out of Europe

  19. Public health and bioterrorism: renewed threat of anthrax and smallpox. (United States)

    Wallin, Arūne; Luksiene, Zivile; Zagminas, Kestutis; Surkiene, Gene


    Bioterrorism is one of the main public health categorical domains. According to sociological analytics, in postmodern society terrorism is one of the real threats of the 21st century. While rare, the use of biological weapons has a long history. Recently, anthrax has been evaluated as one of the most dangerous biological weapons. Naturally occurring anthrax in humans is a disease acquired from contact with anthrax-infected animals or anthrax-contaminated animal products. Usually anthrax infection occurs in humans by three major routes: inhalational, cutaneous, and gastrointestinal. Inhalational anthrax is expected to account for most serious morbidity and most mortality. The clinical presentation of inhalation anthrax has been described as a two-stage illness. Many factors contribute to the pathogenesis of Bacillus anthracis. Antibiotics, anthrax globulin, corticosteroids, mechanical ventilation, vaccine are possible tools of therapy. Smallpox existed in two forms: variola major, which accounted for most morbidity and mortality, and a milder form, variola minor. Smallpox spreads from person to person primarily by droplet nuclei or aerosols expelled from the oropharynx of infected persons and by direct contact. In the event of limited outbreak with few cases, patients should be admitted to the hospital and confined to rooms that are under negative pressure and equipped with high-efficiency particulate air filtration. In larger outbreaks, home isolation and care should be the objective for most patients. Progress in detection, suitable vaccines, postexposure prophylaxis, infection control, and decontamination might be serious tools in fight against the most powerful biological weapon. To assure that the public health and healthcare system can respond to emergencies, the government should direct resources to strengthen the emergency-response system, create medication stockpiles, and improve the public health infrastructure.

  20. 78 FR 67289 - Continuation of the National Emergency With Respect to the Proliferation of Weapons of Mass... (United States)


    ... Emergency With Respect to the Proliferation of Weapons of Mass Destruction On November 14, 1994, by... proliferation of nuclear, biological, and chemical weapons (weapons of mass destruction) and the means of delivering such weapons. On July 28, 1998, the President issued Executive Order 13094 amending...

  1. Reconversion of nuclear weapons

    CERN Document Server

    Kapitza, Sergei P


    The nuclear predicament or nuclear option. Synopsis of three lectures : 1- The physical basis of nuclear technology. Physics of fission. Chain reaction in reactors and weapons. Fission fragments. Separration of isotopes. Radiochemistry.2- Nuclear reactors with slow and fast neutrons. Power, size, fuel and waste. Plutonium production. Dose rate, shielding and health hazard. The lessons of Chernobyl3- Nuclear weapons. Types, energy, blast and fallout. Fusion and hydrogen bombs. What to do with nuclear weapons when you cannot use them? Testing. Nonmilittary use. Can we get rid of the nuclear weapon? Nuclear proliferation. Is there a nuclear future?

  2. Of guns and snakes: testing a modern threat superiority effect. (United States)

    Subra, Baptiste; Muller, Dominique; Fourgassie, Lisa; Chauvin, Alan; Alexopoulos, Theodore


    Previous studies suggest that ancient (i.e. evolutionary-based) threats capture attention because human beings possess an inborn module shaped by evolution and dedicated to their detection. An alternative account proposes that a key feature predicting whether a stimulus will capture attention is its relevance rather than its ontology (i.e. phylogenetic or ontogenetic threat). Within this framework, the present research deals with the attentional capture by threats commonly encountered in our urban environment. In two experiments, we investigate the attentional capture by modern threats (i.e. weapons). In Experiment 1, participants responded to a target preceded by a cue, which was a weapon or a non-threatening stimulus. We found a larger cuing effect (faster reaction times to valid vs. invalid trials) with weapons as compared with non-threatening cues. In Experiment 2, modern (e.g. weapons) and ancient threats (e.g. snakes) were pitted against one another as cues to determine which ones preferentially capture attention. Crucially, participants were faster to detect a target preceded by a modern as opposed to an ancient threat, providing initial evidence for a superiority of modern threat. Overall, the present findings appear more consistent with a relevance-based explanation rather than an evolutionary-based explanation of threat detection.

  3. Public perspectives of nuclear weapons in the post-cold war environment

    Energy Technology Data Exchange (ETDEWEB)

    Jenkins-Smith, H.C.; Herron, K.G. [Univ. of New Mexico, Albuquerque, NM (United States). Institute for Public Policy; Barke, R.P. [Georgia Institute of Technology, Atlanta, GA (United States). School of Public Policy


    This report summarizes the findings of a nationwide survey of public perceptions of nuclear weapons in the post-cold war environment. Participants included 1,301 members of the general public, 1,155 randomly selected members of the Union of Concerned Scientists, and 1,226 employees randomly selected from the technical staffs of four DOE national laboratories. A majority of respondents from all three samples perceived the post-cold war security environment to pose increased likelihood of nuclear war, nuclear proliferation, and nuclear terrorism. Public perceptions of nuclear weapons threats, risks, utilities, and benefits were found to systematically affect nuclear weapons policy preferences in predictable ways. Highly significant relationships were also found between public trust and nuclear weapons policy preferences. As public trust and official government information about nuclear weapons increased, perceptions of nuclear weapons management risks decreased and perceptions of nuclear weapons utilities and benefits increased. A majority of respondents favored decreasing funding for: (1) developing and testing new nuclear weapons; (2) maintaining existing nuclear weapons, and (3) maintaining the ability to develop and improve nuclear weapons. Substantial support was found among all three groups for increasing funding for: (1) enhancing nuclear weapons safety; (2) training nuclear weapons personnel; (3) preventing nuclear proliferation; and (4) preventing nuclear terrorism. Most respondents considered nuclear weapons to be a persistent feature of the post-cold war security environment.


    Directory of Open Access Journals (Sweden)

    Lyatsa A. Kodzokova


    Full Text Available Abstract: The article considers the restrictions imposed on the circulation of civilian and service weapons. The author analyzes the restrictions on the circulation of weapons, the procedure for their implementation in practice. Federal Law "On weapons" only in paragraph 6 p. 1, art. 6 "Restrictions imposed on the circulation of civilian and service weapons" refers to the prohibition of 'turnover as a civilian and service weapons and other items affecting the action is based on the use of radiation and biological factors; weapons and other items affecting the action is based on the use of electromagnetic, light, thermal, subsonic or ultrasonic radiation and which have output parameters that exceed the value set by state standards of the Russian Federation and the relevant regulations of the federal executive authority in the field of public health, as well as these weapons and items produced outside the Russian territory " How to regard this provision of the law? As the transfer of new weapons, not specific item. 25 of the Federal Law "On weapons", or items prohibited for circulation in the territory of our state? This inconsistency decreases the effectiveness of the legal regulation of arms trafficking. Unification of definitions in this area will allow applying the law correctly and reasonably, including criminal. But for this it is necessary taking into account the experience and the modern needs of the various branches of law provide a clearer definition of "weapon" and its species. The author's conclusions may be used in law enforcement. 

  5. Veteran Transfer Students and Concealed Weapons on Campus (United States)

    Pesetski, Christine; Ofstein, Jennifer; Outlaw, Stacy; Brooks, Racheal


    This case details the challenges faced by various members of a 4-year university regarding Kathryn, a non-traditional transfer student and military veteran who recently returned from a traumatic deployment in Afghanistan. Precisely, this study identifies ambiguities pertaining to (a) threat assessment, (b) university weapons policies, (c) transfer…

  6. The nuclear threat; La menace nucleaire

    Energy Technology Data Exchange (ETDEWEB)

    Tertrais, Bruno


    For a long time, a small group of big powers has been the only holder of nuclear weapons (US, USSR, Great Britain, France and China). Since then, new weapons have come out on the geopolitical scene: Israel, India, Pakistan, and some others remain uncertain and generate a worrying atmosphere (North Korea, Iran..). But what is the real risk with nuclear proliferation? Should we dread about it? Is nuclear terrorism a real threat? What are the political stakes of nuclear weapons? Is disarmament a real solution? These are some of the questions that the author answers in a precise and clear manner in this book. Contents: 1 - from monopoly to proliferation: who owns nuclear weapons today, why is it so coveted, is it easy to make one?; 2 - the newcomers: what do we really know about the Iranian nuclear programme, Iran and North Korea: between negotiation and confrontation; 3 - international control and regulation: do we have reliable information, how do we know what we know, Iraq: was there a 'lie' somewhere, who are the states who have renounced nuclear weapons?; 4 - the future: is there still a nuclear warfare risk, what if Pakistani weapons fall into islamic hands, is nuclear terrorism a fantasy or a real risk?

  7. 77 FR 27208 - Renewal of Threat Reduction Advisory Committee (United States)


    ... security affairs, weapons of mass destruction, nuclear physics, chemistry, and biology. The Committee... (Acquisition, Technology, and Logistics) and the Assistant Secretary of Defense (Nuclear, Chemical and... States, its military forces, and its allies and partners posed by nuclear, biological,...

  8. Virtual nuclear weapons

    Energy Technology Data Exchange (ETDEWEB)

    Pilat, J.F.


    The term virtual nuclear weapons proliferation and arsenals, as opposed to actual weapons and arsenals, has entered in recent years the American lexicon of nuclear strategy, arms control, and nonproliferation. While the term seems to have an intuitive appeal, largely due to its cyberspace imagery, its current use is still vague and loose. The author believes, however, that if the term is clearly delineated, it might offer a promising approach to conceptualizing certain current problems of proliferation. The first use is in a reference to an old problem that has resurfaced recently: the problem of growing availability of weapon-usable nuclear materials in civilian nuclear programs along with materials made `excess` to defense needs by current arms reduction and dismantlement. It is argued that the availability of these vast materials, either by declared nuclear-weapon states or by technologically advanced nonweapon states, makes it possible for those states to rapidly assemble and deploy nuclear weapons. The second use has quite a different set of connotations. It is derived conceptually from the imagery of computer-generated reality. In this use, one thinks of virtual proliferation and arsenals not in terms of the physical hardware required to make the bomb but rather in terms of the knowledge/experience required to design, assemble, and deploy the arsenal. Virtual weapons are a physics reality and cannot be ignored in a world where knowledge, experience, materials, and other requirements to make nuclear weapons are widespread, and where dramatic army reductions and, in some cases, disarmament are realities. These concepts are useful in defining a continuum of virtual capabilities, ranging from those at the low end that derive from general technology diffusion and the existence of nuclear energy programs to those at the high end that involve conscious decisions to develop or maintain militarily significant nuclear-weapon capabilities.

  9. Review of Radioisotopes as Radiological Weapons (United States)


    radiation for the pur- pose of weapons use I-131 8.04 d 4590 β and  0.2 43573E-05 Nuclear fusion prod- uct/medical Solid/salt Cs-137 30.17 y 3.22 β...Requirements Office (JRO) for Chemical, Biological, Radiological and Nuclear (CBRN) Defense (J-8/JRO) and the US Army Office of The Surgeon General...D)], radiation dispersal devices (RDD), and improvised nuclear devices (IND), as well as conventional nuclear weapons.”1 To accomplish this task

  10. The threat from without

    Directory of Open Access Journals (Sweden)

    Lassi Saressalo


    him with his own weapon come close to the myth of the beginning of time when a Lapp managed to secure his existence and defend his community against an outside threat. Without the proto-Lapp battle against evil, the community would not have had a chance to exist, the right to live in its area, as the community does nowadays.

  11. 世界动物卫生组织降低动物疫病生物威胁行动概略%A Brief on OIE Actions on Animal Disease Biological Threat Reduction

    Institute of Scientific and Technical Information of China (English)

    庞素芬; 丁家波; 颜起斌


    由于动物疫病会对公共卫生、经济和社会稳定及贸易产生严重影响,病原也容易被获取,因此动物疫病被认为是生物威胁。OIE通过降低生物威胁策略和相应行动,不断强化全球的生物安全,使全球免受自然发生的、蓄意行为或事故等非自然因素造成的传染病威胁。OIE在该方面的行动主要是加强合作和强化卫生体系统一行动,包括制定和实施动物卫生国际标准,进行动物疫病监测、应对及能力建设和教育,进行所有生物威胁的预防、监测和应对。%As animal diseases have impact on public health,animal health,and economics,and animal pathogens are easy to acquire,so animal diseases are considered as biological threats. By Biological Threat Reduction Strategy and some related actions,OIE strengthens biological security worldwide and makes the world free from all biological threats whether they are animal pathogens from natural or deliberate,accidental events. OIE will focus on building a consensus for actions and enhancing cooperation. The actions include international standard setting and implementation,surveil-lance and response,capacity building and education,to strengthen the ability of health systems to prevent,detect and respond to all biological threats.

  12. Operational research in weapon system

    Directory of Open Access Journals (Sweden)

    R. S. Varma


    Full Text Available "The paper is divided into three parts: (a The first part deals with what operational research is. (bThe second part gives what we mean by Weapon Systems and discusses considerations that determine the choice of a particular weapon system from a class weapon systems. (cThe third part deals with some aspects of weapon replacement policy.The effectiveness of a weapon system is defined as E=D/C where E is weapon effectiveness (a comparative figure of merit; D is total damage inflicted or prevented and C is total cost, D and C being reduced to common dimensions. During the course of investigations, criteria regarding to choice of weapon or weapons from a set of weapon systems are established through production function and military effect curves. A procedure is described which maximizes the expectation of military utility in order to select a weapon system from the class of weapon systems. This is done under the following simplifying assumptions: (a Non- decreasing utility function; (b Constant average cost for each kind of weapons; and (c Independence of the performance of each unit of weapon. Some of the difficulties which arises when any of these restrictions is relaxed are briefly mentioned. Finally, the policy of weapon replacement and the factors governing the same are described."

  13. Target threat assessment using fuzzy sets theory

    Directory of Open Access Journals (Sweden)

    Ehsan Azimirad


    Full Text Available The threat evaluation is significant component in target classification process and is significant in military and non military applications. Small errors or mistakes in threat evaluation and target classification especial in military applications can result in huge damage of life and property. Threat evaluation helps in case of weapon assignment, and intelligence sensor support system. It is very important factor to analyze the behavior of enemy tactics as well as our surveillance. This paper represented a precise description of the threat evaluation process using fuzzy sets theory. A review has been carried out regarding which parameters that have been suggested for threat value calculation. For the first time in this paper, eleven parameters are introduced for threat evaluation so that this parameters increase the accuracy in designed system. The implemented threat evaluation system has been applied to a synthetic air defense scenario and four real time dynamic air defense scenarios. The simulation results show the correctness, accuracy, reliability and minimum errors in designing of threat evaluation system

  14. Bio-Terrorism Threat and Casualty Prevention

    Energy Technology Data Exchange (ETDEWEB)



    The bio-terrorism threat has become the ''poor man's'' nuclear weapon. The ease of manufacture and dissemination has allowed an organization with only rudimentary skills and equipment to pose a significant threat with high consequences. This report will analyze some of the most likely agents that would be used, the ease of manufacture, the ease of dissemination and what characteristics of the public health response that are particularly important to the successful characterization of a high consequence event to prevent excessive causalities.

  15. Wounds and weapons

    Energy Technology Data Exchange (ETDEWEB)

    Vogel, H. [Asklepios Klinik St. Georg, Roentgenabteilung, Lohmuehlenstrasse 5, 20099 Hamburg (Germany)], E-mail:; Dootz, B. [Asklepios Klinik St. Georg, Roentgenabteilung, Lohmuehlenstrasse 5, 20099 Hamburg (Germany)


    Purpose: X-ray findings are described, which are typical for injuries due to conventional weapons. It is intended to demonstrate that radiographs can show findings characteristic for weapons. Material and method: The radiograms have been collected in Vietnam, Croatia, Serbia, Bosnia, Chad, Iran, Afghanistan, USA, Great Britain, France, Israel, Palestine, and Germany. Results: Radiograms of injuries due to hand grenades show their content (globes) and cover fragments. The globes are localized regionally in the victim's body. Survivors of cluster bombs show singular or few globes; having been hit by many globes would have been lethal. Shotguns produce characteristic distributions of the pallets and depth of penetration different from those of hand grenades and cluster bombs; cover fragments are lacking. Gunshot wounds (GSW) can be differentiated in those to low velocity bullets, high velocity projectiles, and projectiles, which disintegrate on impact. The radiogram furnishes the information about a dangerous shock and helps to recognize the weapon. Radiograms of victims of explosion show fragments and injuries due to the blast, information valid for therapy planning and prognosis. The radiogram shows details which can be used in therapy, forensic medicine and in war propaganda - examples could be findings typical for cluster bombs and for dumdum bullets; it shows the cruelty of the employment of weapons against humans and the conflict between the goal of medical care and those of military actions. Conclusion: Radiographs may show, which weapon has been employed; they can be read as war reports.

  16. The US nuclear weapon infrastructure and a stable global nuclear weapon regime

    Energy Technology Data Exchange (ETDEWEB)

    Immele, John D [Los Alamos National Laboratory; Wagner, Richard L [Los Alamos National Laboratory


    US nuclear weapons capabilities -- extant force structure and nuclear weapons infrastructure as well as declared policy -- influence other nations' nuclear weapons postures, at least to some extent. This influence can be desirable or undesirable, and is, of course, a mixture of both. How strong the influence is, and its nature, are complicated, controversial, and -- in our view -- not well understood but often overstated. Divergent views about this influence and how it might shape the future global nuclear weapons regime seem to us to be the most serious impediment to reaching a national consensus on US weapons policy, force structure and supporting infrastructure. We believe that a paradigm shift to capability-based deterrence and dissuasion is not only consistent with the realities of the world and how it has changed, but also a desirable way for nuclear weapon postures and infrastructures to evolve. The US and other nuclear states could not get to zero nor even reduce nuclear arms and the nuclear profile much further without learning to manage latent capability. This paper has defined three principles for designing NW infrastructure both at the 'next plateau' and 'near zero.' The US can be a leader in reducing weapons and infrastructure and in creating an international regime in which capability gradually substitutes for weapons in being and is transparent. The current 'strategy' of not having policy or a Congressionally-approved plan for transforming the weapons complex is not leadership. If we can conform the US infrastructure to the next plateau and architect it in such a way that it is aligned with further arms reductions, it will have these benefits: The extant stockpile can be reduced in size, while the smaller stockpile still deters attack on the US and Allies. The capabilities of the infrastructure will dissuade emergence of new challenges/threats; if they emerge, nevertheless, the US will be able to deal with them in

  17. Patient care in a biological safety level-4 (BSL-4) environment. (United States)

    Marklund, LeRoy A


    The greatest threats to America's public health include accidental importation of deadly diseases by international travelers and the release of biologic weapons by our adversaries. The greatest failure is unpreparedness because international travel and dispersion of biologic agents by our enemies are inevitable. An effective medical defense program is the recommended deterrent against these threats. The United States has a federal response plan in place that includes patient care and patient transport by using the highest level of biologic containment: BSL-4. The DoD has the capability to provide intensive care for victims infected with highly infectious yet unknown biologic agents in an environment that protects the caregiver while allowing scientists to study the characteristics of these new agents and assess the effectiveness of treatment. Army critical care nurses are vital in the biologic medical defense against unidentified infectious diseases, accidental occupational exposures, or intentional dispersion of weaponized biologic agents. Research that carefully advances healthcare using BSL-4 technology addresses the challenges of the human element of BSL-4 containment patient care, and BSL-4 patient transport enhances our nation's ability to address the emerging biologic threats we confront in the future.

  18. Airborne Particulate Threat Assessment

    Energy Technology Data Exchange (ETDEWEB)

    Patrick Treado; Oksana Klueva; Jeffrey Beckstead


    Aerosol threat detection requires the ability to discern between threat agents and ambient background particulate matter (PM) encountered in the environment. To date, Raman imaging technology has been demonstrated as an effective strategy for the assessment of threat agents in the presence of specific, complex backgrounds. Expanding our understanding of the composition of ambient particulate matter background will improve the overall performance of Raman Chemical Imaging (RCI) detection strategies for the autonomous detection of airborne chemical and biological hazards. Improving RCI detection performance is strategic due to its potential to become a widely exploited detection approach by several U.S. government agencies. To improve the understanding of the ambient PM background with subsequent improvement in Raman threat detection capability, ChemImage undertook the Airborne Particulate Threat Assessment (APTA) Project in 2005-2008 through a collaborative effort with the National Energy Technology Laboratory (NETL), under cooperative agreement number DE-FC26-05NT42594. During Phase 1 of the program, a novel PM classification based on molecular composition was developed based on a comprehensive review of the scientific literature. In addition, testing protocols were developed for ambient PM characterization. A signature database was developed based on a variety of microanalytical techniques, including scanning electron microscopy, FT-IR microspectroscopy, optical microscopy, fluorescence and Raman chemical imaging techniques. An automated particle integrated collector and detector (APICD) prototype was developed for automated collection, deposition and detection of biothreat agents in background PM. During Phase 2 of the program, ChemImage continued to refine the understanding of ambient background composition. Additionally, ChemImage enhanced the APICD to provide improved autonomy, sensitivity and specificity. Deliverables included a Final Report detailing our

  19. The Optimum Replacement of Weapon

    Institute of Scientific and Technical Information of China (English)

    ZHANG Xiao; ZHANG Jin-chun


    The theory of LCC (Life Cycle Cost) is applied in this paper. The relation between the economic life of weapon and the optimum replacement is analyzed. The method to define the optimum replacement time of weapon is discussed.

  20. Multiple smart weapons employment mechanism

    Energy Technology Data Exchange (ETDEWEB)

    McGlynn, M.P.; Meiklejohn, W.D.


    A digital communications armament network adaptor is described for carrying multiple smart weapons on a single wing pylon station of an aircraft, comprising: an aircraft having a weapons controller configured in compliance with MIL-STD 1553; multiple wing-mounted pylons on said aircraft, each providing a weapons station with communications and ejection and release mechanisms electrically connected to said controller for the airborne launch of smart weapons; a multiple ejector rack affixed to at least one pylon, said rack holding a plurality of smart weapons; and an electronic digital network connected between the controller and said rack-mounted smart weapons, said network located in said rack and including circuitry which receives coded digital communications from said controller and selectively rebroadcasts said communications to one of said smart weapons on said rack designated by said coded communications, thereby controlling all required functions of said designated smart weapon.

  1. Transcendental Terrorism and Dirty Bombs: Radiological Weapons Threat Revisited (United States)


    radioactive sources. This gap sets the stage for a Goiania -type disaster, where thieves in Brazil searching for scrap metal broke into an abandoned cancer...unknowingly and unwittingly spread the contamination throughout Goiania .53 The results were five deaths, 151 people who suffered internal...for obsolete radioactive materials. While the distribution of cesium-137 in Goiania was not the result of deliberate terrorist action, it certainly

  2. Taming The Next Set of Strategic Weapons Threats (United States)


    the United States, a foreign policy utopia fueled by President Roh Moo Hyun.27 Many members of this generation consider the United States to be “most...a potential majority of the Greens and the SPD a true spectre for Atlantic defence policy. Looking at the high popularity of ecological issues

  3. Toxic Industrial Chemicals: A Future Weapons of Mass Destruction Threat (United States)


    dependent on factors, such as temperature , pressure, and wind speed (US Army 1990; 1994; and 1998a). In addition to CW agents’ toxicities, their chemical...expected to be at especially high risk of shigellosis, malaria, sandfly fever, and cutaneous leishmaniasis (Quin 1992). Studies conducted since the war

  4. Nuclear weapon detection categorization analysis

    Energy Technology Data Exchange (ETDEWEB)



    This statement of work is for the Proof of Concept for nuclear weapon categories utility in Arms control. The focus of the project will be to collect, analyze and correlate Intrinsic Radiation (INRAD) calculation results for the purpose of defining measurable signatures that differentiate categories of nuclear weapons. The project will support START III negotiations by identifying categories of nuclear weapons. The categories could be used to clarify sub-limits on the total number of nuclear weapons.

  5. Biological warfare, bioterrorism, and biocrime. (United States)

    Jansen, H J; Breeveld, F J; Stijnis, C; Grobusch, M P


    Biological weapons achieve their intended target effects through the infectivity of disease-causing infectious agents. The ability to use biological agents in warfare is prohibited by the Biological and Toxin Weapon Convention. Bioterrorism is defined as the deliberate release of viruses, bacteria or other agents used to cause illness or death in people, but also in animals or plants. It is aimed at creating casualties, terror, societal disruption, or economic loss, inspired by ideological, religious or political beliefs. The success of bioterroristic attempts is defined by the measure of societal disruption and panic, and not necessarily by the sheer number of casualties. Thus, making only a few individuals ill by the use of crude methods may be sufficient, as long as it creates the impact that is aimed for. The assessment of bioterrorism threats and motives have been described before. Biocrime implies the use of a biological agent to kill or make ill a single individual or small group of individuals, motivated by revenge or the desire for monetary gain by extortion, rather than by political, ideological, religious or other beliefs. The likelihood of a successful bioterrorist attack is not very large, given the technical difficulties and constraints. However, even if the number of casualties is likely to be limited, the impact of a bioterrorist attack can still be high. Measures aimed at enhancing diagnostic and therapeutic capabilities and capacities alongside training and education will improve the ability of society to combat 'regular' infectious diseases outbreaks, as well as mitigating the effects of bioterrorist attacks.

  6. Applying Agile MethodstoWeapon/Weapon-Related Software

    Energy Technology Data Exchange (ETDEWEB)

    Adams, D; Armendariz, M; Blackledge, M; Campbell, F; Cloninger, M; Cox, L; Davis, J; Elliott, M; Granger, K; Hans, S; Kuhn, C; Lackner, M; Loo, P; Matthews, S; Morrell, K; Owens, C; Peercy, D; Pope, G; Quirk, R; Schilling, D; Stewart, A; Tran, A; Ward, R; Williamson, M


    This white paper provides information and guidance to the Department of Energy (DOE) sites on Agile software development methods and the impact of their application on weapon/weapon-related software development. The purpose of this white paper is to provide an overview of Agile methods, examine the accepted interpretations/uses/practices of these methodologies, and discuss the applicability of Agile methods with respect to Nuclear Weapons Complex (NWC) Technical Business Practices (TBPs). It also provides recommendations on the application of Agile methods to the development of weapon/weapon-related software.

  7. Nuclear weapons in Europe

    CERN Document Server

    Calogero, F


    Information speech given by Prof. Calogero from the university of Roma to describe the actual situation of nuclear weapons in Europe, the strategical reasons or justifications for this deployment, the prospects of negociations, and what scientists could do and do on this issue.

  8. Medicalized weapons & modern war. (United States)

    Gross, Michael L


    "Medicalized" weapons--those that rely on advances in neuroscience, physiology, and pharmacology--offer the prospect of reducing casualties and protecting civilians. They could be especially useful in modern asymmetric wars in which conventional states are pitted against guerrilla or insurgent forces. But may physicians and other medical workers participate in their development?

  9. Neutrino Counter Nuclear Weapon

    CERN Document Server

    Tang, Alfred


    Radiations produced by neutrino-antineutrino annihilation at the Z0 pole can be used to heat up the primary stage of a thermonuclear warhead and can in principle detonate the device remotely. Neutrino-antineutrino annihilation can also be used as a tactical assault weapon to target hideouts that are unreachable by conventional means.

  10. Countering the Nuclear Terrorist Threat

    Energy Technology Data Exchange (ETDEWEB)

    Vantine, H C


    The nuclear/radioactive threat to homeland security posed by terrorists can be broken into four categories. Of highest concern is the use of an improvised nuclear device (IND). An IND, as its name implies, is a nuclear explosive device. It produces nuclear yield, and this nuclear yield has catastrophic effects. An IND is the ultimate terrorist weapon, and terrorist groups are actively attempting to acquire nuclear weapons. Detonation of an IND could dwarf the devastation of the September 11 attack on the World Trade Center. Dealing with the aftermath of an IND would be horrific. Rescue efforts and cleanup would be hazardous and difficult. Workers would have to wear full protection suits and self-contained breathing apparatus. Because of the residual radioactivity, in certain locations they could only work short times before acquiring their ''lifetime'' dose. As with the Chernobyl event, some rescue workers might well expose themselves to lethal doses of radiation, adding to the casualty toll. Enormous volumes of contaminated debris would have to be removed and disposed. If a terrorist group decides not to pursue an actual nuclear device, it might well turn to Radiological Dispersal Devices (RDDs) or ''dirty bombs'' as they are often called. RDDs spread radioactivity but they do not generate nuclear yield. The fabrication of an RDD requires radioactive material and a dispersal mechanism. Radioactive materials are used all over the world for medical, industrial, and research applications. Standards for safe handling and accountability of radioactive material vary around the world. Stories in the press suggest inadequate controls on radiological materials in parts of the world. The effects of an RDD vary widely, and are measured in terms of contamination area, health effects to the exposed population, and economic consequences. Even a negligible, but measurable, exposure would exploit the general public's fear of things




    Non-lethal weapons, also called less-lethal weapons, less-than lethal weapons, non-deadly weapons, compliance weapons, or pain-inducing weapons are weapons intended to be less likely to kill a living target than conventional weapons. It is often understood that accidental, incidental, and correlative casualties are risked wherever force is applied, but non-lethal weapons try to minimise the risk as much as possible. Non-lethal weapons are used in combat situations to limit the escalation of c...

  12. Pakistans Nuclear Weapons (United States)


    Command and Control Support System, which “enables robust Command and Control capability of all strategic assets with round the clock situational...Building Confidence in Pakistan’s Nuclear Security,” Arms Control Today, December 2007; Robin Walker, “Pakistan’s Evolution as a Nuclear Weapons State: Lt...that understands the importance and the high priority that the world places on nuclear security. 136 Ambassador Olson told the House Foreign

  13. Illegal Weapons Exports?

    Institute of Scientific and Technical Information of China (English)


    Amnesty International, a human rights organization, released a report on June 11 accusing China of facilitating regional conflicts and human rights violations by exporting a large quantity of weapons to Sudan, Nepal, Myanmar and the Great Lakes countries of Africa. Responding to such charges, Teng Jianqun, a researcher with the China Arms Control and Disarmament Association, told the official Xinhua News Agency that China has always put its limited arms exports under strict control and surveillance, deno...

  14. Counterproliferation of Nuclear Weapons (United States)


    an occurrence. In his book, Atomic Tragedy, Sean Malloy writes that Henry Stimson, the United States Secretary of War, warned in April, 1945 that...Ibid., 380. 41 Ibid. 42 Sean L. Malloy , Atomic Tragedy: Henry L. Stimson and the Decision to use the Bomb Against Japan (Ithaca, New York...Weapons of Mass Destruction in the Middle East, 96-97. 45 Robert M. Gates, National Defense Strategy (Washington, DC: US Government Printing Office

  15. Joseph A. Burton Forum Award: Some Nuclear Weapons Dilemmas (United States)

    May, Michael


    Nuclear weapons pose a combination of political and ethical dilemmas the solution to which has not been found. On one hand, in the view of both US government leaders and US allies, nuclear deterrence continues to play an essential part in the US role as the ultimate source of military strength for the alliances among the major democratic countries. It also continues to be in demand by countries that believe themselves to be isolated and threatened. On the other hand, nuclear weapons, besides being effective deterrents, can cause unprecedented loss of life and risk the demise of civilizations. No ban or technical precaution could prevent the rebuilding of nuclear weapons in a crisis. No diplomatic arrangement to date has erased the threat of invasion and war in the world. Only the abandonment of war and the threat of war as instruments of policy can make nuclear weapons obsolete. The slow, halting, risky road to that end remains the only hope for a world in which lasting solutions to the nuclear dilemmas are possible.

  16. Nuclear Threat Intelligence, Surveillance, and Reconnaissance (United States)

    Kuliasha, Michael


    The National Security Strategy states that the greatest threat to the American people is ``the pursuit of nuclear weapons by violent extremists and their proliferation to additional states.'' The Global Nuclear Detection Architecture (GNDA) addresses a key portion of that threat by focusing on detecting nuclear and radiological materials that are out of regulatory control within permissive operating environments. However, the force protection requirements of the Department of Defense (DoD) range across a wider mission space from permissive environments, where nuclear and radiological materials can be monitored while under regulatory control, to hostile environments where nuclear and radiological materials exist in defiance of international regulations and agreements. This wider range of operating environments and the inherent physics limitations on the range of radiation detection pose great challenges to radiation detection-focused approaches to nuclear threat detection. Consequently, DoD is in the process of defining an intelligence, surveillance, and reconnaissance approach to countering nuclear threats that considers the observable signatures of all elements that comprise a potential threat; information, funds, people, material, equipment, and infrastructure. This strategy represents a shift from radiation detection as the primary sensing modality to radiation detection as one of many sensing modalities, including the human dimension, with a heavy emphasis on data fusion. This presentation will describe the attributes of a layered sensing approach to nuclear threat detection, illustrate the approach with examples, define potential building blocks, and discuss technical challenges.

  17. The Nature of the Bioterrorism Threat

    Energy Technology Data Exchange (ETDEWEB)

    Regens, J. L.


    This analysis provides an overview of the nature of the bioterrorism threat. It identifies potential CDC Class A biological agents that are likely candidates for use in a terrorist incident and describes the known sources of vulnerability. The paper also summarizes S&T resources/needs and assesses response options for achieving effective biodefense against terrorist threats.

  18. [New immunological weapons for medicine in the 21st Century: biological therapy based on the use of the latest generation monoclonal antibodies]. (United States)

    Aguillón, Juan C; Contreras, Juan; Dotte, Andrés; Cruzat, Andrea; Catalán, Diego; Salazar, Lorena; Molina, María Carmen; Guerrero, Julia; López, Mercedes; Soto, Lilian; Salazar-Onfray, Flavio; Cuchacovich, Miguel


    The fusion of a murine B cell and a myeloma cell generates a hybridoma that produces monoclonal antibody (mAb). These murine mAb induce the HAMA (human anti-mouse antibodies) response. Murine mAb have been modified by genetic engineering, producing molecules with a higher proportion of human protein. At present, chimeric, humanized and fully human mAb are available. mAb block interactions between target molecules and their ligands or trigger the lyses of mAb-coated tumor cells. Numerous mAb have been developed using the recombinant DNA technology and several are available in the market. Trastuzumab, against HER2/neu, is useful in breast cancer; rituximab, against CD20 in B lymphocytes is useful in lymphoma; alemtuzumah, against CD52 is used in lymphoma and leukemia; daclizumab and basiliximab block the IL-2 receptor interaction and reduce acute rejection in kidney transplantation; abciximab, an antagonist of GPIIb/IIIa platelet receptor, is used in patients undergoing acute coronary syndromes. In autoimmunity diseases, blocking tumor necrosis factor by infliximab and adalimumab has demonstrated excellent results. Thus, infliximab is useful in the treatment of rheumatoid arthritis (RA), Crohn's disease and ulcerative colitis while adalimumab is the first fully human mAb available for RA. Infliximab and adalimumab reduce signs and symptoms in RA and they also interfere with progression of joint damage. Finally, the direct benefits of antagonist treatment can occur at the expense of a major adverse effect in some other biological function.

  19. Lead exposures and biological responses in military weapons systems: Aerosol characteristics and acute lead effects among US Army artillerymen: Final report

    Energy Technology Data Exchange (ETDEWEB)

    Bhattacharyya, M.H.; Stebbings, J.H.; Peterson, D.P.; Johnson, S.A.; Kumar, R.; Goun, B.D.; Janssen, I.; Trier, J.E.


    This study was to determine the concentration and chemical nature of lead (Pb) aerosols produced during the firing of artillery and to determine the exposures and biological responses of crew members exposed to lead aerosols during such firing. The concentrations of lead-containing aerosols at crew positions depended on wind conditions, with higher concentrations when firing into a head wind. Aerosol concentrations were highest in the muzzle blast zone. Concentrations of lead in the blood of crew members rose during the first 12 days of exposure to elevated airborne lead concentrations and then leveled off. There was no rapid decrease in blood lead concentrations after completion of firing. Small decreases in hematocrit and small increases in free erythrocyte porphyrin were correlated with increasing exposure to airborne lead. These changes were reversed by seven weeks after firing. Changes in nerve conduction velocity had borderline statistical significance to airborne lead exposure. In measuring nerve conduction velocity, differences in skin temperature must be taken into account.

  20. Advanced Naval Surface fire support weapon employment against mobile targets


    Le, Hung B.


    Approved for public release; distribution is unlimited Key threat trends have identified shortfalls in Naval Surface Fire Support (NSFS), a mission area that is undergoing rapid evolution. The Navy's ability to effectively provide sea-based fire support to ground forces is profoundly challenged by mobile and reduced dwell time targets. Furthermore, longer range enemy weapon systems, which must be destroyed at greater ranges prior to their engagement of friendly forces, will make NSFS timel...

  1. Examination of Economic Feasibility of Nuclear Weapons in the Republic of Korea

    Energy Technology Data Exchange (ETDEWEB)

    Suh, Young A; Yim, Man Sung [Korea Advanced Institute of Science and Technology, Daejeon (Korea, Republic of)


    This observation implies that the popular view on nuclear weapons amongst Korean public is in part due to lack of knowledge about overall implications of possessing nuclear weapons. In this regard, pros and cons of nuclear weapons development need to be better characterized and understood by the public to support nuclear nonproliferation culture development. Noting lack of literature on characterizing the economics of nuclear weapons development, this study aims at performing economic feasibility analysis of nuclear weapons development in the ROK. For this purpose, an approach called Index technique based on the US experiences was applied to Korean historical data along with cost-benefit analysis and Multi-Criteria Decision Making Analysis. In this study, the scenario of nuclear weapons development against North Korean nuclear threat was compared with conventional weapons-based defense strategy. The comparison was based on cost benefit analysis and qualitative multi-criteria decision analysis. Results indicate that nuclear weapons development is not a desirable option. However, as this work was a rather simplistic academic exercise, further work is needed to support the outcome of the study. Outcome of these investigations would be useful for communication with the public regarding the need for nuclear weapons for national defense and to develop nuclear nonproliferation culture in the ROK.

