WorldWideScience

Sample records for biological weapons threat

  1. The bioscience revolution & the biological weapons threat: levers & interventions

    Directory of Open Access Journals (Sweden)

    Martin Greg

    2009-02-01

    Full Text Available Abstract In December 2008, the US Commission on the Prevention of Weapons of Mass Destruction Proliferation and Terrorism, released a report, World At Risk. The Report points to the fact that, not only is the use of a weapon of mass destruction in a terrorist attack before the end of 2013, more likely than not, but also to the fact that terrorists are more likely to be able to obtain and use biological weapons than nuclear. This paper examines the recommendations of the report in the context of the historic and geopolitical changes, in particular globalization. The authors highlight the "dual-use" dilemma, as described in the report, as the paradoxical use of technology developed for the benefit of mankind being used for sinister purposes. The mitigation of such a threat lies in broad stakeholder involvement and cooperation, including non-state actors, governments and the bio-tech industry itself. The importance of vigilance measures within the life science community is emphasized and, the authors propose, could include a web-based didactic course in bioterrorism and weapons of mass destruction identification. The site could outline safety protocols, have detailed disaster management tutorials, and could be specifically tailored for different subsets of industry and health professionals. The paper concludes with an endorsement of a multi-pronged approach including strong international guidelines and intelligence cooperation and preparatory measures such as the wide-spread use of detection systems as well as diagnostic decision support systems for bioterrorism detection at the local level.

  2. The bioscience revolution & the biological weapons threat: levers & interventions

    OpenAIRE

    Martin Greg; D'Agostino Mark

    2009-01-01

    Abstract In December 2008, the US Commission on the Prevention of Weapons of Mass Destruction Proliferation and Terrorism, released a report, World At Risk. The Report points to the fact that, not only is the use of a weapon of mass destruction in a terrorist attack before the end of 2013, more likely than not, but also to the fact that terrorists are more likely to be able to obtain and use biological weapons than nuclear. This paper examines the recommendations of the report in the context ...

  3. Historical precedence and technical requirements of biological weapons use : a threat assessment.

    Energy Technology Data Exchange (ETDEWEB)

    Estes, Daniel P.; Vogel, Kathleen Margaret; Gaudioso, Jennifer Marie; Hickok, Lauren T.; Jung, Danielle F.; Barnett, Natalie Beth; Frerichs, Rebecca L.; Salerno, Reynolds Mathewson

    2004-05-01

    The threat from biological weapons is assessed through both a comparative historical analysis of the patterns of biological weapons use and an assessment of the technological hurdles to proliferation and use that must be overcome. The history of biological weapons is studied to learn how agents have been acquired and what types of states and substate actors have used agents. Substate actors have generally been more willing than states to use pathogens and toxins and they have focused on those agents that are more readily available. There has been an increasing trend of bioterrorism incidents over the past century, but states and substate actors have struggled with one or more of the necessary technological steps. These steps include acquisition of a suitable agent, production of an appropriate quantity and form, and effective deployment. The technological hurdles associated with the steps present a real barrier to producing a high consequence event. However, the ever increasing technological sophistication of society continually lowers the barriers, resulting in a low but increasing probability of a high consequence bioterrorism event.

  4. Biological Threats

    Science.gov (United States)

    ... Workplace Plans School Emergency Plans Main Content Biological Threats Biological agents are organisms or toxins that can ... for Disease Control and Prevention . Before a Biological Threat Unlike an explosion, a biological attack may or ...

  5. Weapons of mass destruction - current security threat

    International Nuclear Information System (INIS)

    This publication brings a complex and comprehensive view of the weapons of mass destruction phenomenon in the context of present military and political situation. It emphasizes the threat posed by proliferation of these destructive devices and their carriers as well as the threat present in their possession by unpredictable totalitarian regimes or terrorist groups. The publication is structured into four basic parts: Introduction Into The Topic, Nuclear Weapons, Chemical Weapons and Biological Weapons. The Introduction reflects the latest developments on the field of military technologies, which lead to the development of new destructive devices with characteristics comparable to basic types of WMDs - nuclear, chemical and biological. Based on the definition of WMD as 'weapon systems with enormous impact causing mass destruction, population, equipment and material losses', the modern mass destruction devices are assorted here, such as ecological, radiological and beam weapons, aerosol and container intelligent ammunition, the outburst of dangerous chemical substances from infrastructure, non-conventional weapons and military devices. The Nuclear Weapons part depicts the most destructive device of mass destruction mankind ever invented in close detail. It maps the history of most significant discoveries in nuclear physics, development and construction of the first nuclear weapons, accumulation of nuclear warheads and their carriers in the Cold war era, attempts of nuclear disarmament and reducing the number of nuclear weapons in possession of superpowers and their proliferation in the world's crisis regions including North Korea and Iran. The chapters devoted to theoretical grounds and physical principles of nuclear and thermonuclear weapons' functioning, the main categories and types, as well as destructive effects and consequences of use contain an adequate mathematical apparatus. This chapter's conclusion brings the overview of nuclear armament of states that

  6. Terror weapons. Ridding the world of nuclear, biological and chemical weapons - Commission on mass destruction weapons

    International Nuclear Information System (INIS)

    This book approaches in 8 chapters the ambitious challenge of ridding the world of all mass destruction weapons: 1 - re-launching disarmament; 2 - terror weapons: nature of threats and answers (weakness of traditional answers, counter-proliferation); 3 - nuclear weapons: preventing proliferation and terrorism, reducing threat and nuclear weapons number, from regulation to banning); 4 - biological or toxin weapons; 5 - chemical weapons; 6 - vectors, anti-missile defenses and space weapons; 7 - exports control, international assistance and non-governmental actors; 8 - respect, verification, enforcement and role of the United Nations. The recommendations and works of the Commission are presented in appendix together with the declaration adopted on April 30, 2009. (J.S.)

  7. Chemical and biological weapons

    International Nuclear Information System (INIS)

    This paper discusses the prospects of the multilateral negotiations aimed at achieving a complete and total ban on chemical weapons the Chemical Weapons convention (CWC). The control of the proliferation of chemical weapons is no longer just on East-West issue; it is also an issue of concern in Third World Countries, and in some of the wealthier middle eastern nations, such as Kuwait

  8. Nuclear weapons: new threats, new challenges

    International Nuclear Information System (INIS)

    After a brief history of the Iranian nuclear crisis since 2003, the author discusses the four aspects of this crisis which make it a textbook case: a country which wants to control the whole nuclear process and therefore may reach the capacity to produce military-grade uranium (this raises the question of the relationship between nuclear energy and disarmament), the validity and efficiency of international controls is at stake, divergence may appear on the ways to have international treaties respected (different approaches between Europe and the USA), a country which is looking for nuclear weapon for matters of regional security and power (this raises the issue of a new approach to security). Then, the author describes the new nuclear threats: proliferating states, terrorist groups, and states with nuclear weapons (attitude of the USA, China, Russia, France and the United Kingdom, perspective of a nuclear disarmament of Europe). He gives an overview of the current status of disarmament and of treaties (START, NPT), and discusses the opportunities to save the non proliferation treaty from collapsing in 2005

  9. Chlorine Gas: An Evolving Hazardous Material Threat and Unconventional Weapon

    Directory of Open Access Journals (Sweden)

    Jones, Robert MD

    2010-05-01

    Full Text Available Chlorine gas represents a hazardous material threat from industrial accidents and as a terrorist weapon. This review will summarize recent events involving chlorine disasters and its use by terrorists, discuss pre-hospital considerations and suggest strategies for the initial management for acute chlorine exposure events. [West J Emerg Med. 2010; 11(2:151-156.

  10. Legality of the threat or use of nuclear weapons

    International Nuclear Information System (INIS)

    This paper examines international treaties in relation to the threat or use of nuclear weapons including the 1968 Nuclear Non-Proliferation Treaty and the 1996 Comprehensive Test Ban Treaty. It can be concluded that the effect of the aforesaid international treaties is still in doubt without explicit enforcement mechanisms and penalty for non-compliance. This paper also reviews the International Court of Justice's advisory opinion on the legality of the threat or use of nuclear weapons and comments that a clear explanation on the legality of use of nuclear weapons in 'extreme circumstances of self-defence' is required. Examples from current state practice in relation to nuclear non-proliferation efforts are also provided, with special attention to China, North Korea and Iran. This paper suggests that China as a leader of developing countries should extend its efforts on nuclear non-proliferation and conduct communication between North Korea and Iran and other nuclear weapons states to reduce or prohibit nuclear weapons.

  11. Biological Threats Detection Technologies

    International Nuclear Information System (INIS)

    Among many decisive factors, which can have the influence on the possibility of decreases the results of use biological agents should be mentioned obligatory: rapid detection and identification of biological factor used, the proper preventive treatment and the medical management. The aims of identification: to identify the factor used, to estimate the area of contamination, to evaluate the possible countermeasure efforts (antibiotics, disinfectants) and to assess the effectiveness of the decontamination efforts (decontamination of the persons, equipment, buildings, environment etc.). The objects of identification are: bacteria and bacteria's spores, viruses, toxins and genetically modified factors. The present technologies are divided into: based on PCR techniques (ABI PRISM, APSIS, BIOVERIS, RAPID), immuno (BADD, RAMP, SMART) PCR and immuno techniques (APDS, LUMINEX) and others (BDS2, LUNASCAN, MALDI). The selected technologies assigned to field conditions, mobile and stationary laboratories will be presented.(author)

  12. Biological toxin warfare: threat, proliferation, and the effects of neutron energy on BTW agents

    OpenAIRE

    Swartz, Jeffrey R.

    1995-01-01

    The threat of biological weapons presents a special military challenge. Biological toxin warfare (BTW) agents are more potent than chemical warfare agents. Depending on the yield of the nuclear weapon, a biological weapon also can have a higher lethality than nuclear weapons. This thesis examines existing international restricions on the proliferation of BTW technology and identifies their shortcomings. These loopholes contribute to the eay availability of the technology necessary to examine ...

  13. Detecting Chemical Weapons: Threats, Requirements, Solutions, and Future Challenges

    Science.gov (United States)

    Boso, Brian

    2011-03-01

    Although chemicals have been reportedly used as weapons for thousands of years, it was not until 1915 at Ypres, France that an industrial chemical, chlorine, was used in World War I as an offensive weapon in significant quantity, causing mass casualties. From that point until today the development, detection, production and protection from chemical weapons has be an organized endeavor of many of the world's armed forces and in more recent times, non-governmental terrorist organizations. The number of Chemical Warfare Agents (CWAs) has steadily increased as research into more toxic substances continued for most of the 20 th century. Today there are over 70 substances including harassing agents like tear gas, incapacitating agents, and lethal agents like blister, blood, chocking, and nerve agents. The requirements for detecting chemical weapons vary depending on the context in which they are encountered and the concept of operation of the organization deploying the detection equipment. The US DoD, for example, has as a requirement, that US forces be able to continue their mission, even in the event of a chemical attack. This places stringent requirements on detection equipment. It must be lightweight (chemical warfare agents and toxic industrial chemicals, detect and warn at concentration levels and time duration to prevent acute health effects, meet military ruggedness specifications and work over a wide range of temperature and humidity, and have a very high probability of detection with a similarly low probability of false positives. The current technology of choice to meet these stringent requirements is Ion Mobility Spectrometry. Many technologies are capable of detecting chemicals at the trace levels required and have been extensively developed for this application, including, but not limited to: mass spectroscopy, IR spectroscopy, RAMAN spectroscopy, MEMs micro-cantilever sensors, surface acoustic wave sensors, differential mobility spectrometry, and

  14. Terror weapons. Ridding the world of nuclear, biological and chemical weapons - Commission on mass destruction weapons; Armes de terreur. Debarrasser le monde des armes nucleaires, biologiques et chimiques - Commission sur les armes de destruction massive

    Energy Technology Data Exchange (ETDEWEB)

    Blix, H.; Journe, V.

    2010-07-01

    This book approaches in 8 chapters the ambitious challenge of ridding the world of all mass destruction weapons: 1 - re-launching disarmament; 2 - terror weapons: nature of threats and answers (weakness of traditional answers, counter-proliferation); 3 - nuclear weapons: preventing proliferation and terrorism, reducing threat and nuclear weapons number, from regulation to banning); 4 - biological or toxin weapons; 5 - chemical weapons; 6 - vectors, anti-missile defenses and space weapons; 7 - exports control, international assistance and non-governmental actors; 8 - respect, verification, enforcement and role of the United Nations. The recommendations and works of the Commission are presented in appendix together with the declaration adopted on April 30, 2009. (J.S.)

  15. Nuclear Weapons 60 Years On: Still a Global Public Health Threat

    OpenAIRE

    MacDonald, Rhona

    2005-01-01

    This year marks the 60-year anniversary of the bombings of Hiroshima and Nagasaki. Has the world learned anything about the threat of nuclear weapons? What role can the health community play in reducing it?

  16. The chemical and biological weapon terrorism by the Aum Shnirikyo

    International Nuclear Information System (INIS)

    The Aum Shinrikyo, an obscure cult religious group, attacked the Tokyo subways employing sarin gas in March 1995, which was viewed as a mark of a new era in terrorism. The Aum Shinrikyo remains the one empirical example of a religiously motivated cult with an affluent amount of financial and human resources and motivations to use unconventional weapons. The Aum Shinrikyo's leaders included the scientific elite of a young generation as well as former Yakuza members who had close ties with organized crime networks. Aum succeeded in establishing an extensive network to procure weapons, material, and drug, primarily in Russia but also other countries including the United States and even North Korea. Despite the fact that the law enforcement authority had already obtained various pieces of information that reasonably indicated that Aum was producing sarin by late 1994, the law enforcement authority became too cautious to advance its investigation to arrest Aum members until it was too late. Japan's experience with the Aum Shinrikyo's threats provides valuable insights for democratic governments seeking to thwart the deadly plans of religiously motivated non-state actors. It reveals the tremendous difficulties for a democratic society to confront the terrorists who were willing to pursue their deadly 'divine' objectives, especially when the society had no experience to encounter such a threat. This presentation will explain the chemical and biological weapon programs of the Aum Shinrikyo, especially focusing on the following elements: Intention and capability of the Aum Shinrikyo; Weapon systems and mode of attacks, including their target selections; The lessons learned from this case for the prevention and crisis/consequence management n the event of CBW terrorism. The views expressed here are those of the author and do not represent those of the Research Institute for Science and Technology for Society or its research sponsors.(author)

  17. Radiation, chemical and biological protection. Mass destruction weapons

    International Nuclear Information System (INIS)

    In this text-book mass destruction weapons and radiation, chemical and biological protection are reviewed. The text-book contains the following chapter: (1) Mass destruction weapons; (2) Matter and material; (3) Radioactive materials; (4) Toxic materials; (5) Biological resources; (6) Nuclear energetic equipment; Appendices; References.

  18. Unconventional biological threats and the molecular biological response to biological threats.

    Science.gov (United States)

    Greenfield, Ronald A; Lutz, Brock D; Huycke, Mark M; Gilmore, Michael S

    2002-06-01

    This article concludes this symposium on potential agents of warfare and terrorism with discussion of 3 topics. First, influenza A virus is discussed as a potential biological weapon. Although it does not receive much attention in this role, the potential for mass casualties and public panic certainly exist if an epidemic of a virulent influenza A virus were initiated. Second, agroterrorism, terrorism directed at livestock or poultry or crops, is briefly discussed. Finally, the potential role of techniques of modern molecular biology to create new agents for bioterrorism or enhance the terrorist potential of available agents, and the known roles of these techniques in defense against biological warfare or terrorism are discussed. PMID:12074489

  19. Evaluation of Potential Biological Threats in Ukraine

    International Nuclear Information System (INIS)

    Dilating of biological threats spectrum, EDI diffusion opportunities and routes, unpredictability of outbreaks connected with connatural, technogenic, terrorist factors determines constant monitoring and readiness for operative BPA indication and identification. Scientific analytical approach of existing and probable regional bio-threats evaluation is necessary for adequate readiness system creation and maintenance of medical counteraction tactics to probable biological threats. Basing on the international experience, we carry out analysis of a situation present in Ukraine and routes for the decisions. The basic directions are: - Evaluation of a reality for EDI penetration from abroad and presence of conditions for their further diffusion inside the country. - Revealing of presence and definition of connatural EDI foci biocenoses features and BPAs. - Appropriate level of biological safety and physical protection of bio-laboratories and pathogens collections maintenance. - Gene/molecular and phenotypical definition of EDI circulating strains. - Creation of the circulating EDI gene/ phenotypic characteristics regional data bank. - Ranging of EDI actual for area. - Introduction of GPT, mathematical modeling and forecasting for tactics development in case of technogenic accidents and connatural outbreaks. - Methodical basis and equipment improvement for BPA system indication for well-timed identification of natural, or modified agent. - Education and training The international cooperation in maintenance of biosafety and bioprotection within the framework of scientific programs, grants, exchange of experience, introduction of international standards and rules are among basic factors in the decision for creating system national biosafety for countries not included in EU and the NATO. (author)

  20. Arms Control: US and International efforts to ban biological weapons

    Energy Technology Data Exchange (ETDEWEB)

    1992-12-01

    The Bacteriological (Biological) and Toxin Weapons Convention, the treaty that bans the development, production, and stockpiling and acquisition of biological weapons was opened for signature in 1972 and came into force in 1975 after being ratified by 22 governments, including the depository nations of the USA, the United Kingdom, and the former Soviet Union. In support of the Convention, the USA later established export controls on items used to make biological weapons. Further, in accordance with the 1990 President`s Enhanced Proliferation Control Initiative, actions were taken to redefine and expand US export controls, as well as to encourage multilateral controls through the Australia Group. Thus far, the Convention has not been effective in stopping the development of biological weapons. The principal findings as to the reasons of the failures of the Convention are found to be: the Convention lacks universality, compliance measures are effective, advantage of verification may outweigh disadvantages. Recommendations for mitigating these failures are outlined in this report.

  1. Toxic industrial chemicals (TICs) as asymmetric weapons: the design basis threat

    International Nuclear Information System (INIS)

    Asymmetric warfare concepts relate well to the use of improvised chemical weapons against urban targets. Sources of information on toxic industrial chemicals (TICs) and lists of high threat chemicals are available that point to likely choices for an attack. Accident investigations can be used as a template for attacks, and to judge the possible effectiveness of an attack using TICs. The results of a chlorine rail car accident in South Carolina, USA and the Russian military assault on a Moscow theater provide many illustrative points for similar incidents that mighty be carried out deliberately. Computer modeling of outdoor releases shows how an attack might take into consideration issues of stand-off distance and dilution. Finally, the preceding may be used to estimate with some accuracy the design basis threat posed by the used of TICs as weapons.(author)

  2. Weapons of Mass Destruction Commission, final report, 'Weapons of Terror: Freeing the World of Nuclear, Biological, and Chemical Arms', Stockholm, Sweden, 1 June 2006

    International Nuclear Information System (INIS)

    Nuclear, biological and chemical weapons are rightly called weapons of mass destruction (WMD). Designed to terrify as well as destroy, they have the potential to kill thousands and thousands of people in a single attack, and their effects may persist in the environment and in our bodies, in some cases indefinitely. Many efforts have been made to free the world from the threat of these weapons and some progress has been made. Paradoxically, despite the end of the Cold War, the past decade has seen more setbacks than successes. States have failed to comply with their disarmament and non-proliferation commitments, and terrorist groups have emerged that recognize no restraints. In September 2005, the United Nations World Summit was unable to agree on a single recommendation on disarmament and non-proliferation. It is time for all to wake up to the awesome reality that many of the old threats continue to hang over the world and that many new ones have emerged. It is time for all governments to revive their cooperation and to breathe new life into the disarmament work of the United Nations. Efforts to eradicate poverty and to protect the global environment must be matched by a dismantling of the world's most destructive capabilities. The gearshift now needs to be moved from reverse to drive. Biological and chemical weapons have been comprehensively outlawed through global conventions, but these need to be universally accepted and fully implemented. Nuclear weapons must also be outlawed. Before this aim is realized, there must be new initiatives to reduce the number of nuclear weapons and the threat posed by them. It is equally urgent to prevent proliferation and to take special measures to ensure that terrorists do not acquire any weapons of mass destruction. This report presents ideas and recommendations on what the world community - including national governments and civil society - can and should do

  3. Chemical or Biological Terrorist Attacks: An Analysis of the Preparedness of Hospitals for Managing Victims Affected by Chemical or Biological Weapons of Mass Destruction

    OpenAIRE

    Bennett, Russell L.

    2006-01-01

    The possibility of a terrorist attack employing the use of chemical or biological weapons of mass destruction (WMD) on American soil is no longer an empty threat, it has become a reality. A WMD is defined as any weapon with the capacity to inflict death and destruction on such a massive scale that its very presence in the hands of hostile forces is a grievous threat. Events of the past few years including the bombing of the World Trade Center in 1993, the Murrah Federal Building in Oklahoma C...

  4. [Yersinia pestis as a dangerous biological weapon].

    Science.gov (United States)

    Grygorczuk, Sambor; Hermanowska-Szpakowicz, Teresa

    2002-01-01

    Plague is an infectious disease caused by the Yersinia pestis microorganism, which is transmitted to the human host from a natural reservoir (different rodent species) by a flea bite. Plague is still encountered in humans in the areas of its enzootic prevalence in local rodent populations. Infection by flea bite results in a bubonic or septicemic plague, possibly complicated by secondary pneumonia. The person with pneumonic symptoms may be a source of a droplet-borne inhalatory infection for other people who consequently develop primary pneumonic plague. Despite a clinical form, plague is a severe infection characterized by a short incubation period, rapid onset and quick progress with mortality exceeding 50% if not treated properly. The pneumonic plague is associated with a particularly rapid progress and the mortality rate of almost 100% if not treated properly. As Yersinia pestis can be easily obtained and cultured and is highly pathogenic for humans, it poses a serious threat of being used for bioterrorism purposes. Artificially created aerosol containing plague bacilli can cause numerous and almost simultaneous cases of primary pulmonic plague in an exposed population. Persons exposed would most likely develop severe pneumonia with rapidly progressing respiratory and circulatory failure. The use of the Yersinia pestis strains resistant to antibiotics typically applied cannot be excluded. PMID:12474416

  5. The Seventh Review Conference of the Biological Weapons Convention

    OpenAIRE

    Avramchev, Georgi; Taleski, Vaso

    2013-01-01

    “Overall, we have done pretty well. In some areas, we could have done better” - Ambassador Paul van den IJssel, President, Biological Weapons Convention (BWC) Seventh Review Conference 2011 was a year of particular importance to the BWC. It was an opportunity to shape the direction that the treaty would take in coming years and ensure that it would remain at the forefront of efforts to prevent the use of disease as a weapon. Hopes for the future were high. Annual meetings had bee...

  6. A Novel Two-Staged Decision Support based Threat Evaluation and Weapon Assignment Algorithm, Asset-based Dynamic Weapon Scheduling using Artificial Intelligence Techinques

    CERN Document Server

    Naeem, Huma; Hussain, Mukhtar; Khan, Shoab A

    2009-01-01

    Surveillance control and reporting (SCR) system for air threats play an important role in the defense of a country. SCR system corresponds to air and ground situation management/processing along with information fusion, communication, coordination, simulation and other critical defense oriented tasks. Threat Evaluation and Weapon Assignment (TEWA) sits at the core of SCR system. In such a system, maximal or near maximal utilization of constrained resources is of extreme importance. Manual TEWA systems cannot provide optimality because of different limitations e.g.surface to air missile (SAM) can fire from a distance of 5Km, but manual TEWA systems are constrained by human vision range and other constraints. Current TEWA systems usually work on target-by-target basis using some type of greedy algorithm thus affecting the optimality of the solution and failing in multi-target scenario. his paper relates to a novel two-staged flexible dynamic decision support based optimal threat evaluation and weapon assignment...

  7. From biodefence to biosecurity: the Obama administration's strategy for countering biological threats.

    Science.gov (United States)

    Koblentz, Gregory D

    2012-01-01

    The Seventh Review Conference of the Biological Weapons Convention (BWC), the first international treaty to outlaw an entire class of weapons, was held in Geneva in December 2011. On 7 December, Secretary of State Hillary Clinton became the highest-ranking US government official to address a BWC meeting. Secretary Clinton told the assembled delegation that ‘we view the risk of bioweapons attack as both a serious national security challenge and a foreign policy priority’. At the same time, she warned that a large-scale disease outbreak ‘could cripple an already fragile global economy’. Secretary Clinton's speech reflected a new understanding that the range of biological threats to international security has expanded from state-sponsored biological warfare programmes to include biological terrorism, dual-use research and naturally occurring infectious diseases such as pandemics. Recognizing these changes, President Barack Obama released a new national strategy for countering biological threats in 2009. This strategy represents a shift in thinking away from the George W. Bush administration's focus on biodefence, which emphasized preparing for and responding to biological weapon attacks, to the concept of biosecurity, which includes measures to prevent, prepare for and respond to naturally occurring and man-made biological threats. The Obama administration's biosecurity strategy seeks to reduce the global risk of naturally occurring and deliberate disease outbreaks through prevention, international cooperation, and maximizing synergies between health and security. The biosecurity strategy is closely aligned with the Obama administration's broader approach to foreign policy, which emphasizes the pragmatic use of smart power, multilateralism and engagement to further the national interest. This article describes the Obama administration's biosecurity strategy; highlights elements of continuity and change from the policies of the Bush administration; discusses

  8. The role of the Biological Weapons Convention in disease surveillance and response.

    Science.gov (United States)

    Enemark, Christian

    2010-11-01

    This article assesses the role and significance of the Biological Weapons Convention (BWC) with respect to infectious disease surveillance and response to outbreaks. Increasingly, the BWC is being used as a platform for addressing infectious disease threats arising naturally as well as traditional concerns about malicious dissemination of pathogenic microorganisms. The latter have long had a place on the security agenda, but natural disease outbreaks too are now being partially 'securitized' through the use of the BWC as a forum for exchanging information and ideas on disease surveillance and response. The article focuses on two prominent issues discussed at recent meetings of BWC member states: enhancing capacity for disease surveillance and response; and responding to allegations of biological weapons use and investigating outbreaks deemed suspicious. It concludes, firstly, that the BWC supports the efforts of international health organizations to enhance disease surveillance and response capacity worldwide. And secondly, that the BWC, rather than the World Health Organization (WHO), is the appropriate institution to deal with biological weapons allegations and investigations of suspicious outbreaks. The overall message is that securitization in the health sphere cuts both ways. Adding a security dimension (BW) alongside the task of detecting and responding to naturally occurring disease outbreaks is beneficial, but requiring a non-security organization (the WHO) to assume a security role would be counterproductive. PMID:20961949

  9. Information management and the biological warfare threat

    OpenAIRE

    Martinez, Antonio

    2002-01-01

    Approved for public release; distribution is unlimited This thesis explores the implications of information management of government-funded projects on national security objectives. A case study of the Human Genome Project is used to illustrate the risk of information transfer between government sources and private industry and the implications posed to the proliferation of Weapons of Mass Destruction. The issue of risk in information management is approached by developing three theoretica...

  10. Meeting the threat of weapons of mass destruction terrorism: toward a broader conception of consequence management.

    Science.gov (United States)

    Becker, S M

    2001-12-01

    As the importance of psychosocial issues in domestic preparedness has come to be better understood, it has become evident that there are significant conceptual limitations in existing approaches to weapons of mass destruction consequence management. This article identifies six problems: (1) most understandings of consequence management focus on short-term issues with longer-term recovery issues receiving far less attention; (2) while psychological issues are beginning to be introduced, social issues are generally not addressed; (3) although more attention is being paid to mental health issues, scenarios that are predominantly psychosocial in their effects are not generally considered; (4) social and behavioral science insights are not adequately incorporated; (5) despite the further inclusion of psychological issues, the overall approach is not sufficiently integrated or interdisciplinary; and (6) although psychological issues are receiving more attention, fundamental macro-level issues such as the re-establishment of trust after a weapons of mass destruction terrorist incident rarely receive significant attention. These limitations could seriously weaken efforts to address the consequences of a chemical, biological, radiological, or nuclear terrorist attack. There is an urgent need, therefore, to re-think current approaches and to develop a broader conception of consequence management. PMID:11778419

  11. Biological warfare agents as threats to potable water.

    OpenAIRE

    Burrows, W D; Renner, S E

    1999-01-01

    Nearly all known biological warfare agents are intended for aerosol application. Although less effective as potable water threats, many are potentially capable of inflicting heavy casualties when ingested. Significant loss of mission capability can be anticipated even when complete recovery is possible. Properly maintained field army water purification equipment can counter this threat, but personnel responsible for the operation and maintenance of the equipment may be most at risk of exposur...

  12. 78 FR 55326 - Determinations Regarding Use of Chemical Weapons in Syria Under the Chemical and Biological...

    Science.gov (United States)

    2013-09-10

    ... Determinations Regarding Use of Chemical Weapons in Syria Under the Chemical and Biological Weapons Control and..., 22 U.S.C. 5604(a), that the Government of Syria has used chemical weapons in violation of... Under Secretary of State for Political Affairs: (1) Determined that the Government of Syria has...

  13. Medical strategies to handle mass casualties from the use of biological weapons

    OpenAIRE

    Koenig, Kristi L.; Kahn, C A; Schultz, C H

    2006-01-01

    This article reviews the definitions of biological weapons and mass casualties. In addition, it discusses the main operational and logistical issues of import in the medical management of mass casualties from the use of biological weapons. Strategies for medical management of specific biologic agents also are highlighted.

  14. Current laboratory methods for biological threat agent identification.

    Science.gov (United States)

    Henchal, E A; Teska, J D; Ludwig, G V; Shoemaker, D R; Ezzell, J W

    2001-09-01

    The authors present an integrated approach for the identification of biological threat agents. The methods used have been used extensively in field exercises and during response to incidents of biological terrorism. A diagnostic system, which integrates the clinical diagnosis or medical intelligence with immunodiagnostic tests, rapid gene amplification assays, and standard culture, provides results of the highest quality and confidence. In the future, selected reagents and technologies will be distributed through a network of civilian and military laboratories. PMID:11572145

  15. Building the Good Fire Department; Practical Preparedness and Agenda Setting for Biological Weapons Release

    OpenAIRE

    Young, Hailey Alexandra Kimmel

    2015-01-01

    The grouping of chemical, biological, radiological, nuclear and explosive (CBRNE) events is common in response planning literature, and yet from an emergency management perspective, responding to biological events is very unlike responding to the others. A sizable biological weapons response effort would be a singularly formidable emergency planning challenge. With the distinct characteristics of the biological weapons problem, and in the face of both transmissibility and the psychological tr...

  16. The terrorist threat nuclear, radiological, biological, chemical - a medical approach

    International Nuclear Information System (INIS)

    Since September 11, 2001, the fear of a large scale nuclear, biological and/or chemical terrorism is taken again into consideration at the highest level of national policies of risk prevention. The advent of international terrorism implies a cooperation between the military defense and the civil defense. The nuclear, radiological, biological and chemical (NRBC) experts of the health service of army and of civil defense will have to work together in case of major terror attack. This book presents this cooperation between civil and military experts in the NRBC domain: risk analysis, national defense plans, crisis management, syndromes and treatments. The different aspects linked with the use of nuclear, biological and chemical weapons are analyzed by the best experts from French medical and research institutes. All topics of each NRBC domain are approached: historical, basic, diagnostic, therapeutic and preventive. (J.S.)

  17. Bioforensics: Characterization of biological weapons agents by NanoSIMS

    Energy Technology Data Exchange (ETDEWEB)

    Weber, P K; Ghosal, S; Leighton, T J; Wheeler, K E; Hutcheon, I D

    2007-02-26

    The anthrax attacks of Fall 2001 highlight the need to develop forensic methods based on multiple identifiers to determine the origin of biological weapons agents. Genetic typing methods (i.e., DNA and RNA-based) provide one attribution technology, but genetic information alone is not usually sufficient to determine the provenance of the material. Non-genetic identifiers, including elemental and isotopic signatures, provide complementary information that can be used to identify the means, geographic location and date of production. Under LDRD funding, we have successfully developed the techniques necessary to perform bioforensic characterization with the NanoSIMS at the individual spore level. We have developed methods for elemental and isotopic characterization at the single spore scale. We have developed methods for analyzing spore sections to map elemental abundance within spores. We have developed rapid focused ion beam (FIB) sectioning techniques for spores to preserve elemental and structural integrity. And we have developed a high-resolution depth profiling method to characterize the elemental distribution in individual spores without sectioning. We used these newly developed methods to study the controls on elemental abundances in spores, characterize the elemental distribution of in spores, and to study elemental uptake by spores. Our work under this LDRD project attracted FBI and DHS funding for applied purposes.

  18. Terrorist threat, chemical, biological, radiological, nuclear medical approach

    International Nuclear Information System (INIS)

    The different aspects linked to the use of nuclear, radiological, biological and or chemical weapons are gathered in this work. They concern history, fundamental aspect, diagnosis, therapy and prevention. The part devoted to the nuclear aspect concern the accidents in relation with ionizing radiations, the radiation syndrome, the contribution and limits of dosimetry, the treatment of medullary aplasia, the evaluation and treatment of an internal contamination, new perspectives on the use of cytokine for the treatment of accidental irradiated persons, alternative to the blood transfusion. (N.C.)

  19. 15 CFR Supplement No. 1 to Part 742 - Nonproliferation of Chemical and Biological Weapons

    Science.gov (United States)

    2010-01-01

    ... Biological Weapons No. Supplement No. 1 to Part 742 Commerce and Foreign Trade Regulations Relating to... ADMINISTRATION REGULATIONS CONTROL POLICY-CCL BASED CONTROLS Pt. 742, Supp. 1 Supplement No. 1 to Part 742...: (i) Equipment (for producing chemical weapon precursors and chemical warfare agents) described...