  2. Preventing the spread of nuclear weapons : The law of arms control and the international non-proliferation regime

    NARCIS (Netherlands)

    Coppen, T.


    The proliferation of nuclear weapons remains a severe threat to international peace, security and stability. In order to counter this threat, the international community has taken numerous measures, legal and otherwise, resulting in a global framework of treaties and political agreements known as th

  3. Real life identification of partially occluded weapons in video frames (United States)

    Hempelmann, Christian F.; Arslan, Abdullah N.; Attardo, Salvatore; Blount, Grady P.; Sirakov, Nikolay M.


    We empirically test the capacity of an improved system to identify not just images of individual guns, but partially occluded guns and their parts appearing in a videoframe. This approach combines low-level geometrical information gleaned from the visual images and high-level semantic information stored in an ontology enriched with meronymic part-whole relations. The main improvements of the system are handling occlusion, new algorithms, and an emerging meronomy. Well-known and commonly deployed in ontologies, actual meronomies need to be engineered and populated with unique solutions. Here, this includes adjacency of weapon parts and essentiality of parts to the threat of and the diagnosticity for a weapon. In this study video sequences are processed frame by frame. The extraction method separates colors and removes the background. Then image subtraction of the next frame determines moving targets, before morphological closing is applied to the current frame in order to clean up noise and fill gaps. Next, the method calculates for each object the boundary coordinates and uses them to create a finite numerical sequence as a descriptor. Parts identification is done by cyclic sequence alignment and matching against the nodes of the weapons ontology. From the identified parts, the most-likely weapon will be determined by using the weapon ontology.

  4. 32 CFR 234.10 - Weapons. (United States)


    ... 32 National Defense 2 2010-07-01 2010-07-01 false Weapons. 234.10 Section 234.10 National Defense... PENTAGON RESERVATION § 234.10 Weapons. (a) Except as otherwise authorized under this section, the following are prohibited: (1) Possessing a weapon. (2) Carrying a weapon. (3) Using a weapon. (b) This...

  5. Cyber threat metrics.

    Energy Technology Data Exchange (ETDEWEB)

    Frye, Jason Neal; Veitch, Cynthia K.; Mateski, Mark Elliot; Michalski, John T.; Harris, James Mark; Trevino, Cassandra M.; Maruoka, Scott


    Threats are generally much easier to list than to describe, and much easier to describe than to measure. As a result, many organizations list threats. Fewer describe them in useful terms, and still fewer measure them in meaningful ways. This is particularly true in the dynamic and nebulous domain of cyber threats - a domain that tends to resist easy measurement and, in some cases, appears to defy any measurement. We believe the problem is tractable. In this report we describe threat metrics and models for characterizing threats consistently and unambiguously. The purpose of this report is to support the Operational Threat Assessment (OTA) phase of risk and vulnerability assessment. To this end, we focus on the task of characterizing cyber threats using consistent threat metrics and models. In particular, we address threat metrics and models for describing malicious cyber threats to US FCEB agencies and systems.

  6. An Expert System For Multispectral Threat Assessment And Response (United States)

    Steinberg, Alan N.


    A concept has been defined for an automatic system to manage the self-defense of a combat aircraft. Distinctive new features of this concept include: a. the flexible prioritization of tasks and coordinated use of sensor, countermeasures, flight systems and weapons assets by means of an automated planning function; b. the integration of state-of-the-art data fusion algorithms with event prediction processing; c. the use of advanced Artificial Intelligence tools to emulate the decision processes of tactical EW experts. Threat Assessment functions (a) estimate threat identity, lethality and intent on the basis of multi-spectral sensor data, and (b) predict the time to critical events in threat engagements (e.g., target acquisition, tracking, weapon launch, impact). Response Management functions (a) select candidate responses to reported threat situations; (b) estimate the effects of candidate actions on survival; and (c) coordinate the assignment of sensors, weapons and countermeasures with the flight plan. The system employs Finite State Models to represent current engagements and to predict subsequent events. Each state in a model is associated with a set of observable features, allowing interpretation of sensor data and adaptive use of sensor assets. Defined conditions on state transitions allow prediction of times to critical future states and are used in planning self-defensive responses, which are designed either to impede a particular state transition or to force a transition to a lower threat state.

  7. Effects of nuclear weapons. Third edition

    Energy Technology Data Exchange (ETDEWEB)

    Glasstone, S.; Dolan, P.J.


    Since the last edition of ''The Effects of Nuclear Weapons'' in 1962 much new information has become available concerning nuclear weapon effects. This has come in part from the series of atmospheric tests, including several at very high altitudes, conducted in the Pacific Ocean area in 1962. In addition, laboratory studies, theoretical calculations, and computer simulations have provided a better understanding of the various effects. A new chapter has been added on the electromagnetic pulse. The chapter titles are as follows: general principles of nuclear explosions; descriptions of nuclear explosions; air blast phenomena in air and surface bursts; air blast loading; structural damage from air blast; shock effects of surface and subsurface bursts; thermal radiation and its effects; initial nuclear radiation; residual nuclear radiation and fallout; radio and radar effects; the electromagnetic pulse and its effects; and biological effects. (LTN)

  8. The Effects of Nuclear Weapons. Third edition

    Energy Technology Data Exchange (ETDEWEB)

    Glasstone, S; Dolan, P J


    Since the last edition of ''The Effects of Nuclear Weapons'' in 1962 much new information has become available concerning nuclear weapon effects. This has come in part from the series of atmospheric tests, including several at very high altitudes, conducted in the Pacific Ocean area in 1962. In addition, laboratory studies, theoretical calculations, and computer simulations have provided a better understanding of the various effects. A new chapter has been added on the electromagnetic pulse. The chapter titles are as follows: general principles of nuclear explosions; descriptions of nuclear explosions; air blast phenomena in air and surface bursts; air blast loading; structural damage from air blast; shock effects of surface and subsurface bursts; thermal radiation and its effects; initial nuclear radiation; residual nuclear radiation and fallout; radio and radar effects; the electromagnetic pulse and its effects; and biological effects. (LTN)

  9. Handheld ultrasound concealed weapons detector (United States)

    Felber, Franklin S.; Wild, Norbert C.; Nunan, Scott C.; Breuner, Dennis; Doft, Frank


    A handheld, battery-operated prototype of a remove concealed weapons detector has been built and tested. The concealed weapons detector will enable law enforcement and security officers to detect metallic and nonmetallic weapons concealed beneath clothing remotely from beyond arm's length to about 20 feet. These detectors may be used to: (1) allow hands-off, stand-off frisking of suspects for metallic and nonmetallic weapons; and (2) search for metallic and nonmetallic weapons on cooperative subjects at courthouse entrances and other monitored security portals. We have demonstrated that we image weapons concealed under heavy clothing, not just detect them, at ranges up to 15 feet using the same ultrasound frequency (40 kHz) used by commercial rangefinders. The concealed weapons detector operates much as a rangefinder, but at higher peak fluxes and pulse repetition frequencies. The detector alerts the user to concealed weapons audibly and visibly by detecting ultrasound glints above a body/clothing baseline, and by compensating for changing range and attenuation. The detector locates concealed weapons within a 6-inch illuminated spot at 10 feet. The signal processor eliminates any signal from behind the target.

  10. Weapons Neutron Research Facility (WNR) (United States)

    Federal Laboratory Consortium — The Weapons Neutron Research Facility (WNR) provides neutron and proton beams for basic, applied, and defense-related research. Neutron beams with energies ranging...

  11. 76 FR 68809 - Bureau of International Security and Nonproliferation; Termination of Chemical and Biological... (United States)


    ... Nonproliferation; Termination of Chemical and Biological Weapons (CBW) Proliferation Sanctions Against a Foreign... CONTACT: Pamela K. Durham, Office of Missile, Biological, and Chemical Nonproliferation, Bureau of... government, project, or entity in its efforts to acquire chemical or biological weapons capability:...

  12. Proportionality and Autonomous Weapons Systems

    NARCIS (Netherlands)

    van den Boogaard, J.


    Given the swift technologic development, it may be expected that the availability of the first truly autonomous weapons systems is fast approaching. Once they are deployed, these weapons will use artificial intelligence to select and attack targets without further human intervention. Autonomous weap

  13. Naval Weapons Station Earle Reassessment (United States)


    surveys for their Section 110 compliance: Architectural Resources Survey, Naval Weapons Station Earle, Monmouth County, New Jersey (Louis Berger 1999...text within brackets. Berger Report 1999 Architectural Resources Survey, Naval Weapons Station Earle, Monmouth County, New Jersey (Louis Berger... architectural treatment of buildings at NWS Earle: a traditional vernacular theme with minimal decorative detailing. This so-called minimal traditional

  14. Nuclear weapon reliability evaluation methodology

    Energy Technology Data Exchange (ETDEWEB)

    Wright, D.L. [Sandia National Labs., Albuquerque, NM (United States)


    This document provides an overview of those activities that are normally performed by Sandia National Laboratories to provide nuclear weapon reliability evaluations for the Department of Energy. These reliability evaluations are first provided as a prediction of the attainable stockpile reliability of a proposed weapon design. Stockpile reliability assessments are provided for each weapon type as the weapon is fielded and are continuously updated throughout the weapon stockpile life. The reliability predictions and assessments depend heavily on data from both laboratory simulation and actual flight tests. An important part of the methodology are the opportunities for review that occur throughout the entire process that assure a consistent approach and appropriate use of the data for reliability evaluation purposes.

  15. Cooperative Security: A New Paradigm For A World Without Nuclear Weapons?

    Directory of Open Access Journals (Sweden)

    Marc Finaud


    Full Text Available If there is a loose consensus on aiming at a world free of nuclear weapons in the future, there are clear oppositions as to the timeframe as well as the means for achieving this goal. The approach to nuclear disarmament followed to date has only yielded limited success because it has been conceived in isolation from global and regional security environments and threat perceptions. A new paradigm should thus be sought in order to reconcile nuclear powers’ security doctrines with global aspirations for a safer world, and ensure that nuclear powers derive their security less from others’ insecurity but from mutually beneficial cooperative security. This should not become a pretext for preserving nuclear weapons for ever. It will on the contrary require parallel tracks addressing the initial motivations for acquiring nuclear weapons and other weapons of mass destruction (WMD, in particular in the context of regional conflicts, as well as dealing with the current issues necessarily related to nuclear disarmament (missile defence, weaponization of space, conventional imbalances and future weapon systems. Ultimately, in a globalised nuclear-weapon free world, state security will not require nuclear weapons because it will be inserted into a broader network encompass­ing all aspects of security addressed in cooperative and multilateral approaches.

  16. The Illogic of the Biological Weapons Taboo (United States)


    scale quantities of microbes for the production of vaccines and antibiotics , it also became possible for medical scientists to harness the...tularemia bacteria, 334 pounds of dried Venezuelan equine encephalitis (VEE) virus, 4,991 gallons of liquid VEE viral suspension, 5,098 gallons of Q fever

  17. Pulsed Electric Fields for Biological Weapons Defense (United States)


    implanted into athymic nude mice for evaluation of solid tumor responses in vivo. In addition the following microorganisms were studied: Bacillus ...including Staphylococcus, a-hemolytic Streptococcus, Actinomyces, and Candida species. , 12% 0.1 % ° F R 3 R2 R3 .0 E R5:2 % R5: 32

  18. Filling in biodiversity threat gaps

    DEFF Research Database (Denmark)

    Joppa, L. N.; O'Connor, Brian; Visconti, Piero


    increase to 10,000 times the background rate should species threatened with extinction succumb to pressures they face (4). Reversing these trends is a focus of the Convention on Biological Diversity's 2020 Strategic Plan for Biodiversity and its 20 Aichi Targets and is explicitly incorporated...... into the United Nations' 2030 Agenda for Sustainable Development and its 17 Sustainable Development Goals (SDGs). We identify major gaps in data available for assessing global biodiversity threats and suggest mechanisms for closing them....

  19. Threats to Bitcoin Software


    Kateraas, Christian H


    Collect and analyse threat models to the Bitcoin ecosystem and its software. The create misuse case, attack trees, and sequence diagrams of the threats. Create a malicious client from the gathered threat models. Once the development of the client is complete, test the client and evaluate its performance. From this, assess the security of the Bitcoin software.

  20. Weapon of the Weak?

    DEFF Research Database (Denmark)

    Amber, Van der Graaf; Otjes, Simon; Rasmussen, Anne


    Social media have the potential to offset existing inequalities in representation among interest groups and act as a ‘weapon of the weak’ by providing a technological infrastructure that allows even groups with limited resources to create content and interact across the globe. We expand...... on the sparse existing literature on interest groups and social media in a quantitative, structural analysis of both the range and volume of social media use examining a data set of groups active in European Union lobbying. Despite the positive expectations, we find limited evidence that social media have been...... able to reinvigorate democratic processes by changing inequalities in the landscape of political representation among interest groups. The level of resources held by the interest groups acts as the single most consistent predictor of both the range and volume of their social media use. Interest groups...

  1. Cyber Conflicts as a New Global Threat

    Directory of Open Access Journals (Sweden)

    Alexander Kosenkov


    Full Text Available In this paper, an attempt is made to analyze the potential threats and consequences of cyber conflicts and, in particular, the risks of a global cyber conflict. The material is based on a comprehensive analysis of the nature of cyber conflict and its elements from both technical and societal points of view. The approach used in the paper considers the societal component as an essential part of cyber conflicts, allowing basics of cyber conflicts often disregarded by researchers and the public to be highlighted. Finally, the conclusion offers an opportunity to consider cyber conflict as the most advanced form of modern warfare, which imposes the most serious threat and whose effect could be comparable to weapons of mass destruction.

  2. Survey and documentation of the potential and actual invasive alien plant species and other biological threats to biodiversity in Awash National Park, Ethiopia

    Directory of Open Access Journals (Sweden)

    Sebsebe DEMISSEW


    Full Text Available The study was conducted at the Awash National Park (ANP Ethiopia, todocument Invasive Alien Species (IAS and to assess the spread of Prosopis juliflora (Sw. DC. A total of 64 sample plots were laid systematically along the altitudinal gradient of 750 to 1916 m.Potential IAS were recorded. IAS which may threaten biodiversity of the park includes species such as Prosopis juliflora, Parthenium hysterophorus L., Cryptostegia grandiflora Roxb. ex R. Br., Parkinsonia aculeata L., Senna occidentalis (L. Link, Datura ferox L. and Xanthium strumarium L. Except P. juliflora and P. hysterophorus, all others were not recorded in Ethiopia as IAS. P.juliflora was recorded in three plots with cover of 1% to 10%. P. juliflora was also found spread in different parts of the park particularly following the route of cattle movement. P. hysterophoruswas recorded in and around nine sample plots. Plot 46, 47 and 48 werehighly infested by P. hysterophorus which covered more than 60, 70 and 80% of the ground layer respectively. C. grandiflora was recorded in 11 plots with cover ranging from 1% to 35%. In view of all the natural as well as anthropogenic threats to the biodiversity of the Park, the ANP is at high risk. The rich biodiversity needsimmediate management intervention.

  3. Shipborne Laser Beam Weapon System for Defence against Cruise Missiles

    Directory of Open Access Journals (Sweden)

    J.P. Dudeja


    Full Text Available Sea-skim~ing cruise missiles pose the greatest threat to a surface ship in the present-day war scenario. The convenitional close-in-weapon-systems (CIWSs are becoming less reliable against these new challenges requiring extremely fast reaction time. Naval Forces see a high energy laser as a feasible andjeffective directed energy weapon against sea-skimming antiship cruise missiles becauseof its .ability to deliver destructive energy at the speed of light on to a distant target. The paper comparesthe technology and capability of deuterium fluoride (DF and chemical-oxygen-iodine laser (COIL in effectively performing the role of a shipborne CIWS altainst sea-skimming missiles. Out of these twolasers, it is argued that DF laser wo.uld be more effective a,s a shipborne weapon for defence against sea-skimmin,g cruise missiles. Besides the high energy laser as the primary (killing laser, othersub-systems required in the complete weapon system would be: A beacon laser to sense phase distor'ions in the primary laser, adaptive optics to compensate the atmospheric distortions, beam-directing optics, illuminating lasers, IRST sensors, surveillance and tracking radars, interfacing system, etc.

  4. An overview of the future of non-lethal weapons. (United States)

    Alexander, J B


    During the past decade, vast changes have occurred in the geopolitical landscape and the nature of the types of conflicts in which technologically developed countries have been involved. While the threat of conventional war remains, forces have been more frequently deployed in situations that require great restraint. Adversaries are often likely to be elusive and commingled with noncombatants. There has been some shift in public opinion away from tolerance of collateral casualties. Therefore there is a need to be able to apply force while limiting casualties. Non-lethal weapons provide part of the solution. Among the changes that will influence the future have been studies by the US and NATO concerning the use of non-lethal weapons, coincidental with increased funding for their development and testing. New concepts and policies have recently been formalized. Surprisingly, the most strident objections to the implementation of non-lethal weapons have come from organizations that are ostensibly designed to protect non-combatants. These arguments are specious and, while technically and academically challenging, actually serve to foster an environment that will result in the deaths of many more innocent civilians. They misconstrue technology with human intent. The reasons for use of force will not abate. Alternatives to bombs, missiles, tanks and artillery must therefore be found. Non-lethal weapons are not a panacea but do offer the best hope of minimizing casualties while allowing nations or alliances the means to use force in protection of national or regional interests.

  5. [Medical aspects of common non-lethal weapons]. (United States)

    Kunz, Sebastian Niko; Grove, Christina; Monticelli, Fabio


    The development and provision of non-lethal weapons (NLW) allow military and law enforcement personnel to exploit gradual engagement in countering potentially hazardous threats. Chemical, kinetic and electrical weapons systems are used to curb violence in civilian crowds. With inappropriate usage, these technologies can cause potentially fatal injuries that are not only of clinical, but also of legal relevance. In this context, the practicing physician is faced with treatment as well as assessment issues of new forms of injuries. In order to assure medical care and to be able to draw competent expert's conclusions, a detailed knowledge of the medical effects of these NLW is necessary. The review at hand presents today's most popular NLW and gives an overview of their possible injury potential and required treatments.


    Directory of Open Access Journals (Sweden)

    Mariana, BUICAN


    Full Text Available Oil (called by some black gold has not always been as coveted and used, but only in the last hundred years has established itself as a highly sought after as an indispensable proper functioning of modern economic activity that an important factor in international politics. International oil regime has changed in the last decades. In 1960, oil regime was a private oligopol which had links with governments main consuming countries. By then the price of a barrel of oil was two U.S. dollars and seven major transnational oil companies decided the amount of oil that will be produced. Meanwhile the world region with the largest oil exports were more strongly expressed nationalism and decolonization. Result, it was so in the late 60s in the region occur independent states. They have created an organization aim of this resource to their advantage - OPEC (Organization of Petroleum Exporting Countries. Thus since 1973 there have been changes in the international regime governing oil field, namely producing countries were fixed production rate and price. After this time the oil weapon has become increasingly important in the management of international relations. Oil influenced the great powers to Middle East conflicts that occurred in the last century, but their attitude about the emergence of new sources of oil outside OPEC. In the late 90's, Russia has become a major supplier of oil to the West.

  7. Overview of the Distributed Mission Training Integrated Threat Environment project (United States)

    Stytz, Martin R.; Banks, Sheila B.; Santos, Eugene, Jr.


    The Joint Synthetic Battlespace (JSB) envisioned within the Department of Defense modeling and simulation master plan requires a distributed virtual environment (DVE) wide consistent threat environment to achieve a useful mission rehearsal, training, test and evaluation capability. To achieve this objective, all threats in the DVE must appear at compatible levels of fidelity to all the entities operating in the DVE and they must interact with human- operated and computer-controlled entities in a realistic fashion. Achieving this goal is not currently possible for two reasons. First, each primary aircraft simulator training system developer has created their own threat system and made their own modeling decisions to support a specific user for a select few predetermined conditions. This traditional threat simulation approach is expensive and leads to ongoing difficulties in maintaining threat currency as intelligence updates are made, new weapons are introduced and new theaters of operation are identified. Second, the threat system interaction on a distributed network must be coordinated. The individualized nature of current threat systems precludes the possibility of introducing coordinated threats. The Distributed Mission Training Integrated Threat Environment (DMTITE) project is developing an effective solution to these issues. The DMTITE project is identifying the requirements for a distributed threat environment and building a demonstrator DOD High Level Architecture compatible system that can provide realistic threats for pilots to train against. The DMTITE prototype will instantiate a variety of threats for use in distributed training scenarios, including surface threats, air threats, radars, and jamming systems. A key element of the system will be the provision of realistic behaviors for the threat systems. We based DMTITE on a general software design methodology and software architecture for computer-generated forces (CGFs) that naturally supports `variety

  8. Economic impact profiling of CBRN events: focusing on biological incidents. (United States)

    Cavallini, Simona; Bisogni, Fabio; Mastroianni, Marco


    Chemical, biological, radiological and nuclear (CBRN) incidents, both caused accidentally by human error or natural/technological events and determined intentionally as criminal/malicious/terroristic acts, have consequences that could be differently characterized. In the last years many efforts to analyze the economic impact of terrorist threat have been carried out, while researches specifically concerning CBRN events have not been extensively undertaken. This paper in particular aims at proposing a methodological approach for studying macro-level economic impact profiles of biological incidents caused by weaponized and non-weaponized materials. The suggested approach investigates the economic consequences of biological incidents according to two main dimensions: type of large-scale effect and persistence of effect. Biological incident economic impacts are analyzed taking into account the persistence of effect during time as short-term impact (i.e. immediately after the incident), medium-term impact (i.e. by a month) and long-term impact (i.e. by years). The costs due to preventive countermeasure against biological threats (e.g. prevention, protection and preparedness expenses) are not taken into account. To this purpose, information on the key features of past biological incidents can be used as case studies to try to build impact profiles taking into account the proposed two main dimensions. Consequence management and effect mitigation of CBRN emergencies and disasters may benefit from an ex ante definition of the impact profiling related to this kind of incidents. The final goal of this paper is to define an approach to organize information on possible biological events according to their impact profile for supporting more effective and efficient first responders' prompt actions and policy makers' strategic decisions after the event occurrence.

  9. Insiders and Insider Threats

    DEFF Research Database (Denmark)

    Hunker, Jeffrey; Probst, Christian W.


    Threats from the inside of an organization’s perimeters are a significant problem, since it is difficult to distinguish them from benign activity. In this overview article we discuss defining properties of insiders and insider threats. After presenting definitions of these terms, we go on to disc...... of threats, and their mitigation. Another important observation is that the distinction between insiders and outsiders seems to loose significance as IT infrastructure is used in performing insider attacks....

  10. Radiological Weapons: How Great Is The Danger?

    Energy Technology Data Exchange (ETDEWEB)

    Moore, G M


    One of the underlying purposes of this paper is to provoke thinking about the interplay between the regulation of radioactive materials and the risk of their use in an radiological weapon (RW). Also considered in this paper are the types of RWs that a terrorist might use, the nature of the threat and danger posed by the various types of RWs, the essential elements that must be considered in responding to the terrorist use of an RW, and what steps may need to be taken a priori to minimize the consequences of the inevitable use of an RW. Because radiological dispersal devices (RDDs) have been the focus of so much recent concern and because RDDs are arguably the most likely of RWs to be used by a terrorist group, a major focus of this paper will be on RDDs. Radiological weapons are going to be used by some individual or group, if not this year then next year, or at some time in the foreseeable future. A policy of focusing resources solely on prevention of their use would leave any government open to significant economic disruption when the inevitable use occurs. Preplanning can limit the injuries, property damage, and economic losses that might result from the use of an RW. Moreover, a combination of efforts to prevent and to minimize the impact of RWs may significantly discourage potential users. The dangers from RWs can be dealt with while society continues to enjoy the benefits of nuclear technology that were promised under Atoms for Peace. However, some restructuring of our use of radioactive materials is necessary to ensure that the current and future uses of radioactive materials outweigh the potential disruption caused by misuse of the materials in RWs.

  11. 海上核化生安全威胁与水面舰艇集体防护%Nautical nuclear chemical and biological security threat and collective protection of surface ship

    Institute of Scientific and Technical Information of China (English)

    刘虹; 刘飞; 王斌


    为保障水面舰艇形成与其任务相适应的核化生防护能力,从核化生武器扩散新样式、核化生事故、恐怖袭击、次生核化灾害等角度深入阐述并研究了海上核化生环境对水面舰艇安全的威胁.基于此背景,分析了水面舰艇核化生集体防护的技术要素、能力的必要性及其较个人防护更适合于海上环境的技术特点.另外,通过对比国外海军主战水面舰艇的集体防护能力,为我国今后集体防护设计明确了发展方向.%For ensuring nuclear, chemical, and biological(NCB) defense ability of surface ships in accord with its mission, combining with the current international condition, the nautical NCB security situation is analyzed, and the NCB threat to surface ship security is lucubrated, surrounding several main aspects including new modality of nuclear spread, NCB accident, terror raid, derivative nuclear and chemical disaster, and so on. Aiming at this threat, the technology essentials and the ability necessary of surface ship NCB collective protection are analyzed, and the technology traits between collective protection and individual protection for nautical environment are compared. In addition, by comparing the collective protection ability of foreign naval main active surface ships, it shows clearly the further development direction of collective protection designment.

  12. Identifying and Mitigating Insider Threats

    DEFF Research Database (Denmark)

    Probst, Christian W.


    Organisations face many threats that coarsely can be separated in inside threats and outside threats. Threats from insiders are especially hard to counter since insiders have special knowledge and privileges. Therefore, malicious insider actions are hard to distinguish from benign actions. After...... discussing new definitions of insiders and insider threats, this article gives an overview of how to mitigate insider threats and discusses conflicting goals when dealing with insider threats....

  13. Cyber Intelligence Threat Prioritization (United States)


    possible direction of their behavior. and determines their interest in targeting the organization. t Intrinsic (personally rewarding) Extrinsic (receive...actors resources. Money People Tools Training Motive Why do threat actors attack? Determining an actor’s motive provides insight into the...platform that allows anyone to make their organization more visible to threat actors. Online Presence Extracurricular Activities Motive Risk

  14. Review on Invasive Tree of Heaven (Ailanthus altissima (Mill.) Swingle) Conflicting Values: Assessment of Its Ecosystem Services and Potential Biological Threat. (United States)

    Sladonja, Barbara; Sušek, Marta; Guillermic, Julia


    Globally, invasions by alien plants are rapidly increasing in extent and severity, leading to large-scale ecosystem degradation. One of the most widespread invasive alien plant species in Europe and North America, Tree of Heaven (Ailanthus altissima (Mill.) Swingle) was introduced intentionally for use as an ornamental plant in the 18th century. Since then, it has spread and is now frequently found in a number of countries. Today, Tree of Heaven is considered one of the worst invasive plant species in Europe and is also listed as invasive in North America and many other countries. Millennium Ecosystem Assessment is one of many systems trying to list and categorize biological services to humans and to provide a tool for identifying services delivered by natural ecosystems. Invasive species have generally caused degradation of the services, have a major impact on the environment, and are threatening biodiversity and reducing overall species abundance and diversity. On the other hand, some invasive species can provide services useful to human well-being. In the present review A. altissima impacts on ecosystems are identified and positive influences on some ecosystem services are weighed against the negative effects on the environment and human health. The aim of the present review is to resume the general knowledge of A. altissima, group available references on distribution and ecology according to countries, compare ecosystem services provided or enhanced by A. altissima presence and the negative effects it causes, identify gaps in current knowledge, and give recommendations for future lines of research.

  15. Wetland Preservation in Australia: The Administrative and Policital Threats

    Institute of Scientific and Technical Information of China (English)

    Mark Yaolin Wang


    The wetlands in Australia are of great physical, chemical and biological variety due to the continent's age, geological history and climate. The traditional physical and biological threats remain as the main challenges for wetland preservation in Australia. However, it has been increasingly recognized that the immediate survival of wetlands are being affected by more subtle threats, such as administrative and political threats. This paper identifies these non-physical threats and discusses how and why they have become the major barriers for sustainable wetland preservation in Australia. Finally, this paper calls for more practical policies and solutions to be implemented for sustainable wetland preservation in Australia.

  16. Biological warfare agents. (United States)

    Pohanka, Miroslav; Kuca, Kamil


    Biological warfare agents are a group of pathogens and toxins of biological origin that can be potentially misused for military or criminal purposes. The present review attempts to summarize necessary knowledge about biological warfare agents. The historical aspects, examples of applications of these agents such as anthrax letters, biological weapons impact, a summary of biological warfare agents and epidemiology of infections are described. The last section tries to estimate future trends in research on biological warfare agents.


    Energy Technology Data Exchange (ETDEWEB)

    Ayca Eminoglu


    In the Post Cold War era, the concepts of ''security'', ''national security'', and ''international security'' have changed with regard to their contents and meanings. Such developments made states to renew their national security policies. Security is a special form of politics as well. All security issues are political problems but not all political conflicts are security issues. In the Post Cold War era, differentiating and increasing numbers of elements that constitutes threat changed the concept of threat and widen the capacity of security. In this term, many elements lost its effect of being a threat but also new threatening elements emerged. Environmental problems, human rights, mass migration, micro nationalism, ethnic conflicts, religious fundamentalism, contagious diseases, international terrorism, economic instabilities, drug and weapon smuggling and human trafficking are the new problems emerged in international security agenda. Environmental problems no longer take place in security issues and can be mentioned as a ''low security'' issue. They are threats to the global commons i.e. the oceans, the seas, the ozone layer and the climate system, which are life supports for mankind as a whole. Global warming is one of the most important environmental issues of our day that effects human life in every field and can be defined as a 'serious threat to international security'. Because of global warming, environmental changes will occur and these changes will cause conflicting issues in international relations. Because of global warming dwindling freshwater supplies, food shortages, political instability and other conflicts may take place. Some IR scholars see a need for global cooperation in order to face the threat. At the background of global warming and its effects, states have to get preventive measures and normally, each state form its own measures, therefore as a

  18. The Effects of Nuclear Weapons

    Energy Technology Data Exchange (ETDEWEB)

    Glasstone, Samuel


    This book is a revision of "The Effects of Nuclear Weapons" which was issued in 1957. It was prepared by the Defense Atomic Support Agency of the Department of Defense in coordination with other cognizant governmental agencies and was published by the U.S. Atomc Energy Commission. Although the complex nature of nuclear weapons effects does not always allow exact evaluation, the conclusions reached herein represent the combined judgment of a number of the most competent scientists working the problem. There is a need for widespread public understanding of the best information available on the effects of nuclear weapons. The purpose of this book is to present as accurately as possible, within the limits of national security, a comprehensive summary of this information.

  19. The Effects of Nuclear Weapons

    Energy Technology Data Exchange (ETDEWEB)

    Glasstone, Samuel


    This handbook prepared by the Armed Forces Special Weapons Project of the Department of Defense in coordination with other cognizant government agencies and published by the United States Atomic Energy Commission, is a comprehensive summary of current knowledge on the effects of nuclear weapons. The effects information contained herein is calculated for yields up to 20 megatons and the scaling laws for hypothetically extending the calculations beyond this limit are given. The figure of 20 megatons however is not be taken as an indication of capabilities or developments.

  20. The acquisition of dangerous biological materials :

    Energy Technology Data Exchange (ETDEWEB)

    Aceto, Donato Gonzalo; Astuto-Gribble, Lisa M.; Gaudioso, Jennifer M.


    Numerous terrorist organizations have openly expressed interest in producing and deploying biological weapons. However, a limiting factor for many terrorists has been the acquisition of dangerous biological agents, as evidenced by the very few successful instances of biological weapons use compared to the number of documented hoaxes. Biological agents vary greatly in their ability to cause loss of life and economic damage. Some agents, if released properly, can kill many people and cause an extensive number of secondary infections; other agents will sicken only a small number of people for a short period of time. Consequently, several biological agents can potentially be used to perpetrate a bioterrorism attack but few are likely capable of causing a high consequence event. It is crucial, from a US national security perspective, to more deeply understand the likelihood that terrorist organizations can acquire the range of these agents. Few studies have attempted to comprehensively compile the technical information directly relevant to the acquisition of dangerous bacteria, viruses and toxins. In this report, technical fact sheets were assembled for 46 potentially dangerous biological agents. Much of the information was taken from various research sources which could ultimately and significantly expedite and improve bioterrorism threat assessments. By systematically examining a number of specific agent characteristics included in these fact sheets, it may be possible to detect, target, and implement measures to thwart future terrorist acquisition attempts. In addition, the information in these fact sheets may be used as a tool to help laboratories gain a rudimentary understanding of how attractive a method laboratory theft is relative to other potential acquisition modes.

  1. A Physicist Looks at the Terrorist Threat (United States)

    Muller, Richard


    Many people fear a terrorist nuclear device, smuggled into the United States, as the one weapon that could surpass the destruction and impact of 9-11. I'll review the design of nuclear weapons, with emphasis on the kinds that can be developed by rogue nations, terrorist groups, and high-school students. Saddam, prior to the first gulf war, was developing a uranium bomb, similar to the one that destroyed Hiroshima. His calutrons (named after my university) were destroyed by the United Nations. The North Korean nuclear weapon was, like the U.S. bomb used on Nagasaki, based on plutonium. Its test released the energy equivalent of about 400 tons of TNT. Although some people have speculated that they were attempting to build a small bomb, it is far more likely that this weapon was a fizzle, with less than 1 percent of the plutonium exploded. In contrast, the energy released from burning jet fuel at the 9-11 World Trade Center attack was the equivalent of 900 tons of TNT for each plane -- over twice that of the North Korean Nuke. The damage came from the fact that gasoline delivers 10 kilocalories per gram, about 15 times the energy of an equal weight of TNT. It is this huge energy per gram that also accounts for our addiction to gasoline; per gram, high performance lithium-ion computer batteries carry only 1 percent as much energy. A dirty bomb (radiological weapon) is also unattractive to terrorists because of the threhold effect: doses less than 100 rem produce no radiation illness and will leave no dead bodies at the scene. That may be why al Qaeda instructed Jose Padilla to abandon his plans for a dirty bomb attack in Chicago, and to try a fossil fuel attack (natural gas) instead. I will argue that the biggest terrorist threat is the conventional low-tech one, such as an airplane attack on a crowded stadium using the explosive fuel that they can legally buy at the corner station.

  2. Alternative Threat Methodology

    Directory of Open Access Journals (Sweden)

    Charles B. King III


    Full Text Available Of the many challenges facing risk analysis practitioners, perhaps the most difficult to overcome is in the field of terrorist threat analysis. When estimating the threat associated with naturally occurring events, historical data provides a great deal of insight into the frequency of those events. Threat associated with accidents applies many operations research tools to gauge future failure-rates (Failure Mode and Effects Analysis being perhaps the most widely known. However, estimating the probability of an individual's or group's attacking a specific (or even a generic target is an element of risk analysis in which art and intuition are applied far more regularly than is science.

  3. Concealed Threat Detection at Multiple Frames-per-second

    Energy Technology Data Exchange (ETDEWEB)

    Chang, J T


    In this LDRD project, our research purpose is to investigate the science and technology necessary to enable real-time array imaging as a rapid way to detect hidden threats through obscurants such as smoke, fog, walls, doors, and clothing. The goal of this research is to augment the capabilities of protective forces in concealed threat detection. In the current context, threats include people as well as weapons. In most cases, security personnel must make very fast assessments of a threat based upon limited amount of data. Among other attributes, UWB has been shown and quantified to penetrate and propagate through many materials (wood, some concretes, non-metallic building materials, some soils, etc.) while maintaining high range resolution. We have build collaborations with university partners and government agencies. We have considered the impact of psychometrics on target recognition and identification. Specifically we have formulated images in real-time that will engage the user's vision system in a more active way to enhance image interpretation capabilities. In this project, we are researching the use of real time (field programmable gate arrays) integrated with high resolution (cm scale), ultra wide band (UWB) electromagnetic signals for imaging personnel through smoke and walls. We evaluated the ability of real-time UWB imaging for detecting smaller objects, such as concealed weapons that are carried by the obscured personnel. We also examined the cognitive interpretation process of real time UWB electromagnetic images.

  4. 32 CFR 1903.10 - Weapons. (United States)


    ... 32 National Defense 6 2010-07-01 2010-07-01 false Weapons. 1903.10 Section 1903.10 National... INSTALLATIONS § 1903.10 Weapons. (a) Except as provided in paragraph (c) of this section, knowingly possessing or causing to be present a weapon on an Agency installation, or attempting to do so is prohibited....

  5. 48 CFR 25.301-3 - Weapons. (United States)


    ... 48 Federal Acquisition Regulations System 1 2010-10-01 2010-10-01 false Weapons. 25.301-3 Section... FOREIGN ACQUISITION Contracts Performed Outside the United States 25.301-3 Weapons. The contracting officer shall follow agency procedures and the weapons policy established by the combatant commander...

  6. Detection of weapons of mass destruction (United States)

    Bjorkholm, Paul J.


    High Energy X-ray cargo screening is a mature technology that has proven its value in the detection of contraband material hidden within cargo including fully loaded sea containers. To date high energy screening has been largely applied to manifest verification and to drug detection. However, the dramatic change in world terrorism has altered the application. Now it is essential that weapons of mass destruction (WMD"s) be interdicted with incredibly high accuracy. The implication of a missed detection has gone from loss of revenue or the lowering of the street price of drugs to potentially stopping, at least for some significant time, most world commerce. Screening containers with high energy x-rays (~250+ mm of steel penetration) is capable of detecting all nuclear threats at a fraction of the strategically important mass. The screening operation can be automated so that no human decisions are required with very low false alarms. Finally, the goal of 100% inspection of cargo inbound to the United States from the twenty largest international ports is an achievable goal with hardware costs in the area of that already spent on airport security.