  20. Weapons of mass destruction: Overview of the CBRNEs (Chemical, Biological, Radiological, Nuclear, and Explosives).

    Science.gov (United States)

    Prockop, Leon D

    2006-11-01

    The events of September 11, 2001, made citizens of the world acutely aware of disasters consequent to present-day terrorism. This is a war being waged for reasons obscure to many of its potential victims. The term "NBCs" was coined in reference to terrorist weapons of mass destruction, i.e., nuclear, biological and chemical. The currently accepted acronym is "CBRNE" which includes Chemical, Biological, Radiological, Nuclear, and Explosive weapons. Non-nuclear explosives are the most common terrorist weapon now in use. Nuclear and radiological weapons are beyond the scope of this publication, which focuses on the "CBEs", i.e. chemical, biological and explosive weapons. Although neurologists will not be the first responders to CBEs, they must know about the neurological effects in order to provide diagnosis and treatment to survivors. Neurological complications of chemical, biological and explosive weapons which have or may be used by terrorists are reviewed by international experts in this publication. Management and treatment profiles are outlined. PMID:16920155

  1. Global patterns in threats to vertebrates by biological invasions.

    Science.gov (United States)

    Bellard, C; Genovesi, P; Jeschke, J M

    2016-01-27

    Biological invasions as drivers of biodiversity loss have recently been challenged. Fundamentally, we must know where species that are threatened by invasive alien species (IAS) live, and the degree to which they are threatened. We report the first study linking 1372 vertebrates threatened by more than 200 IAS from the completely revised Global Invasive Species Database. New maps of the vulnerability of threatened vertebrates to IAS permit assessments of whether IAS have a major influence on biodiversity, and if so, which taxonomic groups are threatened and where they are threatened. We found that centres of IAS-threatened vertebrates are concentrated in the Americas, India, Indonesia, Australia and New Zealand. The areas in which IAS-threatened species are located do not fully match the current hotspots of invasions, or the current hotspots of threatened species. The relative importance of biological invasions as drivers of biodiversity loss clearly varies across regions and taxa, and changes over time, with mammals from India, Indonesia, Australia and Europe are increasingly being threatened by IAS. The chytrid fungus primarily threatens amphibians, whereas invasive mammals primarily threaten other vertebrates. The differences in IAS threats between regions and taxa can help efficiently target IAS, which is essential for achieving the Strategic Plan 2020 of the Convention on Biological Diversity. PMID:26817767

  2. A parametric design of ceramic faced composite armor subject to air weapon threats

    Science.gov (United States)

    Guo, Y. N.; Sun, Q.

    2015-12-01

    By taking into consideration the two categories of military projectile threats to aircraft structures, an optimal layer configuration of ceramic faced composite armor was designed in this paper. Using numerical simulations and the same layer arrangement of ceramic, UHMWPE, and carbon fiber laminates, a parametric finite element model using LS-DYNA code was built. Several thickness combinations were analyzed in order to determine the final lightest configuration that is capable of supporting a high-speed impact load and HEI blast wave load, which implements a high anti-penetration design for aircraft armor. This configuration can be used to improve the anti-impact ability of aircraft structures as well as achieve a structure/function integration design that considers a lighter weight.

  3. Prospects for improved detection of chemical, biological, radiological, and nuclear threats

    Energy Technology Data Exchange (ETDEWEB)

    Wuest, Craig R. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Hart, Brad [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Slezak, Thomas R. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2012-07-31

    Acquisition and use of Chemical, Biological, Radiological, and Nuclear (CBRN) weapons continue to be a major focus of concern form the security apparatus of nation states because of their potential for mass casualties when used by a determined adversary.

  4. Exploring the Possible Use of Information Barriers for future Biological Weapons Verification Regimes

    International Nuclear Information System (INIS)

    This report describes a path forward for implementing information barriers in a future generic biological arms-control verification regime. Information barriers have become a staple of discussion in the area of arms control verification approaches for nuclear weapons and components. Information barriers when used with a measurement system allow for the determination that an item has sensitive characteristics without releasing any of the sensitive information. Over the last 15 years the United States (with the Russian Federation) has led on the development of information barriers in the area of the verification of nuclear weapons and nuclear components. The work of the US and the Russian Federation has prompted other states (e.g., UK and Norway) to consider the merits of information barriers for possible verification regimes. In the context of a biological weapons control verification regime, the dual-use nature of the biotechnology will require protection of sensitive information while allowing for the verification of treaty commitments. A major question that has arisen is whether - in a biological weapons verification regime - the presence or absence of a weapon pathogen can be determined without revealing any information about possible sensitive or proprietary information contained in the genetic materials being declared under a verification regime. This study indicates that a verification regime could be constructed using a small number of pathogens that spans the range of known biological weapons agents. Since the number of possible pathogens is small it is possible and prudent to treat these pathogens as analogies to attributes in a nuclear verification regime. This study has determined that there may be some information that needs to be protected in a biological weapons control verification regime. To protect this information, the study concludes that the Lawrence Livermore Microbial Detection Array may be a suitable technology for the detection of the

  5. Exploring the Possible Use of Information Barriers for future Biological Weapons Verification Regimes

    Energy Technology Data Exchange (ETDEWEB)

    Luke, S J

    2011-12-20

    This report describes a path forward for implementing information barriers in a future generic biological arms-control verification regime. Information barriers have become a staple of discussion in the area of arms control verification approaches for nuclear weapons and components. Information barriers when used with a measurement system allow for the determination that an item has sensitive characteristics without releasing any of the sensitive information. Over the last 15 years the United States (with the Russian Federation) has led on the development of information barriers in the area of the verification of nuclear weapons and nuclear components. The work of the US and the Russian Federation has prompted other states (e.g., UK and Norway) to consider the merits of information barriers for possible verification regimes. In the context of a biological weapons control verification regime, the dual-use nature of the biotechnology will require protection of sensitive information while allowing for the verification of treaty commitments. A major question that has arisen is whether - in a biological weapons verification regime - the presence or absence of a weapon pathogen can be determined without revealing any information about possible sensitive or proprietary information contained in the genetic materials being declared under a verification regime. This study indicates that a verification regime could be constructed using a small number of pathogens that spans the range of known biological weapons agents. Since the number of possible pathogens is small it is possible and prudent to treat these pathogens as analogies to attributes in a nuclear verification regime. This study has determined that there may be some information that needs to be protected in a biological weapons control verification regime. To protect this information, the study concludes that the Lawrence Livermore Microbial Detection Array may be a suitable technology for the detection of the

  6. Escalation of terrorism? On the risk of attacks with chemical, biological, radiological and nuclear weapons or materials

    International Nuclear Information System (INIS)

    The report on the risk of attacks with chemical, biological, radiological and nuclear weapons or materials covers the following topics: the variety of terrorism: ethnic-nationalistic, politically motivated, social revolutionary, political extremism, religious fanaticism, governmental terrorism; CBRN (chemical, biological, radiological, nuclear) weapons and materials: their availability and effectiveness in case of use; potential actor groups; prevention and counter measures, emergency and mitigating measures.

  7. The indoor as a scene for biological threats

    DEFF Research Database (Denmark)

    Storgaard, Kresten; Gunnarsen, Lars; Bräuner, Elvira

    2014-01-01

    The paper presents the result of involving users in developing a user-friendly device for easy and fast detection of bio-threats in indoor settings. Bio-protect is a project supported by the European Commission, with the concept of developing a fast-alert, mobile, easy-to-use device to detect and...... identify airborne pathogens. In the development phase of the Bio-protect project the main focus was on the optimization of the device detection limits and sensitivity, which overshadowed an adequate degree of user-friendliness. Two generations of technical prototype-solutions were developed. Based on the...... user-interface of the first prototype, a second user-interface was developed. We tested the first generation prototype in combination with the second generation user interface on two types of users: A) First responders with experience in bio-threat action and B) Facility Management operators with no...

  8. Is all fair in biological warfare? The controversy over genetically engineered biological weapons.

    Science.gov (United States)

    Appel, J M

    2009-07-01

    Advances in genetics may soon make possible the development of ethnic bioweapons that target specific ethnic or racial groups based upon genetic markers. While occasional published reports of such research generate public outrage, little has been written about the ethical distinction (if any) between the development of such weapons and ethnically neutral bioweapons. The purpose of this paper is to launch a debate on the subject of ethnic bioweapons before they become a scientific reality. PMID:19567692

  9. The evolution of legal approaches to controlling nuclear and radiological weapons and combating the threat of nuclear terrorism

    NARCIS (Netherlands)

    J. Herbach

    2015-01-01

    This chapter traces the evolution of international law related to the weaponization of nuclear and other radioactive materials, focusing in particular on the law pertaining to preventing acts of nuclear terrorism. International efforts to control atomic energy have evolved substantially since the on

  10. Will threat of biological invasions unite the European Union?

    Czech Academy of Sciences Publication Activity Database

    Hulme, P. E.; Pyšek, Petr; Nentwig, W.; Vila, M.

    2009-01-01

    Roč. 324, č. 5923 (2009), s. 40-41. ISSN 0036-8075 Institutional research plan: CEZ:AV0Z60050516 Keywords : biological invasions * European Union * policy Subject RIV: EF - Botanics Impact factor: 29.747, year: 2009

  11. THE TWENTIETH CENTURY DEVELOPMENT OF DIFFERENT TYPES OF BACTERIAL, BIOLOGICAL AND CHEMICAL WEAPONS AND THE PRESENT CAPABILITIES OF NATO AND THE WARSAW PACT IN THIS RESPECT

    OpenAIRE

    A.L.S. Hudson

    2012-01-01

    Over the last twenty years increased attention has been focused on the military uses of Bacterial, Biological and Chemical agents (BBC weapons). This phenomenon can be attributed to a number of reasons. Firstly, BBC weapons are comparatively cheap and simple to produce, they are easy to use as conventional weapons and their effects are short-lived. The mutual deterrence effect of nuclear weapons, furthermore, has necessitated the exploration of other fields of warfare of which - BBC warfare i...

  12. Chemical or Biological Terrorist Attacks: An Analysis of the Preparedness of Hospitals for Managing Victims Affected by Chemical or Biological Weapons of Mass Destruction

    Directory of Open Access Journals (Sweden)

    Russell L. Bennett

    2006-03-01

    Full Text Available The possibility of a terrorist attack employing the use of chemical or biological weapons of mass destruction (WMD on American soil is no longer an empty threat, it has become a reality. A WMD is defined as any weapon with the capacity to inflict death and destruction on such a massive scale that its very presence in the hands of hostile forces is a grievous threat. Events of the past few years including the bombing of the World Trade Center in 1993, the Murrah Federal Building in Oklahoma City in 1995 and the use of planes as guided missiles directed into the Pentagon and New York’s Twin Towers in 2001 (9/11 and the tragic incidents involving twentythree people who were infected and five who died as a result of contact with anthrax-laced mail in the Fall of 2001, have well established that the United States can be attacked by both domestic and international terrorists without warning or provocation. In light of these actions, hospitals have been working vigorously to ensure that they would be “ready” in the event of another terrorist attack to provide appropriate medical care to victims. However, according to a recent United States General Accounting Office (GAO nationwide survey, our nation’s hospitals still are not prepared to manage mass causalities resulting from chemical or biological WMD. Therefore, there is a clear need for information about current hospital preparedness in order to provide a foundation for systematic planning and broader discussions about relative cost, probable effectiveness, environmental impact and overall societal priorities. Hence, the aim of this research was to examine the current preparedness of hospitals in the State of Mississippi to manage victims of terrorist attacks involving chemical or biological WMD. All acute care hospitals in the State were selected for inclusion in this study. Both quantitative and qualitative methods were utilized for data collection

  13. Automated and miniaturized detection of biological threats with a centrifugal microfluidic system

    Science.gov (United States)

    Mark, D.; van Oordt, T.; Strohmeier, O.; Roth, G.; Drexler, J.; Eberhard, M.; Niedrig, M.; Patel, P.; Zgaga-Griesz, A.; Bessler, W.; Weidmann, M.; Hufert, F.; Zengerle, R.; von Stetten, F.

    2012-06-01

    The world's growing mobility, mass tourism, and the threat of terrorism increase the risk of the fast spread of infectious microorganisms and toxins. Today's procedures for pathogen detection involve complex stationary devices, and are often too time consuming for a rapid and effective response. Therefore a robust and mobile diagnostic system is required. We present a microstructured LabDisk which performs complex biochemical analyses together with a mobile centrifugal microfluidic device which processes the LabDisk. This portable system will allow fully automated and rapid detection of biological threats at the point-of-need.

  14. 78 FR 74218 - Imposition of Additional Sanctions on Syria Under the Chemical and Biological Weapons Control and...

    Science.gov (United States)

    2013-12-10

    ... Imposition of Additional Sanctions on Syria Under the Chemical and Biological Weapons Control and Warfare.... ACTION: Notice. SUMMARY: On August 2, 2013, a determination was made that the Government of Syria used... Notice 8460. That determination resulted in sanctions against the Government of Syria. Section 307(b)...

  15. THE TWENTIETH CENTURY DEVELOPMENT OF DIFFERENT TYPES OF BACTERIAL, BIOLOGICAL AND CHEMICAL WEAPONS AND THE PRESENT CAPABILITIES OF NATO AND THE WARSAW PACT IN THIS RESPECT

    Directory of Open Access Journals (Sweden)

    A.L.S. Hudson

    2012-02-01

    Full Text Available Over the last twenty years increased attention has been focused on the military uses of Bacterial, Biological and Chemical agents (BBC weapons. This phenomenon can be attributed to a number of reasons. Firstly, BBC weapons are comparatively cheap and simple to produce, they are easy to use as conventional weapons and their effects are short-lived. The mutual deterrence effect of nuclear weapons, furthermore, has necessitated the exploration of other fields of warfare of which - BBC warfare is a field. Another reason for this interest is the employment, on a limited scale, of such weapons in certain conflicts over this period.

  16. Strategy for responding to nuclear, radiological, biological and chemical threats in Switzerland

    International Nuclear Information System (INIS)

    ABC- Protection in Switzerland was originally set up primarily for protection against military weapons of mass destruction, such as atomic/nuclear or chemical weapons. Protection against biological weapons - at first within the domain of the medical service - was later integrated into AC-Protection, thus leading to ABC-Protection in Switzerland. In some cases the objectives of ABC-Protection with regard to prevention and intervention were defined differently in the military and civil fields. In order to put ABC-Protection in Switzerland on a uniform basis, the Federal Council has instructed the KomABC (Commission for ABC-Protection) to develop a general strategy for 'ABC-Protection in Switzerland'. The following paper describes the objectives as well as the key elements of this general strategy, which should guarantee that all Federal and Cantonal organizations take decisions related to prevention and intervention based on the same principles. The strategy covers the following topics: 1) Reference scenarios for ABC-Protection; 2) Demands related to prevention; 3) Demands related to intervention; 4) Allocation of tasks at the Federal and Cantonal levels. Protective measures for improving ABC-Protection in Switzerland are presented. (author)

  17. Biological invasions in the aquatic ecosystems of Europe as a threat to biodiversity

    OpenAIRE

    Wołczuk, Katarzyna; Mięsikowski, Michał; Jarzynka, Karolina; Wilczyńska, Bogdana

    2011-01-01

    In recent years biological invasions have become a serious ecological and socio-economic problem for many countries. Invasions are promoted by anthropogenic activity which is broadly understood as well as the instability of ecosystems. It carries a number of threats, often difficult to predict. The effects of invasion are long-term and occur on many levels of life. They can very often contribute to the extinction of native species, thus reducing biodiversity. According to the concept of susta...

  18. Reframing the debate against nuclear weapons

    International Nuclear Information System (INIS)

    'Some 35,000 nuclear weapons remain in the arsenals of the nuclear powers, with thousands still deployed on hair-trigger alert. Whatever rationale these weapons may once have had has long since dwindled. Political, moral, and legal constraints on actually using them further undermine their strategic utility without, however, reducing the risks of inadvertent war or proliferation. The objective of nuclear non-proliferation is not helped by the fact that the nuclear weapon States continue to insist that those weapons in their hands enhance security, while in the hands of others they are a threat to world peace. If we were making steady progress towards disarmament, this situation would be less alarming. Unfortunately, the reverse is true.' - United Nations Secretary-General Kofi Annan. 'Something is wrong with the nuclear disarmament and non-proliferation regime. Although seemingly well-equipped with an arsenal of legal and political mechanisms, such as the Nuclear Non-Proliferation Treaty (NPT), the 1996 Advisory Opinion of the International Court of Justice (ICJ), decades' worth of General Assembly (GA) resolutions and even a recent slew of ad-hoc, plurilateral initiatives such as the Proliferation Security Initiative, the regime created to prevent the catastrophe of nuclear war remains inadequate. This insufficiency is even starker when viewed in relation to the regimes controlling other weapons of mass destruction. Despite its own challenges, the Organization for the Prohibition on Chemical Weapons remains relatively well-funded and well-situated to facilitate the implementation of the Chemical Weapons Convention (CWC). Even the Biological and Toxin Weapons Convention (BTWC), while still lacking the necessary verification mechanisms, has managed to effectively criminalize not just the use and threat of use of biological weapons, but also their production, development and stockpiling. Meanwhile, the anti-nuclear regime seems to be faltering. Progress made in

  19. Degradation of biological weapons agents in the environment: implications for terrorism response.

    Science.gov (United States)

    Stuart, Amy L; Wilkening, Dean A

    2005-04-15

    We investigate the impact on effective terrorism response of the viability degradation of biological weapons agents in the environment. We briefly review the scientific understanding and modeling of agent environmental viability degradation. In general, agent susceptibility to viability loss is greatest for vegetative bacteria, intermediate for viruses, and least for bacterial spores. Survival is greatest in soil and progressively decreases in the following environments: textiles, water, hard surfaces, and air. There is little detailed understanding of loss mechanisms. We analyze the time behavior and sensitivity of four mathematical models that are used to represent environmental viability degradation (the exponential, probability, and first- and second-order catastrophic decay models). The models behave similarly at short times (representation of the hazard. For longer time phenomena, including decontamination, the current model capabilities are likely insufficient. Finally, we implement each model in a simple numerical integration of anthrax dispersion, viability degradation, and dose response. Decay models spanning the current knowledge of airborne degradation result in vastly different predicted hazard areas. This confounds attempts to determine necessary medical and decontamination measures. Hence,the current level of understanding and representation of environmental viability degradation in response models is inadequate to inform appropriate emergency response measures. PMID:15884371

  20. The role of genomics in the identification, prediction, and prevention of biological threats.

    Directory of Open Access Journals (Sweden)

    W Florian Fricke

    2009-10-01

    Full Text Available In all likelihood, it is only a matter of time before our public health system will face a major biological threat, whether intentionally dispersed or originating from a known or newly emerging infectious disease. It is necessary not only to increase our reactive "biodefense," but also to be proactive and increase our preparedness. To achieve this goal, it is essential that the scientific and public health communities fully embrace the genomic revolution, and that novel bioinformatic and computing tools necessary to make great strides in our understanding of these novel and emerging threats be developed. Genomics has graduated from a specialized field of science to a research tool that soon will be routine in research laboratories and clinical settings. Because the technology is becoming more affordable, genomics can and should be used proactively to build our preparedness and responsiveness to biological threats. All pieces, including major continued funding, advances in next-generation sequencing technologies, bioinformatics infrastructures, and open access to data and metadata, are being set in place for genomics to play a central role in our public health system.

  1. The Principle of Integration in International Sustainable Development Law (ISDL) with Reference to the Biological Weapons Convention (BWC)

    OpenAIRE

    Marina Abdul Majid; Nor Anita Abdullah; Siti Nurani Mohd Noor; Chan Kok Gan

    2016-01-01

    The Biological Weapons Convention (BWC) does not explicitly refer to sustainable development despite the fact that other United Nations (UN) disarmament documents prescribe that international environmental law principles and sustainable development be considered among arms control agreements. This study’s objective is to utilize the principle of integration’s three components of environmental, economic, and social development, as found in the International Sustainable Development Law (ISDL) ...

  2. The bioterrorism threat by non-state actors hype or horror?

    OpenAIRE

    Thompson, Christopher M.

    2006-01-01

    This thesis provides a capabilities-based approach to assessing the bioterrorism threat from non-state actors. Through comparative case study, prior bioterrorism attacks are analyzed to assess capability in the three areas necessary to complete a biological weapons attack: obtaining or isolating a pathogen, weaponizing the agent, and employing or disseminating the weapon. The three cases are the Rajneeshee cult in 1984, the Aum Shinrikyo cult in the early 1990's, and the United States Posta...

  3. International forum on nuclear and biological decommissioning: Management of global security threats

    International Nuclear Information System (INIS)

    The Forum on Nuclear and Biological Decommissioning: Management of Global Security Threats was organized by the Landau Network-Centro Volta (LNCV) with the support of the UNESCO Venice Office, the Italian Ministry of Foreign Affairs, the Italian National Board for Alternative Energy Sources (ENEA), the Lombardy Region and the Municipality of Como. Subjects dealt with at the conference included the reconversion of nuclear and biological military equipment produced in the 50 years of the Cold War period and the effects of radio contamination on the environment and on human life. This conference was the most recent of a number of initiatives on reconversion organized in collaboration with the UNESCO Venice Office. The issues dealt with at the conference will be among the subjects for discussion at the UNESCO International School Science for Peace, which will be set up at the 'A. Volta' Center for Scientific Culture

  4. A systematic screen of FDA-approved drugs for inhibitors of biological threat agents.

    Directory of Open Access Journals (Sweden)

    Peter B Madrid

    Full Text Available BACKGROUND: The rapid development of effective medical countermeasures against potential biological threat agents is vital. Repurposing existing drugs that may have unanticipated activities as potential countermeasures is one way to meet this important goal, since currently approved drugs already have well-established safety and pharmacokinetic profiles in patients, as well as manufacturing and distribution networks. Therefore, approved drugs could rapidly be made available for a new indication in an emergency. METHODOLOGY/PRINCIPAL FINDINGS: A large systematic effort to determine whether existing drugs can be used against high containment bacterial and viral pathogens is described. We assembled and screened 1012 FDA-approved drugs for off-label broad-spectrum efficacy against Bacillus anthracis; Francisella tularensis; Coxiella burnetii; and Ebola, Marburg, and Lassa fever viruses using in vitro cell culture assays. We found a variety of hits against two or more of these biological threat pathogens, which were validated in secondary assays. As expected, antibiotic compounds were highly active against bacterial agents, but we did not identify any non-antibiotic compounds with broad-spectrum antibacterial activity. Lomefloxacin and erythromycin were found to be the most potent compounds in vivo protecting mice against Bacillus anthracis challenge. While multiple virus-specific inhibitors were identified, the most noteworthy antiviral compound identified was chloroquine, which disrupted entry and replication of two or more viruses in vitro and protected mice against Ebola virus challenge in vivo. CONCLUSIONS/SIGNIFICANCE: The feasibility of repurposing existing drugs to face novel threats is demonstrated and this represents the first effort to apply this approach to high containment bacteria and viruses.

  5. Barents Sea polar bears (Ursus maritimus: population biology and anthropogenic threats

    Directory of Open Access Journals (Sweden)

    Magnus Andersen

    2016-07-01

    Full Text Available This paper examines how anthropogenic threats, such as disturbance, pollution and climate change, are linked to polar bear (Ursus maritimus population biology in the Svalbard and Barents Sea area, with the aim to increase our understanding of how human activity may impact the population. Overharvesting drastically reduced the population of polar bears in the Barents Sea region from about 1870 to 1970. After harvesting was stopped—in 1956 in Russia and 1973 in Norway—the population grew to an estimated 2650 individuals (95% confidence interval 1900–3600 in 2004, and maternity denning in the Svalbard Archipelago became more widely distributed. During recent decades, the population has faced challenges from a variety of new anthropogenic impacts: a range of pollutants, an increasing level of human presence and activity as well as changes in ice conditions. Contaminants bioaccumulate up through the marine food web, culminating in this top predator that consumes ringed, bearded and harp seals. Females with small cubs use land-fast sea ice for hunting and are therefore vulnerable to disturbance by snowmobile drivers. Sea-ice diminution, associated with climate change, reduces polar bears’ access to denning areas and could negatively affect the survival of cubs. There are clear linkages between population biology and current anthropogenic threats, and we suggest that future research and management should focus on and take into consideration the combined effects of several stressors on polar bears.

  6. Functionalized gold nanoparticle supported sensory mechanisms applied in detection of chemical and biological threat agents: A review

    International Nuclear Information System (INIS)

    Highlights: ► Smart sensors are needed for detection of chemical and biological threat agents. ► Smart sensors detect analytes with rapid speed, high sensitivity and selectivity. ► Functionalized gold nanoparticles (GNPs) can potentially smart sense threat agents. ► Functionalized GNPs support multiple analytical methods for sensing threat agents. ► Threat agents of all types can be detected using functionalized GNPs. - Abstract: There is a great necessity for development of novel sensory concepts supportive of smart sensing capabilities in defense and homeland security applications for detection of chemical and biological threat agents. A smart sensor is a detection device that can exhibit important features such as speed, sensitivity, selectivity, portability, and more importantly, simplicity in identifying a target analyte. Emerging nanomaterial based sensors, particularly those developed by utilizing functionalized gold nanoparticles (GNPs) as a sensing component potentially offer many desirable features needed for threat agent detection. The sensitiveness of physical properties expressed by GNPs, e.g. color, surface plasmon resonance, electrical conductivity and binding affinity are significantly enhanced when they are subjected to functionalization with an appropriate metal, organic or biomolecular functional groups. This sensitive nature of functionalized GNPs can be potentially exploited in the design of threat agent detection devices with smart sensing capabilities. In the presence of a target analyte (i.e., a chemical or biological threat agent) a change proportional to concentration of the analyte is observed, which can be measured either by colorimetric, fluorimetric, electrochemical or spectroscopic means. This article provides a review of how functionally modified gold colloids are applied in the detection of a broad range of threat agents, including radioactive substances, explosive compounds, chemical warfare agents, biotoxins, and

  7. Functionalized gold nanoparticle supported sensory mechanisms applied in detection of chemical and biological threat agents: A review

    Energy Technology Data Exchange (ETDEWEB)

    Upadhyayula, Venkata K.K., E-mail: Upadhyayula.Venkata@epa.gov [Oak Ridge Institute of Science and Education (ORISE), MC-100-44, PO Box 117, Oak Ridge, TN 37831 (United States)

    2012-02-17

    Highlights: Black-Right-Pointing-Pointer Smart sensors are needed for detection of chemical and biological threat agents. Black-Right-Pointing-Pointer Smart sensors detect analytes with rapid speed, high sensitivity and selectivity. Black-Right-Pointing-Pointer Functionalized gold nanoparticles (GNPs) can potentially smart sense threat agents. Black-Right-Pointing-Pointer Functionalized GNPs support multiple analytical methods for sensing threat agents. Black-Right-Pointing-Pointer Threat agents of all types can be detected using functionalized GNPs. - Abstract: There is a great necessity for development of novel sensory concepts supportive of smart sensing capabilities in defense and homeland security applications for detection of chemical and biological threat agents. A smart sensor is a detection device that can exhibit important features such as speed, sensitivity, selectivity, portability, and more importantly, simplicity in identifying a target analyte. Emerging nanomaterial based sensors, particularly those developed by utilizing functionalized gold nanoparticles (GNPs) as a sensing component potentially offer many desirable features needed for threat agent detection. The sensitiveness of physical properties expressed by GNPs, e.g. color, surface plasmon resonance, electrical conductivity and binding affinity are significantly enhanced when they are subjected to functionalization with an appropriate metal, organic or biomolecular functional groups. This sensitive nature of functionalized GNPs can be potentially exploited in the design of threat agent detection devices with smart sensing capabilities. In the presence of a target analyte (i.e., a chemical or biological threat agent) a change proportional to concentration of the analyte is observed, which can be measured either by colorimetric, fluorimetric, electrochemical or spectroscopic means. This article provides a review of how functionally modified gold colloids are applied in the detection of a broad

  8. Preparing for and implementing the UN secretary-general's mechanism on alleged use investigation for biological weapons

    International Nuclear Information System (INIS)

    The United Nations Global Counter-Terrorism Strategy was adopted by the UN General Assembly in September 2006. Preventing and responding to attacks using WMD were identified amongst the key areas of activities covered by the strategy. The Secretary-General's mechanism to carry out prompt investigations in response to allegations brought to his attention concerning the possible use of chemical and bacteriological (biological) and toxin weapons was developed in the late 1980s. Triggered by a request from any member State, the Secretary-General is authorized to launch an investigation including dispatching a fact-finding team to the site of the alleged incident(s) and to report to all UN Member States. This is to ascertain in an objective and scientific manner facts of alleged violations of the 1925 Geneva Protocol, which bans the use of chemical and biological weapons. Member States encouraged the Secretary-General in September 2006 to update the roster of experts and laboratories, as well as the technical guidelines and procedures, available to him for the timely and efficient investigation of alleged use. The roster of experts and laboratories and the guidelines and procedures constitute the key elements of the special mechanism available to the Secretary-General for investigation of reports by Member States of alleged use of chemical, biological and toxin weapons. The Office for Disarmament Affairs has been working with Member States since March 2007 to update the roster of experts and laboratories and the technical appendices of the guidelines and procedures so that they fully correspond with the rapid and substantial developments that have occurred in the biological area since the 1980s and also to take into account the fact that an Organization for the Prohibition of Chemical Weapons (OPCW) has since been established. Currently, the roster of experts and laboratories has been updated and includes experts from more than 50 countries. The information available in

  9. Can Iraq be deterred from using weapons of mass destruction?

    OpenAIRE

    Klemick, Michael T

    1997-01-01

    Approved for public release; distribution is unlimited It generally is assumed that the threat of a U.S. nuclear strike deterred the intentional use of chemical and biological weapons by Iraq during the 1991 Persian Gulf War. Evidence suggests that this assumption might be faulty, or at least incomplete. The purpose of this thesis is to test the common wisdom about nuclear deterrence and Iraq's non-use of chemical and biological weapons (CBW) during the Gulf War. This thesis examines the u...

  10. N deposition as a threat to the World's protected areas under the Convention on Biological Diversity

    International Nuclear Information System (INIS)

    This paper combines the world's protected areas (PAs) under the Convention on Biological Diversity (CBD), common classification systems of ecosystem conservation status, and current knowledge on ecosystem responses to nitrogen (N) deposition to determine areas most at risk. The results show that 40% (approx. 11% of total area) of PAs currently receive >10 kg N/ha/yr with projections for 2030 indicating that this situation is not expected to change. Furthermore, 950 PAs are projected to receive >30 kg N/ha/yr by 2030 (approx. twice the 2000 number), of which 62 (approx. 11,300 km2) are also Biodiversity Hotspots and G200 ecoregions; with forest and grassland ecosystems in Asia particularly at risk. Many of these sites are known to be sensitive to N deposition effects, both in terms of biodiversity changes and ecosystem services they provide. Urgent assessment of high risk areas identified in this study is recommended to inform the conservation efforts of the CBD. - Highlights: → Significant areas of the Protected Areas Programme under the CBD will likely be under threat of high N deposition levels by the year 2030.→ Approx. 950 PAs are projected to receive N deposition levels of more than 30 kg N/ha/yr by 2030.→ 62 of these sites are also Biodiversity Hotspots and G200 ecoregions, where forest and grassland ecosystems in Asia will be particularly at risk.→ Many of these sites are known to be sensitive to N deposition effects, both in terms of biodiversity changes and ecosystem services they provide → Urgent assessment of high risk areas identified in this study is recommended to inform the conservation efforts of the CBD. - Significant areas of the UNEP Protected Areas Programme under the CBD receive high N deposition rates that are likely to increase in the future, especially in Asia, and may pose a significant threat to biodiversity.

  11. Dangers in the 1990s: Nuclear, chemical and biological weapons and missile proliferation

    International Nuclear Information System (INIS)

    The revolutionary political changes in Europe, coupled with the situation in Persian Gulf, have thrown into stark relief both the degree to which confidence building measures can create an effective basis for qualitative and quantitative arms limitation and the danger to regional and global peace and security which can arise from dissemination of modern weapons. The concept of proliferation remains never the less a sensitive topic in debates over international security. Attitudes to proliferation in the Asia Pacific region are discussed taking into account the future of the Non-proliferation Treaty and the role of the IAEA nuclear safeguards system

  12. A new threat to bees? Entomopathogenic nematodes used in biological pest control cause rapid mortality in Bombus terrestris

    OpenAIRE

    Dutka, Alexandrea; McNulty, Alison; Williamson, Sally M.

    2015-01-01

    There is currently a great deal of concern about population declines in pollinating insects. Many potential threats have been identified which may adversely affect the behaviour and health of both honey bees and bumble bees: these include pesticide exposure, and parasites and pathogens. Whether biological pest control agents adversely affect bees has been much less well studied: it is generally assumed that biological agents are safer for wildlife than chemical pesticides. The aim of this stu...

  13. Toxins as weapons of mass destruction. A comparison and contrast with biological-warfare and chemical-warfare agents.

    Science.gov (United States)

    Madsen, J M

    2001-09-01

    Toxins are toxic chemical compounds synthesized in nature by living organisms. Classifiable by molecular weight, source, preferred targets in the body, and mechanism of action, they include the most potent poisons on the planet, although considerations of production, weaponization, delivery, environmental stability, and host factors place practical limits on their use as WMD. The two most important toxin threats on the battlefield or in bioterrorism are probably botulinum toxin (a series of seven serotypes, of which botulinum toxin A is the most toxic for humans) and SEB, an incapacitating toxin. Ricin and the trichothecene mycotoxins, including T-2 mycotoxin, are of lesser concern but are still potential threats. Botulinum toxin is a neurotoxin, ricin and trichothecene mycotoxins are membrane-damaging proteins, and SEB is a superantigen capable of massive nonspecific activation of the immune system. The clinical intoxications resulting from exposure to and absorption (usually by inhalation) of these agents reflect their underlying pathophysiology. Because of the hybrid nature of toxins, they have sometimes been considered CW agents and sometimes BW agents. The current trend seems to be to emphasize their similarities to living organisms and their differences from CW agents, but examination of all three groups relative to a number of factors reveals both similarities and differences between toxins and each of the other two categories of non-nuclear unconventional WMD. The perspective that groups toxins with BW agents is logical and very useful for research and development and for administrative and treaty applications, but for medical education and casualty assessment, there are real advantages in clinician use of assessment techniques that emphasize the physicochemical behavior of these nonliving, nonreplicating, intransmissible chemical poisons. PMID:11577702

  14. Functionalized gold nanoparticle supported sensory mechanisms applied in detection of chemical and biological threat agents: a review.