  7. Handheld Concealed Weapons Detector Development (United States)


    Enforcement, Edward M. Carapezza, Donald Spector, Eds., Proc. SPIE 2938, 110 - 119 (1997). 3. Franklin Felber, Norbert Wild, Scott Nunan , Dennis Breuner... Nunan , D. Breuner, and F. Doft, "Handheld Ultrasound Concealed-Weapons Detector," in Enforcement and Security Technologies, A. Trent DePersia, J. J

  8. Seaborne Delivery Interdiction of Weapons of Mass Destruction (WMD)

    Energy Technology Data Exchange (ETDEWEB)

    Glauser, H


    Over the next 10-20 years, the probability of a terrorist attack using a weapon of mass destruction (WMD) on the United States is projected to increase. At some point over the next few decades, it may be inevitable that a terrorist group will have access to a WMD. The economic and social impact of an attack using a WMD anywhere in the world would be catastrophic. For weapons developed overseas, the routes of entry are air and sea with the maritime vector as the most porous. Providing a system to track, perform a risk assessment and inspect all inbound marine traffic before it reaches US coastal cities thereby mitigating the threat has long been a goal for our government. The challenge is to do so effectively without crippling the US economy. The Portunus Project addresses only the maritime threat and builds on a robust maritime domain awareness capability. It is a process to develop the technologies, policies and practices that will enable the US to establish a waypoint for the inspection of international marine traffic, screen 100% of containerized and bulk cargo prior to entry into the US if deemed necessary, provide a palatable economic model for transshipping, grow the US economy, and improve US environmental quality. The implementation strategy is based on security risk, and the political and economic constraints of implementation. This article is meant to provide a basic understanding of how and why this may be accomplished.

  9. The simulation of laser-based guided weapon engagements (United States)

    Al-Jaberi, Mubarak; Richardson, Mark; Coath, John; Jenkin, Robin


    The laser is an integrated part of many weapon systems, such as laser guided bombs, laser guided missiles and laser beam-riding missiles. These systems pose a significant threat to military assets on the modern battlefield. The lasers used in beam-riding missiles are particularly hard to detect as they typically use relatively low power lasers. Beamriders are also particularly difficult to defeat as current countermeasure systems have not been optimized against this threat. Some recent field trails conducted in the United Arab Emirates desert have demonstrated poor performance of both laser beam-riding systems and the LWRs designed to detect them. The aim of this research is to build a complete evaluation tool capable of assessing all the phases of an engagement of a main battle tank or armoured fighting vehicle with a laser based guided weapon. To this end a software model has been produced using Matlab & Simulink. This complete model has been verified using lab based experimentation and by comparison to the result of the mentioned field trials. This project will enable both the evaluation and design of any generic laser warning receiver or missile seeker and specific systems if various parameters are known. Moreover, this model will be used as a guide to the development of reliable countermeasures for laser beam-riding missiles.

  10. Biologic

    CERN Document Server

    Kauffman, L H


    In this paper we explore the boundary between biology and the study of formal systems (logic). In the end, we arrive at a summary formalism, a chapter in "boundary mathematics" where there are not only containers but also extainers ><, entities open to interaction and distinguishing the space that they are not. The boundary algebra of containers and extainers is to biologic what boolean algebra is to classical logic. We show how this formalism encompasses significant parts of the logic of DNA replication, the Dirac formalism for quantum mechanics, formalisms for protein folding and the basic structure of the Temperley Lieb algebra at the foundations of topological invariants of knots and links.

  11. Advanced Research Workshop on Preparedness for Nuclear and Radiological Threats

    CERN Document Server

    Diamond, David; Nuclear Threats and Security Challenges


    With the dissolution of the Soviet Union the nuclear threats facing the world are constantly evolving and have grown more complex since the end of the Cold War. The diversion of complete weapon systems or nuclear material to rogue nations and terrorist organizations has increased. The events of the past years have proved the necessity to reevaluate these threats on a level never before considered.  In recognition that no single country possesses all of the answers to the critical scientific, institutional and legal questions associated with combating nuclear and radiological terrorism, the NATO Advanced Research Workshop on “Preparedness for Nuclear and Radiological Threats” and this proceeding was structured to promote wide-ranging, multi-national exploration of critical technology needs and underlying scientific challenges to reducing the threat of nuclear/radiological terrorism; to illustrate through country-specific presentations how resulting technologies were used in national programs; and to outli...

  12. Hostile fire indicator threat data collection for helicopter-mounted applications (United States)

    Naz, P.; Hengy, S.; De Mezzo, S.


    This paper briefly describes the set-up of the sensors and the instrumentation deployed by the French-German Research Institute of Saint-Louis (ISL) during the last NATO/ACG3/SG2 HFI Threat Data Collection (Trial PROTEUS which has been conducted during the summer 2012 in Slovenia). The main purpose of this trial was the measurements of weapon and ammunition signatures for threat warning and hostile fire indicator (HFI) system development. The used weapons vary from small caliber rifles to anti-tank rockets in ground-to-ground shooting configurations. For the ISL team, the objectives consisted in measuring the acoustic signals for detection and localization of weapon firing events. Experimental results of sound localization obtained by using ground based sensors are presented and analyzed under various conditions.

  13. [Modern pneumatic weapons and injuries they cause]. (United States)

    Kozachenko, I N


    The data on the history of development and further improvement of pneumatic weapons are presented with special reference to specific features of different types and varieties of these weapons, cartridges for them, and the sphere of their application. Investigations into peculiarities of damages caused by high-capacity pneumatic weapons to the objects of forensic medical expertise affected from different distances are reviewed. Results of forensic medical expertise and clinical studies on the structure of body injuries inflicted by gunshots from pneumatic weapons to the human body are discussed. The author emphasizes the necessity of developing up-to-date terminology and classification of gunshot injuries caused by shooting from pneumatic weapons.

  14. Why Sexually Selected Weapons Are Not Ornaments. (United States)

    McCullough, Erin L; Miller, Christine W; Emlen, Douglas J


    The elaboration and diversification of sexually selected weapons remain poorly understood. We argue that progress in this topic has been hindered by a strong bias in sexual selection research, and a tendency for weapons to be conflated with ornaments used in mate choice. Here, we outline how male-male competition and female choice are distinct mechanisms of sexual selection, and why weapons and ornaments are fundamentally different types of traits. We call for research on the factors contributing to weapon divergence, the potential for male-male competition to drive speciation, and the specific use of weapons in the context of direct fights versus displays. Given that weapons are first and foremost fighting structures, biomechanical approaches are an especially promising direction for understanding weapon design.

  15. Challenges to Leadership: Responding to Biological Threats (United States)


    hospitals , doctors, vaccine providers, and others) have mobilized to enhance their readiness, resilience, and capacity to respond. After nearly 10...Influence in Biodefense: The Bio Plum Book, Biosecurity and Bioterrorism: Biodefense Strategy,” Practice and Science 4:2 328 (2004), [available at professionals will often be the first to identify outbreaks. The efforts must also include coordination with the private sector—the hospitals

  16. Information Management and the Biological Warfare Threat (United States)


    information-sharing paradigm is best illustrated in the fierce competition for gene patenting in the biotechnology industry . In 1992 Agracetus (an consider the ramifications of business decisions in the biotechnology industry . The bottom-line for any corporation in a capitalist environment...patenting. The business requirement for the patenting of genes is vital from the perspective of the biotechnology industry . Companies argue that

  17. 3.7. Threat: Biological resource use



    3.7.1 Reducing exploitation and conflict Based on the collated evidence, what is the current assessment of the effectiveness of interventions for reducing exploitation and conflict? Beneficial ● Use legislative regulation to protect wild populations Likely to be beneficial ● Use wildlife refuges to reduce hunting disturbance Unknown effectiveness (limited evidence) ● Employ local people as ʹbiomonitorsʹ● Increase ʹon-the-groundʹ protection to reduce unsustainable levels of exploitation● Intro...

  18. Maritime Terrorism and the Small Boat Threat to the United States: A Proposed Response (United States)


    vessel, including a vessel that is below 300 gross tons.161 Concern over the threat of the import of WMDs via the supply chain , i.e., including...they obtain one. Since Terrorists lack a missile delivery capability for such weapons, our concern is their use of the supply chain to deliver a 44 Catherine Zara Raymond, “How Real is the Threat from Maritime Terrorism?” Power and

  19. Real-time threat evaluation in a ground based air defence environment

    Directory of Open Access Journals (Sweden)

    JN Roux


    Full Text Available In a military environment a ground based air defence operator is required to evaluate the tactical situation in real-time and protect Defended Assets (DAs on the ground against aerial threats by assigning available Weapon Systems (WSs to engage enemy aircraft. Since this aerial environment requires rapid operational planning and decision making in stress situations, the associated responsibilities are typically divided between a number of operators and computerized systems that aid these operators during the decision making processes. One such a Decision Support System (DSS, a threat evaluation and weapon assignment system, assigns threat values to aircraft (with respect to DAs in real-time and uses these values to propose possible engagements of observed enemy aircraft by anti-aircraft WSs. In this paper a design of the threat evaluation part of such a DSS is put forward. The design follows the structured approach suggested in [Roux JN & van Vuuren JH, 2007, Threat evaluation and weapon assignment decision support: A review of the state of the art, ORiON, 23(2, pp. 151-187], phasing in a suite of increasingly complex qualitative and quantitative model components as more (reliable data become available.

  20. History of Laser Weapon Research (United States)


    surgery/medicine, hair re- moval, presentation pointers, law enforcement, ranging and sighting devices, welding applications, and much more. Using...other laser technology develop- ments. The first chemical laser, hydrogen fluoride ( HF ), was built in 1965, producing 1 kW. It was then that DoD laser (HEL) weapons. In industry, the more powerful CO2 lasers are used for weld - ing, drilling, and cutting. There are many different types

  1. The vulnerability of laser warning systems against guided weapons based on low power lasers


    Al-Jaberi, Mubarak


    Laser assisted weapons, such as laser guided bombs, laser guided missiles and laser beam-riding missiles pose a significant threat to military assets in the modern battlefield. Laser beam-riding missiles are particularly hard to detect because they use low power lasers. Most laser warning systems produced so far can not detect laser beam-riding missiles because of their weak emissions which have signals less than 1% of laser range finder power . They are even harder to defeat because current ...

  2. Aspects of Insider Threats

    DEFF Research Database (Denmark)

    Probst, Christian W.; Hunker, Jeffrey; Gollmann, Dieter;


    The insider threat has received considerable attention, and is often cited as the most serious security problem. It is also considered the most difficult problem to deal with, because an “insider” has information and capabilities not known to external attackers. The difficulty in handling the ins...

  3. Optimization of Aimpoints for Coordinate Seeking Weapons (United States)


    process. The program works by first taking in the number of weapons used and arranging them in a fixed uniform spacing on a circle centered on the...MATLAB program is used as the coding tool for the development of this algorithm and the optimization process. The program works by first taking in the...number of weapons used and arranging them in a fixed uniform spacing on a circle centered on the assumed target location. Then, the weapon

  4. Susceptibility and hardening of electronic systems to fast transient threats: new challenges ahead

    Directory of Open Access Journals (Sweden)

    F. Sabath


    Full Text Available The field of susceptibility and hardening of electronic systems to transient threats has experienced a significant growth during the past ten years. Driven by the development in the area of non-lethal electromagnetic weapons it has become necessary to extend the classical set of transient threats, consisting of LEMP, ESD and NEMP, by a fast transient threat with an extreme bandwidth. The investigation of the susceptibility to those UWB threats, characterized by a bandwidth of more than a quarter of the center frequency, rise times of less than 200 ps and pulse durations in the ns regime, is of special interest. This paper presents an overview of current challenges of the hardening against UWB threats. It discusses recent research trends in transient susceptibility measurements, protection concepts and methods of analysis.

  5. A different kind of weapon focus: simulated training with ballistic weapons reduces change blindness


    Taylor, J. Eric T.; Witt, Jessica K.; Pratt, Jay


    Attentional allocation is flexibly altered by action-related priorities. Given that tools – and specifically weapons – can affect attentional allocation, we asked whether training with a weapon or holding a weapon during search would affect change detection. In three experiments, participants searched for changes to agents, shootable objects, or environments in the popular flicker paradigm. Participants trained with a simulated weapon or watched a video from the same training perspective and ...

  6. Chemical and Biological Warfare: Should Rapid Detection Techniques Be Researched To Dissuade Usage? A Review


    Mark R. Hurst; Ebtisam Wilkins


    Chemistry, microbiology and genetic engineering have opened new doorways for the human race to propel itself to a better future. However, there is a darker side to Bioengineering. One element of this is the manufacture and proliferation of biological and chemical weapons. It is clearly in the interest of humankind to prevent the future use of such weapons of mass destruction. Though many agents have been proposed as potential biological and chemical weapons, the feasibility of these weapons i...

  7. If it bleeds, it leads: separating threat from mere negativity. (United States)

    Kveraga, Kestutis; Boshyan, Jasmine; Adams, Reginald B; Mote, Jasmine; Betz, Nicole; Ward, Noreen; Hadjikhani, Nouchine; Bar, Moshe; Barrett, Lisa F


    Most theories of emotion hold that negative stimuli are threatening and aversive. Yet in everyday experiences some negative sights (e.g. car wrecks) attract curiosity, whereas others repel (e.g. a weapon pointed in our face). To examine the diversity in negative stimuli, we employed four classes of visual images (Direct Threat, Indirect Threat, Merely Negative and Neutral) in a set of behavioral and functional magnetic resonance imaging studies. Participants reliably discriminated between the images, evaluating Direct Threat stimuli most quickly, and Merely Negative images most slowly. Threat images evoked greater and earlier blood oxygen level-dependent (BOLD) activations in the amygdala and periaqueductal gray, structures implicated in representing and responding to the motivational salience of stimuli. Conversely, the Merely Negative images evoked larger BOLD signal in the parahippocampal, retrosplenial, and medial prefrontal cortices, regions which have been implicated in contextual association processing. Ventrolateral as well as medial and lateral orbitofrontal cortices were activated by both threatening and Merely Negative images. In conclusion, negative visual stimuli can repel or attract scrutiny depending on their current threat potential, which is assessed by dynamic shifts in large-scale brain network activity.

  8. Designing the Army’s Future Active Duty Weapons of Mass Destruction Response: Is the Defense Chemical, Biological, Radiological, Nuclear and High-Yield Explosives Response Force (DCRF) the Right Force at the Right Time? (United States)


    alternative methods for implementing the force structure, reducing redundancy and waste , and building cooperative training strategies for the CBRNE forces...nuclear detonation, attacks with biological, blister , nerve, and radiological agents, an influenza pandemic, an toxic industrial chemical release, a

  9. A Lesson Not to Be Learned? Understanding Stereotype Threat Does Not Protect Women from Stereotype Threat (United States)

    Tomasetto, Carlo; Appoloni, Sara


    This research examines whether reading a text presenting scientific evidence concerning the phenomenon of stereotype threat improves or disrupts women's performance in a subsequent math task. In two experimental conditions participants (N=118 ) read a text summarizing an experiment in which stereotypes, and not biological differences, were shown…

  10. 76 FR 1136 - Electroshock Weapons Test and Measurement Workshop (United States)


    ... National Institute of Standards and Technology Electroshock Weapons Test and Measurement Workshop AGENCY..., academia, military, test instrument manufacturers, etc.) of electroshock weapons that provide stand-off... requirements for electroshock weapons, the Law Enforcement Standards Office (OLES) at NIST has...

  11. Threat in dreams: an adaptation? (United States)

    Malcolm-Smith, Susan; Solms, Mark; Turnbull, Oliver; Tredoux, Colin


    Revonsuo's influential Threat Simulation Theory (TST) predicts that people exposed to survival threats will have more threat dreams, and evince enhanced responses to dream threats, compared to those living in relatively safe conditions. Participants in a high crime area (South Africa: n=208) differed significantly from participants in a low crime area (Wales, UK: n=116) in having greater recent exposure to a life-threatening event (chi([1,N=186])(2)=14.84, pdreams (chi([1,N=287])(2)=6.11, pdream threats (Fisher's Exact test, p=.2478). Overall, the incidence of threat in dreams was extremely low-less than 20% of dreams featured realistic survival threats. Escape from dream threats occurred in less than 2% of dreams. We conclude that this evidence contradicts key aspects of TST.

  12. Nuclear Threats and Security


    Garry Jacobs; Winston P. Nagan


    This article presents highlights and insights from the International Conference on “Nuclear Threats and Security” organized by the World Academy of Art and Science in association with the European Leadership Network and the Dag Hammarskjöld University College of International Relations and Diplomacy and sponsored by NATO at the Inter-University Centre, Dubrovnik on September 14-16, 2012. The conference examined important issues related to nuclear non-proliferation and disarmament, the legalit...

  13. Nonlethal weapons as force options for the Army

    Energy Technology Data Exchange (ETDEWEB)

    Alexander, J.B.


    This paper suggests that future challenges to US national security will be very different from those previously experienced. In a number of foreseeable circumstances, conventional military force will be inappropriate. The National Command Authority, and other appropriate levels of command, need expanded options available to meet threats for which the application of massive lethal force is counterproductive or inadvisable. It is proposed that nonlethal concepts be developed that provide additional options for military leaders and politicians. Included in this initiative should be exploration of policy, strategy, doctrine, and training issues as well as the development of selected technologies and weapons. In addition, civilian law enforcement agencies have similar requirements for less-than-lethal systems. This may be an excellent example for a joint technology development venture.

  14. Nuclear weapons, nuclear effects, nuclear war

    Energy Technology Data Exchange (ETDEWEB)

    Bing, G.F.


    This paper provides a brief and mostly non-technical description of the militarily important features of nuclear weapons, of the physical phenomena associated with individual explosions, and of the expected or possible results of the use of many weapons in a nuclear war. Most emphasis is on the effects of so-called ``strategic exchanges.``

  15. Weapons Acquisition. Processes of Selected Foreign Government. (United States)


    period from 1977 to 1985: (1) 5.56mm calibre assault rifle. (2) Milan and Hot antitank weapon systems. (3) Roland ground-to-air weapon system. (4) AMX 30...and standardization edicts . Awards and penalties are laid on accordingly. (7/17, 13/20) The ministries stand apart from one another in the same way

  16. Color image fusion for concealed weapon detection

    NARCIS (Netherlands)

    Toet, A.


    Recent advances in passive and active imaging sensor technology offer the potential to detect weapons that are concealed underneath a person's clothing or carried along in bags. Although the concealed weapons can sometimes easily be detected, it can be difficult to perceive their context, due to the

  17. Overview of surplus weapons plutonium disposition

    Energy Technology Data Exchange (ETDEWEB)

    Rudy, G.


    The safe disposition of surplus weapons useable plutonium is a very important and urgent task. While the functions of long term storage and disposition directly relate to the Department`s weapons program and the environmental management program, the focus of this effort is particularly national security and nonproliferation.

  18. [Consequences learned from the use of chemical weapons during the First World War for the modern military medicine]. (United States)

    Belskikh, A N; Basharin, V A; Chepur, S V; Khalimov, Yu Sh; Markizova, N F


    The article describes the way medical service dealed with problems resulted from the use of chemical weapons during the First World War (1914-1918). It was revealed that many of the abovementioned problems remain unsolved up to the present moment. It is stated the existence of the threat of use of chemical weapons in modem military conflicts, which expands the area of responsibility for medical chemical protection. The authors proved necessity and algorithm of the training system, considered as a part of medical protection in case of adverse factors of chemical nature.

  19. Weapon Control System for Airborne Application.

    Directory of Open Access Journals (Sweden)

    M. Sankar Kishore


    Full Text Available The integrated fire' control system (IFCS plays an important role in the present-day fighter aircraft and helicopters. Wecapons, such as missiles (active/passive, rockets and guns may be present on thelfighter aircraft or helicopter .IFCS monitors the status of the weapons present on the vehicle and passes the information to pilot/co-pilot. Depending upon the health/availability of the weapons, IFCS selects/fires the weapons. An attempt has been made to bring out the details of one such IFCS. As a I stepping stone, smaller version is developed and same philosophy can be used for integrating ftlore and I more weapons. Here, emphasis has been made on design and development of weapon control unit which is the heart f IFCS, both in hardware and software. The system has been developed using a 486 DX2 processor, and an elaborate software has been developed in PL/M.

  20. Bill related to the struggle against proliferation of mass destruction weapons and their vectors; Projet de Loi relatif a la lutte contre la proliferation des armes de destruction massive et de leurs vecteurs

    Energy Technology Data Exchange (ETDEWEB)



    This bill indicates the modifications brought to different French laws and codes (penal code, defence code, custom code) and defines provisions and penalties within the frame of struggle against the proliferation of weapons of mass destruction (nuclear weapons, biological weapons and toxin-based weapons, chemical weapons), and against the proliferation of their vectors. These modifications, provisions and penalties also concern double-use products. The bill also defines the modifications brought to the French penal procedure code. It finally addresses offenses related to these proliferations which can be considered as an act of terrorism

  1. Threat modeling designing for security

    CERN Document Server

    Shostack, Adam


    Adam Shostack is responsible for security development lifecycle threat modeling at Microsoft and is one of a handful of threat modeling experts in the world. Now, he is sharing his considerable expertise into this unique book. With pages of specific actionable advice, he details how to build better security into the design of systems, software, or services from the outset. You'll explore various threat modeling approaches, find out how to test your designs against threats, and learn effective ways to address threats that have been validated at Microsoft and other top companies. Systems secur

  2. Weapons barrel life cycle determination

    Directory of Open Access Journals (Sweden)

    Nebojša Pene Hristov


    Full Text Available This article describes the dynamic processes within the gun barrel during the firing process in exploitation. It generally defines the basic principles of constructing tube elements, and shows the distortion of the basic geometry of the tube interior due to wear as well as the impact it causes during exploitation. The article also defines basic empirical models as well as a model based on fracture mechanics for the calculation of a use-life of the barrel, and other elements essential for the safe use of the barrel as the basic weapon element. Erosion causes are analysed in order to control and reduce wear and prolong the lifetime of the gun barrel. It gives directions for the reparation of barrels with wasted resources. In conclusion, the most influential elements of tube wear are given as well as possible modifications of existing systems, primarily propellant charges, with a purpose of prolonging lifetime of gun barrels. The guidelines for a proper determination of the lifetime based on the barrel condition assessment are given as well. INTRODUCTION The barrel as the basic element of each weapon is described as well as the processes occurring during the firing that have impulsive character and are accompanied by large amounts of energy. The basic elements of barrel and itheir constructive characteristics are descibed. The relation between Internal ballistics, ie calculation of the propellant gas pressure in the firing process, and structural elements defined by the barrel material resistance is shown. In general, this part of the study explains the methodology of the gun barrel structural elements calculation, ie. barrel geometry, taking into account the degrees of safety in accordance with Military Standards.   TUBE WEAR AND DEFORMATIONS The weapon barrel gradually wears out during exploitation due to which it no longer satisfies the set requirements. It is considered that the barrel has experienced a lifetime when it fails to fulfill the

  3. Otters Increasing - Threats Increasing

    Directory of Open Access Journals (Sweden)

    Andreas Kranz


    Full Text Available In some parts of Central Europe populations of otters are apparently increasing. Until recently, no research was being conducted on the ecology of otters in mainly artificial habitats like fish farms. Otters are not only a new source of conflict requiring species management, but appear once again threatened by illegal hunting. Austria is dealing with this problem using compensation for otter damage, electric fencing and translocation of problem otters. Despite a rise in illegal killing, Austria does not formally recognise this as a threat.

  4. Threats to international science (United States)

    Kisslinger, Carl

    The role of nongovernmental organizations (NGOs) as effective agents for promoting world science is seriously threatened. It is ironic that the threat comes from Norway and Denmark, two countries that have demonstrated a deep commitment to individual freedom and human rights. Motivated by a sincere desire to express their strongest disapproval of the “apartheid” policies of the government of the Republic of South Africa, these countries have passed laws that have the effect of rejecting the International Council of Scientific Unions (ICSU) principles of nondiscrimination and free circulation of scientists.

  5. Air guns: toys or weapons? (United States)

    Aslan, Sahin; Uzkeser, Mustafa; Katirci, Yavuz; Cakir, Zeynep; Bilir, Ozlem; Bilge, Fatih; Cakir, Murtaza


    Air guns and blank guns may appear relatively harmless at first glance, but they are, in fact, potentially destructive, even lethal, weapons. Approximately 2 to 2.5 million nonpowder firearms are sold annually, and again approximately 12.9 per 100,000 population are treated for such injuries in hospital emergency departments each year in the United States. Unfortunately, these guns are considered to be a toy for children. Therefore, incidents of air gun injuries are gradually increasing. Although such injuries may initially be considered trivial, it may signify severe internal tissue pathologies. These apparently trivial injuries may have catastrophic consequences if unnoticed. In this study, we report 4 cases with head injury due to a shot by these guns. The cases indicate that these people had used the guns belonging to their parents for the purpose of suicide. The cases also show that these machines are not innocent.

  6. Electronic eyebox for weapon sights (United States)

    Szapiel, Stan; Greenhalgh, Catherine; Wagner, Kevin; Nobes, Ryan


    We expand the effective size of the eyebox of a magnified telescopic weapon sight by following the movements of the operator's eye to create a larger, `electronic eyebox'. The original eyebox of the telescope is dynamically relocated in space so that proper overlap between the pupil of the eye and the exit pupil of the device is maintained. Therefore, the operator will perceive the entire field of view of the instrument in a much bigger spatial region than the one defined by the original eyebox. Proof-of-the-concept results are presented with a more than 3.5X enlargement of the eyebox volume along with recommendations for the next phase of development.

  7. Taser and Conducted Energy Weapons. (United States)

    LeClair, Thomas G; Meriano, Tony


    It is clear that CEWs are an increasingly prevalent law enforcement tool, adopted to address a complex and challenging problem. The potential for serious injury from a single deployment of a CEW is extremely low. The debate regarding the link between these electrical weapons and sudden in-custody death is likely to continue because their use is often in complex and volatile situations. Any consideration of injuries has to be put into that context. One must also consider what injuries to a subject would result if an alternative force method was used. Furthermore, the potential benefits of CEWs, including reduction in injuries to the public and law-enforcement officers, need to be considered.

  8. The silent threat of low genetic diversity (United States)

    Hunter, Margaret E.


    Across the Caribbean, protected coastal waters have served as primary feeding and breeding grounds for the endangered Antillean manatee. Unfortunately, these same coastal waters are also a popular “habitat” for humans. In the past, the overlap between human and manatee habitat allowed for manatee hunting and threatened the survival of these gentle marine mammals. Today, however, threats are much more inadvertent and are often related to coastal development, degraded habitats and boat strikes. In the state of Florida, decades of research on the species’ biological needs have helped conservationists address threats to its survival. For example, low wake zones and boater education have protected manatees from boat strikes, and many of their critical winter refuges are now protected. The Florida population has grown steadily, thus increasing from approximately 1,200 in 1991 to more than 5,000 in 2010. It is conceivable that in Florida manatees may one day be reclassified as “threatened” rather than “endangered.” Yet, in other parts of the Caribbean, threats still loom. This includes small, isolated manatee populations found on islands that can be more susceptible to extinction and lack of genetic diversity. To ensure the species’ long-term viability, scientists have turned their sights to the overall population dynamics of manatees throughout the Caribbean. Molecular genetics has provided new insights into long-term threats the species faces. Fortunately, the emerging field of conservation genetics provides managers with tools and strategies for protecting the species’ long-term viability.

  9. Toward a nuclear weapons free world?

    Energy Technology Data Exchange (ETDEWEB)

    Maaranen, S.A. [Los Alamos National Lab., NM (United States). Center for International Security Affairs


    Doubts about the wisdom of relying on nuclear weapons are as old as nuclear weapons themselves. But despite this questioning, nuclear weapons came to be seen as the indispensable element of American (indeed Western) security during the Cold War. By the 1970s and 1980s, however, discontent was growing about the intense US-Soviet nuclear arms competition, as it failed to provide any enduring improvement in security; rather, it was seen as creating ever greater risks and dangers. Arms control negotiations and limitations, adopted as a means to regulate the technical competition, may also have relieved some of the political pressures and dangers. But the balance of terror, and the fears of it, continued. The Strategic Defense Initiative (SDI) under President Reagan was a very different approach to escaping from the precarious protection of nuclear weapons, in that it sought a way to continue to defend the US and the West, but without the catastrophic risks of mutual deterrence. As such, SDI connoted unhappiness with the precarious nuclear balance and, for many, with nuclear weapons in general. The disappearance of the Warsaw Pact, the disintegration of the Soviet Union, and the sudden end of the Cold War seemed to offer a unique opportunity to fashion a new, more peaceful world order that might allow for fading away of nuclear weapons. Scholars have foreseen two different paths to a nuclear free world. The first is a fundamental improvement in the relationships between states such that nuclear weapons are no longer needed. The second path is through technological development, e.g., missile defenses which could provide effective protection against nuclear attacks. The paper discusses nuclear weapon policy in the US, views of other nuclear states, the future of nuclear weapons, and issues in a less-nuclear world.

  10. Weapon container catalog. Volumes 1 & 2

    Energy Technology Data Exchange (ETDEWEB)

    Brown, L.A.; Higuera, M.C.


    The Weapon Container Catalog describes H-gear (shipping and storage containers, bomb hand trucks and the ancillary equipment required for loading) used for weapon programs and for special use containers. When completed, the catalog will contain five volumes. Volume 1 for enduring stockpile programs (B53, B61, B83, W62, W76, W78, W80, W84, W87, and W88) and Volume 2, Special Use Containers, are being released. The catalog is intended as a source of information for weapon program engineers and also provides historical information. The catalog also will be published on the SNL Internal Web and will undergo periodic updates.

  11. Categorizing threat : building and using a generic threat matrix.

    Energy Technology Data Exchange (ETDEWEB)

    Woodard, Laura; Veitch, Cynthia K.; Thomas, Sherry Reede; Duggan, David Patrick


    The key piece of knowledge necessary for building defenses capable of withstanding or surviving cyber and kinetic attacks is an understanding of the capabilities posed by threats to a government, function, or system. With the number of threats continuing to increase, it is no longer feasible to enumerate the capabilities of all known threats and then build defenses based on those threats that are considered, at the time, to be the most relevant. Exacerbating the problem for critical infrastructure entities is the fact that the majority of detailed threat information for higher-level threats is held in classified status and is not available for general use, such as the design of defenses and the development of mitigation strategies. To reduce the complexity of analyzing threat, the threat space must first be reduced. This is achieved by taking the continuous nature of the threat space and creating an abstraction that allows the entire space to be grouped, based on measurable attributes, into a small number of distinctly different levels. The work documented in this report is an effort to create such an abstraction.

  12. Security in the Mediterranean basin: terrorism and weapons of mass destruction; La securite dans le bassin mediterraneen: terrorisme et armes de destruction massive

    Energy Technology Data Exchange (ETDEWEB)

    Benoit, L. [Tours Univ., 37 (France); Groupe d' Etudes et de Recherches sur la Cooperation Internationale et Europeenne (GERCIE), 37 - Tours (France)


    The european union has appreciated the gravity of the threat from terrorism and weapons of mass destruction, and has adopted a strategy for keeping up its guard, particularly in the Mediterranean basin. The author reviews what is being done to meet these scourges. (author)

  13. Review of weapon noise measurement and damage risk criteria: considerations for auditory protection and performance. (United States)

    Nakashima, Ann; Farinaccio, Rocco


    Noise-induced hearing loss resulting from weapon noise exposure has been studied for decades. A summary of recent work in weapon noise signal analysis, current knowledge of hearing damage risk criteria, and auditory performance in impulse noise is presented. Most of the currently used damage risk criteria are based on data that cannot be replicated or verified. There is a need to address the effects of combined noise exposures, from similar or different weapons and continuous background noise, in future noise exposure regulations. Advancements in hearing protection technology have expanded the options available to soldiers. Individual selection of hearing protection devices that are best suited to the type of exposure, the auditory task requirements, and hearing status of the user could help to facilitate their use. However, hearing protection devices affect auditory performance, which in turn affects situational awareness in the field. This includes communication capability and the localization and identification of threats. Laboratory training using high-fidelity weapon noise recordings has the potential to improve the auditory performance of soldiers in the field, providing a low-cost tool to enhance readiness for combat.

  14. 43 CFR 15.11 - Explosives and dangerous weapons. (United States)


    ... 43 Public Lands: Interior 1 2010-10-01 2010-10-01 false Explosives and dangerous weapons. 15.11... § 15.11 Explosives and dangerous weapons. No person shall carry, use or possess within the Preserve... other kind of weapon potentially harmful to the reef structure. The use of such weapons from beyond...

  15. 36 CFR 2.4 - Weapons, traps and nets. (United States)


    ... 36 Parks, Forests, and Public Property 1 2010-07-01 2010-07-01 false Weapons, traps and nets. 2.4... PROTECTION, PUBLIC USE AND RECREATION § 2.4 Weapons, traps and nets. (a)(1) Except as otherwise provided in... prohibited: (i) Possessing a weapon, trap or net (ii) Carrying a weapon, trap or net (iii) Using a...

  16. 36 CFR 1002.4 - Weapons, traps and nets. (United States)


    ... 36 Parks, Forests, and Public Property 3 2010-07-01 2010-07-01 false Weapons, traps and nets. 1002... AND RECREATION § 1002.4 Weapons, traps and nets. (a)(1) Except as otherwise provided in this section, the following are prohibited: (i) Possessing a weapon, trap or net. (ii) Carrying a weapon, trap...

  17. What can Iran gain by having a nuclear weapons program that threatens to destabilize security in the Middle East?

    DEFF Research Database (Denmark)

    Nielsen, Thomas Galasz

    and a lot of neigh- bouring countries fear such a development for security reasons. But why is Iran following a nuclear path that may further destabilise the fragile security situation in the Middle East? It is to do with Iran’s own perception of security risks, its desire for greatness in the region......In this paper, Iran’s nuclear aspiration to destabilise power in the Middle East is analysed. Iran is attempting to develop a nuclear energy program, and perhaps even a nuclear weapons program, despite assurances of the opposite. An Iranian nuclear weapon would be a game changer in the region......, and domestic challenges, caused in part by United Nations’ sanctions, lack of development and internal political power struggles. Iran balances cleverly on the edge of either further international isolation or becoming a significant local power. It uses the threat of developing nuclear weapons, in com...

  18. The Threat of the Premium Tank: The Product and Process of the Soviet Experience (United States)


    he’p drive the U.S. Army’s current push for new and more effective antiarmor weapon systems. CONCLUSION The historic appearance of the Russian T-34...Army 100 post-war generation of tank development. The PT-5 will go into limited production in 1993, with the push to full scale production between 1994...Anti-armor. Orlando, FL: Tecnology Training Corporation, 1989. 122 INITIAL DISTRIBUTION LIST 1. LTC John K. Boles III USACAC Threats Directorate Ft

  19. Weapons dismantlement issues in independent Ukraine

    Energy Technology Data Exchange (ETDEWEB)

    Zack, N.R. [Los Alamos National Lab., NM (United States); Kirk, E.J. [American Association for the Advancement of Science, Washington, DC (United States)


    The American Association for the Advancement of Science sponsored a seminar during September 1993, in Kiev, Ukraine, entitled ``Toward a Nuclear Free Future -- Barriers and Problems.`` It brought together Ukrainians, Belarusians, and Americans to discuss the legal, political, safeguards and security, economic, and technical dimensions of nuclear weapons dismantlement and destruction. US representatives initiated discussions on legal and treaty requirements and constraints, safeguards and security issues surrounding dismantlement, storage and disposition of nuclear materials, warhead transportation, and economic considerations. Ukrainians gave presentations on arguments for and against the Ukraine keeping nuclear weapons, Ukrainian Parliament non-approval of START I, alternative strategies for dismantling silos and launchers, and economic and security implications of nuclear weapons removal from the Ukraine. Participants from Belarus discussed proliferation and control regime issues, This paper will highlight and detail the issues, concerns, and possible impacts of the Ukraine`s dismantlement of its nuclear weapons.

  20. Controlling Weapons-Grade Fissile Material (United States)

    Rotblat, J.


    Discusses the problems of controlling weapons-grade fissionable material. Projections of the growth of fission nuclear reactors indicates sufficient materials will be available to construct 300,000 atomic bombs each containing 10 kilograms of plutonium by 1990. (SL)

  1. Computational Challenges in Nuclear Weapons Simulation

    Energy Technology Data Exchange (ETDEWEB)

    McMillain, C F; Adams, T F; McCoy, M G; Christensen, R B; Pudliner, B S; Zika, M R; Brantley, P S; Vetter, J S; May, J M


    After a decade of experience, the Stockpile Stewardship Program continues to ensure the safety, security and reliability of the nation's nuclear weapons. The Advanced Simulation and Computing (ASCI) program was established to provide leading edge, high-end simulation capabilities needed to meet the program's assessment and certification requirements. The great challenge of this program lies in developing the tools and resources necessary for the complex, highly coupled, multi-physics calculations required to simulate nuclear weapons. This paper describes the hardware and software environment we have applied to fulfill our nuclear weapons responsibilities. It also presents the characteristics of our algorithms and codes, especially as they relate to supercomputing resource capabilities and requirements. It then addresses impediments to the development and application of nuclear weapon simulation software and hardware and concludes with a summary of observations and recommendations on an approach for working with industry and government agencies to address these impediments.

  2. 76 FR 6087 - Draft Weapons Safety Assessment on the Use of Enhanced Weapons; Notice of Availability and... (United States)


    ... COMMISSION 10 CFR Part 73 RIN 3150-AI49 Draft Weapons Safety Assessment on the Use of Enhanced Weapons... guidance document entitled ``Weapons Safety Assessment'' (WSA). This guidance would be used by licensees and certificate holders applying to the NRC to obtain enhanced weapons under the NRC's proposed...