    Science.gov (United States)

    Upadhyayula, Venkata K K

    2012-02-17

    There is a great necessity for development of novel sensory concepts supportive of smart sensing capabilities in defense and homeland security applications for detection of chemical and biological threat agents. A smart sensor is a detection device that can exhibit important features such as speed, sensitivity, selectivity, portability, and more importantly, simplicity in identifying a target analyte. Emerging nanomaterial based sensors, particularly those developed by utilizing functionalized gold nanoparticles (GNPs) as a sensing component potentially offer many desirable features needed for threat agent detection. The sensitiveness of physical properties expressed by GNPs, e.g. color, surface plasmon resonance, electrical conductivity and binding affinity are significantly enhanced when they are subjected to functionalization with an appropriate metal, organic or biomolecular functional groups. This sensitive nature of functionalized GNPs can be potentially exploited in the design of threat agent detection devices with smart sensing capabilities. In the presence of a target analyte (i.e., a chemical or biological threat agent) a change proportional to concentration of the analyte is observed, which can be measured either by colorimetric, fluorimetric, electrochemical or spectroscopic means. This article provides a review of how functionally modified gold colloids are applied in the detection of a broad range of threat agents, including radioactive substances, explosive compounds, chemical warfare agents, biotoxins, and biothreat pathogens through any of the four sensory means mentioned previously. PMID:22244163

  15. Operationalising UN security council resolution 1540: an overview of select practical activities in the chemical and biological weapon-related areas

    International Nuclear Information System (INIS)

    The UN member states are continuing to take measures to inter alia establish and effectively implement controls to prevent the proliferation of nuclear, biological and chemical weapons and their means of delivery in accordance with United Nations Security Council Resolution 1540 (2004). The resolution also encourages enhanced international cooperation on such efforts, including by working through the 1540 Committee. Most analyses on the implementation of the resolution have focused on nuclear issues. This presentation provides an overview of select practical activities in the chemical and biological weapon-related areas, including chemical product classification and identification, biosafety and biosecurity practices and criminal prosecutions for unauthorised chemical transfers.(author)

  16. Southeastern Center for Emerging Biologic Threats tabletop exercise: foodborne toxoplasmosis outbreak on college campuses.

    Science.gov (United States)

    Morris, J Glenn; Greenspan, Allison; Howell, Kelly; Gargano, Lisa M; Mitchell, Joanne; Jones, Jeffrey L; Potter, Morris; Isakov, Alexander; Woods, Christopher; Hughes, James M

    2012-03-01

    The use of tabletop exercises as a tool in emergency preparedness and response has proven to be an effective means of assessing readiness for unexpected events. Whereas most exercise developers target a population in a defined space (eg, state, county, metropolitan area, hospital), the Southeastern Center for Emerging Biologic Threats (SECEBT) conducted an innovative tabletop exercise involving an unusual foodborne outbreak pathogen, targeting public health agencies and academic institutions in 7 southeastern states. The exercise tested the ability of participants to respond to a simulated foodborne disease outbreak affecting the region. The attendees represented 4 federal agencies, 9 state agencies, 6 universities, 1 nonprofit organization, and 1 private corporation. The goals were to promote collaborative relationships among the players, identify gaps in plans and policies, and identify the unique contributions of each organization-and notably academic institutions-to outbreak recognition, investigation, and control. Participants discussed issues and roles related to outbreak detection and management, risk communication, and coordination of policies and responsibilities before, during, and after an emergency, with emphasis on assets of universities that could be mobilized during an outbreak response. The exercise generated several lessons and recommendations identified by participants and evaluators. Key recommendations included a need to establish trigger points and protocols for information sharing and alerts among public health, academic, and law enforcement; to establish relationships with local, state, and federal stakeholders to facilitate communications during an emergency; and to catalogue and leverage strengths, assets, and priorities of academic institutions to add value to outbreak responses. PMID:22283568

  17. Biological Composition of Sewage Sludge in the Aspect of Threats to the Natural Environment

    Directory of Open Access Journals (Sweden)

    Bień January

    2014-12-01

    Full Text Available One of the prerequisites for sustainable development is integrated waste management, including sewage sludge. Besides its good fertilization properties, sewage sludge, which is an inevitable by-product of sewage treatment, accumulates toxic chemical substances and dangerous pathogenic and toxicogenic organisms. Uncontrolled introduction of sewage sludge into soil might pose a serious threat to food chain and natural soil microflora. This in effect might disturb the ecological balance in a particular ecosystem. This study presents author’s own investigations of the sanitary conditions of sewage sludge and the conditions after the processes of aerobic and anaerobic stabilization. The investigated sewage sludge originated from a municipal wastewater treatment plant. The sewage sludge samples were transferred onto proliferation and diagnostic media. The results of the analysis obtained in this study confirmed that sewage sludge is a material which is rich in microorganisms, including pathogenic bacterial species such as: Escherichia coli and Salmonella typhimurium. Mycological tests demonstrated that sewage sludge is a material which is conducive to proliferation of yeast-like and mould-like fungi, among which both pathogenic and toxinogenic species can be present. Quantitative analysis of the investigated sewage sludge demonstrated that the processes of stabilization reduce the content of microorganisms but they do not guarantee product safety in sanitary terms. A huge variability and variety of biological composition points to the need for further research in the field of sanitary characteristics of sewage sludge and survival rate in microorganisms from different types of sewage sludge.

  18. Can an attribution assessment be made for Yellow Rain? Systematic reanalysis in a chemical-and-biological-weapons use investigation.

    Science.gov (United States)

    Katz, Rebecca; Singer, Burton

    2007-03-01

    In intelligence investigations, such as those into reports of chemical- or biological-weapons (CBW) use, evidence may be difficult to assemble and, once assembled, to weigh. We propose a methodology for such investigations and then apply it to a large body of recently declassified evidence to determine the extent to which an attribution can now be made in the Yellow Rain case. Our analysis strongly supports the hypothesis that CBW were used in Southeast Asia and Afghanistan in the late 1970s and early 1980s, although a definitive judgment cannot be made. The proposed methodology, while resource-intensive, allows evidence to be assembled and analyzed in a transparent manner so that assumptions and rationale for decisions can be challenged by external critics. We conclude with a discussion of future research directions, emphasizing the use of evolving information-extraction (IE) technologies, a sub-field of artificial intelligence (AI). PMID:18208344

  19. 激光失能生物学原理与激光失能武器技术%Biological foundation and technical development of disabling laser weapons

    Institute of Scientific and Technical Information of China (English)

    杨在富; 王嘉睿; 钱焕文

    2014-01-01

    Disabling laser weapons are directed energy weapons , which make use of laser energy to fight against the en-emy, deprive them of the ability of to perform military tasks but will not result in death .Based on biological principles , dis-abling laser weapons can be divided into blinding , dazzling or pain-eliciting weapons .In this paper , the biological founda-tion and technical development of disabling laser weapons were reviewed .%激光失能武器是利用光能对敌人实施打击,致其丧失军事作业能力但不会直接致命的定向能武器。激光失能武器依据其生物学原理可分为激光致盲武器、激光眩目武器、激光致痛武器等不同类型。该文对上述激光失能武器的生物学原理和武器技术现状做一综述。

  20. Escalation of terrorism? On the risk of attacks with chemical, biological, radiological and nuclear weapons or materials; Eskalation des Terrors? Ueber das Anschlagsrisiko mit chemischen, biologischen, radiologischen und nuklearen Waffen oder Stoffen

    Energy Technology Data Exchange (ETDEWEB)

    Nass, Jens

    2010-07-01

    The report on the risk of attacks with chemical, biological, radiological and nuclear weapons or materials covers the following topics: the variety of terrorism: ethnic-nationalistic, politically motivated, social revolutionary, political extremism, religious fanaticism, governmental terrorism; CBRN (chemical, biological, radiological, nuclear) weapons and materials: their availability and effectiveness in case of use; potential actor groups; prevention and counter measures, emergency and mitigating measures.

  1. Proliferation of massive destruction weapons: fantasy or reality?

    International Nuclear Information System (INIS)

    This article evaluates the threat of massive destruction weapons (nuclear, chemical, biological) for Europe and recalls the existing safeguards against the different forms of nuclear proliferation: legal (non-proliferation treaty (NPT), comprehensive nuclear test ban treaty (CTBT), fissile material cut off treaty (FMCT) etc..), technical (fabrication of fissile materials, delays). However, all these safeguards can be overcome as proven by the activities of some countries. The situation of proliferation for the other type of massive destruction weapons is presented too. (J.S.)

  2. The threat of nuclear terrorism

    International Nuclear Information System (INIS)

    Full text: There have always been enormous gaps between the potential of a weapon and the abilities and/or the will to employ it by terrorists. New means and methods of violence with unknown outcomes could be less appealing for sub-national groups. Conventional 'off the shelf' weaponry is thus likely to remain the major tools for traditional terrorists. However, the analysis show that while the risk of nuclear terrorism may be remote, it should not and cannot be excluded. Rigorous standards and means the protection, control and accounting of fissile materials are thus needed. 'Nuclear terrorism' can be defined as acts of violence and destruction where the means applied are nuclear devices, or threats of use of such means, to create a condition of fear, to get attention, or to blackmail to have wider effect on others than the directly targeted victim(s). Nuclear terrorism is a subset of radiological terrorism, were the means (or threats) applied are radioactive substances. While being distinctly dissimilar in terms of technical approaches and damage potentials, many of the features with regards to public threat perception are likely to be similar. No non-state actors have ever deployed or used a nuclear device, and the number of (publicly known) nuclear bomb treats has been limited. However, there is a disturbing interest among some terrorist organizations in acquiring nuclear weapon capabilities, probably for tactical purposes. The biological and chemical programs of the Japanese 'Aum Shinrikyo' cult that culminated in the Tokyo metro attack is highly publicized. Less well-known is the nuclear weapon program of the group. Nuclear material was acquired from the sect's properties in Australia and markets were explored to purchase nuclear technology via straw trading companies. Another highly profiled terrorist group with obvious nuclear intentions is the 'Al- Qa'ida', the group of bin Laden. The recent trail for the bombings of the U.S. embassies in Nairobi, Kenya

  3. Fire control apparatus for a laser weapon

    Science.gov (United States)

    Worsham, R. H.

    1985-10-01

    This patent application discloses a laser weapon fire control computer apparatus for responding in real time to the escort/threat scenario that confronts the weapon. The fire control computer apparatus compares the threat data with stored predicted scenarios to develop a firing strategy menu which takes into account the fact that the laser energy is instantaneously propagated to the target but requires a substantial amount of time to inflict damage. The fire control computer apparatus utilizes the weapon's status, dwell time, slow time and fuel limits to yield a weapon pointing sequence and weapon on-off times.

  4. Biological Treatments: New Weapons in the Management of Monogenic Autoinflammatory Disorders

    Directory of Open Access Journals (Sweden)

    Antonio Vitale

    2013-01-01

    Full Text Available Treatment of monogenic autoinflammatory disorders, an expanding group of hereditary diseases characterized by apparently unprovoked recurrent episodes of inflammation, without high-titre autoantibodies or antigen-specific T cells, has been revolutionized by the discovery that several of these conditions are caused by mutations in proteins involved in the mechanisms of innate immune response, including components of the inflammasome, cytokine receptors, receptor antagonists, and oversecretion of a network of proinflammatory molecules. Aim of this review is to synthesize the current experience and the most recent evidences about the therapeutic approach with biologic drugs in pediatric and adult patients with monogenic autoinflammatory disorders.

  5. The nuclear threat and the Nuclear Threat Initiative

    International Nuclear Information System (INIS)

    Full text: President and chief operating officer of the Nuclear Threat Initiative (NTI), was invited by the IAEA Director General to speak about NTI and its mission at the IAEA Safeguards Symposium. Established by CNN founder Ted Turner and former U.S. Senator Sam Nunn, NTI is a charitable organization working to strengthen global security by reducing the risk of use and preventing the spread of nuclear, biological and chemical weapons. The foundation is global, concentrating not just on the United States, Russia, and other nations of the former Soviet Union, but also on those regions of greatest proliferation concern in Asia and the Middle East. NTI is working to close what it perceives as an increasingly dangerous gap between the threat from nuclear, biological and chemical weapons and the global response. NTI is supported by a pledge from Mr. Turner of at least $250 million over five years, among the largest sums any private individual has ever invested in these security issues. NTI's Board of Directors, an international team of experienced and knowledgeable experts, determines the overall direction of the foundation. (author)

  6. The Principle of Integration in International Sustainable Development Law (ISDL with Reference to the Biological Weapons Convention (BWC

    Directory of Open Access Journals (Sweden)

    Marina Abdul Majid

    2016-02-01

    Full Text Available The Biological Weapons Convention (BWC does not explicitly refer to sustainable development despite the fact that other United Nations (UN disarmament documents prescribe that international environmental law principles and sustainable development be considered among arms control agreements. This study’s objective is to utilize the principle of integration’s three components of environmental, economic, and social development, as found in the International Sustainable Development Law (ISDL from the New Delhi Declaration (Delhi Declaration of Principles of International Law Relating to Sustainable Development, in order to evaluate whether the BWC contains such components; thereby, making it possible for the BWC to contribute to sustainable development. The methodology of this study is necessarily qualitative, given that it is a socio-legal research that relies on international agreements such as the BWC, declarations, resolutions, plans of implementation, other non-binding documents of the UN, and secondary resources—all of which are analyzed through a document analysis. The results show that the BWC addresses the environment (Article II, prohibits transfers relating to export controls, international trade, and economic development (Article III, while at the same time, covering social development concerns, health, and diseases that make up the international social law (Article X. Since the BWC is found to be capable of contributing to sustainable development, it is concluded that ISDL cannot be restricted to international environmental, economic, and social law, but should be expanded to include international arms control law.

  7. AB Blanket for Cities (for continual pleasant weather and protection from chemical, biological and radioactive weapons)

    CERN Document Server

    Bolonkin, Alexander

    2009-01-01

    In a series of previous articles (see references) the author offered to cover a city or other important large installations or subregions by a transparent thin film supported by a small additional air overpressure under the form of an AB Dome. The building of a gigantic inflatable AB Dome over an empty flat surface is not difficult. However, if we want to cover a city, garden, forest or other obstacle course we cannot easily deploy the thin film over building or trees. In this article is suggested a new method which solves this problem. The idea is to design a double film blanket filled by light gas (for example, methane, hydrogen, or helium). Sections of this AB Blanket are lighter then air and fly in atmosphere. They can be made on a flat area (serving as an assembly area) and delivered by dirigible or helicopter to station at altitude over the city. Here they connect to the already assembled AB Blanket subassemblies, cover the city in an AB Dome and protect it from bad weather, chemical, biological and rad...

  8. Refocusing NATO's intelligence outlook towards biological warfare

    OpenAIRE

    Villareal, Claro William.

    1996-01-01

    Approved for public release; distribution is unlimited Today, we are attempting to manage chaos. With the end of the Cold War, a number of troubling developments in the world have been unleashed, especially the proliferation of WMD. Biological weapons are an increasing threat to world security. Nations and non-state actors are willing to sell or buy the necessary technologies for the production of biological weapons which can have disastrous effects on a military, an economy, and the envir...

  9. Pakistan's national legislation entitled: 'Export Control on Goods, Technologies, Material and Equipment related to Nuclear and Biological Weapons and their Delivery Systems Act, 2004'

    International Nuclear Information System (INIS)

    The Director General has received a letter from the Permanent Mission of Pakistan, dated 4 November 2004, concerning Pakistan's national legislation entitled 'Export Control on Goods, Technologies, Material and Equipment related to Nuclear and Biological Weapons and their Delivery Systems Act, 2004'. As requested by the Permanent Mission of Pakistan, the letter and the Export Control Act of 2004, are reproduced herein for the information of the Member States

  10. The construction of imaginaries of the public as a threat to synthetic biology

    OpenAIRE

    Marris, C.

    2015-01-01

    Scientific institutions and innovation-focused government bodies have identified public attitudes to synthetic biology as an obstruction to the field. This view is based on a perception that the public is (or will likely become) fearful of synthetic biology and that a ‘public scare’ would impede development of the field. Fear of the public's fear of synthetic biology, which I characterise as ‘synbiophobia-phobia’, has been the driving force behind the promotion of public engagement and other ...

  11. Weapons of mass destruction, WMD

    International Nuclear Information System (INIS)

    Purpose: Since the invasion into Iraq in 2003, weapons of mass destruction (WMD), have come to general notice; they include today chemical, biological, and atomic/nuclear weapons, (CW, BW, and AW). Radiological findings shall be described. Material and methods: X-ray findings of victims of WMD are described. From CW, own observations are reported. Examples of (possible) X-ray findings of victims of BW are described. AW may induce radiation disease. Results: Exposure to sulfur-lost induces severe bronchitis; if the radiograph shows pulmonary infiltrations, the prognosis is bad; a late consequence maybe bronchiectasis. BW can be based on bacteria, virus or toxins. An approach of the X-ray findings for BW victims is based on the assumption that the disease induced by BW has the same (or a similar) clinic and radiology as that induced by the original microorganism or by the unchanged toxism. This approximation may have its limits, if the germ or toxin has been modified. In survivors of AW, the radiology is probably that of victims of thermal radiation and blast. Conclusion: WMD seem to be a real or a possible threat. They can be used in war, in terrorist attacks, in crime, and in action of secret services. In case that WMD are employed, X-ray diagnostic will be used to evaluate the prognosis (triage) and the risk of infection

  12. Special Weapons

    Data.gov (United States)

    Federal Laboratory Consortium — Supporting Navy special weapons, the division provides an array of engineering services, technical publication support services, logistics support services, safety...

  13. A Biological Security Motivation System for Potential Threats: Are There Implications for Policy-Making?

    Directory of Open Access Journals (Sweden)

    Erik Z Woody

    2013-09-01

    Full Text Available Research indicates that there is a specially adapted, hard-wired brain circuit, the security motivation system, which evolved to manage potential threats, such as the possibility of contamination or predation. The existence of this system may have important implications for policy-making related to security. The system is sensitive to partial, uncertain cues of potential danger, detection of which activates a persistent, potent motivational state of wariness or anxiety. This state motivates behaviours to probe the potential danger, such as checking, and to correct for it, such as washing. Engagement in these behaviours serves as the terminating feedback for the activation of the system. Because security motivation theory makes predictions about what kinds of stimuli activate security motivation and what conditions terminate it, the theory may have applications both in understanding how policy-makers can best influence others, such as the public, and also in understanding the behavior of policy-makers themselves.

  14. [The experiments conducted by Japanese on human guinea pigs, and the use of biological weapons during the Sino-Japanese war (1937-1945)].

    Science.gov (United States)

    Sabbatani, Sergio

    2014-09-01

    Starting from the end of the nineteenth century, and during the first four decades of the past century, Japan showed considerable military expansion, on the back of a pan-Asiatic and imperialistic ideology, comparable only to those expressed by Wilhelmian and Nazi Germany. This growth led to Japan playing an extremely important role in the Asia-Pacific continent, which unavoidably brought the country onto a collision course with the British Empire and the United States of America. The Japanese general Shiro Ishii, who had undoubted organisational abilities but also a propensity for crimes against mankind, starting from the end of the 1920s and during the subsequent decade, under the suggestion of a military physician, developed a research programme to obtain biological weapons, since he was aware of the lack of raw materials, technology and scientific background in nuclear weapons. This project was taken forward despite Japan's ratification of the Geneva protocol, undersigned by 70 nations, which posed strict limits to the use of both biological and chemical weapons. In actual fact, the protocol allowed these weapons for defensive purposes, and permitted their experimental development. The research programme, developed with the support of the high command of the Japanese army and certainly known by the Emperor (Tenno) Hirohito, had its operative basis from the year 1932 in the satellite state of Manchukuo, but later and paralleling the increased, aggressive behaviour towards China and the English and American colonies during World War II, spread towards other Asian provinces occupied by the Japanese armies, with other operative units. In these dedicated bases, which were true concentration camps, numerous experiments were carried out on human guinea pigs, frequently concluding with vivisection. Among others, experiments of freezing, thirst, hunger, loss of blood, wounding with firearms, and bone fractures, were performed, as well as the inoculation of

  15. A new threat to bees? Entomopathogenic nematodes used in biological pest control cause rapid mortality in Bombus terrestris.

    Science.gov (United States)

    Dutka, Alexandrea; McNulty, Alison; Williamson, Sally M

    2015-01-01

    There is currently a great deal of concern about population declines in pollinating insects. Many potential threats have been identified which may adversely affect the behaviour and health of both honey bees and bumble bees: these include pesticide exposure, and parasites and pathogens. Whether biological pest control agents adversely affect bees has been much less well studied: it is generally assumed that biological agents are safer for wildlife than chemical pesticides. The aim of this study was to test whether entomopathogenic nematodes sold as biological pest control products could potentially have adverse effects on the bumble bee Bombus terrestris. One product was a broad spectrum pest control agent containing both Heterorhabditis sp. and Steinernema sp., the other product was specifically for weevil control and contained only Steinernema kraussei. Both nematode products caused ≥80% mortality within the 96 h test period when bees were exposed to soil containing entomopathogenic nematodes at the recommended field concentration of 50 nematodes per cm(2) soil. Of particular concern is the fact that nematodes from the broad spectrum product could proliferate in the carcasses of dead bees, and therefore potentially infect a whole bee colony or spread to the wider environment. PMID:26618084

  16. How to weaponize anthrax?

    OpenAIRE

    Dizer, Ufuk; Levent KENAR; ORTATATLI, Mesut; Karayılanoğlu, Turan

    2013-01-01

    Anthrax, a zoonotic disease caused by  Bacillusanthracis, occurs in domesticated and wild animals-primarily herbivores. Humans usually become infectedby contact with infected animals or their products.Anthrax is so easy to obtain that it could be weaponizedfor biological warfare if a laboratory area of 5 m2  isowned with 10.000$.Key words: Anthrax, weapon, spore, Bacillus anthracis

  17. Strategy for responding to nuclear, radiological, biological and chemical threats in Switzerland

    International Nuclear Information System (INIS)

    The Confederation and the cantons share responsibility for protecting the population against NBC hazards. To honour this responsibility, preparatory measures are taken at both civilian and military level. Assignment of responsibilities is based on the type and seriousness of the given threat. At present, preparations break down as follows: 1) Civil protection at cantonal and municipal level is well regulated. Ensuring the effective management of minor or moderately serious incidents. Command organisations and intervention units are well trained. However, NBC protection equipment must be improved (especially in relation to rapid analysis and decontamination) to ensure that initial useable evidence can be obtained nationwide and within an expedient period of time. This will, in turn guarantee that swift action is taken. 2) There is no central command body for NBC incidents, which would provide leadership at the federal level and would coordinate federal subsidiary resources should a NBC incident occur. 3) As a general rule, much is known about civilian risks (industrial accidents or accidents involving the transport of hazardous goods) thanks to a wealth of studies conducted on this subject. Cantonal and municipal contingency plans guarantee effective incident management. However, what is missing is the tested cooperation between intercantonal, cantonal-federal and civilian-military. These bodies need to take part in joint training exercises, with the involvement of political leaders. 4) In terms of prevention and interventions, additional efforts should be made to prevent the criminal or terrorist deployment of NBC resources. For example, clear orders should be issued on the deployment of subsidiary resources which the Confederation makes available to the cantons, municipalities and regions. The fourteen reference scenarios developed by the ComNBC illustrate the range of current hazards, analyse existing preparations and enable us to observe the following: 1

  18. N deposition as a threat to the World's protected areas under the Convention on Biological Diversity

    Energy Technology Data Exchange (ETDEWEB)

    Bleeker, A., E-mail: a.bleeker@ecn.nl [Energy research Centre of the Netherlands (ECN), P.O. Box 1, 1755ZG Petten (Netherlands); Hicks, W.K. [Stockholm Environment Institute (SEI), University of York (United Kingdom); Dentener, F. [European Commission, Joint Research Centre, Ispra (Italy); Galloway, J. [University of Virginia, VA (United States); Erisman, J.W. [Energy research Centre of the Netherlands (ECN), P.O. Box 1, 1755ZG Petten (Netherlands); VU University Amsterdam (Netherlands)

    2011-10-15

    This paper combines the world's protected areas (PAs) under the Convention on Biological Diversity (CBD), common classification systems of ecosystem conservation status, and current knowledge on ecosystem responses to nitrogen (N) deposition to determine areas most at risk. The results show that 40% (approx. 11% of total area) of PAs currently receive >10 kg N/ha/yr with projections for 2030 indicating that this situation is not expected to change. Furthermore, 950 PAs are projected to receive >30 kg N/ha/yr by 2030 (approx. twice the 2000 number), of which 62 (approx. 11,300 km{sup 2}) are also Biodiversity Hotspots and G200 ecoregions; with forest and grassland ecosystems in Asia particularly at risk. Many of these sites are known to be sensitive to N deposition effects, both in terms of biodiversity changes and ecosystem services they provide. Urgent assessment of high risk areas identified in this study is recommended to inform the conservation efforts of the CBD. - Highlights: > Significant areas of the Protected Areas Programme under the CBD will likely be under threat of high N deposition levels by the year 2030.> Approx. 950 PAs are projected to receive N deposition levels of more than 30 kg N/ha/yr by 2030.> 62 of these sites are also Biodiversity Hotspots and G200 ecoregions, where forest and grassland ecosystems in Asia will be particularly at risk.> Many of these sites are known to be sensitive to N deposition effects, both in terms of biodiversity changes and ecosystem services they provide > Urgent assessment of high risk areas identified in this study is recommended to inform the conservation efforts of the CBD. - Significant areas of the UNEP Protected Areas Programme under the CBD receive high N deposition rates that are likely to increase in the future, especially in Asia, and may pose a significant threat to biodiversity.

  19. Rapid Detection of Biological and Chemical Threat Agents Using Physical Chemistry, Active Detection, and Computational Analysis

    Energy Technology Data Exchange (ETDEWEB)

    Chung, Myung; Dong, Li; Fu, Rong; Liotta, Lance; Narayanan, Aarthi; Petricoin, Emanuel; Ross, Mark; Russo, Paul; Zhou, Weidong; Luchini, Alessandra; Manes, Nathan; Chertow, Jessica; Han, Suhua; Kidd, Jessica; Senina, Svetlana; Groves, Stephanie

    2007-01-01

    Basic technologies have been successfully developed within this project: rapid collection of aerosols and a rapid ultra-sensitive immunoassay technique. Water-soluble, humidity-resistant polyacrylamide nano-filters were shown to (1) capture aerosol particles as small as 20 nm, (2) work in humid air and (3) completely liberate their captured particles in an aqueous solution compatible with the immunoassay technique. The immunoassay technology developed within this project combines electrophoretic capture with magnetic bead detection. It allows detection of as few as 150-600 analyte molecules or viruses in only three minutes, something no other known method can duplicate. The technology can be used in a variety of applications where speed of analysis and/or extremely low detection limits are of great importance: in rapid analysis of donor blood for hepatitis, HIV and other blood-borne infections in emergency blood transfusions, in trace analysis of pollutants, or in search of biomarkers in biological fluids. Combined in a single device, the water-soluble filter and ultra-sensitive immunoassay technique may solve the problem of early warning type detection of aerosolized pathogens. These two technologies are protected with five patent applications and are ready for commercialization.

  20. US nuclear weapons policy

    Energy Technology Data Exchange (ETDEWEB)

    May, M.

    1990-12-05

    We are closing chapter one'' of the nuclear age. Whatever happens to the Soviet Union and to Europe, some of the major determinants of nuclear policy will not be what they have been for the last forty-five years. Part of the task for US nuclear weapons policy is to adapt its nuclear forces and the oganizations managing them to the present, highly uncertain, but not urgently competitive situation between the US and the Soviet Union. Containment is no longer the appropriate watchword. Stabilization in the face of uncertainty, a more complicated and politically less readily communicable goal, may come closer. A second and more difficult part of the task is to deal with what may be the greatest potential source of danger to come out of the end of the cold war: the breakup of some of the cooperative institutions that managed the nuclear threat and were created by the cold war. These cooperative institutions, principally the North Atlantic Treaty Organization (NATO), the Warsaw Pact, the US-Japan alliance, were not created specifically to manage the nuclear threat, but manage it they did. A third task for nuclear weapons policy is that of dealing with nuclear proliferation under modern conditions when the technologies needed to field effective nuclear weapons systems and their command and control apparatus are ever more widely available, and the leverage over some potential proliferators, which stemmed from superpower military support, is likely to be on the wane. This paper will make some suggestions regarding these tasks, bearing in mind that the unsettled nature of that part of the world most likely to become involved in nuclear weapons decisions today must make any suggestions tentative and the allowance for surprise more than usually important.

  1. The nuclear threat

    International Nuclear Information System (INIS)

    For a long time, a small group of big powers has been the only holder of nuclear weapons (US, USSR, Great Britain, France and China). Since then, new weapons have come out on the geopolitical scene: Israel, India, Pakistan, and some others remain uncertain and generate a worrying atmosphere (North Korea, Iran..). But what is the real risk with nuclear proliferation? Should we dread about it? Is nuclear terrorism a real threat? What are the political stakes of nuclear weapons? Is disarmament a real solution? These are some of the questions that the author answers in a precise and clear manner in this book. Contents: 1 - from monopoly to proliferation: who owns nuclear weapons today, why is it so coveted, is it easy to make one?; 2 - the newcomers: what do we really know about the Iranian nuclear programme, Iran and North Korea: between negotiation and confrontation; 3 - international control and regulation: do we have reliable information, how do we know what we know, Iraq: was there a 'lie' somewhere, who are the states who have renounced nuclear weapons?; 4 - the future: is there still a nuclear warfare risk, what if Pakistani weapons fall into islamic hands, is nuclear terrorism a fantasy or a real risk?

  2. Antisatellite weapons

    International Nuclear Information System (INIS)

    The authors take issue with the assessment that the advent of antisatellite weapons implies that the beneficial role of satellites in arms control, confidence building, and conflict resolution has been judged less important than their ability to support actual military operations. They argue that there is still an opportunity to negotiate a militarily significant and verifiable constraint on the growth of antisatellite technology that would be in the security interest of the US and the world as a whole. They base their opinion on an assessment of the roles of the existing military satellites and their vulnerability to antisatellite weapons and the probable impact of antisatellite weapons on various kinds of crisis and conflict. 10 figures, 1 table

  3. Bioterrorism and Biological Warfare, from Past to the Present: A classic review

    OpenAIRE

    Majid Zare Bidaki; Mahdi Balalimood

    2015-01-01

    Bioterrorism is defined as any terrorist action of intentional release or dissemination of highly pathogenic biological agents, including a variety of microorganisms or biological toxins. With the growing threat of terrorism, is necessary that the potential danger of various microorganisms – as a powerful tool of aggression and threat- to be taken seriously. This review tries to explain the concept of biological weapons and their historical development process with an emphasis on ef...

  4. China Threat, What Threat?

    Institute of Scientific and Technical Information of China (English)

    2008-01-01

    Since the end of the Cold War, China has become the candidate of choice among "illusionist" hawks looking to justify Pentagon spending. Henry Rosemont, a professor emeritus at St Mary’s CoUege of Maryland and a visiting scholar in the Religious Studies Department at Brown University, recently wrote an article for Asia Times Online, saying that facts belie the claims of China’s military threat

  5. Communication of 19 January 2006 from the Permanent Mission of Pakistan to the Agency concerning 'Control Lists of Goods, Technologies, Materials and Equipment related to Nuclear and Biological Weapons and their Delivery Systems' adopted by Pakistan

    International Nuclear Information System (INIS)

    The Director General has received a letter from the Resident Representative of Pakistan, dated 19 January 2006, attaching a statutory regulatory order containing the 'Control Lists of Goods, Technologies, Materials and Equipment related to Nuclear and Biological Weapons and their Delivery Systems' adopted by Pakistan. As requested in the letter, the letter and its attachment are herewith circulated for the information of Member States

  6. MRT letter: Human bloodstains on antique aboriginal weapons: a guiding low-vacuum SEM study of erythrocytes in experimental samples on ethnographically documented biological raw materials.

    Science.gov (United States)

    Hortolà, Policarp

    2012-08-01

    The aboriginal use of reed and bone as raw materials for knives and daggers, respectively, has been well-documented ethnographically in some geographical areas of Melanesia. Because of the significant role that these weapons played in inter- and intra-ethnic aggression, they can potentially have retained smears from the contact with human blood. To carry out a guiding low-vacuum scanning electron microscopy (SEM) study of specific interest to ethnography, the outsides of a fragment of stalk of giant cane (Arundo donax) and tibial diaphysis of domestic sheep (Ovis aries) were smeared with peripheral human blood. No biological specimen preparation was applied to the samples. After just over 1 month, bloodstain boundaries and their neighboring inner areas were examined via secondary electrons by a variable-pressure SEM (VP-SEM) working in low-vacuum mode. On both substrates, bloodstains exhibited micro-scales. No janocyte (erythrocyte negative replica) was observed in the examined areas. However, erythrocytes were seen crowded together as grain-shaped corpuscles in the smear on reed, and several hecatocytes (moon-like shaped erythrocytes) were evidenced in the smear on bone. The results of this study suggest that a VP-SEM working in low-vacuum mode can be used fruitfully to detect blood remains in medium-sized reed and bone antique aboriginal artifacts. This procedure can prospectively help to ethnographic museum curators and aboriginal-art surveyors as an easy guiding test in the valuation of antique traditional weapons prior to acquisition, when the real use of a piece has been claimed by the supplier. PMID:22648991

  7. Proliferation of massive destruction weapons: fantasy or reality?; La proliferation des armes de destruction massive: fantasme ou realite?