  3. Energy security and renewable electricity trade-Will Desertec make Europe vulnerable to the 'energy weapon'?

    Energy Technology Data Exchange (ETDEWEB)

    Lilliestam, Johan, E-mail: [Potsdam Institute for Climate Impact Research (PIK), Telegrafenberg A31, 14473 Potsdam (Germany); International Institute for Applied Systems Analysis (IIASA), Schlossplatz 1, 2361 Laxenburg (Austria); Ellenbeck, Saskia [Potsdam Institute for Climate Impact Research (PIK), Telegrafenberg A31, 14473 Potsdam (Germany)


    Solar power imports to Europe from the deserts of North Africa, as foreseen in the Desertec concept, is one possible way to help decarbonising the European power sector by 2050. However, this approach raises questions of threats to European energy security in such an import scenario, particularly in the light of increasing import dependency and Russia's use of the 'energy weapon' in recent years. In this paper we investigate the threat of North African countries using the Desertec electricity exports as an 'energy weapon'. We develop and use a new model to assess the interdependence - the bargaining power symmetry, operationalised as costs - of a disruption in a future renewable electricity trade between North Africa and Europe. If Europe maintains current capacity buffers, some demand-response capability and does not import much more than what is described in the Desertec scenario, it is susceptible to extortion and political pressure only if all five exporter countries unite in using the energy weapon. Europe is not vulnerable to extortion by an export cut from only one country, as the European capacity buffers are sufficient to restore the power supply: no single exporter country would have sustained bargaining power over Europe. - Highlights: > European vulnerability to energy weapon extortion in a Desertec-style electricity future is assessed. > The vulnerability to the energy weapon is conceptualised as the direct disruption costs on both sides. > The paper shows that Europe is not vulnerable to single-country export disruptions. > If all exporters cut supplies simultaneously, Europe may be vulnerable to the energy weapon.

  4. World War I chemical weapons bunker engineering evaluation and cost analysis

    Energy Technology Data Exchange (ETDEWEB)

    Craig, C.A.; Crotteau, A.


    This paper provides a review of the US Army Corps of Engineers development and execution of a CERCLA chemical weapons and soil removal from two World War 1 underground test bunkers. The non-time critical removal action was completed from October 1994 to January 1995 in conjunction with Operation Safe Removal, Spring Valley, Washington, D.C. On January 5, 1993, a startled backhoe operator unearthed three 75mm artillery shells, exposing the legacy of a World War 1 (WWI) chemical weapons test facility in the midst of the nation`s capitol. That discovery, made in an exclusive residential neighborhood, prompted an intensive two year environmental cleanup. The Army immediately responded to the chemical ordnance threat, initiating Operation Safe Removal, a $20 million emergency response action and remedial investigation.

  5. Weapon target assignment problem satisfying expected damage probabilities based on ant colony algorithm

    Institute of Scientific and Technical Information of China (English)

    Wang Yanxia; Qian Longjun; Guo Zhi; Ma Lifeng


    A weapon target assignment (WTA) model satisfying expected damage probabilities with an ant colony algorithm is proposed.In order to save armament resource and attack the targets effectively,the strategy of the weapon assignment is that the target with greater threat degree has higher priority to be intercepted.The effect of this WTA model is not maximizing the damage probability but satisfying the whole assignment result.Ant colony algorithm has been successfully used in many fields,especially in combination optimization.The ant colony algorithm for this WTA problem is described by analyzing path selection,pheromone update,and tabu table update.The effectiveness of the model and the algorithm is demonstrated with an example.

  6. Biophysics and the Challenges of Emerging Threats

    CERN Document Server

    Puglisi, Joseph D


    This volume is a collection of articles from the proceedings of the International School of Structural Biology and Magnetic Resonance 8th Course: Biophysics and the Challenges of Emerging Threats. This NATO Advance Study Institute (ASI) was held in Erice at the Ettore Majorana Foundation and Centre for Scientific Culture on 19 through 30 June 2007. The ASI brought together a diverse group of experts who bridged the fields of virology and biology, biophysics, chemistry and physics. Prominent lecturers and students from around the world representant a total of 24 countries participated in the NATO ASI organized by Professors Joseph Puglisi (Stanford University, USA) and Alexander Arseniev (Moscow, RU). The central hypothesis underlying this ASI was that interdisciplinary research, merging principles of physics, chemistry and biology, can drive new discovery in detecting and fighting bioterrorism agents, lead to cleaner environments, and help propel development in NATO partner countries. The ASI merged the relat...


    Energy Technology Data Exchange (ETDEWEB)



    The program of the Atomic Energy Commission on environmental contamination from weapons tests is designed for the overall evaluation of the hazard to humans from test operations. It is limited to studies of the deposition of activity at long range rather than the problems associated with immediate, close-in fallout. The program has largely been a study of Sr{sup 90}, since considerations based on experience and measurement indicate that it is the isotope of greatest potential hazard. Data are presented pertinent to the monitoring of long-range fallout, particularly Sr{sup 90} and Cs{sup 137}. Values are tabulated for the fallout deposition, air concentrations, water concentrations, and the amounts in foods and human bone. In addition, results are given for some experimental investigations. The report of these results is not interpretative although certain papers that do attempt to interpret the present situation with respect to Sr{sup 90} in particular are reprinted. Bibliographies are presented covering the period since the 1957 hearings before the Joint Committee on Atomic Energy concerning the nature of radioactive fallout and its effects on man. A document list of submissions to the United Nations Scientific Committee on the Effects of Atomic Radiation is given to illustrate the work done in other countries. Several papers on the subject, which have not been generally available, are reprinted.

  8. Biological and Chemical Security

    Energy Technology Data Exchange (ETDEWEB)

    Fitch, P J


    The LLNL Chemical & Biological National Security Program (CBNP) provides science, technology and integrated systems for chemical and biological security. Our approach is to develop and field advanced strategies that dramatically improve the nation's capabilities to prevent, prepare for, detect, and respond to terrorist use of chemical or biological weapons. Recent events show the importance of civilian defense against terrorism. The 1995 nerve gas attack in Tokyo's subway served to catalyze and focus the early LLNL program on civilian counter terrorism. In the same year, LLNL began CBNP using Laboratory-Directed R&D investments and a focus on biodetection. The Nunn-Lugar-Domenici Defense Against Weapons of Mass Destruction Act, passed in 1996, initiated a number of U.S. nonproliferation and counter-terrorism programs including the DOE (now NNSA) Chemical and Biological Nonproliferation Program (also known as CBNP). In 2002, the Department of Homeland Security was formed. The NNSA CBNP and many of the LLNL CBNP activities are being transferred as the new Department becomes operational. LLNL has a long history in national security including nonproliferation of weapons of mass destruction. In biology, LLNL had a key role in starting and implementing the Human Genome Project and, more recently, the Microbial Genome Program. LLNL has over 1,000 scientists and engineers with relevant expertise in biology, chemistry, decontamination, instrumentation, microtechnologies, atmospheric modeling, and field experimentation. Over 150 LLNL scientists and engineers work full time on chemical and biological national security projects.

  9. Proliferation concerns in the Russian closed nuclear weapons complex cities : a study of regional migration behavior.

    Energy Technology Data Exchange (ETDEWEB)

    Flores, Kristen Lee


    The collapse of the Soviet Union in 1991 left the legacy of the USSR weapons complex with an estimated 50 nuclear, chemical, and biological weapons cities containing facilities responsible for research, production, maintenance, and destruction of the weapons stockpile. The Russian Federation acquired ten such previously secret, closed nuclear weapons complex cities. Unfortunately, a lack of government funding to support these facilities resulted in non-payment of salaries to employees and even plant closures, which led to an international fear of weapons material and knowledge proliferation. This dissertation analyzes migration in 33 regions of the Russian Federation, six of which contain the ten closed nuclear weapons complex cities. This study finds that the presence of a closed nuclear city does not significantly influence migration. However, the factors that do influence migration are statistically different in regions containing closed nuclear cities compared to regions without closed nuclear cities. Further, these results show that the net rate of migration has changed across the years since the break up of the Soviet Union, and that the push and pull factors for migration have changed across time. Specifically, personal and residential factors had a significant impact on migration immediately following the collapse of the Soviet Union, but economic infrastructure and societal factors became significant in later years. Two significant policy conclusions are derived from this research. First, higher levels of income are found to increase outmigration from regions, implying that programs designed to prevent migration by increasing incomes for closed city residents may be counter-productive. Second, this study finds that programs designed to increase capital and build infrastructure in the new Russian Federation will be more effective for employing scientists and engineers from the weapons complex, and consequently reduce the potential for emigration of

  10. Bio-threat microparticle simulants (United States)

    Farquar, George Roy; Leif, Roald N


    A bio-threat simulant that includes a carrier and DNA encapsulated in the carrier. Also a method of making a simulant including the steps of providing a carrier and encapsulating DNA in the carrier to produce the bio-threat simulant.

  11. Bio-threat microparticle simulants (United States)

    Farquar, George Roy; Leif, Roald


    A bio-threat simulant that includes a carrier and DNA encapsulated in the carrier. Also a method of making a simulant including the steps of providing a carrier and encapsulating DNA in the carrier to produce the bio-threat simulant.

  12. 对抗高超声速武器的机载激光武器发展研究%Research on the Development of Airborne Laser Weapons Against Hypersonic Weapons

    Institute of Scientific and Technical Information of China (English)

    张同鑫; 李权


    The military threat of hypersonic weapon to current air defense system, and the potential military value of airborne laser weapon confronted to the hypersonic weapon were illustrated. Detailed introduction was made on the technical barriers of airborne laser weapon and the state of the art research progress. It is emphasized that now to research airborne laser weapon, its weight and size must be decreased, beam control system and aiming and tracking system in dynamic environments must be researched, special aerodynamic layout must be designed and smart energy sources management must be established.%介绍了高超声速武器对现有军事防御系统的威胁,机载激光武器对抗高超声速武器的军事价值。详细描述了国外机载激光武器的研究进展以及研究机载激光武器的技术难点,指出当前研究机载激光武器必须进一步降低激光武器的重量和体积,研发动态环境的光束控制与瞄准跟踪系统,开展特殊气动布局设计研究,建立周密的能源管理系统。

  13. Forum on Microbial Threats (United States)


    studied and opening a portal to vast post-genomic possibilities - from RNAi (RNA interference) therapeutics to synthetic biology. New strategies combining...with the public health system limit this system’s contribution to national biosurveillance . Dr. Tim Stearns discussed the findings of a 2008 JASONs

  14. Psychoanalysis and the nuclear threat

    Energy Technology Data Exchange (ETDEWEB)

    Levine, H.B.; Jacobs, D.; Rubin, L.J.


    {ital Psychoanalysis and the Nuclear Threat} provides coverage of the dynamic and clinical considerations that follow from life in the nuclear age. Of special clinical interest are chapters dealing with the developmental consequences of the nuclear threat in childhood, adolescence, and adulthood, and those exploring the technical issues raised by the occurrence in analytic and psychotherapeutic hours of material related to the nuclear threat. Additional chapters bring a psychoanalytic perspective to bear on such issues as the need to have enemies, silence as the real crime, love, work, and survival in the nuclear age, the relationship of the nuclear threat to issues of mourning and melancholia, apocalyptic fantasies, the paranoid process, considerations of the possible impact of gender on the nuclear threat, and the application of psychoanalytic thinking to nuclear arms strategy. Finally, the volume includes the first case report in the English language---albeit a brief psychotherapy---involving the treatment of a Hiroshima survivor.




    Optimal features for concealed carry weapons. The specificity of jobs and tasks that require concealed carrying of weapons by officials require specific criteria when choosing personal weapons specialist.

  16. Color image fusion for concealed weapon detection (United States)

    Toet, Alexander


    Recent advances in passive and active imaging sensor technology offer the potential to detect weapons that are concealed underneath a person's clothing or carried along in bags. Although the concealed weapons can sometimes easily be detected, it can be difficult to perceive their context, due to the non-literal nature of these images. Especially for dynamic crowd surveillance purposes it may be impossible to rapidly asses with certainty which individual in the crowd is the one carrying the observed weapon. Sensor fusion is an enabling technology that may be used to solve this problem. Through fusion the signal of the sensor that depicts the weapon can be displayed in the context provided by a sensor of a different modality. We propose an image fusion scheme in which non-literal imagery can be fused with standard color images such that the result clearly displays the observed weapons in the context of the original color image. The procedure is such that the relevant contrast details from the non-literal image are transferred to the color image without altering the original color distribution of this image. The result is a natural looking color image that fluently combines all details from both input sources. When an observer who performs a dynamic crowd surveillance task, detects a weapon in the scene, he will also be able to quickly determine which person in the crowd is actually carrying the observed weapon (e.g. "the man with the red T-shirt and blue jeans"). The method is illustrated by the fusion of thermal 8-12 μm imagery with standard RGB color images.

  17. Implications of a North Korean Nuclear Weapons Program

    Energy Technology Data Exchange (ETDEWEB)

    Lehman, R.F. II


    The Democratic People`s Republic of Korea (DPRK) is one of the Cold War`s last remaining totalitarian regimes. Rarely has any society been as closed to outside influences and so distant from political, economic, and military developments around the globe. In 1991 and in 1992, however, this dictatorship took a number of political steps which increased Pyongyang`s interaction with the outside world. Although North Korea`s style of engagement with the broader international community involved frequent pauses and numerous steps backward, many observers believed that North Korea was finally moving to end its isolated, outlaw status. As the end of 1992 approached, however, delay and obstruction by Pyongyang became intense as accumulating evidence suggested that the DPRK, in violation of the nuclear Non-Proliferation Treaty (NPT), was seeking to develop nuclear weapons. On March 12, 1993, North Korea announced that it would not accept additional inspections proposed by the International Atomic Energy Agency (IAEA) to resolve concerns about possible violations and instead would withdraw from the Treaty. Pyongyang`s action raised the specter that, instead of a last act of the Cold War, North Korea`s diplomatic maneuvering would unravel the international norms that were to be the basis of stability and peace in the post-Cold War era. Indeed, the discovery that North Korea was approaching the capability to produce nuclear weapons suggested that the nuclear threat, which had been successfully managed throughout the Cold War era, could increase in the post-Cold War era.

  18. Stereotype Threat as Validity Threat: The Anxiety-Sex-Threat Interaction (United States)

    Delgado, Ana R.; Prieto, Gerardo


    Stereotype threat has been invoked to explain underperformance on a variety of groups for whom the stereotypes allege inferior cognitive abilities. In math testing, stereotype threat has been used to explain sex differences in test performance. This paper describes an experimental study on a large sample (n = 313), in which the role of anxiety and…

  19. Magnetohydrodynamic (MHD) nuclear weapons effects on submarine cable systems. Volume 1. Experiments and analysis. Final report

    Energy Technology Data Exchange (ETDEWEB)


    This report presents a study of the nuclear weapons magnetohydrodynamic (MHD) effects on submarine communications cables. The study consisted of the analysis and interpretation of currently available data on submarine cable systems TAT-4, TAT-6, and TAT-7. The primary result of the study is that decrease of the effective resistivity with frequency over the available experimental range, coupled with the model results, leads to quite small effective resistivities at the MHD characteristic frequencies, and hence small earth potential differences. Thus, it appears that submarine cable systems are less susceptible to an MHD threat than their land-based counter-parts.

  20. Mobbing, threats to employees

    Directory of Open Access Journals (Sweden)

    Tatjana Vene


    Full Text Available RQ: Is there a connection among perception of hostile and unethical communication, timely removal of causes and employee satisfaction?Purpose: Perceived mobbing in the organization, analysing causes and timely removal of them without any effect; achieve an environment of satisfied employees. The purpose is to study the relationship amongthe categories: perceiving mobbing, removing the effects, employee satisfaction.Methods: Qualitative research approach, method of interview by using the seven steps principles.Results: The findings clearly state that being aware of the negative factors and psychological abuse in organizations was present. The interview participants perceived different negative behaviours especially by the female population and from the side of superiors. In some organizations perceived negative factors are insults,insinuations, low wages, inadequate working day, competition, lobbying, and verbal threats. All negative factors lead to serious implications for employees, in which the organization can lose its reputation, productivity is reduced, costs of employment can increase with more sick leaves and in extreme cases, the results can be soserious that the organization can end in bankruptcy or liquidation.Organization: The result of the study warns management to acceptcertain actions and remediate the situation in organizations. The employer and managers must do everything to protect their subordinates from violence and potential offenders.Society: The research study warns on the seriousness of mobbing among employees, the aim is to bring the issue to individuals and society. The victim usually needs help (health costs, losses in the pension system, increased unemployment, and lower productivity of the whole society.Originality: In view of the sensitivity of the issues, the author concludes that the existing research studies are based especially on closed questions (questionnaires; however, interviews create mutual trust between

  1. Modelling ultraviolet threats (United States)

    James, I.


    Electro-optically (EO) guided surface to air missiles (SAM) have developed to use Ultraviolet (UV) wavebands supplementary to the more common Infrared (IR) wavebands. Missiles such as the US Stinger have been around for some time but are not considered a proliferation risk. The Chinese FN-16 and Russian SA-29 (Verba) are considered a much higher proliferation risk. As a result, models of the missile seekers must be developed to understand the characteristics of the seeker and the potential performance enhancement that are included. Therefore, the purpose of this paper is to introduce the steps that have been taken to characterise and model these missiles. It begins by outlining some of the characteristics of the threats, the key elements of a UV scene, the potential choice of waveband for a detector, the initial modelling work to represent the UV detector of the missile and presents initial results. The modelling shows that the UV detection range of a typical aircraft is dependent on both the size of the aircraft and its reflectivity. However, the strength of this correlation is less than expected. As a result, further work is required to model more seeker types and to investigate what is causing the weak correlations found in these initial investigations. In addition, there needs to be further study of the sensitivities of the model to other variables, such as the modelled detectivity of the detector and the signal to noise ratio assumed. Overall, the outcome of this work will be to provide specifications for aircraft size and reflectivity that limit the effectiveness of the UV channels.

  2. Turkey’s Response to Threats of Weapons of Mass Destruction (United States)


    2000 standard. 339 These aircraft are configured to carry Popeye precision-guided stand-off missiles. In order to boost the capabilities of the...aircraft, donated by the USA are also among the procurement plans. In November of 1996, Turkey revealed plans to buy Popeye II missiles from Israel for...capability to launch Popeye II precision guided missiles to targets as far as 150 miles in range. 2. Intelligence and Early Warning The Turkish

  3. Global Threats to Child Safety. (United States)

    Mace, Sharon E


    Children have rights, as enumerated in the Declaration of the Rights of the Child, and need protection from violence, exploitation, and abuse. Global threats to child safety exist. These threats include lack of basic needs (food, clean water, sanitation), maltreatment, abandonment, child labor, child marriage, female genital mutilation, child trafficking, disasters, and armed conflicts/wars. Recent disasters and armed conflicts have led to a record number of displaced people especially children and their families. Strategies and specific programs can be developed and implemented for eliminating threats to the safety of children.

  4. Advanced Algorithms for Rapidly Reconstructing Clandestine Releases of Biological Agents in Urban Areas

    Energy Technology Data Exchange (ETDEWEB)

    Shinn, J.H.; Hall, C.H.; Neher, L.A.; Wilder, F.J.; Gouveia, D.W.; Layton, D.W.; Daniels, J.I.


    As the United States plays a greater role in the 21st Century as global peacekeeper and international defender of human rights and democratic principles, there is an increasing likelihood that it will become the focus of acts of terrorism. Such acts of terrorism--sometimes described as ''asymmetric''--could involve the threat or use of weapons of mass destruction (WMD), particularly those considered unconventional, which include ones designed to release chemical or biological agents. In fact, biological agents are of great concern because, as noted by D.A. Henderson of the Center for Civilian Biodefense Studies at Johns Hopkins University in Baltimore, MD, ''... with shortages of hospital space, vaccines, antibiotics, there would be chaos.'' (Williams, 2000). Unfortunately, potential aggressor nations, terrorist groups, and even individuals, can, for a modest cost and effort, develop covert capabilities for manufacturing, transporting, and offensively using biological weapons of mass destruction. Furthermore, there is evidence to indicate that terrorist increasingly are targeting civilian populations--in order to inflict indiscriminate casualties--as well as other more traditional targets such as symbolic buildings or organizations (see Tucker, 1999), which suggest that introducing rapid treatment after a biological event may be more practical than concentrating on prevention (see Siegrist, 1999), especially because sensors are unlikely to be placed in all major urban areas to detect even an atmospheric biological release. For these reasons, and because symptoms for the majority of those effected may not occur or be directly identified for several days, early identification of a covert undetected biological event (CUBE) will contribute to timely medical intervention, which can save many lives.

  5. Task Analyses of Three Selected Weapons Systems. (United States)


    using weapons is a joint function of the specific weapon system, the goals (missions) of the system, and the environment in which it is used. The first...Identification of fire mission profiles which state general job functions for each type of typical mission. Documentary sources such as Field Manuals...nd Arin,,, Ui, Guni i A,!i" tant uuPnrr No. I Can; n , r Grup - ( nile. .rs and Prir Diff,-ront S, tm: -inch L,,t.’r _, Fort Hood l::t Cavall, I

  6. Implementing the chemical weapons convention

    Energy Technology Data Exchange (ETDEWEB)

    Kellman, B.; Tanzman, E. A.


    In 1993, as the CWC ratification process was beginning, concerns arose that the complexity of integrating the CWC with national law could cause each nation to implement the Convention without regard to what other nations were doing, thereby causing inconsistencies among States as to how the CWC would be carried out. As a result, the author's colleagues and the author prepared the Manual for National Implementation of the Chemical Weapons Convention and presented it to each national delegation at the December 1993 meeting of the Preparatory Commission in The Hague. During its preparation, the Committee of CWC Legal Experts, a group of distinguished international jurists, law professors, legally-trained diplomats, government officials, and Parliamentarians from every region of the world, including Central Europe, reviewed the Manual. In February 1998, they finished the second edition of the Manual in order to update it in light of developments since the CWC entered into force on 29 April 1997. The Manual tries to increase understanding of the Convention by identifying its obligations and suggesting methods of meeting them. Education about CWC obligations and available alternatives to comply with these requirements can facilitate national response that are consistent among States Parties. Thus, the Manual offers options that can strengthen international realization of the Convention's goals if States Parties act compatibly in implementing them. Equally important, it is intended to build confidence that the legal issues raised by the Convention are finite and addressable. They are now nearing competition of an internet version of this document so that interested persons can access it electronically and can view the full text of all of the national implementing legislation it cites. The internet address, or URL, for the internet version of the Manual is http: // This paper draws from the Manual. It comparatively addresses approximately thirty

  7. Joseph A. Burton Forum Award Lecture: Managing Nuclear and Biological Risks: Building Resilience through International Cooperation (United States)

    Pregenzer, Arian


    International technical cooperation has long been an important nonproliferation strategy, especially since the 1990s when cooperative threat reduction (CTR) to prevent theft or illicit transfer of nuclear weapons, material and expertise in the former Soviet Union became a keystone of U.S. policy. The CTR approach expanded to include engagement with scientists and engineers with expertise relevant to biological and chemical weapons, and continued in the 2000s with efforts in Iraq and Libya, and cooperation with a wide range of countries on export control and nuclear and biological security. In general, the goal of such efforts has been to prevent proliferation or WMD terrorism. In most cases, the United States (or the West) defines the threat, and then funds partner countries to implement solutions. This presentation will argue that the future requires a new approach. Nuclear capabilities are more widely available than ever before, repercussions of the A.Q. Khan network continue to unfurl, and countries such as the DPRK engage in illicit cooperation. In addition, there has been a global boom in biotechnology with many nations, particularly across South and East Asia, investing in the biotech industry as a source of fuels, food, and materials for their rapidly expanding populations. Compared to the 1990s, today's threat is more diffuse, and the line between legitimate and illegitimate technical capability is no longer so clear. In addition, the West has many fewer resources to invest due to the global economic downturn. In this environment, full commitment of all countries that benefit from nuclear and biological advances will be required to assure the safety and security of all. Technical cooperation can continue to play an important role, but with some significant changes: First, challenges should be defined from a local perspective to ensure full commitment and participation. Second, the goal of cooperation should shift from preventing specific threats to building

  8. Agent-based Modeling Methodology for Analyzing Weapons Systems (United States)


    43 Figure 14: Simulation Study Methodology for the Weapon System Analysis Metrics Definition and Data Collection The analysis plan calls for...AGENT-BASED MODELING METHODOLOGY FOR ANALYZING WEAPONS SYSTEMS THESIS Casey D. Connors, Major, USA...AGENT-BASED MODELING METHODOLOGY FOR ANALYZING WEAPONS SYSTEMS THESIS Presented to the Faculty Department of Operational Sciences

  9. 7 CFR 501.12 - Weapons and explosives. (United States)


    ... 7 Agriculture 6 2010-01-01 2010-01-01 false Weapons and explosives. 501.12 Section 501.12... OF AGRICULTURE CONDUCT ON U.S. MEAT ANIMAL RESEARCH CENTER, CLAY CENTER, NEBRASKA § 501.12 Weapons... arrows, darts, other dangerous or deadly weapons, or explosives, either openly or concealed, except...

  10. 32 CFR 552.125 - Disposition of confiscated weapons. (United States)


    ... 32 National Defense 3 2010-07-01 2010-07-01 true Disposition of confiscated weapons. 552.125..., Ammunition, and Explosives-Fort Lewis, Washington § 552.125 Disposition of confiscated weapons. Commanders will maintain confiscated weapons in the unit arms room pending final disposition. They will...

  11. 44 CFR 15.15 - Weapons and explosives. (United States)


    ... 44 Emergency Management and Assistance 1 2010-10-01 2010-10-01 false Weapons and explosives. 15.15... EMERGENCY TRAINING CENTER § 15.15 Weapons and explosives. No person entering or while at Mt. Weather or the NETC will carry or possess firearms, other dangerous or deadly weapons, explosives or items intended...

  12. 15 CFR 265.39 - Weapons and explosives. (United States)


    ... 15 Commerce and Foreign Trade 1 2010-01-01 2010-01-01 false Weapons and explosives. 265.39 Section..., GAITHERSBURG, MARYLAND, AND BOULDER AND FORT COLLINS, COLORADO Buildings and Grounds § 265.39 Weapons and... dangerous or deadly weapons or materials, or explosives, either openly or concealed, without the...

  13. 36 CFR 504.14 - Weapons and explosives. (United States)


    ... 36 Parks, Forests, and Public Property 3 2010-07-01 2010-07-01 false Weapons and explosives. 504... GOVERNING SMITHSONIAN INSTITUTION BUILDINGS AND GROUNDS § 504.14 Weapons and explosives. No person while on the premises shall carry firearms, other dangerous or deadly weapons, or explosives, either openly...

  14. 36 CFR 13.30 - Weapons, traps and nets. (United States)


    ... 36 Parks, Forests, and Public Property 1 2010-07-01 2010-07-01 false Weapons, traps and nets. 13... INTERIOR NATIONAL PARK SYSTEM UNITS IN ALASKA General Provisions § 13.30 Weapons, traps and nets. (a... of this chapter, the following are prohibited— (1) Possessing a weapon, trap, or net; (2) Carrying...

  15. 31 CFR 407.13 - Weapons and explosives. (United States)


    ... 31 Money and Finance: Treasury 2 2010-07-01 2010-07-01 false Weapons and explosives. 407.13... TREASURY ANNEX § 407.13 Weapons and explosives. No person while on the property shall carry firearms, other dangerous or deadly weapons, or explosives, either openly or concealed, except for official purposes....

  16. 46 CFR 386.23 - Weapons and explosives. (United States)


    ... 46 Shipping 8 2010-10-01 2010-10-01 false Weapons and explosives. 386.23 Section 386.23 Shipping... AND GROUNDS AT THE UNITED STATES MERCHANT MARINE ACADEMY § 386.23 Weapons and explosives. No person shall carry or possess firearms, other dangerous or deadly weapons or parts thereof, explosives or...

  17. 32 CFR 228.7 - Prohibition on weapons and explosives. (United States)


    ... 32 National Defense 2 2010-07-01 2010-07-01 false Prohibition on weapons and explosives. 228.7... (CONTINUED) MISCELLANEOUS SECURITY PROTECTIVE FORCE § 228.7 Prohibition on weapons and explosives. No persons... illegal or legally controlled weapon (e.g., throwing stars, switchblades), explosives, or items...

  18. 36 CFR 702.7 - Weapons and explosives. (United States)


    ... 36 Parks, Forests, and Public Property 3 2010-07-01 2010-07-01 false Weapons and explosives. 702.7... Weapons and explosives. Except where duly authorized by law, and in the performance of law enforcement functions, no person shall carry firearms, other dangerous or deadly weapons, or explosives, either...

  19. 31 CFR 700.11 - Weapons and explosives. (United States)


    ... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false Weapons and explosives. 700.11... FEDERAL LAW ENFORCEMENT TRAINING CENTER (FLETC) BUILDINGS AND GROUNDS § 700.11 Weapons and explosives. No person, while on the property, shall carry firearms, other dangerous or deadly weapons, or...

  20. 7 CFR 500.12 - Weapons and explosives. (United States)


    ... 7 Agriculture 6 2010-01-01 2010-01-01 false Weapons and explosives. 500.12 Section 500.12... OF AGRICULTURE NATIONAL ARBORETUM Conduct on U.S. National Arboreturm Property § 500.12 Weapons and... weapons, or explosives, either openly or concealed, except for authorized official purposes. (b) No...

  1. 7 CFR 502.13 - Weapons and explosives. (United States)


    ... 7 Agriculture 6 2010-01-01 2010-01-01 false Weapons and explosives. 502.13 Section 502.13....13 Weapons and explosives. No person while in or on BARC property shall carry firearms, other dangerous or deadly weapons, or explosives, either openly or concealed, except as officially authorized...

  2. 43 CFR 423.30 - Weapons, firearms, explosives, and fireworks. (United States)


    ... 43 Public Lands: Interior 1 2010-10-01 2010-10-01 false Weapons, firearms, explosives, and... WATERBODIES Rules of Conduct § 423.30 Weapons, firearms, explosives, and fireworks. (a) You may possess... exceptions: (1) You must not have a weapon in your possession when at or in a Reclamation facility. (2)...

  3. 4 CFR 25.14 - Weapons and explosives. (United States)


    ... 4 Accounts 1 2010-01-01 2010-01-01 false Weapons and explosives. 25.14 Section 25.14 Accounts... AND ON ITS GROUNDS § 25.14 Weapons and explosives. No person while entering or in the GAO Building or on its grounds shall carry or possess firearms, other dangerous or deadly weapons, explosives...

  4. 49 CFR 1544.219 - Carriage of accessible weapons. (United States)


    ... 49 Transportation 9 2010-10-01 2010-10-01 false Carriage of accessible weapons. 1544.219 Section...: AIR CARRIERS AND COMMERCIAL OPERATORS Operations § 1544.219 Carriage of accessible weapons. (a... weapons, do not apply to a law enforcement officer (LEO) aboard a flight for which screening is...

  5. 36 CFR 520.15 - Weapons and explosives. (United States)


    ... 36 Parks, Forests, and Public Property 3 2010-07-01 2010-07-01 false Weapons and explosives. 520... Weapons and explosives. No person while on the premises shall carry firearms, other dangerous or deadly weapons, or explosives, either openly or concealed, except for official purposes, nor shall any...

  6. 31 CFR 91.13 - Weapons and explosives. (United States)


    ... 31 Money and Finance: Treasury 1 2010-07-01 2010-07-01 false Weapons and explosives. 91.13 Section... CONDUCT IN OR ON THE BUREAU OF THE MINT BUILDINGS AND GROUNDS § 91.13 Weapons and explosives. No person while on the property shall carry firearms, other dangerous or deadly weapons, or explosives,...

  7. 50 CFR 27.43 - Weapons other than firearms. (United States)


    ... 50 Wildlife and Fisheries 6 2010-10-01 2010-10-01 false Weapons other than firearms. 27.43 Section... (CONTINUED) THE NATIONAL WILDLIFE REFUGE SYSTEM PROHIBITED ACTS Disturbing Violations: With Weapons § 27.43 Weapons other than firearms. The use or possession of cross bows, bows and arrows, air guns, spears,...

  8. 7 CFR 503.13 - Weapons and explosives. (United States)


    ... 7 Agriculture 6 2010-01-01 2010-01-01 false Weapons and explosives. 503.13 Section 503.13... OF AGRICULTURE CONDUCT ON PLUM ISLAND ANIMAL DISEASE CENTER § 503.13 Weapons and explosives. No person while in or on the PIADC shall carry firearms or other dangerous or deadly weapons or...

  9. Demand Analysis of Informational Shipboard Gun Weapon System Interface Design

    Directory of Open Access Journals (Sweden)

    WANG Hui-chuan


    Full Text Available According to development demand of informational shipboard gun weapon system, design concept of shipboard gun weapon system interface is proposed. System composition is put forward and function demand of interface is analyzed from combat, training and detection aspects. General principle need to be followed in design process. A new concept is provided for development of shipboard gun weapon system interface.

  10. 10 CFR Appendix H to Part 73 - Weapons Qualification Criteria (United States)


    ... position, then fire 2 rounds and reholster 2 15 yards 2 5 seconds Standing, draw weapon, move to kneeling...) Standing, draw weapon, fire 2 rounds, move to kneeling position and fire 2 rounds, reload and reholster Minimum qualifying = 70%. 4 15 yards 2 5 seconds Draw weapon and fire 2 rounds standing, come to low...

  11. Radiological threat, public and media: a psychosociological view

    Energy Technology Data Exchange (ETDEWEB)

    Arciszewski, T. [University Rene Descartes - Paris 5, 92 - Boulogne (France)


    Nuclear risk has become a major social communication along the 20. century because of its critical socio-political impact. That communication is not limited to expert speeches and simple acceptation. The way people understand that kind of threat is based on beliefs and on imaginary pictures. Consequently, and because it shapes people attitude, expectations and behaviours, their analysis is a key for policy and prevention. We will present, in the light of the research on risk perception and social psychology theoretical background, how people can manage with the nuclear fear. Some particular points will be studied: the nature of nuclear threat and fear, the cultural and media coverage and the consequences of this threat on behaviour. We will first focus on what a societal threat is and of which nature is the nuclear threat. We will rely on statistical data on risk perception. We have to consider the two main fields of information: first the nuclear threat as a mass destruction weapon and second, the radiological risk as a consequence of civil use of radiological material. Those two aspects, deeply related for most people, make the roots for the described fears. Then, the perception of the risks relative to nuclear is necessarily influenced by this representation. The representation of the nuclear power is and will be for next years, related to the nuclear mushroom as experimentally pointed o ut by Fiske, both with the abnormal children of Chernobyl. How can we change that vision? Not to be a liar, it will be hard work because it a old story, a long construction of what will be the future of mankind, something deeply influenced by media, movie, geopolitical facts like the cold war or technological accident like Three Mile Island or Chernobyl. It has to deal with the problem of media transmission of fears, which is a problem in itself, but due to the scientific base of our problem, particularly relevant. Moreover, there is a strong cultural background that maintains

  12. The Drivers of Indias Nuclear Weapons Program (United States)


    Sane Individual’ Would Use Nuclear Weapons Indian Defence Mini,” Financial Times, June 3, 2002. 197 Sanjeev Miglani and John Chalmers , “BJP Puts... Chalmers . “BJP Puts ‘No First Use’ Nuclear Policy in Doubt.” Reuters. April 7, 2014. election-bjp

  13. The Politics of Weapons Standardization in NATO. (United States)


    does raise new and useful perspectives on the problem. And, as he notes, it raises the spectre that instead of attacking the causes of NATO’s malaise...construct- ing his Utopia . 1 58 Two articles, which focus on the weapons procurement process within the United States alone, note the unnecessary

  14. Europium-155 in Debris from Nuclear Weapons

    DEFF Research Database (Denmark)

    Aarkrog, Asker; Lippert, Jørgen Emil


    The lithium-drifted germanium detector enables determination of europium-155 on a routine basis in environmental samples contaminated with debris from nuclear weapons. From measurements of europium-155, cesium-144, and strontium-90 in air filters collected between 1961 and 1966, the yield...

  15. Nuclear Weapon Testing Limitations and International Security (United States)

    Corden, Pierce S.


    For over 50 years stopping nuclear weapon tests has been sought to support achieving international security without nuclear weapons. Testing is the critical path beyond primitive fission devices, e.g. to develop thermonuclear weapons, reduce weight and volume and increase yield. The 1958 Geneva Conference of Experts considered ways to verify a test ban. With then-limitations on seismology, and lack of in-country monitoring and on-site inspections, the 1963 Limited Test Ban Treaty prohibits testing only in the atmosphere, outer space and under water, and is verified by National Technical Means. The US and USSR agreed to a limit of 150 kilotons on underground explosions in the 1970s-80s. The 1996 Comprehensive Nuclear-Test-Ban Treaty bans all nuclear explosions. Its International Monitoring System - seismic, hydroacoustic, infrasound and radionuclide sensors - is being used, and has easily detected testing by the DPRK. On-site inspections will be available under an in-force Treaty. A 2012 National Academy report concludes that cheating attempts would not undermine U.S. security, and the program for monitoring and extending the life of US weapons has succeeded since US testing ceased in 1992.

  16. Managing nuclear weapons in the United States

    Energy Technology Data Exchange (ETDEWEB)

    Miller, G.


    This report discusses the management and security of nuclear weapons in the post-cold war United States. The definition of what constitutes security is clearly changing in the US. It is now a much more integrated view that includes defense and the economy. The author tries to bring some semblance of order to these themes in this brief adaptation of a presentation.

  17. The Spear: An Effective Weapon Since Antiquity

    Directory of Open Access Journals (Sweden)

    Robert E. Dohrenwend


    Full Text Available The spear is perhaps man’s oldest weapon, and may even be his oldest tool. Over the hundreds of thousands of years of the weapon’s existence, it evolved from a pointed stick into an efficient hunting missile, and then became the most effective hand-held bladed weapon humans ever devised. The spear and its use is the only martial art originally devised for use against species other than our own, and more than any other weapon, the spear emphasizes the relationship between hunting and warfare. Virtually without exception, the spear is present wherever there are humans. The spear may claim to be the senior martial art, and the weapon is still in use today. Early techniques are preserved by the small number of Japanese sojutsu schools, and modern Chinese martial artists have developed elegant and impressive gymnastic routines for the spear. The javelin throw is a modern Olympic track and field event, and there are people who have resurrected the Aztec atlatl for sporting competition. Today, the spear is still used in Europe for hunting wild boar, and the continued issue of the obsolete bayonet to modern soldiers testifies to a deep, almost instinctive respect still possessed by the military for the spear.