    Energy Technology Data Exchange (ETDEWEB)

    Duval, M

    2001-09-01

    This article evaluates the threat of massive destruction weapons (nuclear, chemical, biological) for Europe and recalls the existing safeguards against the different forms of nuclear proliferation: legal (non-proliferation treaty (NPT), comprehensive nuclear test ban treaty (CTBT), fissile material cut off treaty (FMCT) etc..), technical (fabrication of fissile materials, delays). However, all these safeguards can be overcome as proven by the activities of some countries. The situation of proliferation for the other type of massive destruction weapons is presented too. (J.S.)

  8. Military and diplomatic roles and options for managing and responding to the proliferation of ballistic missiles and weapons of mass destruction. Final report: Program on Stability and the Offense/Defense Relationship

    Energy Technology Data Exchange (ETDEWEB)

    Hallenbeck, R.A.; Gill, J.M.; Murray, B.L.

    1993-05-26

    The March seminar, ``Military and Diplomatic Roles and Options`` for managing and responding to proliferation, featured three presentations: the military and diplomatic implications of preemptive force as a counterproliferation option; an in-depth assessment of the threat posed by biological weapons; and, a new proposed US counterproliferation policy.

  9. An integrated approach to risk assessment and mitigating the CBRN threat

    International Nuclear Information System (INIS)

    CBRN mass casualty events threat mitigation remains today the highest international priority. Although significant progress has been made, the national security requirements for efforts to combat Weapons of Mass Destruction and Weapons of Mass Disruption will be of the highest national priority in the near future. An integration of a number of approaches is essential in the risk assessment and mitigating the CBRN treat. Preparedness measures and procedures, engineering, science and technology, policy, medical, and emergency response are essential to reduce the threat from the proliferation and use of weapons of mass destruction (WMD). Improved coordination between international, public and private security entities is also essential task to hopefully prevent the terrorist attacks. In this lecture, it will be presented very important scientific approach to risk assessment of potential use of nuclear, radiological, biological or chemical weapons in terrorist actions. An integrated approach for mitigating the CBRN threat, crisis management and preparedness measures for prevention and reduction of potential consequences, will be presented.(author)

  10. Animal Botulism Outcomes in the AniBioThreat Project

    DEFF Research Database (Denmark)

    Woudstra, Cédric; Tevell Åberg, Annica; Skarin, Hanna;

    2013-01-01

    and botulinum neurotoxins are considered potential weapons for bioterrorism and have been included in the Australia Group List of Biological Agents. In 2010 the European Commission (DG Justice, Freedom and Security) funded a 3-year project named AniBioThreat to improve the EU's capacity to counter...... required acquiring new genetic information to better understand the diversity of these Clostridia and develop detection methods targeting both highly specific genetic markers of these Clostridia and the neurotoxins they are able to produce. Several European institutes participating in the Ani...

  11. No first use of nuclear weapons

    International Nuclear Information System (INIS)

    This paper reports that at present, nuclear weapons are considered legitimate, if terrible, weapons, usable as other weapons are for national purposes. In the West and in the East, strategy, military forces, readiness posture, all are based fundamentally on the threat and, ultimately, the use of nuclear weapons. In the West this threat is directed not only against a nuclear attack against the US or its allies, but also against conventional, non-nuclear operations beyond our ability to hold. The term for such nuclear deterrence of non-nuclear hostilities is extended deterrence. It has been at the heart of US and NATO policy for a generation. In the East, the Soviet Union has declared a policy of No First Use of nuclear weapons, a declaration, that is to say, that they would not be the first to use nuclear weapons in any future hostilities, that they would fire them only in retaliation against nuclear attack. To make that declaration a sure control over Soviet and Warsaw Pact decisions and actions in crisis, however, and to make it so convincing to others that they can, cautiously, rely on it, the governmental announcement of the No First Use must be supplemented by a host of implementing and indoctrinating measures that are yet to be taken. Nuclear preemption, first use, has not yet by any means been eliminated from Soviet doctrine, force structures and weapons programmes

  12. Workshop Report from the 33rd Workshop of the Pugwash Study Group on the Implementation of the Chemical and Biological Weapons Conventions: Achieving Realistic Decisions at the Seventh BWC Review Conference in 2011.

    OpenAIRE

    Revill, James

    2012-01-01

    This workshop was hosted by the Association Suisse de Pugwash in association with the Geneva International Peace Research Institute GIPRI. The meeting was supported by a grant provided by the Swiss federal authorities. The workshop took place immediately prior to the Seventh Review Conference on the operation of the Biological Weapons Convention (BWC) in December 2011. It was attended by 57 participants, all by invitation and in their personal capacities, from 17 countries including, A...

  13. Degree of threat to the biological diversity in the Ilha Grande State Park (RJ and guidelines for conservation

    Directory of Open Access Journals (Sweden)

    ALHO C. J. R.

    2002-01-01

    Full Text Available The State Park of Ilha Grande is only a part (5,594 hectares of the entire island (19,300 hectares which is located off the south coast of Rio de Janeiro state, between the cities of Mangaratiba and Angra dos Reis. Approximately half of the Park area (47% is covered by dense Atlantic forest. The secondary forest growth is in a process of ecological succession close to attaining maturity (43% and the remaining part (10% is composed of human-altered areas (1%, rocky outcrops with herbaceous vegetation (7%, mangroves and beaches (2%. The fauna is well represented but already shows signs of degradation with introduced species. The analysis of the degree of threat has shown that the dense forest habitat has a relatively stable status of conservation while the secondary forest, the mangrove and the herbaceous vegetation on rocky outcrops (and their fauna are categorized as vulnerable. The area altered by human occupation is considered threatened. Since the coastal area where Ilha Grande is located is well known for its beautiful scenery (known as the green coast, because of the contrast between the ocean and the Atlantic forest covering the Serra do Mar mountain chain. There is a strong possibility for tourism to become the means in which to achieve economic sustainability for conservation. Contradictorily, tourism is also the major threat to local biodiversity and its landscape units. Because tourism is not organized and controlled, during high season the numbers grow above local capacity, giving rise to a proliferation of hotels, guesthouses and camping grounds. The resulting untreated open sewage, random garbage disposal and other harmful activities form the major threats to biodiversity.

  14. New Proposal for the Detection of Concealed Weapons: Electromagnetic Weapon Detection for Open Areas

    OpenAIRE

    Agurto Goya, Alan

    2009-01-01

    Terrorist groups, hijackers, and people hiding guns and knifes are a constant and increasing threat Concealed weapon detection (CWO) has turned into one of the greatest challenges facing the law enforcement community today. Current screening procedures for detecting concealed weapons such as handguns and knives are common in controlled access settings such as airports, entrances to sensitive buildings and public events. Unfortunately screening people in this way prior to entering controlled a...

  15. The Threat of Terrorist Organizations in Cyberspace

    Directory of Open Access Journals (Sweden)

    Gabi Siboni

    2013-12-01

    Full Text Available This article discusses the threat of terrorism in cyberspace and examines the truth of the perceptions of this threat that have formed in recent years. It examines the capabilities that a non-state actor can achieve and whether these can constitute a real threat to the national security of states. For an analysis of the main threats facing a state from a multi-year perspective and in light of anticipated changes in a state’s strategic balance, the factors that threaten the state are presented and the roots of the threat are identified. The article thus examines whether terrorism, whose impact is generally tactical, could make (or perhaps has already made the transition to a cyber weapon capability with strategic impact. Specifically, the question is could terrorists develop cyber weapon capabilities that could inflict widespread damage or damage over time, of the sort that brings states to their knees and causes critical systems to crash.

  16. Stereotype Threat.

    Science.gov (United States)

    Spencer, Steven J; Logel, Christine; Davies, Paul G

    2016-01-01

    When members of a stigmatized group find themselves in a situation where negative stereotypes provide a possible framework for interpreting their behavior, the risk of being judged in light of those stereotypes can elicit a disruptive state that undermines performance and aspirations in that domain. This situational predicament, termed stereotype threat, continues to be an intensely debated and researched topic in educational, social, and organizational psychology. In this review, we explore the various sources of stereotype threat, the mechanisms underlying stereotype-threat effects (both mediators and moderators), and the consequences of this situational predicament, as well as the means through which society and stigmatized individuals can overcome the insidious effects of stereotype threat. Ultimately, we hope this review alleviates some of the confusion surrounding stereotype threat while also sparking further research and debate. PMID:26361054

  17. A review of research on common biological agents and their impact on environment

    International Nuclear Information System (INIS)

    Biological agents are unique class of microorganisms which can be used to produce the disease in large populations of humans, animals and plants. If used for hostile purposes, any disease-causing microorganism could be considered a weapon. The use of biological agents is not a new concept and history is replete with examples of biological weapon use. Before the twenty century, biological warfare took on three main forms by deliberate poisoning of food and water with infectious material, use of microorganisms or toxins in some form of weapon system, and use of biologically inoculated fabrics. Four kinds of biological warfare agents are bacteria, viruses, rickettsiae, fungi. These are distinguished by being living organisms, that reproduce within their host victims, who then become contagious with a deadly multiplier effect, bacteria, viruses, or fungi or toxin found in nature can be used to kill or injure people. Biological agents may be used for an isolated assassination, as well as to cause incapacitation or death to thousands. These biological agents represent a dangerous military threat because they are alive, and are therefore unpredictable and uncontrollable once released. The act of bioterrorism can range from a simple hoax to the actual use of biological weapons. Biological agents have the potential to make an environment more dangerous over time. If the environment is contaminated, a long-term threat to the population could be created. This paper discusses common biological agents, their mode of action in living organisms and possible impact on the environment. (author)

  18. Metal Detector Searches: An Effective Means To Help Keep Weapons Out of Schools.

    Science.gov (United States)

    Johnson, Robert S.

    2000-01-01

    Disagrees with Ferraraccio's views and argues that: (1) students do bring illegal weapons to school; (2) metal detectors do detect weapons and help schools to disarm students; (3) disarming students reduces the threat of violence; and (4) courts have repeatedly approved the constitutionality of weapon-related suspicionless student searches…

  19. Nuclear weapons modernizations

    Energy Technology Data Exchange (ETDEWEB)

    Kristensen, Hans M. [Federation of American Scientists, Washington, DC (United States)

    2014-05-09

    This article reviews the nuclear weapons modernization programs underway in the world's nine nuclear weapons states. It concludes that despite significant reductions in overall weapons inventories since the end of the Cold War, the pace of reductions is slowing - four of the nuclear weapons states are even increasing their arsenals, and all the nuclear weapons states are busy modernizing their remaining arsenals in what appears to be a dynamic and counterproductive nuclear competition. The author questions whether perpetual modernization combined with no specific plan for the elimination of nuclear weapons is consistent with the nuclear Non-Proliferation Treaty and concludes that new limits on nuclear modernizations are needed.

  20. End the nuclear threat

    International Nuclear Information System (INIS)

    's promises and commitments. Fulfilling our promises in the Nuclear Non-Proliferation Treaty, now with 189 member States, must be a primary aim. This Treaty, essential to our security, will be reviewed formally in 2005 at the UN. The International Atomic Energy Agency (IAEA) performs a vital role under the Treaty - it's the world's nuclear inspectorate to check that countries are not pursuing nuclear weapons. I've had the chance to visit the UN and IAEA at their headquarters in Vienna, Austria, and know how tough the job can be. We need to back the IAEA and make sure it stays strong in our fight against nuclear weapons. At the 2000 Review of the Treaty, the US along with all other parties to the Treaty made a pledge. Let me remind you of what was promised, and I quote: 'an unequivocal undertaking by the nuclear weapons States to accomplish the total elimination of their nuclear arsenals. leading to nuclear disarmament.' There are tens of thousands of nuclear weapons in the world, over 90% are possessed by Russia and the US. Most are many times more devastating than those used on Hiroshima. The arsenals of Russia and the US are armed, targeted and poised, waiting for three short computer signals to fire. These hair trigger devices represent the devastation of approximately 100,000 Hiroshimas and pose a horrific threat to life. The use of a nuclear weapon could take place by accident or design by States, or even terrorists. These weapons pose an unacceptable risk to the planet. We must demonstrate our unambiguous commitment to fulfill our promises. Other-wise, the prospect of more nuclear weapons States, and the construction of new nuclear weapons, will only increase human peril. The world needs a more effective non-proliferation and disarmament regime and is looking to us for leadership

  1. Bioterrorism and Biological Warfare, from Past to the Present: A classic review

    Directory of Open Access Journals (Sweden)

    Majid Zare Bidaki

    2015-10-01

    Full Text Available Bioterrorism is defined as any terrorist action of intentional release or dissemination of highly pathogenic biological agents, including a variety of microorganisms or biological toxins. With the growing threat of terrorism, is necessary that the potential danger of various microorganisms – as a powerful tool of aggression and threat- to be taken seriously. This review tries to explain the concept of biological weapons and their historical development process with an emphasis on efforts to control the proliferation of these types of weapons over the last century. Potential impact of infectious diseases on people and armed forces was known from since 600 BC. Using the victims of the plague as a weapon in medieval warfare and spread of smallpox as a weapon during the war against the Indians when initially America was discovered, the development of biological weapons during the World War I, World War II and the Cold War, and even since the beginning of the third millennium, all show the strategic importance of pathogenic microorganisms as a deterrent power for the superiority of some governments and cults. Historical attempts to use infectious diseases as biological weapons reveal that the distinction between a natural outbreak of an infectious disease and that of a deliberate biological attack is very difficult. Abusing this characteristic of infectious diseases has made it possible for the purposes of superiority. International agreements to control the development of biological weapons, such as “the 1925 Geneva Protocol” and “the Convention on the Prohibition of the Development, Production and Stockpiling of Biological and Toxic Weapons” have not been able to control the development and using of biological warfare.  The current paper is a classic review (Overview article aiming at increasing the knowledge and awareness of people especially of health authorities and government officials.

  2. Contemporary terrorism as a global threat

    OpenAIRE

    Smolarek, Mirosław; Żuber, Marian

    2013-01-01

    Terrorism has been present in human history since ancient times, but it was not considered a serious threat for global security. The attacks on the World Trade Center have demonstrated that it is a threat of a global nature. It is an effective weapon used by the "weaker" against the stronger opponents. The subject of terrorism is very complex, difficult and elusive. There is a divergence among the scholars in understanding terrorism studies due to the lack of uniform criteria for the deter...

  3. Differential detection of a surrogate biological threat agent (Bacillus globigii) with a portable surface plasmon resonance biosensor.