  18. The Use of the Computer Code ATR to Relate DREO Experimental Results to Nuclear Battlefield Threats (United States)


    or thermal effects. Thus the calculations here are for low yield (5100 kT) weapons for ranges of :2 km. For these conditions, biological effects of...197KFT, .037MILES *SLANT ANGLE AN= -16.436DEGREES (COS= .95914) *CALCULATED FROM OTHER COORDINATES - 24- N EUTRON DOSE VS. HORIZ. RANGE (RADS DOSE 1

  19. Threat image projection in CCTV (United States)

    Neil, David; Thomas, Nicola; Baker, Bob


    Operators are key components in a Closed Circuit Television (CCTV) system, being the link between the system technology and its effective use. Operators' performance will largely determine the level of service provided by the system. There have been few studies testing operator performance, while much work has been done to test the performance of the technology. Previous work on CCTV operator performance carried out by the Home Office Scientific Development Branch (HOSDB) has used filmed video and subjects who knew they were undergoing testing, meaning subjects are likely to be concentrating harder on performing well. HOSDB believes that there is a need for a test that would be able to be routinely used in a CCTV control room throughout the course of a normal shift to provide management with operational performance data. Threat Image Projection (TIP) is routinely used in X-Ray baggage scanners to keep operators alert to possible threats. At random intervals, a threat target image is superimposed over the image of the baggage being screened. The operator then responds to this threat. A similar system could be used for CCTV operators. A threat image would be randomly superimposed over the live CCTV feed and the operator would be expected to respond to this.

  20. Game Theoretic Evaluation of Threat Detection Problems-The Central Role of the Adversary

    Energy Technology Data Exchange (ETDEWEB)

    Heasler, Patrick G.; Wood, Thomas W.; Reichmuth, Barbara A.


    A wide variety of security problems hinge on the detection of threats and discrimination of threats from innocuous objects. The theory that frames these problems is common among medical diagnostics, radar and sonar imaging, and detection of radiological, chemical, and biological agents. In many of these problems, the nature of the threat is subject to control by a malicious adversary, and the choice of a reference (or "design basis") threat is a very diffcult, and often intractable, aspect of the problem. It is this class of problems that this report considers.

  1. Cyber threats within civil aviation (United States)

    Heitner, Kerri A.

    Existing security policies in civil aviation do not adequately protect against evolving cyber threats. Cybersecurity has been recognized as a top priority among some aviation industry leaders. Heightened concerns regarding cyber threats and vulnerabilities surround components utilized in compliance with the Federal Aviation Administration's (FAA) Next Generation Air Transportation (NextGen) implementation. Automated Dependent Surveillance-B (ADS-B) and Electronic Flight Bags (EFB) have both been exploited through the research of experienced computer security professionals. Civil aviation is essential to international infrastructure and if its critical assets were compromised, it could pose a great risk to public safety and financial infrastructure. The purpose of this research was to raise awareness of aircraft system vulnerabilities in order to provoke change among current national and international cybersecurity policies, procedures and standards. Although the education of cyber threats is increasing in the aviation industry, there is not enough urgency when creating cybersecurity policies. This project intended to answer the following questions: What are the cyber threats to ADS-B of an aircraft in-flight? What are the cyber threats to EFB? What is the aviation industry's response to the issue of cybersecurity and in-flight safety? ADS-B remains unencrypted while the FAA's mandate to implement this system is rapidly approaching. The cyber threat of both portable and non-portable EFB's have received increased publicity, however, airlines are not responding quick enough (if at all) to create policies for the use of these devices. Collectively, the aviation industry is not being proactive enough to protect its aircraft or airport network systems. That is not to say there are not leaders in cybersecurity advancement. These proactive organizations must set the standard for the future to better protect society and it's most reliable form of transportation.

  2. Origins of the Tactical Nuclear Weapons Modernization Program: 1969-1979 (United States)

    Yaffe, Michael David

    On December 12, 1979, the North Atlantic Treaty Organization decided to deploy new long-range theater nuclear forces, Pershing II and Ground-Launched Cruise Missiles. This marked the first major change in NATO's nuclear stockpile since the adoption of the flexible response strategy in 1967. The decision was controversial inasmuch as the Allies disagreed on the fundamental role of nuclear weapons in this strategy and, thereby, the types and number of weapons required for an effective deterrent posture. Europeans generally preferred long-range weapons capable of striking the Soviet Union and small conventional forces while Americans preferred shorter-range nuclear weapons and a stalwart conventional defense. Thus, the December decision is often described as purely politically motivated, in which the Americans reluctantly acquiesced to a European initiative for long-range weapons, prominently expressed by West German Chancellor Helmut Schmidt in 1977. Recently declassified US government documents reveal, however, that long-range missiles were part of a long-term comprehensive nuclear modernization program conceived in the Pentagon under Defense Secretary James Schlesinger during the period of 1973 through 1975, and presented to skeptical European elites who favored arms control negotiations over costly new deployments. This program was motivated as much by changes in the American national security culture as by an increase in the Soviet military threat to Europe. It was grounded on a clear military rationale: "that a feasible and affordable conventional defense is only possible if NATO has modern nuclear forces" that can effectively hold at risk Warsaw Pact ground and air forces throughout the depth of their employment from the inner-German border to the western military districts of the Soviet Union. When the new US administration in 1977 disagreed with the modernization plan and its rationale, opting instead for more conventional forces, the Allies in a reversal of

  3. Strengths, weaknesses, opportunities and threats

    DEFF Research Database (Denmark)

    Bull, J. W.; Jobstvogt, N.; Böhnke-Henrichs, A.;


    environmental awareness. Threats include resistance to change, and difficulty with interdisciplinary collaboration. Consideration of SWOT themes suggested five strategic areas for developing and implementing ES.The ES concept could improve decision-making related to natural resource use, and interpretation...... facilitate interdisciplinary research, ensuring decision-making that supports sustainable development........ Such an assessment could form the basis for improving ES thinking, further embedding it into environmental decisions and management.The Young Ecosystem Services Specialists (YESS) completed a Strengths-Weaknesses-Opportunities-Threats (SWOT) analysis of ES through YESS member surveys. Strengths include the approach...

  4. Air gun wounding and current UK laws controlling air weapons. (United States)

    Bruce-Chwatt, Robert Michael


    Air weapons whether rifles or pistols are, potentially, lethal weapons. The UK legislation is complex and yet little known to the public. Hunting with air weapons and the laws controlling those animals that are permitted to be shot with air weapons is even more labyrinthine due to the legal power limitations on the possession of air weapons. Still relatively freely available by mail order or on the Internet, an increasing number of deaths have been reported from the misuse of air weapons or accidental discharges. Ammunition for air weapons has become increasingly sophisticated, effective and therefore increasingly dangerous if misused, though freely available being a mere projectile without a concomitant cartridge containing a propellant and an initiator.

  5. Pass Em’ Right: Assessing the Threat of WMD Terrorism from America’s Christian Patriots

    Directory of Open Access Journals (Sweden)

    Paul D. Brister


    Full Text Available Within the field of terrorism studies, great effort has been devoted to the topic of weapons of mass destruction (WMD and their potential usage in the hands of terrorist organisations. This article deepens the discussion of WMD terrorism by focusing upon an oft-overlooked movement that resides within American borders. The Christian Patriot Movement – which rightfully claims the likes of Timothy McVeigh – is a phenomenon that has gone largely unnoticed as American counterterrorism efforts focus largely upon Islamist terrorist organizations. Here we aim to bring the Patriots back into discussions of terrorist threats by assessing their potential to use WMD. We conclude that, although the Patriots have demonstrated intent to employ such weapons, they lack the overall capability to design, acquire, or employ a WMD of significant lethality. We end by looking at the pathways which the Patriots are currently exploring to narrow the divide between intent and capability.       

  6. Audit Report on "Management Controls over the Department's Excess Weapons Inventories and Selected Sensitive Equipment used by Protective Forces"

    Energy Technology Data Exchange (ETDEWEB)



    Since September 11, 2001, the Department of Energy has, on several occasions, revised its security posture based on identified threats and adversaries. These revisions in security posture have driven Departmental sites to upgrade their defensive and tactical equipment. Subsequent changes in the perceived threats have, in some cases, led to a reduction in the need for certain types of weapons, thus creating a pool of surplus equipment. These surplus weapons could potentially be used by other Department sites and Federal law enforcement agencies. Recent Office of Inspector General reports have raised concerns with the adequacy of controls related to defensive and tactical equipment. For example, our report on Management Controls Over Defense Related High Risk Property (OAS-M-08-06, April 2008) found that administrative controls over certain defense related high risk property were not sufficient for providing accountability over these items. Because of prior reported weaknesses in controls over defensive and tactical equipment, we initiated this audit to determine whether the Department and its contractors were properly managing excess weapons inventories and selected sensitive equipment used by protective forces. Our review disclosed that the Department was not always properly managing its inventories of excess weapons and selected sensitive equipment. We identified issues with the retention of unneeded weapons at many locations and with the identification and tracking of sensitive items. More specifically: Sites maintained large inventories of weapons that were no longer needed but had not been made available for use by either other Departmental sites or other Federal law enforcement agencies. For instance, at six of the locations included in our review we identified a total of 2,635 unneeded weapons with a total acquisition value of over $2.8 million that had not been officially declared as excess - an action that would have made them available for others to use

  7. The acquisition of dangerous biological materials: Technical facts sheets to assist risk assessments of 46 potential BW agents

    Energy Technology Data Exchange (ETDEWEB)

    Aceto, Donato Gonzalo [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Astuto-Gribble, Lisa M. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Gaudioso, Jennifer M. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)


    Numerous terrorist organizations have openly expressed interest in producing and deploying biological weapons. However, a limiting factor for many terrorists has been the acquisition of dangerous biological agents, as evidenced by the very few successful instances of biological weapons use compared to the number of documented hoaxes. Biological agents vary greatly in their ability to cause loss of life and economic damage. Some agents, if released properly, can kill many people and cause an extensive number of secondary infections; other agents will sicken only a small number of people for a short period of time. Consequently, several biological agents can potentially be used to perpetrate a bioterrorism attack but few are likely capable of causing a high consequence event. It is crucial, from a US national security perspective, to more deeply understand the likelihood that terrorist organizations can acquire the range of these agents. Few studies have attempted to comprehensively compile the technical information directly relevant to the acquisition of dangerous bacteria, viruses and toxins. In this report, technical fact sheets were assembled for 46 potentially dangerous biological agents. Much of the information was taken from various research sources which could ultimately and significantly expedite and improve bioterrorism threat assessments. By systematically examining a number of specific agent characteristics included in these fact sheets, it may be possible to detect, target, and implement measures to thwart future terrorist acquisition attempts. In addition, the information in these fact sheets may be used as a tool to help laboratories gain a rudimentary understanding of how attractive a method laboratory theft is relative to other potential acquisition modes.

  8. Understanding Cyber Threats and Vulnerabilities

    NARCIS (Netherlands)

    Luiijf, H.A.M.


    This chapter reviews current and anticipated cyber-related threats to the Critical Information Infrastructure (CII) and Critical Infrastructures (CI). The potential impact of cyber-terrorism to CII and CI has been coined many times since the term was first coined during the 1980s. Being the relevanc

  9. Threat from Emerging Vectorborne Viruses

    Centers for Disease Control (CDC) Podcasts


    Reginald Tucker reads an abridged version of the commentary by CDC author Ronald Rosenberg, Threat from Emerging Vectorborne Viruses.  Created: 6/9/2016 by National Center for Emerging and Zoonotic Infectious Diseases (NCEZID).   Date Released: 6/9/2016.

  10. Cyber Threats to Nuclear Infrastructures

    Energy Technology Data Exchange (ETDEWEB)

    Robert S. Anderson; Paul Moskowitz; Mark Schanfein; Trond Bjornard; Curtis St. Michel


    Nuclear facility personnel expend considerable efforts to ensure that their facilities can maintain continuity of operations against both natural and man-made threats. Historically, most attention has been placed on physical security. Recently however, the threat of cyber-related attacks has become a recognized and growing world-wide concern. Much attention has focused on the vulnerability of the electric grid and chemical industries to cyber attacks, in part, because of their use of Supervisory Control and Data Acquisition (SCADA) systems. Lessons learned from work in these sectors indicate that the cyber threat may extend to other critical infrastructures including sites where nuclear and radiological materials are now stored. In this context, this white paper presents a hypothetical scenario by which a determined adversary launches a cyber attack that compromises the physical protection system and results in a reduced security posture at such a site. The compromised security posture might then be malevolently exploited in a variety of ways. The authors conclude that the cyber threat should be carefully considered for all nuclear infrastructures.

  11. The threat of soil salinity

    NARCIS (Netherlands)

    Daliakopoulos, I.N.; Tsanis, I.K.; Koutroulis, A.; Kourgialas, N.N.; Varouchakis, A.E.; Karatzas, G.P.; Ritsema, C.J.


    Soil salinisation is one of the major soil degradation threats occurring in Europe. The effects of salinisation can be observed in numerous vital ecological and non-ecological soil functions. Drivers of salinisation can be detected both in the natural and man-made environment, with climate and th

  12. #TheWeaponizationOfSocialMedia

    DEFF Research Database (Denmark)

    Nissen, Thomas Elkjer

    In today’s conflict environment, transformed by information technology and of who can communicate and how, states, non-state actors, ad hoc activist networks and individuals create effect(s) in and through social network media in support of their objectives. #TheWeaponizationOfSocialMedia develops...... a framework for understanding how social network media shapes global politics and contemporary conflicts by examining their role as a platform for conduction intelligence collection, targeting, cyber-operations, psychological warfare and command and control activities. Through these, the weaponization...... of social media shows both the possibilities and the limitations of social network media in contemporary conflicts and makes a contribution to theorizing and studying contemporary conflicts....

  13. Making Weapons for the Terracotta Army

    Directory of Open Access Journals (Sweden)

    Marcos Martinón-Torres


    Full Text Available The Terracotta Army of the First Emperor of China is one of the most emblematic archaeological sites in the world. Many questions remain about the logistics of technology, standardisation and labour organisation behind the creation of such a colossal construction in just a few decades over 2,000 years ago. An ongoing research project co-ordinated between the UCL Institute of Archaeology and the Emperor Qin Shihang's Terracotta Army Museum is beginning to address some of these questions. This paper outlines some results of the typological, metric, microscopic, chemical and spatial analyses of the 40,000 bronze weapons recovered with the Terracotta Warriors. Thanks to a holistic approach developed specifically for this project, it is possible to reveal remarkable aspects of the organisation of the Qin workforce in production cells, of the standardisation, efficiency and quality-control procedures employed, and of the sophisticated technical knowledge of the weapon-makers.

  14. Ending the scourge of chemical weapons

    Energy Technology Data Exchange (ETDEWEB)

    Brin, J.


    After more than 20 years of arduous negotiations, representatives from 131 countries gathered in Paris in January to sign a treaty banning the development, production, and transfer to other countries of chemical-warfare agents and their means of delivery. The treaty - called the Chemical Weapons Convention, or CWC - complements the more limited Geneva Protocol of 1925, which bans the use of toxic chemicals in warfare. When the CWC enters into force in about two years, it will prohibit the manufacture for military purposes of lethal chemicals such as sulfur mustard, which causes painful skin blistering and lung damage, and nerve agents, which cause rapid death by interfering with the transmission of nerve impulses. The goal is to eliminate from the earth this particularly inhumane form of warfare. The paper discusses facets of the treaty, especially the verification challenge with its inspection on demand features. Short accompanying pieces discuss classifying chemicals and the destruction of chemical weapons under the CWC.

  15. Emergency management of chemical weapons injuries. (United States)

    Anderson, Peter D


    The potential for chemical weapons to be used in terrorism is a real possibility. Classes of chemical weapons include nerve agents, vesicants (blister agents), choking agents, incapacitating agents, riot control agents, blood agents, and toxic industrial chemicals. The nerve agents work by blocking the actions of acetylcholinesterase leading to a cholinergic syndrome. Nerve agents include sarin, tabun, VX, cyclosarin, and soman. The vesicants include sulfur mustard and lewisite. The vesicants produce blisters and also damage the upper airways. Choking agents include phosgene and chlorine gas. Choking agents cause pulmonary edema. Incapacitating agents include fentanyl and its derivatives and adamsite. Riot control agents include Mace and pepper spray. Blood agents include cyanide. The mechanism of toxicity for cyanide is blocking oxidative phosphorylation. Toxic industrial chemicals include agents such as formaldehyde, hydrofluoric acid, and ammonia.

  16. Defense Acquisitions: Assessments of Selected Weapon Programs (United States)


    data. Technologies immature Technologies aproaching maturity Technologies fully maturePage 16 GAO-08-467SP Assessments of Selected Weapon Programs...learned and process control methods developed in the Excalibur program. The Navy anticipates that this strategy will result in mature production...risk management initiative. The RQ-4B aircraft entered a rigorous development test phase. The methodical collection of test data paces this

  17. The Aerodynamics of High Speed Aerial Weapons


    Prince, Simon A.


    The focus of this work is the investigation of the complex compressible flow phenomena associated with high speed aerial weapons. A three dimen- sional multiblock finite volume flow solver was developed with the aim of studying the aerodynamics of missile configurations and their component structures. The first component of the study involved the aerodynamic investigation of the isolated components used in the design of conventional missile config- urations. The computati...

  18. Defense Acquisitions: Assessments of Selected Weapon Programs (United States)


    of contractors delivering the 10 costliest programs have performed well relative to broad-based market indices, indicating that investors expect...16-329SP Assessments of Major Weapon Programs Two programs—the B-2 Extremely High Frequency Satellite Communications and Computer...expected. The B-2 Extremely High Frequency Satellite Communications and Computer Increment 1 date was revised to reflect the actual delivery of

  19. Defense Acquisitions: Assessments of Selected Weapon Programs (United States)


    Assessment 56 Figure 13: Examples of Knowledge Scorecards 58 Contents Page v GAO-15-342SP Assessments of Selected Weapon Programs Abbreviations...efficiencies realized through contract negotiations (13 programs), • design trades to balance affordability and capability (10 programs), • the time of our review with a scorecard and narrative summary at the bottom of the first page of each assessment. As illustrated in figure 12

  20. Imprecise Probability Methods for Weapons UQ

    Energy Technology Data Exchange (ETDEWEB)

    Picard, Richard Roy [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Vander Wiel, Scott Alan [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)


    Building on recent work in uncertainty quanti cation, we examine the use of imprecise probability methods to better characterize expert knowledge and to improve on misleading aspects of Bayesian analysis with informative prior distributions. Quantitative approaches to incorporate uncertainties in weapons certi cation are subject to rigorous external peer review, and in this regard, certain imprecise probability methods are well established in the literature and attractive. These methods are illustrated using experimental data from LANL detonator impact testing.

  1. Nuclear weapons and NATO-Russia relations

    Energy Technology Data Exchange (ETDEWEB)

    Cornwell, G.C.


    Despite the development of positive institutional arrangements such as Russian participation in the NATO-led peacekeeping force in Bosnia and the NATO- Russia Permanent Joint Council, the strategic culture of Russia has not changed in any fundamental sense. Russian strategic culture has not evolved in ways that would make Russian policies compatible with those of NATO countries in the necessary economic, social, technological, and military spheres. On the domestic side, Russia has yet to establish a stable democracy and the necessary legal, judicial, and regulatory institutions for a free-market economy. Russia evidently lacks the necessary cultural traditions, including concepts of accountability and transparency, to make these adaptations in the short-term. Owing in part to its institutional shortcomings, severe socioeconomic setbacks have afflicted Russia. Russian conventional military strength has been weakened, and a concomitant reliance by the Russians on nuclear weapons as their ultimate line of defense has increased. The breakdown in the infrastructure that supports Russian early warning and surveillance systems and nuclear weapons stewardship defense, coupled with a tendency towards has exacerbated Russian anxiety and distrust toward NATO. Russia`s reliance on nuclear weapons as the ultimate line of defense, coupled with a tendency toward suspicion and distrust toward NATO, could lead to dangerous strategic miscalculation and nuclear catastrophe.

  2. The Chemical Weapons Convention -- Legal issues

    Energy Technology Data Exchange (ETDEWEB)



    The Chemical Weapons Convention (CWC) offers a unique challenge to the US system of constitutional law. Its promise of eliminating what is the most purely genocidal type of weapon from the world`s arsenals as well as of destroying the facilities for producing these weapons, brings with it a set of novel legal issues. The reservations about the CWC expressed by US business people are rooted in concern about safeguarding confidential business information and protecting the constitutional right to privacy. The chief worry is that international verification inspectors will misuse their power to enter commercial property and that trade secrets or other private information will be compromised as a result. It has been charged that the Convention is probably unconstitutional. The author categorically disagrees with that view and is aware of no scholarly writing that supports it. The purpose of this presentation is to show that CWC verification activities can be implemented in the US consistently with the traditional constitutional regard for commercial and individual privacy. First, he very briefly reviews the types of verification inspections that the CWC permits, as well as some of its specific privacy protections. Second, he explains how the Fourth Amendment right to privacy works in the context of CWC verification inspections. Finally, he reviews how verification inspections can be integrated into these constitutional requirements in the SU through a federal implementing statute.

  3. Development of a comparative risk ranking system for agents posing a bioterrorism threat to human or animal populations. (United States)

    Tomuzia, Katharina; Menrath, Andrea; Frentzel, Hendrik; Filter, Matthias; Weiser, Armin A; Bräunig, Juliane; Buschulte, Anja; Appel, Bernd


    Various systems for prioritizing biological agents with respect to their applicability as biological weapons are available, ranging from qualitative to (semi)quantitative approaches. This research aimed at generating a generic risk ranking system applicable to human and animal pathogenic agents based on scientific information. Criteria were evaluated and clustered to create a criteria list. Considering availability of data, a number of 28 criteria separated by content were identified that can be classified in 11 thematic areas or categories. Relevant categories contributing to probability were historical aspects, accessibility, production efforts, and possible paths for dispersion. Categories associated with impact are dealing with containment measures, availability of diagnostics, preventive and treatment measures in human and animal populations, impact on society, human and veterinary public health, and economic and ecological consequences. To allow data-based scoring, each criterion was described by at least 1 measure that allows the assignment of values. These values constitute quantities, ranges, or facts that are as explicit and precise as possible. The consideration of minimum and maximum values that can occur due to natural variations and that are often described in the literature led to the development of minimum and maximum criteria and consequently category scores. Missing or incomplete data, and uncertainty resulting therefrom, were integrated into the scheme via a cautious (but not overcautious) approach. The visualization technique that was used allows the description and illustration of uncertainty on the level of probability and impact. The developed risk ranking system was evaluated by assessing the risk originating from the bioterrorism threat of the animal pathogen bluetongue virus, the human pathogen Enterohemorrhagic Escherichia coli O157:H7, the zoonotic Bacillus anthracis, and Botulinum neurotoxin.

  4. Why are sexually selected weapons almost absent in females?

    Institute of Scientific and Technical Information of China (English)

    Anders BERGLUND


    In sex role reversed species,predominantly females evolve sexually selected traits,such as ornaments and/or weapons.Female ornaments are common and their function well documented in many species,whether sex role reversed or not.However,sexually selected female weapons seem totally absent except for small wing spurs in three jacana species,present in both males and females.This poor female weaponry is in sharp contrast to the situation in species with conventional sex roles:males commonly have evolved sexually selected weapons as well as ornaments.At the same time,females in many taxa have naturally selected weapons,used in competition over resources or in predator defence.Why are sexually selected weapons then so rare,almost absent,in females? Here I briefly review weaponry in females and the function of these weapons,conclude that the near absence of sexually selected weapons begs an explanation,and suggest that costs of sexually selected weapons may exceed costs of ornaments.Females are more constrained when evolving sexually selected traits compared to males,at least compared to those males that do not provide direct benefits,as trait costs reduce a female's fecundity.I suggest that this constraining trade-off between trait and fecundity restricts females to evolve ornaments but rarely weapons.The same may apply to paternally investing males.Whether sexually selected weapons actually are more costly than sexually selected ornaments remains to be investigated.

  5. North Korea's nuclear weapons development. Implications for future policy

    Energy Technology Data Exchange (ETDEWEB)

    Pollack, J.D.


    This essay assesses North Korea's long-standing quest for nuclear weapons; alternative strategies for inhibiting Pyongyang's weapons development; and the potential implications for regional security and nonproliferation should the Democratic People's Republic of Korea (DPRK) retain and enhance its weapons programs. North Korea's pursuit of a nuclear weapons capability has long provoked heated debate among policy makers and research analysts about the purposes of engagement with the North, reflecting the repeated frustrations in efforts to negotiate Korean denuclearization. These debates reflect widely divergent views of the North Korean regime; its sustainability as an autonomous political, economic, and military system; and the potential consequences of continued nuclear development in this isolated, highly idiosyncratic state. These questions assume additional salience as North Korea approaches a leadership succession for only the second time in its six-decade history. The effort to inhibit North Korea's pursuit of nuclear weapons is among the longest running and least successful sagas in international security and non-proliferation policy of the past quarter century. In early 2010, Pyongyang claims a rudimentary nuclear capability by possession of weaponized plutonium, the conduct of two nuclear tests, and advances in the production of enriched uranium as an alternative means of fissile material production, though the latter step is nominally justified as a source for reactor fuel. North Korea defends its pursuit of a nuclear deterrent to counter what Pyongyang deems existential threats posed by the United States.Despite the resumption of high-level diplomatic contact between Washington and Pyongyang in late 2009, realization of a non-nuclear Korean Peninsula remains a very remote prospect. The DPRK insists that a peace agreement between the U.S. and North Korea and hence the cessation of 'hostile DPRK-U.S. relations' are

  6. Agroterrorism, Biological Crimes, and Biological Warfare Targeting Animal Agriculture

    Energy Technology Data Exchange (ETDEWEB)

    Wilson, Terry M.; Logan-Henfrey, Linda; Weller, Richard E.; Kellman, Brian


    There is a rising level of concern that agriculture might be targeted for economic sabotage by terrorists. Knowledge gathered about the Soviet Union biological weapons program and Iraq following the Gulf War, confirmed that animals and agricultural crops were targets of bioweapon development. These revelations are particularly disturbing in light of the fact that both countries are States Parties to the Biological and Toxin Weapons Convention that entered into force in 1975. The potential for misusing biotechnology to create more virulent pathogens and the lack of international means to detect unethical uses of new technologies to create destructive bioweapons is of increasing concern. Disease outbreaks, whether naturally occurring or intentionally, involving agricultural pathogens that destroy livestock and crops would have a profound impact on a country's infrastructure, economy and export markets. This chapter deals with the history of agroterrorism, biological crimes and biological warfare directed toward animal agriculture, specifically, horses, cattle, swine, sheep, goats, and poultry.

  7. Measures to implement the Chemical Weapons Convention

    Energy Technology Data Exchange (ETDEWEB)

    Tanzman, E.; Kellman, B.


    This seminar is another excellent opportunity for those involved in preventing chemical weapons production and use to learn from each other about how the Chemical Weapons Convention (CWC) can become a foundation of arms control in Africa and around the world. The author is grateful to the staff of the Organization for the Prohibition of Chemical Weapons (OPCW) for inviting him to address this distinguished seminar. The views expressed in this paper are those of the authors alone, and do not represent the position of the government of the US nor or of any other institution. In 1993, as the process of CWC ratification was beginning, concerns arose that the complexity of integrating the treaty with national law would cause each nation to implement the Convention without regard to what other nations were doing, thereby causing inconsistencies among States Parties in how the Convention would be carried out. As a result the Manual for National Implementation of the Chemical Weapons Convention was prepared and presented it to each national delegation at the December 1993 meeting of the Preparatory Commission in The Hague. During its preparation, the Manual was reviewed by the Committee of Legal Experts on National Implementation of the Chemical Weapons Convention, a group of distinguished international jurists, law professors, legally-trained diplomats, government officials, and Parliamentarians from every region of the world, including Mica. In February 1998, the second edition of the Manual was published in order to update it in light of developments since the CWC entered into force on 29 April 1997. The second edition 1998 clarified the national implementation options to reflect post-entry-into-force thinking, added extensive references to national implementing measures that had been enacted by various States Parties, and included a prototype national implementing statute developed by the authors to provide a starting point for those whose national implementing

  8. The bane of "inhumane" weapons and overkill: an overview of increasingly lethal arms and the inadequacy of regulatory controls. (United States)

    Richardson, Jacques G


    Weapons of both defense and offense have grown steadily in their effectiveness--especially since the industrial revolution. The mass destruction of humanity, by parts or in whole, became reality with the advent of toxic agents founded on chemistry and biology or nuclear weapons derived from physics. The military's new non-combat roles, combined with a quest for non-lethal weapons, may change the picture in regard to conventional defense establishments but are unlikely to deter bellicose tyrants or the new terrorists from using the unlimited potential of today's and tomorrow's arsenals. The author addresses the issues that are raised by this developing situation with the intent of seeking those ethics that will enable us to survive in a future and uncertain world.

  9. Systems engineering analysis of kinetic energy weapon concepts

    Energy Technology Data Exchange (ETDEWEB)

    Senglaub, M.


    This study examines, from a systems engineering design perspective, the potential of kinetic energy weapons being used in the role of a conventional strategic weapon. Within the Department of Energy (DOE) complex, strategic weapon experience falls predominantly in the nuclear weapons arena. The techniques developed over the years may not be the most suitable methodologies for use in a new design/development arena. For this reason a more fundamental approach was pursued with the objective of developing an information base from which design decisions might be made concerning the conventional strategic weapon system concepts. The study examined (1) a number of generic missions, (2) the effects of a number of damage mechanisms from a physics perspective, (3) measures of effectiveness (MOE`s), and (4) a design envelope for kinetic energy weapon concepts. With the base of information a cut at developing a set of high-level system requirements was made, and a number of concepts were assessed against these requirements.

  10. Is China Threat a Hoax?

    Institute of Scientific and Technical Information of China (English)

    Niu Weigan; Ma Zongshi


    The Beijing Olympics has focused unprecedented world attention on China this year. Many people hail the Games as an occasion that showcases China's growing contribution to world development and harmony. But intent on politicizing this global event, a few modern Cassandras still cling to the flawed China Threat theory. In this paper, the author traces the origins of this fallacious theory. He sees it as a product of Western empiricism viewed through an historical and philosophical prism. He argues that the assertion of threat arises from a generalization of historical facts. The assertion links China's growing clout with declining Western dominance in international affairs. Starting with the myth that peace is possible only among democracies, the theory predicts the inevitability of conflict between the West and China, a country with an alleged expansionist tradition and under an authoritarian system.

  11. Zika Still a Threat During Winter Months (United States)

    ... page: Zika Still a Threat During Winter Months Public health ... doesn't necessarily mean the end of the Zika threat in the United States, a public health ...

  12. Subordinates as Threats to Leaders


    Glazer, Amihai; Segendorff, Björn


    A leader of an organization may view a subordinate as threatening or weakening the leader's position. The threat may increase with the subordinate's ability and reduce the rents the leader wins. In particular, a leader who trains his subordinate reduces the cost to the owner of a firm in replacing the leader, and so reduces the leader's bargaining power. The leader therefore provides inefficiently low training for the subordinate.

  13. Cyber Terrorism– Global Security Threat


    Bogdanoski, Mitko; Petreski, Drage


    It is more than obvious that the way of conducting terrorism with the time is becoming more sophisticated. The cyber terrorism is real threat to fast technology development. Potential targets are systems which control the nation’s defenses and critical infrastructure. The terrorist of the future will win the wars without firing a shot - just by destroying infrastructure that significantly relies on information technology. The fast growth of the Internet users and Internet dependence dramat...

  14. 76 FR 70317 - Continuation of the National Emergency With Respect to Weapons of Mass Destruction (United States)


    ... With Respect to Weapons of Mass Destruction #0; #0; #0; Presidential Documents #0; #0; #0;#0;Federal... Weapons of Mass Destruction On November 14, 1994, by Executive Order 12938, the President declared a... weapons (weapons of mass destruction) and the means of delivering such weapons. On July 28, 1998,...

  15. Small sample Bayesian analyses in assessment of weapon performance

    Institute of Scientific and Technical Information of China (English)


    Abundant test data are required in assessment of weapon performance.When weapon test data are insufficient,Bayesian analyses in small sample circumstance should be considered and the test data should be provided by simulations.The several Bayesian approaches are discussed and some limitations are founded.An improvement is put forward after limitations of Bayesian approaches available are analyzed and t he improved approach is applied to assessment of some new weapon performance.

  16. Challenging Minimum Deterrence: Articulating the Contemporary Relevance of Nuclear Weapons (United States)


    The Long Shadow: Nuclear Weapons and Security in 21st Century Asia , ed. Muthiah Alagappa (Stanford, CA: Stanford University Press, 2008), 135, 148...nuclear weapons to the Asia -Pacific region in response to contingencies.44 All of this is en- abled by a diverse set of weapons and delivery systems...policy today, see Keith B. Payne’s The Great American Gamble: Deterrence Theory and Practice from the Cold War to the Twenty-First Century (Fairfax

  17. DoD Nuclear Weapons Personnel Reliability Assurance (United States)


    DOD INSTRUCTION 5210.42 DOD NUCLEAR WEAPONS PERSONNEL RELIABILITY ASSURANCE Originating Component: Office of the Under Secretary of...from the DoD Issuances Website at Reissues and renames: DoD Instruction 5210.42, “ Nuclear Weapons Personnel...direction for the management of individuals assigned to perform specified duties associated with U.S. nuclear weapons, nuclear command and control (NC2

  18. Weapons of Mass Destruction Technology Evaluation and Training Range

    Energy Technology Data Exchange (ETDEWEB)

    Kevin Larry Young


    The Idaho National Laboratory (INL) has a long history for providing technology evaluation and training for military and other federal level Weapons of Mass Destruction (WMD) response agencies. Currently there are many federal organizations and commercial companies developing technologies related to detecting, assessing, mitigating and protecting against hazards associated with a WMD event. Unfortunately, very few locations exist within the United States where WMD response technologies are realistically field tested and evaluated using real chemical, biological, radiological, nuclear and explosive materials. This is particularly true with biological and radiological hazards. Related to this lack of adequate WMD, multi-hazard technology testing capability is the shortage of locations where WMD response teams can train using actual chemical, biological, and radiological material or highly realistic simulates. In response to these technology evaluation and training needs, the INL has assembled a consortium of subject matter experts from existing programs and identified dedicated resources for the purpose of establishing an all-hazards, WMD technology evaluation and training range. The author describes the challenges associated with creating the all-hazards WMD technology evaluation and training range and lists the technical, logistical and financial benefits of an all-hazards technology evaluation and training range. Current resources and capabilities for conducting all-hazard technology evaluation and training at the INL are identified. Existing technology evaluation and training programs at the INL related to radiological, biological and chemical hazards are highlighted, including successes and lessons learned. Finally, remaining gaps in WMD technology evaluation and training capabilities are identified along with recommendations for closing those gaps.

  19. An Ontology for Insider Threat Indicators Development and Applications (United States)


    crimes evolve over time. Our case collection involves gathering and analyzing data from public (e.g., media reports, court documents, and other...Trzeciak, The CERT Guide to Insider Threats: How to Prevent, Detect, and Respond to Information Technology Crimes (Theft, Sabotage, Fraud): Pearson...J. A. Blake, D. Botstein, H. Butler, J. M. Cherry, et al., "Gene Ontology: tool for the unification of biology," Nature genetics , vol. 25, pp. 25-29

  20. Strategies for denaturing the weapons-grade plutonium stockpile

    Energy Technology Data Exchange (ETDEWEB)

    Buckner, M.R.; Parks, P.B.


    In the next few years, approximately 50 metric tons of weapons-grade plutonium and 150 metric tons of highly-enriched uranium (HEU) may be removed from nuclear weapons in the US and declared excess. These materials represent a significant energy resource that could substantially contribute to our national energy requirements. HEU can be used as fuel in naval reactors, or diluted with depleted uranium for use as fuel in commercial reactors. This paper proposes to use the weapons-grade plutonium as fuel in light water reactors. The first such reactor would demonstrate the dual objectives of producing electrical power and denaturing the plutonium to prevent use in nuclear weapons.

  1. Granular analyzing of weapon SoS demand description

    Institute of Scientific and Technical Information of China (English)

    Zhao Qingsong; Yang Kewei; Chen Yingwu; Li Mengjun


    The systematism of weapon combat is the typical characteristic of a modern battlefield. The process of combat is complex and the demand description of weapon system of systems (SOS) is difficult. Granular analyzing is an important method for solving the complex problem in the world. Granular thinking is introduced into the demand description of weapon SoS. Granular computing and granular combination based on a relation of compatibility is proposed. Based on the level of degree and degree of detail, the granular resolution of weapon SoS is defined and an example is illustrated at the end.

  2. DOE Nuclear Weapon Reliability Definition: History, Description, and Implementation

    Energy Technology Data Exchange (ETDEWEB)

    Wright, D.L.; Cashen, J.J.; Sjulin, J.M.; Bierbaum, R.L.; Kerschen, T.J.


    The overarching goal of the Department of Energy (DOE) nuclear weapon reliability assessment process is to provide a quantitative metric that reflects the ability of the weapons to perform their intended function successfully. This white paper is intended to provide insight into the current and long-standing DOE definition of nuclear weapon reliability, which can be summarized as: The probability of achieving the specified yield, at the target, across the Stockpile-To-Target Sequence of environments, throughout the weapon's lifetime, assuming proper inputs.


    Directory of Open Access Journals (Sweden)

    Mary Fendley


    Full Text Available There is an increasing recognition that cyber warfare is an important area of development for targeting and weaponeering, with far-reaching effects in national defense and economic security. The ability to conduct effective operations in cyberspace relies on a robust situational awareness of events occurring in both the physical and information domains, with an understanding of how they affect the cognitive domain of friendly, neutral, and adversary population sets. The dynamic nature of the battlefield complicates efforts to understand shifting adversary motivations and intentions. There are very few approaches, to date, that systematically evaluate the effects of the repertoire of cyber weapons on the cognitive, perceptual, and behavioral characteristics of the adversary. In this paper, we describe a software environment called Cognitive Cyber Weapon Selection Tool (CCWST that simulates a scenario involving cyber weaponry.This tool provides the capabilities to test weapons which may induce behavioral state changes in the adversaries. CCWST provides the required situational awareness to the Cyber Information Operations (IO planner to conduct intelligent weapon selection during weapon activation in order to induce the desired behavioral change in the perception of the adversary. Weapons designed to induce the cognitive state changes of deception, distraction, distrust and confusion were then tested empirically to evaluate the capabilities and expected cognitive state changes induced by these weapons. The results demonstrated that CCWST is a powerful environment within which to test and evaluate the impact of cyber weapons on influencing cognitive behavioral states during information processing.

  4. Stereotype Threat, Test Anxiety, and Mathematics Performance (United States)

    Tempel, Tobias; Neumann, Roland


    We investigated the combined effects of stereotype threat and trait test anxiety on mathematics test performance. Stereotype threat and test anxiety interacted with each other in affecting performance. Trait test anxiety predicted performance only in a diagnostic condition that prevented stereotype threat by stereotype denial. A state measure of…

  5. Antigovernment Groups. A Growing Threat to US Security

    Energy Technology Data Exchange (ETDEWEB)

    Swift, Alicia L. [Los Alamos National Laboratory


    Domestic terrorism is a growing threat in the United States, particularly from the 998 right-wing antigovernment (AG) groups in existence in 2015. In the years since the September 11, 2001 attacks in New York City, right-wing anti-government acts have oc- curred more often and killed more people in the United States than Muslim extremists. Such AG group members are often in uenced by racist, anti-Semitic, or anti-Islamic views, believe conspiracy theories about the government, and often refuse to pay taxes or participate in frivolous lawsuits in order to intentionally waste the government's time. There is, however, a violent element to these groups which participates in events ranging from the armed take-over of federal land in Oregon, to an armed stand-o with federal agents in Nevada, to the bombing of the Oklahoma City building which killed 168 people. Such acts may be conducted by a few individuals, as is the case of the Oklahoma City bombing, or an entire group. Such groups have a wide range of capabilities, with typical weapons including legal and illegal rearms, with a focus on purchasing fully automatic weapons; hand grenades, with some homemade; deadly tox- ins, like ricin (in multiple cases) and sodium cyanide (in one case); transportation, such as all-terrain vehicles (ATVs); arson, with the intent of destroying federal property; and explosives, often in large numbers and including pipe bombs, truck bombs, IEDs, and other homemade explosives. The growing acceptance of these violent methods by Republican congressmen and governors, however, only increases visibility of such groups and encourages their behavior. Coupled with the removal of the Department of Homeland Security's division responsible for monitoring such groups, the result could prove disastrous for the safety of United States citizens.

  6. Cardiac fibrillation risk of Taser weapons. (United States)

    Leitgeb, Norbert


    The debate on potential health hazards associated with delivering electric discharges to incapacitated subjects, in particular on whether electric discharge weapons are lethal, less lethal or non-lethal, is still controversial. The cardiac fibrillation risks of Taser weapons X26 and X3 have been investigated by measuring the delivered high-tension pulses in dependence on load impedance. Excitation thresholds and sinus-to-Taser conversion factors have been determined by numerical modeling of endocardial, myocardial, and epicardial cells. Detailed quantitative assessment of cardiac electric exposure has been performed by numerical simulation at the normal-weighted anatomical model NORMAN. The impact of anatomical variation has been quantified at an overweight model (Visible Man), both with a spatial resolution of 2 × 2 × 2 mm voxels. Spacing and location of dart electrodes were systematically varied and the worst-case position determined. Based on volume-weighted cardiac exposure assessment, the fibrillation probability of the worst-case hit was determined to 30% (Taser X26) and 9% (Taser X3). The overall risk assessment of Taser application accounting for realistic spatial hit distributions was derived from training sessions of police officers under realistic scenarios and by accounting for the influence of body (over-)weight as well as gender. The analysis of the results showed that the overall fibrillation risk of Taser use is not negligible. It is higher at Taser X26 than at Taser X3 and amounts to about 1% for Europeans with an about 20% higher risk for Asians. Results demonstrate that enhancement as well as further reduction of fibrillation risk depends on responsible use or abuse of Taser weapons.

  7. Environmental Detection of Clandestine Nuclear Weapon Programs (United States)

    Kemp, R. Scott


    Environmental sensing of nuclear activities has the potential to detect nuclear weapon programs at early stages, deter nuclear proliferation, and help verify nuclear accords. However, no robust system of detection has been deployed to date. This can be variously attributed to high costs, technical limitations in detector technology, simple countermeasures, and uncertainty about the magnitude or behavior of potential signals. In this article, current capabilities and promising opportunities are reviewed. Systematic research in a variety of areas could improve prospects for detecting covert nuclear programs, although the potential for countermeasures suggests long-term verification of nuclear agreements will need to rely on methods other than environmental sensing.

  8. Millimeter Wave Radar Applications to Weapons Systems (United States)


    ocity, and azimuth and elevation arRles ; assignment of target to L weapon for engagement; and assessment of the damage by the indication of cessa- tion...paper. 29 D.E. Gray, American institute of Physics Handbook ," McGraw-Hill, New S~York, 1957. --. . - - . .A • -•• =_ . . . . •,,- - - The complex...B-13) is the target-to-clutter power ratio. I. 41I 7 Handbook of Mathematical Functions, U.S. Department of Commerce, National Bureau of Standards

  9. DOE battery program for weapon applications (United States)

    Clark, R. P.; Baldwin, A. R.

    This report discusses the Department of Energy (DOE) Weapons Battery program which originates from Sandia National Laboratories (SNL) and involves activities ranging from research, design and development to testing, consulting, and production support. The primary customer is the DOE/Office of Defense Programs, although work is also done for various Department of Defense agencies and their contractors. The majority of the SNL activities involve thermal battery (TB) and lithium ambient temperature battery (LAMB)technologies. Smaller efforts are underway in the areas of silver oxide/zinc and nickel oxide/cadmium batteries as well as double layer capacitors.

  10. Recoil Considerations for Shoulder-Fired Weapons (United States)


    2012) Steyr 15.2 mm 35 g 1450 m/s 39.6 lb 11.4 Burns (2012) Type 97 (Japanese) 20 mm 162 g 790 m/s 130 lb 28.7 Burns (2012) 12HB00 ( Remington ...shotgun 0.727 in 807 gr (12 × 00) 1225 ft/s 7.0 lb 4.37 Remington (2011) Remington Express 12B0 shotgun 0.727 in 580 gr (12 × 0) 1275 ft/s...7.0 lb 3.28 Remington 5 Table 3. Recoil-related characteristics of selected shoulder-fired weapons cited in table 1. Nomenclature

  11. Postulated accident scenarios in weapons disassembly

    Energy Technology Data Exchange (ETDEWEB)

    Payne, S.S. [Dept. of Energy, Albuquerque, NM (United States)


    A very brief summary of three postulated accident scenarios for weapons disassembly is provided in the paper. The first deals with a tetrahedral configuration of four generic pits; the second, an infinite planar array of generic pits with varying interstitial water density; and the third, a spherical shell with internal mass suspension in water varying the size and mass of the shell. Calculations were performed using the Monte Carlo Neutron Photon transport code MCNP4A. Preliminary calculations pointed to a need for higher resolution of small pit separation regimes and snapshots of hydrodynamic processes of water/plutonium mixtures.

  12. The Regulation of the Possession of Weapons at Gatherings

    Directory of Open Access Journals (Sweden)

    Pieter du Toit


    Full Text Available The Dangerous Weapons Act 15 of 2013 provides for certain prohibitions and restrictions in respect of the possession of a dangerous weapon and it repeals the Dangerous Weapons Act 71 of 1968 as well as the different Dangerous Weapons Acts in operation in the erstwhile TBVC States. The Act also amends the Regulation of Gatherings Act 205 of 1993 to prohibit the possession of any dangerous weapon at a gathering or demonstration. The Dangerous Weapons Act provides for a uniform system of law governing the use of dangerous weapons for the whole of South Africa and it furthermore no longer places the onus on the individual charged with the offence of the possession of a dangerous weapon to show that he or she did not have any intention of using the firearm for an unlawful purpose. The Act also defines the meaning of a dangerous weapon. According to our court’s interpretation of the Dangerous Weapons Act 71 of 1968 a dangerous weapon was regarded as an object used or intended to be used as a weapon even if it had not been designed for use as a weapon. The Act, however, requires the object to be capable of causing death or inflicting serious bodily harm if it were used for an unlawful purpose. The possession of a dangerous weapon, in circumstances which may raise a reasonable suspicion that the person intends to use it for an unlawful purpose, attracts criminal liability. The Act also provides a useful set of guidelines to assist courts to determine if a person charged with the offence of the possession of a dangerous weapon had indeed intended to use the weapon for an unlawful purpose. It seems, however, that the Act prohibits the possession of a dangerous weapon at gatherings, even if the person carrying the weapon does not intend to use it for an unlawful purpose. The state will, however, have to prove that the accused had the necessary control over the object and the intention to exercise such control, as well as that the object is capable of

  13. Stress-induced cortisol secretion impairs detection performance in x-ray baggage screening for hidden weapons by screening novices. (United States)

    Thomas, Livia; Schwaninger, Adrian; Heimgartner, Nadja; Hedinger, Patrik; Hofer, Franziska; Ehlert, Ulrike; Wirtz, Petra H


    Aviation security strongly depends on screeners' performance in the detection of threat objects in x-ray images of passenger bags. We examined for the first time the effects of stress and stress-induced cortisol increases on detection performance of hidden weapons in an x-ray baggage screening task. We randomly assigned 48 participants either to a stress or a nonstress group. The stress group was exposed to a standardized psychosocial stress test (TSST). Before and after stress/nonstress, participants had to detect threat objects in a computer-based object recognition test (X-ray ORT). We repeatedly measured salivary cortisol and X-ray ORT performance before and after stress/nonstress. Cortisol increases in reaction to psychosocial stress induction but not to nonstress independently impaired x-ray detection performance. Our results suggest that stress-induced cortisol increases at peak reactivity impair x-ray screening performance.

  14. Stereotype threat and female communication styles. (United States)

    von Hippel, Courtney; Wiryakusuma, Cindy; Bowden, Jessica; Shochet, Megan


    A large body of research has documented the performance-debilitating effects of stereotype threat for individuals, but there is a paucity of research exploring interpersonal consequences of stereotype threat. Two experiments tested the hypothesis that stereotype threat would change the style in which women communicate. Results indicate that women who experience stereotype threat regarding leadership abilities react against the stereotype by adopting a more masculine communication style. Study 2 provides evidence that self-affirmation eliminates this effect of stereotype threat on women's communication styles. A third study demonstrates an ironic consequence of this effect of stereotype threat on women's communication--when women under stereotype threat adopt a more masculine communication style, they are rated as less warm and likeable, and evaluators indicate less willingness to comply with their requests. Theoretical and practical implications of these findings are discussed.

  15. Beyond the bomb: Living without nuclear weapons

    Energy Technology Data Exchange (ETDEWEB)

    Sommer, M.


    This book is a guide to alternative strategies for building a stable peace. It provides a survey of proposals for peace. Topics covered include: alternative defense: protection without threat; nonviolence: strengths of the weak; economic conversion: swords into services; game theory: nice guys last longest; and alternative futurism: toward more practical utopias.

  16. Wireless LAN Security Threats & Vulnerabilities

    Directory of Open Access Journals (Sweden)

    Md. Waliullah


    Full Text Available Wireless LANs are everywhere these days from home to large enterprise corporate networks due to the ease of installation, employee convenience, avoiding wiring cost and constant mobility support. However, the greater availability of wireless LANs means increased danger from attacks and increased challenges to an organisation, IT staff and IT security professionals. This paper discusses the various security issues and vulnerabilities related to the IEEE 802.11 Wireless LAN encryption standard and common threats/attacks pertaining to the home and enterprise Wireless LAN system and provide overall guidelines and recommendation to the home users and organizations.

  17. Symbian `vulnerability' and Mobile Threats

    CERN Document Server

    Gharibi, Wajeb


    Modern technologies are becoming ever more integrated with each other. Mobile phones are becoming increasing intelligent, and handsets are growing ever more like computers in functionality. We are entering a new era - the age of smart houses, global advanced networks which encompass a wide range of devices, all of them exchanging data with each other. Such trends clearly open new horizons to malicious users, and the potential threats are self evident. In this paper, we study and discuss one of the most famous mobile operating systems 'Symbian'; its vulnerabilities and recommended protection technologies.

  18. New Threat to World Economy

    Institute of Scientific and Technical Information of China (English)


    The aggregate amount of money and credit in the global economy has risen sharply over the past 30 years,with its growth rate and stock far exceeding that of the real economy or real assets of the world.This is the view of Xiang Songzuo,professor at the Huazhong University of Science and Technology,whose opinion was first published in a recent article in China Business News.Xiang said this situation is a real threat to the world economy.Excerpts of his article are reprinted below:

  19. 25 CFR 11.444 - Carrying concealed weapons. (United States)


    ... 25 Indians 1 2010-04-01 2010-04-01 false Carrying concealed weapons. 11.444 Section 11.444 Indians BUREAU OF INDIAN AFFAIRS, DEPARTMENT OF THE INTERIOR LAW AND ORDER COURTS OF INDIAN OFFENSES AND LAW AND ORDER CODE Criminal Offenses § 11.444 Carrying concealed weapons. A person who goes about in...

  20. Willingness to pay for defense against weapons of mass destruction. (United States)

    Mulvaney, J M; LaBarre, D; Pastel, R; Landauer, M


    A survey assessed the willingness to pay for defense against weapons of mass destruction. The results were evaluated according to the benefit to society. The results indicated preferences for increased spending on intelligence gathering, training, and equipment. We concluded that the United States is spending less for weapons of mass destruction defense than the sample population was willing to pay.

  1. 14 CFR 135.119 - Prohibition against carriage of weapons. (United States)


    ... 14 Aeronautics and Space 3 2010-01-01 2010-01-01 false Prohibition against carriage of weapons... Flight Operations § 135.119 Prohibition against carriage of weapons. No person may, while on board an aircraft being operated by a certificate holder, carry on or about that person a deadly or dangerous...

  2. 32 CFR 552.116 - Privately owned weapons-security. (United States)


    ... 32 National Defense 3 2010-07-01 2010-07-01 true Privately owned weapons-security. 552.116 Section..., Ammunition, and Explosives-Fort Lewis, Washington § 552.116 Privately owned weapons—security. Privately owned arms and ammunition will be secured in the manner required for military weapons and ammunition...

  3. 31 CFR 0.215 - Possession of weapons and explosives. (United States)


    ... 31 Money and Finance: Treasury 1 2010-07-01 2010-07-01 false Possession of weapons and explosives... OF THE TREASURY EMPLOYEE RULES OF CONDUCT Rules of Conduct § 0.215 Possession of weapons and explosives. (a) Employees shall not possess firearms, explosives, or other dangerous or deadly...

  4. Rethinking the Development of Weapons and Their Impact (United States)

    Katsioloudis, Petros J.; Jones, Mildred V.


    As one reads about the history of humans, he/she sees very early on that humans are naturally "tool users." More specifically, humans used tools as a means of subsistence and survival. Even today humans use tools to extend their capabilities beyond imagination. These tools are even used as weapons. However primitive, these early weapons would soon…

  5. Vaccines against biologic agents: uses and developments. (United States)

    Ales, Noel C; Katial, Rohit K


    Although the Geneva protocol that prohibits the use of chemical and biologic weapons was ratified in 1925, many countries failed to accept this protocol: others stipulated retaliation, and some, like the United States, did not ratify the protocol for decades. This delay allowed the continued development of chemical and biologic agents. Members of the health care community are responsible for determining the best way to protect society from the potentially devastating effects of these biologic agents. Ideally,these diseases would be prevented from ever developing into systemic illnesses. In the past, vaccination has been a successful means of eradicating disease. Vaccines remain a hopeful therapy for the future, but time is short,and there are many obstacles.Information regarding bioterrorism agents and their treatments comes mainly from dated data or from in vitro or animal studies that may not apply to human treatment and disease. Additionally, the current threat of bioterrorism does not allow enough time for accurate, well-designed,controlled studies in humans before the release of investigational vaccines. Furthermore, some human studies would not be safe or ethical. Finally,many members of society suffer from illnesses that would put them at high risk to receive prophylactic vaccination. It is therefore naive to believe that vaccines would be the ultimate protection from these agents. In addition to vaccine development, there must be concurrent investigations into disease management and treatment. Even in instances in which vaccination is known to be an effective means of disease protection. biologic agents may be presented in a manner that renders vaccines ineffective. Virulent strains of organisms may be used, more than one organism may be used in tandem to increase virulence, and strains may be selected for antibiotic and vaccine resistance. Genetically engineered strains may use virulence factors other than those targeted in vaccines, and high

  6. Psychobiological responses to social threat: evolution of a psychological model in psychoneuroimmunology. (United States)

    Kemeny, Margaret E


    There exists a bidirectional network of interactions between the central nervous system, the endocrine system and the immune system. The existence of these pathways allows stressful life experience to impact the immune system with important implications for health. One powerful elicitor of changes in the autonomic, endocrine and immune systems is threat to social status. This review describes the development of a human model of social status threat that specifies a set of contextual, psychological and biological pathways that may underlie the health consequences of threats to social status and regard. The role of cognitive processes in shaping the physiological response to the social world will be emphasized.

  7. Stereotype threat and executive functions: which functions mediate different threat-related outcomes? (United States)

    Rydell, Robert J; Van Loo, Katie J; Boucher, Kathryn L


    Stereotype threat research shows that women's math performance can be reduced by activating gender-based math stereotypes. Models of stereotype threat assert that threat reduces cognitive functioning, thereby accounting for its negative effects. This work provides a more detailed understanding of the cognitive processes through which stereotype threat leads women to underperform at math and to take risks, by examining which basic executive functions (inhibition, shifting, and updating) account for these outcomes. In Experiments 1 and 2, women under threat showed reduced inhibition, reduced updating, and reduced math performance compared with women in a control condition (or men); however, only updating accounted for women's poor math performance under threat. In Experiment 3, only updating accounted for stereotype threat's effect on women's math performance, whereas only inhibition accounted for the effect of threat on risk-taking, suggesting that distinct executive functions can account for different stereotype threat-related outcomes.

  8. Enhanced Memory for both Threat and Neutral Information Under Conditions of Intergroup Threat

    Directory of Open Access Journals (Sweden)

    Yong eZhu


    Full Text Available Few studies have examined the effect of intergroup threat on cognitive outcomes such as memory. Different theoretical perspectives can inform how intergroup threat should affect memory for threat-relevant and neutral information, such as the mood-congruency approach, Yerkes-Dodson law, Easterbrook’s theory, and also evolutionary perspectives. To test among these, we conducted two experiments to examine how exposure to intergroup threats affected memory compared to control conditions. In study 1, we manipulated symbolic threat and examined participants’ memory for threat and neutral words. In study 2, memory performance was assessed following the induction of realistic threat. Across the studies, in the control condition participants showed better memory for threat-related than neutral information. However, participants under threat remembered neutral information as well as threat-related information. In addition, participants in the threat condition remembered threat-related information as well as participants in the control condition. The findings are discussed in terms of automatic vigilance processes but also the effects of threat on arousal and its effect on information processing. This latter perspective, suggests paradoxically, that under some circumstances involving an outgroup threat, non-threatening information about outgroups can be extensively processed.

  9. Chemical and Biological Warfare: Should Rapid Detection Techniques Be Researched To Dissuade Usage? A Review

    Directory of Open Access Journals (Sweden)

    Mark R. Hurst


    Full Text Available Chemistry, microbiology and genetic engineering have opened new doorways for the human race to propel itself to a better future. However, there is a darker side to Bioengineering. One element of this is the manufacture and proliferation of biological and chemical weapons. It is clearly in the interest of humankind to prevent the future use of such weapons of mass destruction. Though many agents have been proposed as potential biological and chemical weapons, the feasibility of these weapons is a matter of conjecture. The unpredictable and indiscriminate devastation caused by natural epidemics and hazardous chemicals during wartime without medical treatment should warn humans of the dangers of employing them as weapons. This study argues rapid detection techniques may dissuade future use. Many agents are far less toxic to treatment. A quick response time to most attacks will decrease the chances of serious health issues. The agent will be less effective and discourage the attacker from using the weapon. Fortunately, the Chemical and Biological Weapons Convention (CWCIBWC allows defensive work in the area of biological and chemical weapons. Consequently, the review will discuss history, delivery/dispersal systems and specific agents of the warfare. The study presents current developments in biosensors for toxic materials of defense interest. It concludes with future directions for biosensor development.

  10. National Strategy for Countering Biological Threats: Diplomacy and International Programs (United States)


    horrific implications of procrastination , what will you do? I respectfully ask you not to wait for the first attacks to prepare for the second...spend money on this; but we have to spend political capital. We have to overcome in-bred ideological dis- positions, and that may be even more And I hope in the future that you will overcome your shyness when I ask whether there is someone here from the State Department, and perceptively

  11. Perceived threat in childhood: a review of research and implications for children living in violent households. (United States)

    Miller, Laura E


    The current study is a review of existing literature on perceived threat across childhood (0-19 years). There is strong evidence from this body of research that threat detection emerges in infancy and is present throughout childhood, with meaningful links to child adjustment. The wide range of methodologies employed to assess threat include biological measures (event-related potential and functional magnetic resonance imaging), observational data (gaze duration and response time), and a range of ways of gathering cognitive data (threat appraisal). Across methodologies, a uniform finding is that children who have higher threat attenuation are at increased risk for the development of anxiety disorders. It also seems that children's attention to threatening stimuli may vary across development, with heightened attention in infancy and early childhood. These findings have meaningful extensions for children who are living in violent families. Since many children living in violent homes are exposed to the threat of violence beginning in infancy, these children may be at heightened risk as compared to their nonexposed peers for the development of maladaptive patterns of threat detection and response. There is some evidence that this long-standing pattern of vigilance toward threat in key developmental periods may in part explain the increased risk of the development of anxiety disorders and posttraumatic stress disorder following exposure to violence.

  12. Revolutions in Science and Technology: Future Threats to US National Security (United States)


    Stockpiling of Bacteriological (Biological) and Tox in Weapons and on their Destruction. 73 Ken Alibek and Stephen Handelman. Biohazard: The Chilling True...Carol D. Leonnig, and Del Quentin Wilber , "Scientist Set to Discuss Plea Bargain in Deadly Attacks Commits Suicide," Washington Post, August 2, 2008...and Carrie Johnsen, Del Quentin Wilber , and Dan Eggen, "Evidence ;~,gainst Scientist Detailed," Washington Post, August 7, 2008. 124 Michael J

  13. Countering 21st Century Threats

    DEFF Research Database (Denmark)

    Scharling Pedersen, Peter; Pillai, Chad M.; Hun, Lee Jae


    The United States and its Allies confront an increasingly volatile world where threats range from traditional state-on-state challenges to non-state transnational networks. To successfully combat these 21st Century problems, in an era of resource and geo-political power constraints, the U......), Counter-Terrorism (CT), and Security and Stability Operations (SSO). • Establishing a construct that allows a strategic Whole-of-Government capacity for operations coordinated by joint interagency task forces. • Continue to developing the Global SOF network. • Increased intelligence sharing in areas...... (UW). Other obstacles such as resolving tensions in U.S. statutory law between traditional military and intelligence activities, bridging the gap with non-security Departments and Agencies, and developing the necessary trust with bilateral and multilateral partners are components that need...

  14. World's soils are under threat (United States)

    Montanarella, Luca; Pennock, Daniel Jon; McKenzie, Neil; Badraoui, Mohamed; Chude, Victor; Baptista, Isaurinda; Mamo, Tekalign; Yemefack, Martin; Singh Aulakh, Mikha; Yagi, Kazuyuki; Hong, Suk Young; Vijarnsorn, Pisoot; Zhang, Gan-Lin; Arrouays, Dominique; Black, Helaina; Krasilnikov, Pavel; Sobocká, Jaroslava; Alegre, Julio; Henriquez, Carlos Roberto; de Lourdes Mendonça-Santos, Maria; Taboada, Miguel; Espinosa-Victoria, David; AlShankiti, Abdullah; Kazem AlaviPanah, Sayed; El Mustafa Elsheikh, Elsiddig Ahmed; Hempel, Jon; Camps Arbestain, Marta; Nachtergaele, Freddy; Vargas, Ronald


    The Intergovernmental Technical Panel on Soils has completed the first State of the World's Soil Resources Report. Globally soil erosion was identified as the gravest threat, leading to deteriorating water quality in developed regions and to lowering of crop yields in many developing regions. We need to increase nitrogen and phosphorus fertilizer use in infertile tropical and semi-tropical soils - the regions where the most food insecurity among us are found - while reducing global use of these products overall. Stores of soil organic carbon are critical in the global carbon balance, and national governments must set specific targets to stabilize or ideally increase soil organic carbon stores. Finally the quality of soil information available for policy formulation must be improved - the regional assessments in the State of the World's Soil Resources Report frequently base their evaluations on studies from the 1990s based on observations made in the 1980s or earlier.

  15. Dissolution Threats and Legislative Bargaining

    DEFF Research Database (Denmark)

    Becher, Michael; Christiansen, Flemming Juul


    Chief executives in many parliamentary democracies have the power to dissolve the legislature. Despite a well-developed literature on the endogenous timing of parliamentary elections, political scientists know remarkably little about the strategic use of dissolution power to influence policymaking....... To address this gap, we propose and empirically evaluate a theoretical model of legislative bargaining in the shadow of executive dissolution power. The model implies that the chief executive's public support and legislative strength, as well as the time until the next constitutionally mandated election......, are important determinants of the use and effectiveness of dissolution threats in policymaking. Analyzing an original time-series data set from a multiparty parliamentary democracy, we find evidence in line with key empirical implications of the model....

  16. Proportionality, just war theory and weapons innovation. (United States)

    Forge, John


    Just wars are supposed to be proportional responses to aggression: the costs of war must not greatly exceed the benefits. This proportionality principle raises a corresponding 'interpretation problem': what are the costs and benefits of war, how are they to be determined, and a 'measurement problem': how are costs and benefits to be balanced? And it raises a problem about scope: how far into the future do the states of affairs to be measured stretch? It is argued here that weapons innovation always introduces costs, and that these costs cannot be determined in advance of going to war. Three examples, the atomic bomb, the AK-47 and the ancient Greek catapult, are given as examples. It is therefore argued that the proportionality principle is inapplicable prospectively. Some replies to the argument are discussed and rejected. Some more general defences of the proportionality principle are considered and also rejected. Finally, the significance of the argument for Just War Theory as a whole is discussed.

  17. Nuclear weapons issues in South Asia

    Energy Technology Data Exchange (ETDEWEB)

    Joeck, N.


    This report discusses how the US can play a productive mediating role in South Asia by engaging India and Pakistan in an international forum to manage nuclear weapons, as Edward Teller advocated. India and Pakistan have developed their nuclear capabilities because they fear their neighbors, not because they want to threaten fear their neighbors, not because they want to threaten the US. The appropriate response for the US, therefore, is diplomatic engagement and negotiations. In addition to the international approach, encouragement and facilitation of regional and bilateral interactions will also be important. Formal arms control agreements have been reached, but less formal confidence-building measures, and unilateral security pledges may well be combined to form a more secure strategic environment in South Asia than a nuclear armed confrontation across the porous South Asian border.

  18. Insider Threat Mitigation Workshop Instructional Materials

    Energy Technology Data Exchange (ETDEWEB)

    Gibbs, Philip [Brookhaven National Lab. (BNL), Upton, NY (United States); Larsen, Robert [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); O' Brien, Mike [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Rodriquez, Jose [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)


    Insiders represent a formidable threat to nuclear facilities. This set of workshop materials covers methodologies to analyze and approaches to mitigate the threat of an insider attempting abrupt theft of nuclear materials. This report is a compilation of workshop materials consisting of lectures on technical and administrative measures used in Physical Protection (PP) and Material Control and Accounting (MC&A) and methods for analyzing their effectiveness against a postulated insider threat.

  19. Bias Adjusted Precipitation Threat Scores

    Directory of Open Access Journals (Sweden)

    F. Mesinger


    Full Text Available Among the wide variety of performance measures available for the assessment of skill of deterministic precipitation forecasts, the equitable threat score (ETS might well be the one used most frequently. It is typically used in conjunction with the bias score. However, apart from its mathematical definition the meaning of the ETS is not clear. It has been pointed out (Mason, 1989; Hamill, 1999 that forecasts with a larger bias tend to have a higher ETS. Even so, the present author has not seen this having been accounted for in any of numerous papers that in recent years have used the ETS along with bias "as a measure of forecast accuracy".

    A method to adjust the threat score (TS or the ETS so as to arrive at their values that correspond to unit bias in order to show the model's or forecaster's accuracy in extit{placing} precipitation has been proposed earlier by the present author (Mesinger and Brill, the so-called dH/dF method. A serious deficiency however has since been noted with the dH/dF method in that the hypothetical function that it arrives at to interpolate or extrapolate the observed value of hits to unit bias can have values of hits greater than forecast when the forecast area tends to zero. Another method is proposed here based on the assumption that the increase in hits per unit increase in false alarms is proportional to the yet unhit area. This new method removes the deficiency of the dH/dF method. Examples of its performance for 12 months of forecasts by three NCEP operational models are given.

  20. [Chikungunya fever - A new global threat]. (United States)

    Montero, Antonio


    The recent onset of epidemics caused by viruses such as Ebola, Marburg, Nipah, Lassa, coronavirus, West-Nile encephalitis, Saint Louis encephalitis, human immunodeficiency virus, dengue, yellow fever and Venezuelan hemorrhagic fever alerts about the risk these agents represent for the global health. Chikungunya virus represents a new threat. Surged from remote African regions, this virus has become endemic in the Indic ocean basin, the Indian subcontinent and the southeast of Asia, causing serious epidemics in Africa, Indic Ocean Islands, Asia and Europe. Due to their epidemiological and biological features and the global presence of their vectors, chikungunya represents a serious menace and could become endemic in the Americas. Although chikungunya infection has a low mortality rate, its high attack ratio may collapse the health system during epidemics affecting a sensitive population. In this paper, we review the clinical and epidemiological features of chikungunya fever as well as the risk of its introduction into the Americas. We remark the importance of the epidemiological control and mosquitoes fighting in order to prevent this disease from being introduced into the Americas.

  1. Information security practices emerging threats and perspectives

    CERN Document Server

    Awad, Ahmed; Woungang, Isaac


    This book introduces novel research targeting technical aspects of protecting information security and establishing trust in the digital space. New paradigms, and emerging threats and solutions are presented in topics such as application security and threat management; modern authentication paradigms; digital fraud detection; social engineering and insider threats; cyber threat intelligence; intrusion detection; behavioral biometrics recognition; hardware security analysis. The book presents both the important core and the specialized issues in the areas of protection, assurance, and trust in information security practice. It is intended to be a valuable resource and reference for researchers, instructors, students, scientists, engineers, managers, and industry practitioners. .

  2. Threat by association: do distant intergroup threats carry-over into local intolerance? (United States)

    Bouman, Thijs; van Zomeren, Martijn; Otten, Sabine


    Individuals are often confronted with intergroup threats, yet many of these threats emanate from distant groups that most individuals are unlikely to encounter in their local environment. An important yet unanswered question is whether reactions to those threats, such as intolerance towards the threatening group, carry over to other groups that individuals actually do encounter in their local environment (e.g., immigrants). The main goal of our studies was to experimentally identify this carry-over effect of intergroup threat. Specifically, we hypothesized that (by definition relatively abstract) symbolic threats (e.g., threats to the ingroup's worldview) have an especially strong carry-over potential because those threats can be easily attributed to other outgroups. We tested these predictions in one correlational and two experimental studies. The results of all three studies confirmed our hypothesis that particularly distant symbolic threats were predictive of intolerance towards local outgroups.

  3. Toward Armageddon: The proliferation of unconventional weapons and ballistic missiles in the Middle East. Occasional Paper No. 36

    Energy Technology Data Exchange (ETDEWEB)

    Miller, A.J.


    The author concludes that it is probable that unconventional weapons and their associated delivery systems will form a permanent part of future political and strategic calculations in the Middle East. Some possible consequences of this situation can be divided into three classes: intra-regional, inter-regional and extra-regional. There is no doubt that Israel, driven by the need for security,precipitated the proliferation of unconventional weapons and of surface-to-surface missiles in the Middle East. It will now be driven to secure itself from the new threat to its security posed by its regional opponents. The most significant extra-regional consequence of developments in the Middle East may be further complication of great power arms control negotiations. To the re-discovery by the United States and the Soviet Union of their obligations under the Non-Proliferation Treaty to reduce the level of their nuclear weapons must now be added the desire to reduce, if not entirely eliminate, their chemical weapons stockpiles in advance of a global ban. It is possible that lesser powers will learn from the evidence of the great powers behavior, although that contradicts much of what we know of the psychology of decision making in international politics. What is necessary, though not necessarily sufficient, is that the U.S. and the USSR as the two external powers with potentially the greatest leverage, work together toward the resolution of the underlying causes of conflict in a region marked by more than a generation of competition between them.

  4. Threats: power, family mealtimes, and social influence. (United States)

    Hepburn, Alexa; Potter, Jonathan


    One of the most basic topics in social psychology is the way one agent influences the behaviour of another. This paper will focus on threats, which are an intensified form of attempted behavioural influence. Despite the centrality to the project of social psychology, little attention has been paid to threats. This paper will start to rectify this oversight. It reviews early examples of the way social psychology handles threats and highlights key limitations and presuppositions about the nature and role of threats. By contrast, we subject them to a programme of empirical research. Data comprise video records of a collection of family mealtimes that include preschool children. Threats are recurrent in this material. A preliminary conceptualization of features of candidate threats from this corpus will be used as an analytic start point. A series of examples are used to explicate basic features and dimensions that build the action of threatening. The basic structure of the threats uses a conditional logic: if the recipient continues problem action/does not initiate required action then negative consequences will be produced by the speaker. Further analysis clarifies how threats differ from warnings and admonishments. Sequential analysis suggests threats set up basic response options of compliance or defiance. However, recipients of threats can evade these options by, for example, reworking the unpleasant upshot specified in the threat, or producing barely minimal compliance. The implications for broader social psychological concerns are explored in a discussion of power, resistance, and asymmetry; the paper ends by reconsidering the way social influence can be studied in social psychology.

  5. Application of the Raven UAV for chemical and biological detection (United States)

    Altenbaugh, Ryan; Barton, Jeff; Chiu, Christopher; Fidler, Ken; Hiatt, Dan; Hawthorne, Chad; Marshall, Steven; Mohos, Joe; McHugh, Vince; Nicoloff, Bill


    This paper presents the plume tracking algorithms developed for a series of outdoor chemical-stimulant testing conducted at Dugway Proving Ground in 2008 and 2009 employing a Raven UAV equipped with a real-time chemical sensor. The flights were conducted as part of the a program under the sponsorship of the Army JPM NBC Contamination Avoidance and in conjunction with the Army PM-Unmanned Aircraft Systems, the Defense Threat Reduction Agency, and Edgewood Chemical Biological Center. This test demonstrated the Raven's ability to autonomously detect and track a chemical plume during a variety of atmospheric conditions. During the testing, the Raven conducted over a dozen flights, tracking outdoor releases of simulated chemical weapons over significant distances. The Raven was cued to the releases with standoff detection systems through Cursor on Target messages. Upon reaching the plume, the Raven used on-board sensors and on-board meteorological data to track the plume autonomously and determine the extent of the plume. Results were provided in real-time to the UAV operator.

  6. Threats to sandy beach ecosystems: A review (United States)

    Defeo, Omar; McLachlan, Anton; Schoeman, David S.; Schlacher, Thomas A.; Dugan, Jenifer; Jones, Alan; Lastra, Mariano; Scapini, Felicita


    We provide a brief synopsis of the unique physical and ecological attributes of sandy beach ecosystems and review the main anthropogenic pressures acting on the world's single largest type of open shoreline. Threats to beaches arise from a range of stressors which span a spectrum of impact scales from localised effects (e.g. trampling) to a truly global reach (e.g. sea-level rise). These pressures act at multiple temporal and spatial scales, translating into ecological impacts that are manifested across several dimensions in time and space so that today almost every beach on every coastline is threatened by human activities. Press disturbances (whatever the impact source involved) are becoming increasingly common, operating on time scales of years to decades. However, long-term data sets that describe either the natural dynamics of beach systems or the human impacts on beaches are scarce and fragmentary. A top priority is to implement long-term field experiments and monitoring programmes that quantify the dynamics of key ecological attributes on sandy beaches. Because of the inertia associated with global climate change and human population growth, no realistic management scenario will alleviate these threats in the short term. The immediate priority is to avoid further development of coastal areas likely to be directly impacted by retreating shorelines. There is also scope for improvement in experimental design to better distinguish natural variability from anthropogenic impacts. Sea-level rise and other effects of global warming are expected to intensify other anthropogenic pressures, and could cause unprecedented ecological impacts. The definition of the relevant scales of analysis, which will vary according to the magnitude of the impact and the organisational level under analysis, and the recognition of a physical-biological coupling at different scales, should be included in approaches to quantify impacts. Zoning strategies and marine reserves, which have not

  7. 32 CFR 552.124 - Transportation of privately owned weapons and ammunition. (United States)


    ... 32 National Defense 3 2010-07-01 2010-07-01 true Transportation of privately owned weapons and... owned weapons and ammunition. (a) Privately owned firearms and ammunition will be transported in the following manner: (1) Weapons, other than weapons being transported into Fort Lewis for the first time,...

  8. 32 CFR 552.104 - Disposition of confiscated/seized weapons. (United States)


    ... 32 National Defense 3 2010-07-01 2010-07-01 true Disposition of confiscated/seized weapons. 552... RESERVATIONS AND NATIONAL CEMETERIES REGULATIONS AFFECTING MILITARY RESERVATIONS Firearms and Weapons § 552.104 Disposition of confiscated/seized weapons. All weapons, ammunition, explosives or other devices defined...

  9. 32 CFR 552.130 - Disposition of confiscated/seized weapons. (United States)


    ... 32 National Defense 3 2010-07-01 2010-07-01 true Disposition of confiscated/seized weapons. 552..., Ammunition and Other Dangerous Weapons on Fort Gordon § 552.130 Disposition of confiscated/seized weapons. All weapons, ammunition, explosives, or other devices defined in this subpart, that are...

  10. Threat diversity will erode mammalian phylogenetic diversity in the near future.

    Directory of Open Access Journals (Sweden)

    Clémentine M A Jono

    Full Text Available To reduce the accelerating rate of phylogenetic diversity loss, many studies have searched for mechanisms that could explain why certain species are at risk, whereas others are not. In particular, it has been demonstrated that species might be affected by both extrinsic threat factors as well as intrinsic biological traits that could render a species more sensitive to extinction; here, we focus on extrinsic factors. Recently, the International Union for Conservation of Nature developed a new classification of threat types, including climate change, urbanization, pollution, agriculture and aquaculture, and harvesting/hunting. We have used this new classification to analyze two main factors that could explain the expected future loss of mammalian phylogenetic diversity: 1. differences in the type of threats that affect mammals and 2. differences in the number of major threats that accumulate for a single species. Our results showed that Cetartiodactyla, Diprotodontia, Monotremata, Perissodactyla, Primates, and Proboscidea could lose a high proportion of their current phylogenetic diversity in the coming decades. In contrast, Chiroptera, Didelphimorphia, and Rodentia could lose less phylogenetic diversity than expected if extinctions were random. Some mammalian clades, including Marsupiala, Chiroptera, and a subclade of Primates, are affected by particular threat types, most likely due solely to their geographic locations and associations with particular habitats. However, regardless of the geography, habitat, and taxon considered, it is not the threat type, but the threat diversity that determines the extinction risk for species and clades. Thus, some mammals might be randomly located in areas subjected to a large diversity of threats; they might also accumulate detrimental traits that render them sensitive to different threats, which is a characteristic that could be associated with large body size. Any action reducing threat diversity is

  11. Vibrotactile and visual threat cueing with high g threat intercept in dynamic flight simulation

    NARCIS (Netherlands)

    Eriksson, L.; Erp, J.B.F. van; Carlander, O.; Levin, B.; Veen, H.A.H.C. van; Veltman, J.E.


    In a TNO and FOI joint study, nine fighter pilots participated in a threat detection and intercept experiment in the Swedish Dynamic Flight Simulator. Visual threat cueing with a simulated Gripen aircraft head-up display (HUD) symbology was compared with combined visual and vibrotactile threat cuein

  12. Threat by association : Do distant intergroup threats carry-over into local intolerance?

    NARCIS (Netherlands)

    Bouman, Thijs; van Zomeren, Martijn; Otten, Sabine


    Individuals are often confronted with intergroup threats, yet many of these threats emanate from distant groups that most individuals are unlikely to encounter in their local environment. An important yet unanswered question is whether reactions to those threats, such as intolerance towards the thre

  13. Cosmic Impacts: The DoomsDay Threat (United States)

    McGaha, J.


    Recent science fiction movies (Deep Impact and Armageddon) have brought public attention to the threat of possible impacts from space. Just how real is this threat and what would be the consequences of such an impact? Can we do anything to prevent it? The survival of civilization may depend on it.

  14. Game Theoretic Risk Analysis of Security Threats

    CERN Document Server

    Bier, Vicki M


    Introduces reliability and risk analysis in the face of threats by intelligent agents. This book covers applications to networks, including problems in both telecommunications and transportation. It provides a set of tools for applying game theory TO reliability problems in the presence of intentional, intelligent threats

  15. How you perceive threat determines your behavior

    Directory of Open Access Journals (Sweden)

    Orlando Fernandes Junior


    Full Text Available The prioritization of processing emotional stimuli usually produces deleterious effects on task performance when it distracts from a task. One common explanation is that brain resources are consumed by emotional stimuli, diverting resources away from executing the task. Viewing unpleasant stimuli also generates defensive reactions, and these responses may be at least partially responsible for the effect of the emotional modulation observed in various reaction time (RT paradigms. We investigated whether modulatory effects on RT vary if we presented threat stimuli to prompt different defensive responses. To trigger different responses, we manipulated threat perception by moving the direction of threatening stimuli. Threatening or neutral stimuli were presented as distractors during a bar orientation discrimination task. The results demonstrated that threat stimuli directed towards the observer produced a decrease in RT; in contrast, threat stimuli directed away from the observer produced an increase in RT, when compared to neutral stimuli. Accelerated RT during direct threat stimuli was attributed to increased motor preparation resulting from strong activation of the defense response cascade. In contrast, no direct threat stimuli likely activated the defense cascade, but less intensively, prompting immobility. Different threat stimuli produced varying effects, which was interpreted as evidence that the modulation of RT by emotional stimuli represents the summation of attentional and motivational effects. Additionally, participants who had been previously exposed to diverse types of violent crime were more strongly influenced by direct threat stimuli. In sum, our data support the concept that emotions are indeed action tendencies.

  16. Perception of the Threat of Terrorism. (United States)

    Cohen-Louck, Keren


    In light of the tense and ongoing security situation in Israel, one important issue that needs to be analyzed and understood is the perception of terrorism threats. Most studies focused mainly on the psychological implications of terrorist acts; this study examines the complexity of the manner in which the individual perceives the threat of terrorism. In all, 40 Israeli adults (22 women and 18 men) were interviewed using semistructured in-depth interviews. Qualitative analysis indicates that the components of the perception of terrorism that construct the evaluation and subjective perception of the participants are as follows: (a) perception of control, which is a feeling of loss of control and helplessness due to uncertainty, inability to predict threats, and the vagueness of the threat; (b) perception of vulnerability to the threat, such as a feeling of vulnerability to and potential victimization by terrorism; and (c) perception of fear of terrorism that includes responses of fear, anxiety, feeling of danger, and emotional distress. In addition, gender differences were found in the analysis. The findings of this study help gain a better understanding as to how people perceive the threat of terrorism. The findings also enable an understanding of the complexity of living under ongoing terrorism threats and may assist in understanding how citizens cope with and adjust to this threat.

  17. Security threats categories in healthcare information systems. (United States)

    Samy, Ganthan Narayana; Ahmad, Rabiah; Ismail, Zuraini


    This article attempts to investigate the various types of threats that exist in healthcare information systems (HIS). A study has been carried out in one of the government-supported hospitals in Malaysia.The hospital has been equipped with a Total Hospital Information System (THIS). The data collected were from three different departments, namely the Information Technology Department (ITD), the Medical Record Department (MRD), and the X-Ray Department, using in-depth structured interviews. The study identified 22 types of threats according to major threat categories based on ISO/IEC 27002 (ISO 27799:2008). The results show that the most critical threat for the THIS is power failure followed by acts of human error or failure and other technological factors. This research holds significant value in terms of providing a complete taxonomy of threat categories in HIS and also an important component in the risk analysis stage.

  18. A Quantitative Threats Analysis for the Florida Manatee (Trichechus manatus latirostris) (United States)

    Runge, Michael C.; Sanders-Reed, Carol A.; Langtimm, Catherine A.; Fonnesbeck, Christopher J.


    The Florida manatee (Trichechus manatus latirostris) is an endangered marine mammal endemic to the southeastern United States. The primary threats to manatee populations are collisions with watercraft and the potential loss of warm-water refuges. For the purposes of listing, recovery, and regulation under the Endangered Species Act (ESA), an understanding of the relative effects of the principal threats is needed. This work is a quantitative approach to threats analysis, grounded in the assumption that an appropriate measure of status under the ESA is based on the risk of extinction, as quantified by the probability of quasi-extinction. This is related to the qualitative threats analyses that are more common under the ESA, but provides an additional level of rigor, objectivity, and integration. In this approach, our philosophy is that analysis of the five threat factors described in Section 4(a)(1) of the ESA can be undertaken within an integrated quantitative framework. The basis of this threats analysis is a comparative population viability analysis. This involves forecasting the Florida manatee population under different scenarios regarding the presence of threats, while accounting for process variation (environmental, demographic, and catastrophic stochasticity) as well as parametric and structural uncertainty. We used the manatee core biological model (CBM) for this viability analysis, and considered the role of five threats: watercraft-related mortality, loss of warm-water habitat in winter, mortality in water-control structures, entanglement, and red tide. All scenarios were run with an underlying parallel structure that allowed a more powerful estimation of the effects of the various threats. The results reflect our understanding of manatee ecology (as captured in the structure of the CBM), our estimates of manatee demography (as described by the parameters in the model), and our characterization of the mechanisms by which the threats act on manatees. As an

  19. Stereotype threat prevents perceptual learning. (United States)

    Rydell, Robert J; Shiffrin, Richard M; Boucher, Kathryn L; Van Loo, Katie; Rydell, Michael T


    Stereotype threat (ST) refers to a situation in which a member of a group fears that her or his performance will validate an existing negative performance stereotype, causing a decrease in performance. For example, reminding women of the stereotype "women are bad at math" causes them to perform more poorly on math questions from the SAT and GRE. Performance deficits can be of several types and be produced by several mechanisms. We show that ST prevents perceptual learning, defined in our task as an increasing rate of search for a target Chinese character in a display of such characters. Displays contained two or four characters and half of these contained a target. Search rate increased across a session of training for a control group of women, but not women under ST. Speeding of search is typically explained in terms of learned "popout" (automatic attraction of attention to a target). Did women under ST learn popout but fail to express it? Following training, the women were shown two colored squares and asked to choose the one with the greater color saturation. Superimposed on the squares were task-irrelevant Chinese characters. For women not trained under ST, the presence of a trained target on one square slowed responding, indicating that training had caused the learning of an attention response to targets. Women trained under ST showed no slowing, indicating that they had not learned such an attention response.

  20. In Brief: Forecasting meningitis threats (United States)

    Showstack, Randy


    The University Corporation for Atmospheric Research (UCAR), in conjunction with a team of health and weather organizations, has launched a project to provide weather forecasts to medical officials in Africa to help reduce outbreaks of meningitis. The forecasts will enable local health care providers to target vaccination programs more effectively. In 2009, meteorologists with the National Center for Atmospheric Research, which is managed by UCAR, will begin issuing 14-day forecasts of atmospheric conditions in Ghana. Later, UCAR plans to work closely with health experts from several African countries to design and test a decision support system to provide health officials with useful meteorological information. ``By targeting forecasts in regions where meningitis is a threat, we may be able to help vulnerable populations. Ultimately, we hope to build on this project and provide information to public health programs battling weather-related diseases in other parts of the world,'' said Rajul Pandya, director of UCAR's Community Building Program. Funding for the project comes from a $900,000 grant from, the philanthropic arm of the Internet search company.

  1. [Counterfeit medicines: a growing threat]. (United States)

    Barbereau, S


    The medical drug market has undergone considerable transformation in recent years. Like other products, medicines have been affected by globalization. Free trade policies have had a number of negative effects including a reduction in quality control not only for some products but also for raw materials and finished products. The global environment has also created conditions conducive to counterfeit medicines. The term counterfeit medicine is defined differently from one country to another in terms of quality, legality and fraudulent intent. This situation prompted the WHO to propose the following definition: "A counterfeit medicine is one which is deliberately and fraudulently mislabeled with respect to identity and/or source. Counterfeiting can apply to both branded and generic products and counterfeit products may include products with the correct ingredients or with the wrong ingredients, without active ingredients, with insufficient active ingredients or with fake packaging." Weak pharmaceutical regulation often compounded by widespread corruption in developing countries has greatly facilitated the development of this illicit market with harmful and costly effects on public health. Due to the lack of pharmocovigilance accidents involving use of counterfeit drugs go unreported. For this reason it is not possible to measure the economic impact. While counterfeiting has become a major threat in developing countries, it also affects industrialized countries. Fraudulent behavior occurs all over the world.

  2. Milk inhibits the biological activity of ricin (United States)

    Ricin is a highly toxic protein produced by the castor plant Ricinus communis. The toxin is relatively easy to isolate and can be used as a biological weapon. There is great interest in identifying effective inhibitors for ricin. In this study, we demonstrated by three independent assays that compon...

  3. Los Alamos National Laboratory JOWOG 31 Weapons Engineering Education & Training

    Energy Technology Data Exchange (ETDEWEB)

    Domzalski, Mark W. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)


    The objectives of this report are to recruit talented staff, invest in new and early/mid career staff, retain trained and talented staff and future leaders, and shorten the ~5-10 year time line to realize new Weaponeers.

  4. Hamburgian weapon delivery technology: a quantitative comparative approach

    DEFF Research Database (Denmark)

    Riede, Felix


    The pioneer human re-colonisation of Southern Scandinavia after the Last Ice Age began some time around 12,700 calendar years BC and is associated with the Hamburgian techno-complex. These groups were reindeer hunters whose hunting weapons were tipped with the eponymous shouldered points (pointes á...... cran). Numerous studies have addressed the question of whether these points tipped arrows fired from bows, darts launched with the help of spear-throwers, or some other projectile delivery weapon. This paper approaches the question of Hamburgian weapon delivery technology from a quantitative...... comparative angle. Lithic metric data as well as information on presumed Hamburgian projectile shafts are used to demonstrate that the bow-and-arrow was the most likely weapon delivery method. This is reflected in the shape similarity with both later prehistoric arrow-points and shafts of the Ahrensburgian...

  5. The use of neutron scattering in nuclear weapons research

    Energy Technology Data Exchange (ETDEWEB)

    Juzaitis, R.J. [Los Alamos National Lab., NM (United States)


    We had a weapons science breakout session last week. Although it would have been better to hold it closer in time to this workshop, I think that it was very valuable. it may have been less of a {open_quotes}short-sleeve{close_quotes} workshop environment than we would have liked, but as the first time two communities-the weapons community and the neutron scattering community- got together, it was a wonderful opportunity to transfer information during the 24 presentations that were made. This report contains discussions on the fundamental analysis of documentation of the enduring stockpile; LANSCE`s contribution to weapons; spallation is critical to understanding; weapons safety assessments; applied nuclear physics requires cross section information; fission models need refinement; and establishing teams on collaborative projects.

  6. Perfection and the Bomb: Nuclear Weapons, Teleology, and Motives. (United States)

    Brummett, Barry


    Uses Kenneth Burke's theory of perfection to explore the vocabularies of nuclear weapons in United States public discourse and how "the Bomb" as a God term has gained imbalanced ascendancy in centers of power. (MS)

  7. Cargo/Weapons Elevator Land Based Engineering Site (United States)

    Federal Laboratory Consortium — The Cargo and Weapons Facility consists of a suite of full scale and component test facilities contiguously located in building 77H. The site was constructed in 1987...

  8. Excess Weapons Plutonium Immobilization in Russia

    Energy Technology Data Exchange (ETDEWEB)

    Jardine, L.; Borisov, G.B.


    The joint goal of the Russian work is to establish a full-scale plutonium immobilization facility at a Russian industrial site by 2005. To achieve this requires that the necessary engineering and technical basis be developed in these Russian projects and the needed Russian approvals be obtained to conduct industrial-scale immobilization of plutonium-containing materials at a Russian industrial site by the 2005 date. This meeting and future work will provide the basis for joint decisions. Supporting R&D projects are being carried out at Russian Institutes that directly support the technical needs of Russian industrial sites to immobilize plutonium-containing materials. Special R&D on plutonium materials is also being carried out to support excess weapons disposition in Russia and the US, including nonproliferation studies of plutonium recovery from immobilization forms and accelerated radiation damage studies of the US-specified plutonium ceramic for immobilizing plutonium. This intriguing and extraordinary cooperation on certain aspects of the weapons plutonium problem is now progressing well and much work with plutonium has been completed in the past two years. Because much excellent and unique scientific and engineering technical work has now been completed in Russia in many aspects of plutonium immobilization, this meeting in St. Petersburg was both timely and necessary to summarize, review, and discuss these efforts among those who performed the actual work. The results of this meeting will help the US and Russia jointly define the future direction of the Russian plutonium immobilization program, and make it an even stronger and more integrated Russian program. The two objectives for the meeting were to: (1) Bring together the Russian organizations, experts, and managers performing the work into one place for four days to review and discuss their work with each other; and (2) Publish a meeting summary and a proceedings to compile reports of all the excellent

  9. Spatial Pattern Determination of Biodiversity Threats at Landscape Level (Case Study: Golestan Province

    Directory of Open Access Journals (Sweden)

    R. Mirzaei


    Full Text Available Mapping spatial patterns of potential biodiversity threats is one of the important steps for effective conservation planning and activities. To determine the spatial patterns of threats in Golestan province, 12 criteria in four main groups including structural (fractal coefficient of perimeter, circularity ratio of area, average slope, compositional aspects of biodiversity (presence of species at risk, non-biological threats (distance to city, distance to village, distance to road, distance to infrastructure, distance to agricultural land, soil pollution, risk of fire and isolation (Nearest Neighbor Index were used. These data layers were digitized in GIS environment and were weighted through Analytical Hierarchy Process. A weighted linear combination was then used to map the spatial pattern of biodiversity threats in the province. Compositional aspect (0.59, non-biological threats (0.23, isolation (0.11, and structural aspect (0.07 were relatively weighted in the order of importance. Central parts of the province and patches in the northern and southern parts were recognized to be more exposed to biodiversity threats. The central parts of the province were mostly threatened by urban, industrial, road and agricultural development, whereas the northern and southern parts were recognized as areas of conservation importance having a variety of threatened birds.

  10. Pakistan’s Nuclear Weapons: Proliferation and Security Issues (United States)


    on Fissile Materials site_down/gfmr07.pdf; SIPRI Yearbook 2007. The International Panel on Fissile Materials...State for Foreign and Commonwealth Affairs David Miliband told the Charlie Rose Show December 15, 2008, that Islamabad’s nuclear weapons “are under...Weapons in Pakistan,” Pakistan Security Research Unit Brief Number 22, University of Bradford, November 18, 2007. Available at

  11. Small Arms - Hand and Shoulder Weapons and Machine Guns (United States)


    performance, reliability , etc. may require additional weapons and spare barrels. d. Whenever a certain minimum number of weapons is specified in...PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) Small Arms Systems Division (TEDT-AT-FP-S) US Army Aberdeen Test Center 400 Colleran Road Aberdeen...Approved for public release; distribution is unlimited. 13. SUPPLEMENTARY NOTES Defense Technical Information Center (DTIC), AD No.: This TOP supersedes

  12. Syria’s Chemical Weapons: Issues for Congress (United States)


    regime of President Bashar al Asad possesses stocks of nerve (sarin, VX ) and blister (mustard gas) agents , possibly weaponized into bombs, shells...largest in the world” during a June 2012 interview.16 Damascus possesses mustard blister agent , sarin nerve agent , and VX nerve agent , according to...chemical weapons stockpile. Syria also has several hundred metric tons of mustard agent in ready-to-use form and several tens of metric tons of VX . The

  13. Technological Innovations to Counter CBRNE Threat Vectors and Ecotage (United States)

    Vaseashta, Ashok

    The ubiquitous presence of sensors for enhanced situational awareness necessitates an innovative, articulate, and focused review of their design, architecture, functionality, and interoperability. A comprehensive overview of the latest and state-of-the art technological innovations in point and stand-off sensing/detection platforms with the objective of countering threats arising from chemical-biological-nuclear-high yield explosives (CBRNE) is the focus of this investigation. Ongoing research efforts and future research directions based on advanced approaches, including nanomaterials to develop materials, devices, and systems for potential use in sensing and detection of such threat vectors are articulated. The concept of advanced sciences convergences is introduced to examine the feasibility of potentially new and innovative research directions for persistent surveillance of CBRNE agents and infectious diseases. The intentional release of such agents in the environment constitutes ecological sabotage. Advanced sensing/detection platforms for CBRNE are used to detect threats to the environment. Issues associated with the use of nanomaterials regarding societal implications and dual-use concerns are addressed by studying fate and transport and the development of guidelines for a risk-assessment model. A roadmap of the future of nanomaterials, in terms of complexity, a nexus of disciplines, and its emerging potential to provide advanced, futuristic, and a paradigm-shifting platform is presented.

  14. Towards securing SCADA systems against process-related threats

    NARCIS (Netherlands)

    Hadziosmanovic, Dina; Bolzoni, Damiano; Hartel, Pieter


    We propose a tool-assisted approach to address process-related threats on SCADA systems. Process-related threats have not been addressed before in a systematic manner. Our approach consists of two steps: threat analysis and threat mitigation. For the threat analysis, we combine two methodologies (PH

  15. Forecasting Lightning Threat Using WRF Proxy Fields (United States)

    McCaul, E. W., Jr.


    Objectives: Given that high-resolution WRF forecasts can capture the character of convective outbreaks, we seek to: 1. Create WRF forecasts of LTG threat (1-24 h), based on 2 proxy fields from explicitly simulated convection: - graupel flux near -15 C (captures LTG time variability) - vertically integrated ice (captures LTG threat area). 2. Calibrate each threat to yield accurate quantitative peak flash rate densities. 3. Also evaluate threats for areal coverage, time variability. 4. Blend threats to optimize results. 5. Examine sensitivity to model mesh, microphysics. Methods: 1. Use high-resolution 2-km WRF simulations to prognose convection for a diverse series of selected case studies. 2. Evaluate graupel fluxes; vertically integrated ice (VII). 3. Calibrate WRF LTG proxies using peak total LTG flash rate densities from NALMA; relationships look linear, with regression line passing through origin. 4. Truncate low threat values to make threat areal coverage match NALMA flash extent density obs. 5. Blend proxies to achieve optimal performance 6. Study CAPS 4-km ensembles to evaluate sensitivities.

  16. External threat and the definition of deviance. (United States)

    Laudedale, P; Smith-Cunnien, P; Parker, J; Inverarity, J


    Research ( Lauderdale , 1976; Schachter , 1951) suggests that an external threat to a group can lead to the rejection of deviant members of the group and alteration of group communication patterns and solidarity. This study sought to extend those findings, integrate them with concepts from Simmel 's (1917/1955) work on group conflict, and link them to key issues in the societal reaction approach to deviant behavior. We examined the effect of variation in level of threat, the relationship between deviant status and nonconformity to the central task norm, the role of high-status actors in deviance designation, the relationship between rejection and negative definition of the deviant, and the effects of rejection and negative definition on group solidarity. Hypotheses were tested in an experimental design involving three conditions (strong threat, weak threat, and no threat). The results suggest that (a) the level of threat is directly related to the extent of rejection and negative definition, (b) nonconformity to the central task norm is not systematically related to deviant status, (c) high-status actors are more involved in the rejection of the deviant, (d) sociometric rejection of the deviant is accompanied by negative definition in the strong-threat condition, and (e) the level of group solidarity is related to the extent of rejection and negative definition. Implications of these findings are discussed relative to the societal reaction approach to deviant behavior and analogous processes in other social groups.

  17. Pulicat Lake: A Fragile Ecosystem Under Threat

    Directory of Open Access Journals (Sweden)

    Saraswathy R.


    Full Text Available The Pulicat Lake is the second largest brackish water lake after Chilika Lake in India. The average area of the water spread is 461 sq km. During the monsoon Pulicat Lake receives freshwater through three major rivers, namely, the Swarnamukhi, the Kalangi and the Arani. The Pulicat lagoon system, which is a storehouse of rich biological resources, is under great threat because of the anthropogenic influences. The Pulicat Lake ecosystem is degraded by siltation, bar mouth dynamics, shell mining and processing and population pressure due to the resettlement of villagers from Sriharikota Island. It has been determined that the extent of the lake, including its water spread area, is decreasing. Therefore, it is essential to assess the land use / land cover changes taking place in and around Pulicat Lake using remote sensing and GIS. Studies on its sediment characteristics are also vital. The grain size content reveals that most of the sediments contain clay and silt in enormous amounts. This lake has been the prime source of a livelihood through fishing for a large section of the population living in the surrounding villages. It is the most important refuge for water birds in south India. The fishing community who lives in and around Pulicat Lake follows the Padu system for fishing in the lake. In this study, apart from studies on configuration changes and sediment analysis, a study of the flora and fauna of the lake and the socio-economic conditions of the local community were also carried out. Finally, mitigation measures for the sustainable protection of the lake’s ecosystem were identified.

  18. Pulicat Lake: A Fragile Ecosystem Under Threat (United States)

    Saraswathy, R.; Pandian, Pitchai Kasinatha


    The Pulicat Lake is the second largest brackish water lake after Chilika Lake in India. The average area of the water spread is 461 sq km. During the monsoon Pulicat Lake receives freshwater through three major rivers, namely, the Swarnamukhi, the Kalangi and the Arani. The Pulicat lagoon system, which is a storehouse of rich biological resources, is under great threat because of the anthropogenic influences. The Pulicat Lake ecosystem is degraded by siltation, bar mouth dynamics, shell mining and processing and population pressure due to the resettlement of villagers from Sriharikota Island. It has been determined that the extent of the lake, including its water spread area, is decreasing. Therefore, it is essential to assess the land use / land cover changes taking place in and around Pulicat Lake using remote sensing and GIS. Studies on its sediment characteristics are also vital. The grain size content reveals that most of the sediments contain clay and silt in enormous amounts. This lake has been the prime source of a livelihood through fishing for a large section of the population living in the surrounding villages. It is the most important refuge for water birds in south India. The fishing community who lives in and around Pulicat Lake follows the Padu system for fishing in the lake. In this study, apart from studies on configuration changes and sediment analysis, a study of the flora and fauna of the lake and the socio-economic conditions of the local community were also carried out. Finally, mitigation measures for the sustainable protection of the lake's ecosystem were identified.

  19. Cross-sectional associations between violent video and computer game playing and weapon carrying in a national cohort of children. (United States)

    Ybarra, Michele L; Huesmann, L Rowell; Korchmaros, Josephine D; Reisner, Sari L


    Data were collected from 9 to 18 year olds surveyed nationally in a three-wave longitudinal survey. The population-average (generalized estimating equation, GEE) odds of carrying a weapon to school in the last month were estimated as a function of past-year exposure to violent content in video, computer, and Internet games, as well as peer aggression and biological sex. The sample included youth who were at risk for both the exposure (i.e., game play) and the outcome (i.e., who attended public or private school). 3,397 observations from 1,489 youth were included in analyses. 1.4% of youth reported carrying a weapon to school in the last month and 69% reported that at least some of the games they played depicted violence. After adjusting for other potentially influential characteristics (e.g., aggressive behavior), playing at least some violent games in the past year was associated with a fourfold increase in odds of also reporting carrying a weapon to school in the last month. Although youth who reported frequent and intense peer victimization in the past year were more likely to report carrying a weapon to school in the last month, this relation was explained by other influential characteristics. Consistent with the predictions of social-cognitive, observational learning theory, this study supports the hypothesis that carrying weapons to school is associated with violent game play. As one of the first studies of its kind, findings should be interpreted cautiously and need to be replicated.

  20. Long Wave Infrared Detection of Chemical Weapons Simulants

    Energy Technology Data Exchange (ETDEWEB)

    Phillips, Mark C.; Taubman, Matthew S.; Scott, David C.; Myers, Tanya L.; Munley, John T.; Cannon, Bret D.


    The purpose of Task 3.b under PL02-OP211I-PD07 (CBW simulant detection) was to demonstrate the applicability of the sensor work developed under this project for chemical and biological weapons detection. To this end, the specific goal was to demonstrate the feasibility of detection of chemical agents via that of simulants (Freons) with similar spectroscopic features. This has been achieved using Freon-125 as a simulant, a tunable external cavity quantum cascade laser (ECQCL), and a Herriott cell-based sensor developed at Pacific Northwest National Laboratory (PNNL) specifically for this task. The experimentally obtained spectrum of this simulant matches that found in the Northwest Infrared (NWIR) spectral library extremely well, demonstrating the ability of this technique to detect the exact shape of this feature, which in turn indicates the ability to recognize the simulant even in the presence of significant interference. It has also been demonstrated that the detected features of a typical interferent, namely water, are so different in shape and width to the simulant, that they are easily recognized and separated from such a measurement. Judging from the signal-to-noise ratio (SNR) of the experimental data obtained, the noise equivalent absorption sensitivity is estimated to be 0.5 x 10-7 to 1 x 10-6 cm-1. For the particular feature of the simulant examined in this work, this corresponds to a relative concentration of 50 to 25 parts-per-billion by volume (ppbv). The corresponding relative concentrations of other chemical targets would differ depending on the particular transition strengths, and would thus have to be scaled accordingly.

  1. The tale of the shrinking weapon: seasonal changes in nutrition affect weapon size and sexual dimorphism, but not contemporary evolution. (United States)

    Miller, C W; McDonald, G C; Moore, A J


    Sexually selected traits are often highly variable in size within populations due to their close link with the physical condition of individuals. Nutrition has a large impact on physical condition, and thus, any seasonal changes in nutritional quality are predicted to alter the average size of sexually selected traits as well as the degree of sexual dimorphism in populations. However, although traits affected by mate choice are well studied, we have a surprising lack of knowledge of how natural variation in nutrition affects the expression of sexually selected weapons and sexual dimorphism. Further, few studies explicitly test for differences in the heritability and mean-scaled evolvability of sexually selected traits across conditions. We studied Narnia femorata (Hemiptera: Coreidae), an insect where males use their hind legs as weapons and the femurs are enlarged, to understand the extent to which weapon expression, sexual dimorphism and evolvability change across the actual range of nutrition available in the wild. We found that insects raised on a poor diet (cactus without fruit) are nearly monomorphic, whereas those raised on a high-quality diet (cactus with ripe fruit) are distinctly sexually dimorphic via the expression of large hind leg weapons in males. Contrary to our expectations, we found little evidence of a potential for evolutionary change for any trait measured. Thus, although we show weapons are highly condition dependent, and changes in weapon expression and dimorphism could alter evolutionary dynamics, our populations are unlikely to experience further evolutionary changes under current conditions.

  2. Is There Future Utility in Nuclear Weapons Nuclear Weapons Save Lives (United States)


    February 2014 DISTRIBUTION A. Approved for public release: distribution unlimited DISCLAIMER The views expressed in this academic research...the capability of other states and the potential threat, not in perceived intent. Intent can change. It would equate to military malpractice to

  3. International trade drives biodiversity threats in developing nations. (United States)

    Lenzen, M; Moran, D; Kanemoto, K; Foran, B; Lobefaro, L; Geschke, A


    Human activities are causing Earth's sixth major extinction event-an accelerating decline of the world's stocks of biological diversity at rates 100 to 1,000 times pre-human levels. Historically, low-impact intrusion into species habitats arose from local demands for food, fuel and living space. However, in today's increasingly globalized economy, international trade chains accelerate habitat degradation far removed from the place of consumption. Although adverse effects of economic prosperity and economic inequality have been confirmed, the importance of international trade as a driver of threats to species is poorly understood. Here we show that a significant number of species are threatened as a result of international trade along complex routes, and that, in particular, consumers in developed countries cause threats to species through their demand of commodities that are ultimately produced in developing countries. We linked 25,000 Animalia species threat records from the International Union for Conservation of Nature Red List to more than 15,000 commodities produced in 187 countries and evaluated more than 5 billion supply chains in terms of their biodiversity impacts. Excluding invasive species, we found that 30% of global species threats are due to international trade. In many developed countries, the consumption of imported coffee, tea, sugar, textiles, fish and other manufactured items causes a biodiversity footprint that is larger abroad than at home. Our results emphasize the importance of examining biodiversity loss as a global systemic phenomenon, instead of looking at the degrading or polluting producers in isolation. We anticipate that our findings will facilitate better regulation, sustainable supply-chain certification and consumer product labelling.

  4. Emerging oomycete threats to plants and animals. (United States)

    Derevnina, Lida; Petre, Benjamin; Kellner, Ronny; Dagdas, Yasin F; Sarowar, Mohammad Nasif; Giannakopoulou, Artemis; De la Concepcion, Juan Carlos; Chaparro-Garcia, Angela; Pennington, Helen G; van West, Pieter; Kamoun, Sophien


    Oomycetes, or water moulds, are fungal-like organisms phylogenetically related to algae. They cause devastating diseases in both plants and animals. Here, we describe seven oomycete species that are emerging or re-emerging threats to agriculture, horticulture, aquaculture and natural ecosystems. They include the plant pathogens Phytophthora infestans, Phytophthora palmivora, Phytophthora ramorum, Plasmopara obducens, and the animal pathogens Aphanomyces invadans, Saprolegnia parasitica and Halioticida noduliformans For each species, we describe its pathology, importance and impact, discuss why it is an emerging threat and briefly review current research activities.This article is part of the themed issue 'Tackling emerging fungal threats to animal health, food security and ecosystem resilience'.


    Energy Technology Data Exchange (ETDEWEB)

    J. F. PILAT


    Bioterrorism--along with biowarfare, from which it may not always be distinguishable in practice--will be a feature of the strategic landscape in the 21st century and is high on the US national security agenda. Bioterrorism poses a potential threat to the US population, agriculture, interests, friends and allies, and military forces (asymmetric threats). Yet these possibilities have not been widely pursued or realized by terrorists. The perceived threat is far worse than anything experienced to date, and is largely technologically driven.

  6. Identity threat and stigma in cancer patients

    Directory of Open Access Journals (Sweden)

    Sarah Knapp


    Full Text Available Cancer stigma has undergone an important transformation in recent decades. In general, this disease no longer fits squarely into Goffman’s classic taxonomy of stigmatized conditions. This review will demonstrate that, with important adaptations, an identity-threat model of stigma can be used to organize cancer stigma research post-Goffman. This adapted model postulates that one’s personal attributions, responses to situational threat, and disease/treatment characteristics can be used to predict identity threat and well-being of individuals with cancer. Implications for further research and clinical practice are discussed.

  7. Pyro-Terrorism -- The Threat of Arson Induced Forest Fires as a Future Terrorist Weapon of Mass Destruction (United States)


    During World War II, There was concern that further [Japanese] attacks could bring disastrous loss of life and destruction of property. There was...Goebel, Greg, The Fire Balloons. V 1.0.2. 01 Jun 04 available at . 29 Goleta Montessori School website on Goleta

  8. USAF Weapons Of Mass Destruction (WMD) Threat Planning And Response Handbook - Air Force Handbook 10-2502 (United States)


    Yes V IR U S Lassa fever Aerosol Low to moder- ate 10-14 days Unknown No No Yes Omsk hemor- rhagic fever Sabotage (water) aerosol Negligi...S) 12. DISTRIBUTION/AVAILABILITY STATEMENT Approved for public release, distribution unlimited 13. SUPPLEMENTARY NOTES The original document...Develop- ment Yes Yes Tularemia Aerosol No 2-10 days Moderate if untreated Yes (IND*) Yes Yes B A C T E R IA Typhoid fever Sabotage food/water

  9. Study on Interference Effect of Warship Close-in Defense Dazzling Weapon%舰载近区防卫眩目武器干扰效果研究

    Institute of Scientific and Technical Information of China (English)

    佘博; 李进军; 汪德虎


    眩目武器是水面舰艇防卫近区非对称威胁目标的新型武器,其作战效果分析和作战运用研究是新的课题。分析眩目武器的作用机理,建立了眩目武器干扰效果分析模型,并在仿真计算结果分析的基础上提出了眩目武器运用的一般原则和方法,可以为相关的指挥决策提供一定的借鉴和指导。%Dazzling weapon is a new weapon for Surface ships to defense the targets of asymmetric threats,operational effectiveness analysis and operational application of Dazzling weapon are also the new subject.Due to this purpose,analyzing mechanism of dazzling weapon,and the models of interference effect are also established.Based on the simulation results,putting forward the general principles and methods of using the dazzling weapon,which can provide some reference and guidance for the associated command and decision-making.

  10. Why are U.S. nuclear weapon modernization efforts controversial? (United States)

    Acton, James


    U.S. nuclear weapon modernization programs are focused on extending the lives of existing warheads and developing new delivery vehicles to replace ageing bombers, intercontinental ballistic missiles, and ballistic missile submarines. These efforts are contested and controversial. Some critics argue that they are largely unnecessary, financially wasteful and potentially destabilizing. Other critics posit that they do not go far enough and that nuclear weapons with new military capabilities are required. At its core, this debate centers on three strategic questions. First, what roles should nuclear weapons be assigned? Second, what military capabilities do nuclear weapons need to fulfill these roles? Third, how severe are the unintended escalation risks associated with particular systems? Proponents of scaled-down modernization efforts generally argue for reducing the role of nuclear weapons but also that, even under existing policy, new military capabilities are not required. They also tend to stress the escalation risks of new--and even some existing--capabilities. Proponents of enhanced modernization efforts tend to advocate for a more expansive role for nuclear weapons in national security strategy. They also often argue that nuclear deterrence would be enhanced by lower yield weapons and/or so called bunker busters able to destroy more deeply buried targets. The debate is further fueled by technical disagreements over many aspects of ongoing and proposed modernization efforts. Some of these disagreements--such as the need for warhead life extension programs and their necessary scope--are essentially impossible to resolve at the unclassified level. By contrast, unclassified analysis can help elucidate--though not answer--other questions, such as the potential value of bunker busters.

  11. A short history of biological warfare. (United States)

    Metcalfe, Neil


    Biological weapons have been used in war from the start of recorded history. This article reviews the history of the subject, including the outbreak of the Black Death and the use of smallpox against American Indians. The new science of microbiology was misused from soon after its start and, despite the 1925 Geneva Protocol, the Japanese experimented extensively on prisoners in China. The Allies carried out extensive research during the Second World War, notably the United Kingdom into anthrax on Gruinard Island and the United States into a variety of agents. Despite the 1972 Biological Weapons Convention (BWC), a major programme continued in the former Soviet Union (leading to an accidental outbreak of anthrax). Most recently Iraq was revealed as having an extensive programme, with weaponization of large amounts of various agents, and several terrorists groups have attempted to use biological agents as weapons. Modern developments in biotechnology could lead to even more serious developments, and effective preventive measures, including strengthening of the BWC, are imperative.

  12. Cyber threats in social networking websites

    CERN Document Server

    Gharibi, Wajeb


    A social network is a social structure made up of individuals or organizations called nodes, which are connected by one or more specific types of interdependency, such as friendship, common interest, and exchange of finance, relationships of beliefs, knowledge or prestige. A cyber threat can be both unintentional and intentional, targeted or non targeted, and it can come from a variety of sources, including foreign nations engaged in espionage and information warfare, criminals, hackers, virus writers, disgruntled employees and contractors working within an organization. Social networking sites are not only to communicate or interact with other people globally, but also one effective way for business promotion. In this paper, we investigate and study the cyber threats in social networking websites. We go through the amassing history of online social websites, classify their types and also discuss the cyber threats, suggest the anti-threats strategies and visualize the future trends of such hoppy popular websi...

  13. Advanced Insider Threat Mitigation Workshop Instructional Materials

    Energy Technology Data Exchange (ETDEWEB)

    Gibbs, Philip [Brookhaven National Lab. (BNL), Upton, NY (United States); Larsen, Robert [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); O' Brien, Mike [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Edmunds, Tom [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)


    Insiders represent a formidable threat to nuclear facilities. This set of workshop materials covers methodologies to analyze and approaches to mitigate the threat of an insider attempting abrupt and protracted theft of nuclear materials. This particular set of materials is an update of a January 2008 version to add increased emphasis on Material Control and Accounting and its role with respect to protracted insider nuclear material theft scenarios. This report is a compilation of workshop materials consisting of lectures on technical and administrative measures used in Physical Protection (PP) and Material Control and Accounting (MC&A) and methods for analyzing their effectiveness against a postulated insider threat. The postulated threat includes both abrupt and protracted theft scenarios. Presentation is envisioned to be through classroom instruction and discussion. Several practical and group exercises are included for demonstration and application of the analysis approach contained in the lecture/discussion sessions as applied to a hypothetical nuclear facility.

  14. Need threat can motivate performance after ostracism. (United States)

    Jamieson, Jeremy P; Harkins, Stephen G; Williams, Kipling D


    Ostracism threatens fundamental needs of belonging, self-esteem, control, and meaningful existence, which should motivate participants to respond to this threat. However, research has yet to examine the role of need threat in producing motivation after ostracism. In the current work, participants completed a "cognitive ability" (antisaccade) task following Cyberball-induced ostracism or inclusion. In two experiments, it was found that when ostracized, participants do not see antisaccade performance as a means of responding to the concerns produced by need threat; they respond only to the social threat, leading to worse performance than included participants (Experiments 1 and 2). However, when participants see an avenue of response (the Cyberball players can compare antisaccade performances), ostracized participants outperform included participants (Experiment 2). Moreover, this effect was mediated by the need for belonging, suggesting that ostracized participants were motivated to elevate their inclusionary status by demonstrating their worth on the cognitive ability task.

  15. Cyber Threats In Social Networking Websites

    Directory of Open Access Journals (Sweden)

    Wajeb Ghari


    Full Text Available A social network is a social structure made up of individuals or organizations called nodes, which areconnected by one or more specific types of interdependency, such as friendship, common interest, and exchange of finance, relationships of beliefs, knowledge or prestige. A cyber threat can be both unintentional and intentional, targeted or non targeted, and it can come from a variety of sources, including foreign nations engaged in espionage and information warfare, criminals, hackers, virus writers, disgruntled employees and contractors working within an organization. Social networking sitesare not only to communicate or interact with other people globally, but also one effective way for business promotion. In this paper, we investigate and study the cyber threats in social networking websites. We go through the amassing history of online social websites, classify their types and also discuss the cyber threats, suggest the anti-threats strategies and visualize the future trends of such hoppy popular websites.

  16. Advanced insider threat mitigation workshop instructional materials

    Energy Technology Data Exchange (ETDEWEB)

    Gibbs, Philip [Brookhaven National Lab. (BNL), Upton, NY (United States); Larsen, Robert [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); O Brien, Mike [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Edmunds, Tom [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)


    Insiders represent a formidable threat to nuclear facilities. This set of workshop materials covers methodologies to analyze and approaches to mitigate the threat of an insider attempting abrupt and protracted theft of nuclear materials. This particular set of materials is a n update of a January 2008 version to add increased emphasis on Material Control and Accounting and its role with respect to protracted insider nuclear material theft scenarios.

  17. Vulnerability of populations and the urban health care systems to nuclear weapon attack – examples from four American cities

    Directory of Open Access Journals (Sweden)

    Dallas Cham E


    Full Text Available Abstract Background The threat posed by the use of weapons of mass destruction (WMD within the United States has grown significantly in recent years, focusing attention on the medical and public health disaster capabilities of the nation in a large scale crisis. While the hundreds of thousands or millions of casualties resulting from a nuclear weapon would, in and of itself, overwhelm our current medical response capabilities, the response dilemma is further exacerbated in that these resources themselves would be significantly at risk. There are many limitations on the resources needed for mass casualty management, such as access to sufficient hospital beds including specialized beds for burn victims, respiration and supportive therapy, pharmaceutical intervention, and mass decontamination. Results The effects of 20 kiloton and 550 kiloton nuclear detonations on high priority target cities are presented for New York City, Chicago, Washington D.C. and Atlanta. Thermal, blast and radiation effects are described, and affected populations are calculated using 2000 block level census data. Weapons of 100 Kts and up are primarily incendiary or radiation weapons, able to cause burns and start fires at distances greater than they can significantly damage buildings, and to poison populations through radiation injuries well downwind in the case of surface detonations. With weapons below 100 Kts, blast effects tend to be stronger than primary thermal effects from surface bursts. From the point of view of medical casualty treatment and administrative response, there is an ominous pattern where these fatalities and casualties geographically fall in relation to the location of hospital and administrative facilities. It is demonstrated that a staggering number of the main hospitals, trauma centers, and other medical assets are likely to be in the fatality plume, rendering them essentially inoperable in a crisis. Conclusion Among the consequences of this

  18. Vulnerability of populations and the urban health care systems to nuclear weapon attack – examples from four American cities (United States)

    Bell, William C; Dallas, Cham E


    Background The threat posed by the use of weapons of mass destruction (WMD) within the United States has grown significantly in recent years, focusing attention on the medical and public health disaster capabilities of the nation in a large scale crisis. While the hundreds of thousands or millions of casualties resulting from a nuclear weapon would, in and of itself, overwhelm our current medical response capabilities, the response dilemma is further exacerbated in that these resources themselves would be significantly at risk. There are many limitations on the resources needed for mass casualty management, such as access to sufficient hospital beds including specialized beds for burn victims, respiration and supportive therapy, pharmaceutical intervention, and mass decontamination. Results The effects of 20 kiloton and 550 kiloton nuclear detonations on high priority target cities are presented for New York City, Chicago, Washington D.C. and Atlanta. Thermal, blast and radiation effects are described, and affected populations are calculated using 2000 block level census data. Weapons of 100 Kts and up are primarily incendiary or radiation weapons, able to cause burns and start fires at distances greater than they can significantly damage buildings, and to poison populations through radiation injuries well downwind in the case of surface detonations. With weapons below 100 Kts, blast effects tend to be stronger than primary thermal effects from surface bursts. From the point of view of medical casualty treatment and administrative response, there is an ominous pattern where these fatalities and casualties geographically fall in relation to the location of hospital and administrative facilities. It is demonstrated that a staggering number of the main hospitals, trauma centers, and other medical assets are likely to be in the fatality plume, rendering them essentially inoperable in a crisis. Conclusion Among the consequences of this outcome would be the probable loss

  19. The nuclear threat: a new start (United States)

    Drell, Sidney


    President Obama has said that he intends to "make the goal of eliminating all nuclear weapons a central element in [US] nuclear policy". He faces enormous challenges in converting this aspiration into a practical reality, both at home and abroad. One reason is that the world has become accustomed to thinking of nuclear weapons the way Winston Churchill described them in 1955: "It may be that we shall by a process of sublime irony have reached a stage in this story where safety will be the sturdy child of terror, and survival the twin brother of annihilation." Over half a century later, the world has changed and the "sublime irony" is that terror and annihilation still loom over humanity, while safety and survival are still in doubt.

  20. The concept of ego threat in social and personality psychology: is ego threat a viable scientific construct? (United States)

    Leary, Mark R; Terry, Meredith L; Batts Allen, Ashley; Tate, Eleanor B


    Although widely invoked as an explanation for psychological phenomena, ego threat has been conceptualized and induced in a variety of ways. Most contemporary research conceptualizes ego threat as a threat to a person's self-image or self-esteem, but experimental operationalizations of ego threat usually confound threats to self-esteem with threats to public image or decreased control over negative events, leading to an inability to distinguish the effects of threats to people's personal egos from threats to public image or threats to feelings of control. This article reviews research on ego threat, discusses experimental manipulations that confound ego threat with other processes, and makes recommendations regarding the use of ego threat as a construct in personality and social psychology.

  1. Assessment of the Emerging Biocruise Threat (United States)


    generation complexes, weapons of mass destruction (WMD) facilities, and oil production and refining factories.2 Although there is some disagreement...gangrene, aflatoxin , trichothecene mycotoxins, wheat cover smut, ricin, hemorrhagic conjunctivitis virus, rotavirus, camel pox Israel Researching...conventional forces would not be able to prevent U.S. actions in the region. Thus, Iranian leaders view WMD and their means of delivery as an essential component

  2. Challenges in the application of modular open system architecture to weapons (United States)

    Shaver, Jonathan; Rose, Leo; Young, Quinn; Christensen, Jacob


    The overarching objective for Flexible Weapons is to replace current inventory weapons that will not fully utilize the increased capabilities of 6th generation platforms, with a single weapons kit made up of flexible, open architecture components. Flexible Weapon will develop a common architecture to enable modular subsystems to achieve flexible weapons capability while allowing technology refresh at the pace of technology discovery in an affordable and sustainable design. The various combinations of weapons to address multiple missions must be 100% compatible with 6th generation delivery platforms (fighters, bombers, RPAs) and backwards compatible with 4th and 5th generation platforms.

  3. Biophysics and medical effects of enhanced radiation weapons. (United States)

    Reeves, Glen I


    Enhanced radiation weapons (ERW) are fission-fusion devices where the massive numbers of neutrons generated during the fusion process are intentionally allowed to escape rather than be confined to increase yield (and fallout products). As a result, the energy partition of the weapon output shifts from blast and thermal energies toward prompt radiation. The neutron/gamma output ratio is also increased. Neutrons emitted from ERW are of higher energy than the Eave of neutrons from fission weapons. These factors affect the patterns of injury distribution; delay wound healing in combined injuries; reduce the therapeutic efficacy of medical countermeasures; and increase the dose to radiation-only casualties, thus potentiating the likelihood of encountering radiation-induced incapacitation. The risk of radiation-induced carcinogenesis is also increased. Radiation exposure to first responders from activation products is increased over that expected from a fission weapon of similar yield. However, the zone of dangerous fallout is significantly reduced in area. At least four nations have developed the potential to produce such weapons. Although the probability of detonation of an ERW in the near future is very small, it is nonzero, and clinicians and medical planners should be aware of the medical effects of ERW.


    Directory of Open Access Journals (Sweden)

    Lyatsa A. KODZOKOVA


    Full Text Available Any offense in the area of arms trafficking is the increased danger. On the one hand, the guilty person through weapons reinforces the illegality or even facilitates the commission of their illegal actions, on the other hand, these activities cause significant harm to individuals and society. Offences related to illicit trafficking in arms (activity without the necessary licenses and permits, for the most part involve criminal responsibility (Article 222 -..225 of the Criminal Code, etc., but some violations in this area is not covered by criminlaw. In these cases, the violators shall apply administrative sanctions (for example, when sending weapons, the illicit manufacture of pneumatic weapons, etc.. Specificity of weapons is that it is endowed with certain peculiar features of quality, depending on which branch of law regulates its turnover. Currently, the legal regime of weapons is regulated by several branches of law (civil, administrative, military, criminal, etc., Each of which considers it based on the specifics of its subject and method, and has its own legal framework, regulating the circulation of arms.

  5. Toxicology of organophosphorus compounds in view of an increasing terrorist threat. (United States)

    Worek, Franz; Wille, Timo; Koller, Marianne; Thiermann, Horst


    The implementation of the Chemical Weapon Convention (CWC), prohibiting the development, production, storage and use of chemical weapons by 192 nations and the ban of highly toxic OP pesticides, especially class I pesticides according to the WHO classification, by many countries constitutes a great success of the international community. However, the increased interest of terrorist groups in toxic chemicals and chemical warfare agents presents new challenges to our societies. Almost seven decades of research on organophosphorus compound (OP) toxicology was mainly focused on a small number of OP nerve agents despite the fact that a huge number of OP analogues, many of these agents having comparable toxicity to classical nerve agents, were synthesized and published. Only limited physicochemical, toxicological and medical information on nerve agent analogues is available in the open literature. This implies potential gaps of our capabilities to detect, to decontaminate and to treat patients if nerve agent analogues are disseminated and may result in inadequate effectiveness of newly developed countermeasures. In summary, our societies may face new, up to now disregarded, threats by toxic OP which calls for increased awareness and appropriate preparedness of military and civilian CBRN defense, a broader approach for new physical and medical countermeasures and an integrated system of effective detection, decontamination, physical protection and treatment.

  6. Managing nuclear weapons in a changing world: Proceedings

    Energy Technology Data Exchange (ETDEWEB)


    The Center for Security and Technology Studies was established at the Lawrence Livermore National Laboratory to support long-range technical studies on issues of importance to US national security. An important goal of the Center is to bring together Laboratory staff and the broader outside community through a program of technical studies, visitors, symposia, seminars, workshops, and publications. With this in mind, the Center and LLNL`s Defense Systems Program sponsored a conference on Managing Nuclear Weapons in a Changing World held on November 17--18,1992. The first day of the meeting focused on nuclear weapons issues in the major geographical areas of the world. On the second day, the conference participants discussed what could be done to manage, control, and account for nuclear weapons in this changing world. Each of the talks and the concluding panel discussion are being indexed as separate documents.

  7. Reality theory: A means to control the public`s fear of chemical weapons use. Research report

    Energy Technology Data Exchange (ETDEWEB)

    Pate, B.E.


    On 20 March 1995 terrorists released the chemical nerve agent sarin into the Tokyo subway system, killing 10 commuters and changing the public`s attitude about the most basic aspect of their lives: the air they breathe and the daily ritual of their commute to work. This is the new threat the United States must face: terrorism and its attack on the will of the people forcing governments to yield to the terrorists` position. Yet there is a different public response in warfare compared with a peacetime terrorist attack. This paper examines the psychological response of people in wartime and applies this description to chemical weapons use in war and in peace. The public`s response can be predicted if one uses reality theory, a concept leaders can use to mitigate responses that would prevent the execution of national strategy.

  8. Stress appraisals and cellular aging: a key role for anticipatory threat in the relationship between psychological stress and telomere length. (United States)

    O'Donovan, Aoife; Tomiyama, A Janet; Lin, Jue; Puterman, Eli; Adler, Nancy E; Kemeny, Margaret; Wolkowitz, Owen M; Blackburn, Elizabeth H; Epel, Elissa S


    Chronic psychological stress is a risk factor for multiple diseases of aging. Accelerated cellular aging as indexed by short telomere length has emerged as a potential common biological mechanism linking various forms of psychological stress and diseases of aging. Stress appraisals determine the degree and type of biological stress responses and altered stress appraisals may be a common psychological mechanism linking psychological stress and diseases of aging. However, no previous studies have examined the relationship between stress appraisals and telomere length. We exposed chronically stressed female caregivers and non-caregiving controls (N=50; M age=62.14±6.10) to a standardized acute laboratory stressor and measured their anticipatory and retrospective threat and challenge appraisals of the stressor. We hypothesized that threat and challenge appraisals would be associated with shorter and longer telomere length respectively, and that chronic caregiving stress would influence telomere length through altered stress appraisals. Higher anticipatory threat appraisals were associated with shorter age-adjusted telomere length (β=-.32, p=.03), but challenge appraisals and retrospective threat appraisals showed no independent association with telomere length. Caregivers reported significantly higher anticipatory (β=-.36, p=.006) and retrospective (β=-.29, p=.03) threat appraisals than controls, but similar challenge appraisals. Although there was no significant main effect of caregiver status on telomere length, caregiving had a significant indirect effect on telomere length through anticipatory threat appraisals. Exaggerated anticipatory threat appraisals may be a common and modifiable psychological mechanism of psychological stress effects on cellular aging.

  9. BioSense/SR-BioSpectra demonstrations of wide area/early warning for bioaerosol threats: program description and early test and evaluation results (United States)

    Simard, Jean-Robert; Buteau, Sylvie; Lahaie, Pierre; Mathieu, Pierre; Roy, Gilles; Nadeau, Denis; McFee, John; Ho, Jim; Rowsell, Susan; Ho, Nicolas; Babin, François; Cantin, Daniel; Healey, Dave; Robinson, Jennifer; Wood, Scott; Hsu, Jack


    Threats associated with bioaerosol weapons have been around for several decades and have been mostly associated with terrorist activities or rogue nations. Up to the turn of the millennium, defence concepts against such menaces relied mainly on point or in-situ detection technologies. Over the last 10 years, significant efforts have been deployed by multiple countries to supplement the limited spatial coverage of a network of one or more point bio-detectors using lidar technology. The addition of such technology makes it possible to detect within seconds suspect aerosol clouds over area of several tens of square kilometers and track their trajectories. These additional capabilities are paramount in directing presumptive ID missions, mapping hazardous areas, establishing efficient counter-measures and supporting subsequent forensic investigations. In order to develop such capabilities, Defence Research and Development Canada (DRDC) and the Chemical, Biological, Radiological-Nuclear, and Explosives Research and Technology Initiative (CRTI) have supported two major demonstrations based on spectrally resolved Laser Induced Fluorescence (LIF) lidar: BioSense, aimed at defence military missions in wide open spaces, and SR-BioSpectra, aimed at surveillance of enclosed or semienclosed wide spaces common to defence and public security missions. This article first reviews briefly the modeling behind these demonstration concepts. Second, the lidar-adapted and the benchtop bioaerosol LIF chambers (BSL1), developed to challenge the constructed detection systems and to accelerate the population of the library of spectral LIF properties of bioaerosols and interferents of interest, will be described. Next, the most recent test and evaluation (T&E) results obtained with SR-BioSpectra and BioSense are reported. Finally, a brief discussion stating the way ahead for a complete defence suite is provided.

  10. Identification of the murder weapon by intricate patterned injury measurements. (United States)

    Zugibe, F T; Costello, J T


    Critical studies of an intricate blunt force injury pattern in a brutal homicide led to the identification of the murder weapon. A 50-year-old male was bludgeoned to death in his apartment during a robbery allegedly engineered by his daughter. Careful measurements and overlay construction of the wounds relative to the magazine catch, lanyard ring, magazine chamber, and butt of a 32-caliber Eistegui Hermanos fibar (España) automatic pistol led to the conclusion that either the alleged weapon or one identical to it caused the fatal injuries.

  11. Autonomous Weapon Systems and Risk Management in Hybrid Networks

    DEFF Research Database (Denmark)

    Nørgaard, Katrine

    In recent years, the development of autonomous weapon systems and so-called ‘killer robots’, has caused a number of serious legal and ethical concerns in the international community, including questions of compliance with International Humanitarian Law and the Laws of Armed Conflict. On the other...... hand, governments and military services hope to develop game-changing technologies, that are ‘better, faster and cheaper’. In this paper, I wish to show how different and competing regimes of justification shape the technopolitical controversy and risk management of autonomous weapon systems...

  12. Defense Acquisitions: Assessments of Selected Major Weapon Programs (United States)


    Common Name: C-130 AMPC -130 Avionics Modernization Program (C-130 AMP)The Air Force’s C-130 AMP standardizes the cockpit configurations and avionics for...GAO-06-391 Assessments of Selected Major Weapon Programs Common Name: C-130 AMPC -130 AMP Program Technology Maturity All of the C-130 AMP’s six...Selected Major Weapon Programs Common Name: C-5 AMPC -5 Avionics Modernization Program (C-5 AMP)The Air Force’s C-5 AMP is the first of two major upgrades

  13. Historical Cost Growth of Completed Weapon System Programs (United States)


    Management Program of RAND Project AIR FORCE. The project’s technical monitor is Jay Jordan, Technical Director of the Air Force Cost Analysis Agency. Other...CGFs for development costs range from a low of 1.16 for the nine ship weapon systems reviewed in Asher and Mag- gelet (1984) to a high of 2.26 for procurement) for each weapon system 2.26 (n = 6) 1.43 (n = 6) Not reported Asher and Maggelet (1984) Last SAR for program or December 1983 As of

  14. Global Security Rule Sets An Analysis of the Current Global Security Environment and Rule Sets Governing Nuclear Weapons Release

    Energy Technology Data Exchange (ETDEWEB)

    Mollahan, K; Nattrass, L


    America is in a unique position in its history. In maintaining its position as the world's only superpower, the US consistently finds itself taking on the role of a global cop, chief exporter of hard and soft power, and primary impetus for globalization. A view of the current global situation shows an America that can benefit greatly from the effects of globalization and soft power. Similarly, America's power can be reduced significantly if globalization and its soft power are not handled properly. At the same time, America has slowly come to realize that its next major adversary is not a near peer competitor but terrorism and disconnected nations that seek nuclear capabilities. In dealing with this new threat, America needs to come to terms with its own nuclear arsenal and build a security rule set that will establish for the world explicitly what actions will cause the US to consider nuclear weapons release. This rule set; however, needs to be established with sensitivity to the US's international interests in globalization and soft power. The US must find a way to establish its doctrine governing nuclear weapons release without threatening other peaceful nations in the process.

  15. Biological warfare agents

    Directory of Open Access Journals (Sweden)

    Duraipandian Thavaselvam


    Full Text Available The recent bioterrorist attacks using anthrax spores have emphasized the need to detect and decontaminate critical facilities in the shortest possible time. There has been a remarkable progress in the detection, protection and decontamination of biological warfare agents as many instrumentation platforms and detection methodologies are developed and commissioned. Even then the threat of biological warfare agents and their use in bioterrorist attacks still remain a leading cause of global concern. Furthermore in the past decade there have been threats due to the emerging new diseases and also the re-emergence of old diseases and development of antimicrobial resistance and spread to new geographical regions. The preparedness against these agents need complete knowledge about the disease, better research and training facilities, diagnostic facilities and improved public health system. This review on the biological warfare agents will provide information on the biological warfare agents, their mode of transmission and spread and also the detection systems available to detect them. In addition the current information on the availability of commercially available and developing technologies against biological warfare agents has also been discussed. The risk that arise due to the use of these agents in warfare or bioterrorism related scenario can be mitigated with the availability of improved detection technologies.

  16. 48 CFR 225.7005 - Restriction on certain chemical weapons antidote. (United States)


    ... 48 Federal Acquisition Regulations System 3 2010-10-01 2010-10-01 false Restriction on certain chemical weapons antidote. 225.7005 Section 225.7005 Federal Acquisition Regulations System DEFENSE... on certain chemical weapons antidote....

  17. 49 CFR 1544.303 - Bomb or air piracy threats. (United States)


    ... 49 Transportation 9 2010-10-01 2010-10-01 false Bomb or air piracy threats. 1544.303 Section 1544... AND COMMERCIAL OPERATORS Threat and Threat Response § 1544.303 Bomb or air piracy threats. (a) Flight... upon receiving information that an act or suspected act of air piracy has been committed, the...

  18. 49 CFR 1546.301 - Bomb or air piracy threats. (United States)


    ... 49 Transportation 9 2010-10-01 2010-10-01 false Bomb or air piracy threats. 1546.301 Section 1546... Threat Response § 1546.301 Bomb or air piracy threats. No foreign air carrier may land or take off an airplane in the United States after receiving a bomb or air piracy threat against that airplane, unless...

  19. Detecting Illicit Nuclear Materials

    Energy Technology Data Exchange (ETDEWEB)

    Kouzes, Richard T.


    The threat that weapons of mass destruction might enter the United States has led to a number of efforts for the detection and interdiction of nuclear, radiological, chemical, and biological weapons at our borders. There have been multiple deployments of instrumentation to detect radiation signatures to interdict radiological material, including weapons and weapons material worldwide.

  20. Insider Threat Assessment: Model, Analysis and Tool (United States)

    Chinchani, Ramkumar; Ha, Duc; Iyer, Anusha; Ngo, Hung Q.; Upadhyaya, Shambhu

    Insider threat is typically attributed to legitimate users who maliciously leverage their system privileges, and familiarity and proximity to their computational environment to compromise valuable information or inflict damage. According to the annual CSI/FBI surveys conducted since 1996, internal attacks and insider abuse form a significant portion of reported incidents. The strongest indication yet that insider threat is very real is given by the recent study [2] jointly conducted by CERT and the US Secret Service; the first of its kind, which provides an in-depth insight into the problem in a real-world setting. However, there is no known body of work which addresses this problem effectively. There are several challenges, beginning with understanding the threat.

  1. Left-Wing Extremism: The Current Threat

    Energy Technology Data Exchange (ETDEWEB)

    Karl A. Seger


    Left-wing extremism is ''alive and well'' both in the US and internationally. Although the current domestic terrorist threat within the U. S. is focused on right-wing extremists, left-wing extremists are also active and have several objectives. Leftist extremists also pose an espionage threat to U.S. interests. While the threat to the U.S. government from leftist extremists has decreased in the past decade, it has not disappeared. There are individuals and organizations within the U.S. who maintain the same ideology that resulted in the growth of left-wing terrorism in this country in the 1970s and 1980s. Some of the leaders from that era are still communicating from Cuba with their followers in the U.S., and new leaders and groups are emerging.

  2. Epidemiology today: Mitigating threats to an ecosystem. (United States)

    Kreiger, Nancy


    Ecosystems comprise all the living and non-living things in a particular area (e.g., rain forest, desert), which interact and maintain equilibrium. Loss of equilibrium (e.g., clear-cutting trees in a rain forest) can mean the decline of the ecosystem, unless it is able to adapt to the new circumstances. The term "knowledge ecosystem" describes an approach to managing knowledge in a particular field; the components of this system include the people, the technological skills and resources, and information or data. Epidemiology can be thought of as a knowledge ecosystem and, like ecological systems, its existence can be threatened, from both internal and external forces that may alter its equilibrium. This paper describes some threats to the epidemiology knowledge ecosystem, how these threats came about, and what responses we can make that may serve to mitigate those threats.

  3. Nuclear, biological, and chemical combined injuries and countermeasures on the battlefield. (United States)

    Knudson, Gregory B; Elliott, Thomas B; Brook, Itzhak; Shoemaker, Michael O; Pastel, Ross H; Lowy, Robert J; King, Gregory L; Herzig, Thomas C; Landauer, Michael R; Wilson, Scott A; Peacock, Susan J; Bouhaouala, S Samy; Jackson, William E; Ledney, G David


    The Armed Forces Radiobiological Research Institute (AFRRI) has developed a research program to determine the major health risks from exposure to ionizing radiation in combination with biological and chemical warfare agents and to assess the extent to which exposure to ionizing radiation compromises the effectiveness of protective drugs, vaccines, and other biological and chemical warfare prophylactic and treatment strategies. AFRRI's Defense Technology Objective MD22 supports the development of treatment modalities and studies to assess the mortality rates for combined injuries from exposure to ionizing radiation and Bacillus anthracis, and research to provide data for casualty prediction models that assess the health consequences of combined exposures. In conjunction with the Defense Threat Reduction Agency, our research data are contributing to the development of casualty prediction models that estimate mortality and incapacitation in an environment of radiation exposure plus other weapons of mass destruction. Specifically, the AFFRI research program assesses the effects of ionizing radiation exposure in combination with B. anthracis, Venezuelan equine encephalomyelitis virus, Shigella sonnei, nerve agents, and mustard as well as their associated treatments and vaccines. In addition, the long-term psychological effects of radiation combined with nuclear, biological, and chemical (NBC) injuries are being evaluated. We are also assessing the effectiveness of gamma photons and high-speed neutrons and electrons for neutralizing biological and chemical warfare agents. New protocols based on our NBC bioeffects experiments will enable U.S. armed forces to accomplish military operations in NBC environments while optimizing both survival and military performance. Preserving combatants' health in an NBC environment will improve warfighting operations and mission capabilities.

  4. On weapons plutonium in the arctic environment (Thule, Greenland)

    Energy Technology Data Exchange (ETDEWEB)

    Eriksson, M


    This thesis concerns a nuclear accident that occurred in the Thule (Pituffik) area, NW Greenland in 1968, called the Thule accident.Results are based on different analytical techniques, i.e. gamma spectrometry, alpha spectrometry, ICP-MS, SEM with EDX and different sediment models, i.e. (CRS, CIC). The scope of the thesis is the study of hot particles. Studies on these have shown several interesting features, e.g. that they carry most of the activity dispersed from the accident, moreover, they have been very useful in the determination of the source term for the Thule accident debris. Paper I, is an overview of the results from the Thule-97 expedition. This paper concerns the marine environment, i.e. water, sediment and benthic animals in the Bylot Sound. The main conclusions are; that plutonium is not transported from the contaminated sediments into the surface water in this shelf sea, the debris has been efficiently buried in the sediment to great depth as a result of biological activity and transfer of plutonium to benthic biota is low. Paper II, concludes that the resuspension of accident debris on land has been limited and indications were, that americium has a faster transport mechanism from the catchment area to lakes than plutonium and radio lead. Paper III, is a method description of inventory calculation techniques in sediment with heterogeneous activity concentration, i.e. hot particles are present in the samples. It is concluded that earlier inventory estimates have been under estimated and that the new inventory is about 3.8 kg (10 TBq) of {sup 239,240}Pu. Paper IV, describes hot particle separation/identification techniques using real-time digital image systems. These techniques are much faster than conventionally used autoradiography and give the results in real time. Paper V, is a study of single isolated hot particles. The most interesting result is that the fission material in the weapons involved in the accident mostly consisted of {sup 235}U

  5. 27 CFR 478.133 - Records of transactions in semiautomatic assault weapons. (United States)


    ... semiautomatic assault weapons. 478.133 Section 478.133 Alcohol, Tobacco Products, and Firearms BUREAU OF ALCOHOL... AMMUNITION Records § 478.133 Records of transactions in semiautomatic assault weapons. The evidence specified in § 478.40(c), relating to transactions in semiautomatic assault weapons, shall be retained in...

  6. 27 CFR 478.153 - Semiautomatic assault weapons and large capacity ammunition feeding devices manufactured or... (United States)


    ... weapons and large capacity ammunition feeding devices manufactured or imported for the purposes of testing... AMMUNITION Exemptions, Seizures, and Forfeitures § 478.153 Semiautomatic assault weapons and large capacity... weapon, and § 478.40a with respect to large capacity ammunition feeding devices, shall not apply to...

  7. 33 CFR 334.930 - Anaheim Bay Harbor, Calif.; Naval Weapons Station, Seal Beach. (United States)


    ... Weapons Station, Seal Beach. 334.930 Section 334.930 Navigation and Navigable Waters CORPS OF ENGINEERS... Bay Harbor, Calif.; Naval Weapons Station, Seal Beach. (a) The restricted area. The water of Anaheim Bay Harbor between the east and west jetties at the United States Naval Weapons Station, Seal...

  8. 36 CFR 327.13 - Explosives, firearms, other weapons and fireworks. (United States)


    ... weapons and fireworks. 327.13 Section 327.13 Parks, Forests, and Public Property CORPS OF ENGINEERS... ADMINISTERED BY THE CHIEF OF ENGINEERS § 327.13 Explosives, firearms, other weapons and fireworks. (a) The... other weapons is prohibited unless: (1) In the possession of a Federal, state or local law...

  9. 76 FR 23515 - Enhanced Weapons, Firearms Background Checks, and Security Event Notifications (United States)


    ... COMMISSION 10 CFR Part 73 RIN 3150-AI49 Enhanced Weapons, Firearms Background Checks, and Security Event... material and would add new event notification requirements on the theft or loss of enhanced weapons... ``Weapons Safety Assessment'' (76 FR 6087) , the draft Regulatory Guide DG-5020, ``Applying for...

  10. 27 CFR 478.40 - Manufacture, transfer, and possession of semiautomatic assault weapons. (United States)


    ... possession of semiautomatic assault weapons. 478.40 Section 478.40 Alcohol, Tobacco Products, and Firearms..., transfer, and possession of semiautomatic assault weapons. (a) Prohibition. No person shall manufacture, transfer, or possess a semiautomatic assault weapon. (b) Exceptions. The provisions of paragraph (a)...

  11. 76 FR 6199 - Enhanced Weapons, Firearms Background Checks, and Security Event Notifications (United States)


    ... February 3, 2011 Part II Nuclear Regulatory Commission 10 CFR Part 73 Enhanced Weapons, Firearms Background...-AI49 Enhanced Weapons, Firearms Background Checks, and Security Event Notifications AGENCY: Nuclear... revisions in these implementing regulations that address the voluntary application for enhanced weapons...

  12. 15 CFR 745.2 - End-Use Certificate reporting requirements under the Chemical Weapons Convention. (United States)


    ... requirements under the Chemical Weapons Convention. 745.2 Section 745.2 Commerce and Foreign Trade Regulations... EXPORT ADMINISTRATION REGULATIONS CHEMICAL WEAPONS CONVENTION REQUIREMENTS § 745.2 End-Use Certificate reporting requirements under the Chemical Weapons Convention. Note: The End-Use Certificate requirement...

  13. 49 CFR 1540.111 - Carriage of weapons, explosives, and incendiaries by individuals. (United States)


    ... 49 Transportation 9 2010-10-01 2010-10-01 false Carriage of weapons, explosives, and incendiaries... § 1540.111 Carriage of weapons, explosives, and incendiaries by individuals. (a) On an individual's... individual may not have a weapon, explosive, or incendiary, on or about the individual's person or...

  14. 78 FR 2214 - Enhanced Weapons, Firearms Background Checks, and Security Event Notifications (United States)


    ...; ] NUCLEAR REGULATORY COMMISSION 10 CFR Part 73 RIN 3150-AI49 Enhanced Weapons, Firearms Background Checks... proposing to further revise its regulations that address the voluntary application for enhanced weapons... for preemption or enhanced weapon authority. Section 161A also mandates that all security...

  15. 41 CFR 102-74.440 - What is the policy concerning weapons on Federal property? (United States)


    ... concerning weapons on Federal property? 102-74.440 Section 102-74.440 Public Contracts and Property... PROPERTY 74-FACILITY MANAGEMENT Conduct on Federal Property Weapons § 102-74.440 What is the policy concerning weapons on Federal property? Federal law prohibits the possession of firearms or other...

  16. Radiological Weapons Control: A Soviet and US Perspective. Occasional Paper 29. (United States)

    Issraelyan, Victor L.; Flowerree, Charles C.

    Two international diplomats from the Soviet Union and the United States focus on the need for a treaty to ban the use of radiological weapons. Radiological weapons are those based on the natural decay of nuclear material such as waste from military or civilian nuclear reactors. Such devices include both weapons and equipment, other than a nuclear…

  17. Nash bargaining with a nondeterministic threat

    CERN Document Server

    Soileau, Kerry Michael


    We consider bargaining problems which involve two participants, with a nonempty closed, bounded convex bargaining set of points in the real plane representing all realizable bargains. We also assume that there is no definite threat or disagreement point which will provide the default bargain if the players cannot agree on some point in the bargaining set. However, there is a nondeterministic threat: if the players fail to agree on a bargain, one of them will be chosen at random with equal probability, and that chosen player will select any realizable bargain as the solution, subject to a reasonable restriction.

  18. American perspectives on security : energy, environment, nuclear weapons, and terrorism : 2010.

    Energy Technology Data Exchange (ETDEWEB)

    Herron, Kerry Gale (University of Oklahoma, Norman, OK); Jenkins-Smith, Hank C. (University of Oklahoma, Norman, OK); Silva, Carol L. (University of Oklahoma, Norman, OK)


    We report findings from an Internet survey and a subset of questions administered by telephone among the American public in mid-2010 on US energy and environmental security. Key areas of investigation include public perceptions shaping the context for debate about a comprehensive national energy policy, and what levels of importance are assigned to various prospective energy technologies. Additionally, we investigate how public views on global climate change are evolving, how the public assesses the risks and benefits of nuclear energy, preferences for managing used nuclear fuel, and public trust in sources of scientific and technical information. We also report findings from a national Internet survey and a subset of questions administered by telephone in mid-2010 on public views of the relevance of US nuclear weapons today, support for strategic arms control, and assessments of the potential for nuclear abolition. Additionally, we analyze evolving public views of the threat of terrorism, assessments of progress in the struggle against terrorism, and tolerance for intrusive antiterror policies. Where possible, findings from each survey are compared with previous surveys in this series for analyses of trends.

  19. Nuclear Energy, Nuclear Weapons Proliferation, and the Arms Race. (United States)

    Hollander, Jack, Ed.

    A symposium was organized to reexamine the realities of vertical proliferation between the United States and the Soviet Union and to place into perspective the horizontal proliferation of nuclear weapons throughout the world, including the possible role of commercial nuclear power in facilitating proliferation. The four invited symposium…

  20. Mitigation and propagation of sound generated by heavy weapons

    NARCIS (Netherlands)

    Berg, F. van den; Eerden, F.J.M. van der


    Much environmental research is performed on predicting the noise impact of heavy weapons or explosives, as the shock waves can propagate over large distances. In the densely populated area of the Netherlands this is of particular interest for the Ministry of Defense. In one research program the miti