    Science.gov (United States)

    Adducci, Benjamin A; Gruszewski, Hope A; Khatibi, Piyum A; Schmale, David G

    2016-04-15

    New methods and technology are needed to quickly and accurately detect potential biological warfare agents, such as Bacillus anthracis, causal agent of anthrax in humans and animals. Here, we report the detection of a simulant of B. anthracis (B. globigii) alone and in a mixture with a different species of Bacillus to test non-specific interference using a portable surface plasmon resonance (SPR) biosensor (SPIRIT 4.0, Seattle Sensor Systems). Both direct capture and antibody amplification were used to determine the limit of detection for spores of B. globigii, and to detect spores of B. globigii in a mixed sample containing another Bacillus spp. Spores of B. globigii were detected by anti-B. globigii (anti-Bg) coated sensors by direct capture at a concentration of 10(7)spores/mL, and with a secondary antibody amplification at a concentration of 10(5)spores/mL. Spores of B. globigii were differentially detected in a 1:1 mixture with B. pumilus spores from equal concentrations (10(7)spores/mL) with a secondary antibody amplification. To our knowledge, this is the first report of the differential detection of B. globigii with SPR in a mixed sample containing at least one additional Bacillus spp., highlighting the potential for SPR to detect any target bacterium in a mixed sample of closely related species. With the availability of portable instrumentation to accurately detect biological warfare agents such as B. anthracis, emergency responders can implement protocols in a timely fashion, limiting the amount of exposed individuals. PMID:26606307

  4. Maintaining non-nuclear weapon status

    International Nuclear Information System (INIS)

    Among the some 170 sovereign states in the world, five are legally recognized as nuclear weapon states (NWS) under the terms of the 1968 Non-Proliferation Treaty (NPT). Six countries (Argentina, Brazil, India, Israel, Pakistan, and South Africa) are counted as threshold states: they possess sizeable unsafeguarded nuclear facilities or have passed the brink of a nuclear test or of clandestine weapon production. Six other countries (Iran, Iraq, Libya, Taiwan, and North and South Korea) have been suspected periodically of either considering the nuclear weapon option or of working secretly on the development of weapons. Thus, about 150 non-nuclear weapon states (NNWS) remain which neither possess nuclear weapons nor strive to acquire them. These states are distributed throughout the globe and encompass highly industrialized as well as underdeveloped countries, liberal democracies, socialist states, sheikdoms and dictatorships. Some NNWS face acute military threats; other are far removed from the quarrels of the world, as in the case of some remote fortunate islands. Furthermore, NNWS may be members of nuclear-umbrella alliances or may have opted for a policy of neutrality or non-alignment

  5. Combating the spread of weapons of mass destruction: Some reflections. Essay, published in Le Monde

    International Nuclear Information System (INIS)

    With all the changes in international relations since the end of the Cold War, nuclear weapons have continued to have a position of prominence as the currency of ultimate power. And although a number of countries such as South Africa have given up their nuclear weapons or nuclear weapons ambitions, the nuclear umbrellas of NATO and other alliances continue to expand. More importantly, the objectives embodied in the Treaty on the Non-Proliferation of Nuclear Weapons (NPT), developed in the early 1970s to control the spread of nuclear weapons and to move us towards nuclear disarmament, are under growing stress. Several thousands of nuclear weapons continue to exist in the five nuclear weapon States party to the NPT (China, France, Russia, the United Kingdom, and the United States). And of the three countries that remain outside the NPT, two India and Pakistan have in the last few years demonstrated their nuclear weapons capability, while the third Israel is generally presumed to have such weapons. Most recently North Korea, a party to the NPT, has decided to walk away from the Treaty and, not unlike some other parties to the Treaty, is suspected of working to acquire nuclear weapons. Other States, on the other hand, have opted for the 'poor man's alternative' by pursuing the acquisition of chemical and biological weapons. And in the aftermath of the events of 11 September 2001, the threat of Weapons of mass destruction (WMD) proliferation gained a new dimension: the prospect of sub-national groups seeking to acquire and use these weapons. Faced with this reality, one must conclude that it is futile to try to combat the spread of WMD through a collective, rule-based system of international security and that people have to acquiesce to living in a world plagued with the constant threat of a nuclear holocaust or other disasters? But reliance on a system of collective security to curb the proliferation of WMD will require bold thinking, a willingness to work together

  6. Consequences of a changing CBRN threat

    International Nuclear Information System (INIS)

    The OPCW now counts 186 member States. Member States that possessed chemical weapons (CW) are destroying those weapons, albeit at a slow pace. In the coming decade most, if not all, of the 100.000 + tons of CW from the previous century will have been destroyed. Of the 12± States, not part of the OPCW, four of them potentially have CW but their quantities are restricted to less than 1000 tons. About one kg of the more potent nerve agent or Mustard gas is required to produce on average one casualty amongst unprotected troops, 1000 tons potentially can produce 1 million casualties. Protection, passive chemical defense, is therefore mandatory. However, once a detection and protection system is in place, with a protection factor of say one thousand, the amount required to produce one casualty amongst troops in a military scenario becomes prohibitive. Furthermore, available CW quantities will have been reduced by pre-emptive airstrikes and the aggressor will have little chance to fully deploy his CW capability. The threat from massive CW with units facing several attacks per week has changed to incidental attacks on a smaller scale and with far lower frequency. This should have consequences for the chemical defense posture of the forces, Detection and protection are still required but the protection can have a lower capacity, less spares per individual. Because the number of incidents will be far lower it might be more cost effective to abandon contaminated equipment than to decontaminate it. As the number of CW casualties entering the military medical system will be small it might be better to find cures for diseases from biological weapons than to spent money on improved therapies for nerve agent or mustard. Although research in CW medical over the last 50 years was great, it has not produced a therapy for mustard or a significant improvement over the old therapy for nerve agent poisoning. With a declining CW threat the BW threat is on the rise, making a passive

  7. Cooperative Threat Reduction: Cooperation Threat Reduction Program Liquid Propellant Disposition Project

    Science.gov (United States)

    2002-09-01

    This audit is one in a series of audits the Deputy Secretary of Defense requested. As part of the Cooperative Threat Reduction (CTR) Program, DoD agreed to assist the Russian Federation in disposing of its liquid rocket propellant. Public Law 102-228 (section 2551 NOTE, title 22, United States Code), the Soviet Nuclear Threat Reduction Act of 1991 designates DoD as the executive agent for the CTR Program. Specific objectives of the act are to destroy chemical, nuclear, and other weapons; transport, store, disable, and safeguard weapons in connection with their destruction; and establish verifiable safeguards against proliferation of weapons of mass destruction. The Office of the Assistant Secretary of Defense (International Security Policy), under the Office of the Under Secretary of Defense for Policy, develops, coordinates, and oversees implementation of policy for the CTR Program. The CTR Directorate, Defense Threat Reduction Agency operates the program.

  8. History of chemical and biological warfare agents.

    Science.gov (United States)

    Szinicz, L

    2005-10-30

    Chemical and biological warfare agents constitute a low-probability, but high-impact risk both to the military and to the civilian population. The use of hazardous materials of chemical or biological origin as weapons and for homicide has been documented since ancient times. The first use of chemicals in terms of weapons of mass destruction goes back to World War I, when on April 22, 1915 large amounts of chlorine were released by German military forces at Ypres, Belgium. Until around the 1970s of the 20th century, the awareness of the threat by chemical and biological agents had been mainly confined to the military sector. In the following time, the development of increasing range delivery systems by chemical and biological agents possessors sensitised public attention to the threat emanating from these agents. Their proliferation to the terrorists field during the 1990s with the expanding scale and globalisation of terrorist attacks suggested that these agents are becoming an increasing threat to the whole world community. The following article gives a condensed overview on the history of use and development of the more prominent chemical and biological warfare agents. PMID:16111798

  9. Prevent, Counter, and Respond - A Strategic Plan to Reduce Global Nuclear Threats (FY 2016-FY2020)

    Energy Technology Data Exchange (ETDEWEB)

    None

    2015-03-01

    NNSA’s second core mission is reducing global nuclear dangers by preventing the acquisition of nuclear weapons or weapons-usable materials, countering efforts to acquire such weapons or materials, and responding to nuclear or radiological incidents. In 2015, NNSA reorganized its nonproliferation activities based on core competencies and realigned its counterterrorism and counterproliferation functions to more efficiently address both current and emerging threats and challenges. The reorganization accompanied the March 2015 release of the first ever Prevent, Counter, and Respond – A Strategic Plan to Reduce Global Nuclear Threats. This report, which NNSA will update annually, highlights key nuclear threat trends and describes NNSA’s integrated threat reduction strategy.

  10. Reconversion of nuclear weapons

    CERN Document Server

    Kapitza, Sergei P

    1993-01-01

    The nuclear predicament or nuclear option. Synopsis of three lectures : 1- The physical basis of nuclear technology. Physics of fission. Chain reaction in reactors and weapons. Fission fragments. Separration of isotopes. Radiochemistry.2- Nuclear reactors with slow and fast neutrons. Power, size, fuel and waste. Plutonium production. Dose rate, shielding and health hazard. The lessons of Chernobyl3- Nuclear weapons. Types, energy, blast and fallout. Fusion and hydrogen bombs. What to do with nuclear weapons when you cannot use them? Testing. Nonmilittary use. Can we get rid of the nuclear weapon? Nuclear proliferation. Is there a nuclear future?

  11. Lessons learned from the former Soviet biological warfare program

    Science.gov (United States)

    Anderson, Debra A.

    The purpose of this doctoral project was to develop the most credible educational tool openly available to enhance the understanding and the application of biological weapons threat analysis. The theory governing the effectiveness of biological weapons was integrated from publications, lectures, and seminars primarily provided by Kenneth Alibek and William C. Patrick III, the world's foremost authorities on the topic. Both experts validated the accuracy of the theory compiled from their work and provided forewords. An exercise requiring analysis of four national intelligence estimates of the former Soviet biological warfare program was included in the form of educational case studies to enhance retention, experience, and confidence by providing a platform against which the reader can apply the newly learned theory. After studying the chapters on BW theory, the reader can compare his/her analysis of the national intelligence estimates against the analysis provided in the case studies by this researcher. This training aid will be a valuable tool for all who are concerned with the threat posed by biological weapons and are therefore seeking the most reliable source of information in order to better understand the true nature of the threat.

  12. Shipborne Laser Beam Weapon System for Defence against Cruise Missiles

    OpenAIRE

    J.P. Dudeja; G.S. Kalsey

    2000-01-01

    Sea-skim~ing cruise missiles pose the greatest threat to a surface ship in the present-day war scenario. The convenitional close-in-weapon-systems (CIWSs) are becoming less reliable against these new challenges requiring extremely fast reaction time. Naval Forces see a high energy laser as a feasible andjeffective directed energy weapon against sea-skimming antiship cruise missiles becauseof its .ability to deliver destructive energy at the speed of light on to a distant target. The paper com...

  13. Excess weapons materials

    International Nuclear Information System (INIS)

    As the size of the U.S. nuclear weapons stockpile continues to decline, dismantlement of nuclear weapons removed from the stockpile proceeds at an accelerated pace. From dismantlement of the weapons, the Department of Energy (DOE) receives uranium, plutonium, and many nonnuclear materials. The current and projected returns of enriched uranium from nuclear weapons have made it possible for DOE to shut down the top of the uranium enrichment plant at Portsmouth, Ohio. The Portsmouth Top is where highly enriched uranium was produced. Now, future needs for highly enriched uranium, at least for the foreseeable future, can be met with highly enriched uranium from retired nuclear weapons. Like enriched uranium, plutonium in large quantities is becoming available from weapons dismantlement. However, unlike enriched uranium, there are no firm needs for the plutonium from weapons. However, there are some potential needs, and the Department is reserving plutonium to meet them. These potential needs are for both weapons and nonweapons programs. While there is a nuclear weapons stockpile reduction, both in the United States and in the former Soviet Union, there is no assurance that future needs for plutonium for defense programs will never exceed the current projections. Just as prudent financial planning should not assume that peak years of savings or revenues or profits can be extended indefinitely, prudent defense planning should not assume that current years of zero or minimum demand for plutonium will be extended indefinitely. Thus, a reserve of plutonium for potential weapons use is maintained. Essentially, all available plutonium not in active use or reserved for weapons programs will be available for nonweapons programs. The paper discusses the grades of plutonium available, the categorization of the plutonium inventory, the forms in which the plutonium exists, the quantities available, and storage locations

  14. Overall View of Chemical and Biochemical Weapons

    Directory of Open Access Journals (Sweden)

    Vladimír Pitschmann

    2014-06-01

    Full Text Available This article describes a brief history of chemical warfare, which culminated in the signing of the Chemical Weapons Convention. It describes the current level of chemical weapons and the risk of using them. Furthermore, some traditional technology for the development of chemical weapons, such as increasing toxicity, methods of overcoming chemical protection, research on natural toxins or the introduction of binary technology, has been described. In accordance with many parameters, chemical weapons based on traditional technologies have achieved the limit of their development. There is, however, a big potential of their further development based on the most recent knowledge of modern scientific and technical disciplines, particularly at the boundary of chemistry and biology. The risk is even higher due to the fact that already, today, there is a general acceptance of the development of non-lethal chemical weapons at a technologically higher level. In the future, the chemical arsenal will be based on the accumulation of important information from the fields of chemical, biological and toxin weapons. Data banks obtained in this way will be hardly accessible and the risk of their materialization will persist.

  15. Indonesian perceptions on the implementation of the chemical weapons convention in relation with biosecurity and biosafety

    International Nuclear Information System (INIS)

    April 29, 2007 was marked the 10 year anniversary of the Chemical Weapons Convention (CWC) entry into force and the creation of the OPCW. Many nations throughout the last year were celebrated its commemoration. Compared to the Biological Weapons Convention (BWC) which is now entering the 33rd year of its entry into force, the progress of CWC is running far beyond that convention because CWC is considered the most complete convention which is equipped with a comprehensive verification system. In contrast, up till now there is no formal verification regime to monitor compliance of the BWC. So the national legislation as well as biosafety and biosecurity procedures will be the best regime to prohibit the misuse of biological agents. To some extent, the strategy and method on implementing the provision of CWC are coincident with biosecurity and biosafety procedure due to their dual use characteristics. Concerning CWC, Indonesia which was ratified it in 30 September 1998 has always active in any multilateral meeting and as well as national activities on prohibiting the misuse of chemical weapons. Several courses have also been done in cooperation with OPCW such as Development of Response System Against Chemical Weapons, Basic Training Course for Response Team, National Industry Awareness Workshop, Advance Training for Response Team, National Emergency Response Workshop, as well as setting up 20 sets of individual protective equipment. There have already 7 inspections done by OPCW in Indonesia during 2004-2007 which proved that there were no indications of misuse of chemical processes and its facilities for hostile purposes. However, it does not mean that there is no threat from the possible misuse of chemical and biological agents due to its dual use characteristics. Learnt from Indonesian experiences, there are several constraints on implementing the CWC as well as biosafety and biosecurity. First is the different perception on the biological and chemical threats. For

  16. Combating the terrorist use of mass destruction weapons, particularly nuclear weapons

    International Nuclear Information System (INIS)

    The risks of mass destruction weapons vary and also forms of damages resulting therefrom. While the effects of nuclear weapons are focused, sudden and comprehensive, the chemical weapons have limited impacts relatively unless used intensively severe prejudice to the element of surprise, and thus impaired the efficacy of their influences,especially that they affect exceptionally the individuals in the area of injury and biological weapons do not announce themselves except through their effect that appears later than the time of use as they affect exceptionally the organisms in the area of injury.The mass destruction weapons have turned from being a purely military means in the early twentieth century and have now become the means of violence against governments and countries that they should prepare themselves for and respond in ways of successful and effective countermeasures. Despite the fact that the acquisition of mass destruction weapons can be considered as a priority objective, which terrorist groups and organizations steadily seek but their accessibility is flanked by a lot of difficulties. Addressing the risk of further spread of nuclear weapons, and especially after doubling the power of those high-risk weapons, the international community has an approach to take a number of arrangements that complement each other to control and resist nuclear proliferation, either for the states or for terrorist groups.

  17. Re-examining the 1996 ICJ Advisory Opinion: Concerning the Legality of Nuclear Weapons

    Directory of Open Access Journals (Sweden)

    Jasjit Singh

    2012-10-01

    Full Text Available The primary objections raised against total elimination of nuclear weapons are built around a few arguments mostly of non-technical nature.Nuclear weapons and the strategies for their use have resulted in the establishment of a vicious circle within which the international community is trapped.The argument that the world will be unsafe without nuclear weapons is only meant to further the narrow self-interest of the nuclear weapon states and their allies.The World Court’s far-reaching 1996 advisory opinion concluded that almost any use or threat of use of nuclear weapons would violate international humanitarian law and law applicable in armed conflict, undermining most claims of nuclear weapon states regarding the legitimacy of possession, use or threat of use of nuclear weapons. The next logical step would be an initiative for a nuclear convention banning the use and threat of use of nuclear weapons in Asia and the adjoining oceans. But as long as the dominant elites in society and the nation-state believe in the utility of nuclear weapons for national security or as the currency of power, abolition of nuclear weapons will remain a mirage.

  18. A Novel Two-Stage Dynamic Decision Support based Optimal Threat Evaluation and Defensive Resource Scheduling Algorithm for Multi Air-borne threats

    CERN Document Server

    Naeem, Huma; Hussain, Mukhtar; Khan, Shoab A

    2009-01-01

    This paper presents a novel two-stage flexible dynamic decision support based optimal threat evaluation and defensive resource scheduling algorithm for multi-target air-borne threats. The algorithm provides flexibility and optimality by swapping between two objective functions, i.e. the preferential and subtractive defense strategies as and when required. To further enhance the solution quality, it outlines and divides the critical parameters used in Threat Evaluation and Weapon Assignment (TEWA) into three broad categories (Triggering, Scheduling and Ranking parameters). Proposed algorithm uses a variant of many-to-many Stable Marriage Algorithm (SMA) to solve Threat Evaluation (TE) and Weapon Assignment (WA) problem. In TE stage, Threat Ranking and Threat-Asset pairing is done. Stage two is based on a new flexible dynamic weapon scheduling algorithm, allowing multiple engagements using shoot-look-shoot strategy, to compute near-optimal solution for a range of scenarios. Analysis part of this paper presents ...

  19. Approach and Significance of Biochemical Threats Event for Children and Pregnant Women

    Directory of Open Access Journals (Sweden)

    Dilek Yildiz

    2010-12-01

    Full Text Available Chemical and biologcal emergencies increasingly threaten the health and safety of people worldwide and are designed to create fear and cause harm to the general population. By the increase of biological and chemical agents and by becoming more aware of effects of its, nurses should be more informed to provide better healthcare to the affected patients during a threat and after a threat and to translate, to react quickly in all levels of threat situations. Children and pregnant women are particularly vulnerable to the effects of these agents because of their specific physiologic, immunologic and physiological characteristics. Because of these unique vulnerabilities of children and pregnant women, it is vital that their special needs are addressed in every stage of disaster planning-prevention, preparation, response and recovery. Nurses have multiple roles in dealing the threat of biochemical. It is essential that nurses who care for children and pregnant women know how to recognize the effects of this type of weapon and how to alleviate or mitigate their impact. Therefore, it is important that nurses should be informed about biochemical threats and do exercises, also during school education. [TAF Prev Med Bull 2010; 9(6.000: 677-688

  20. Airborne Particulate Threat Assessment

    Energy Technology Data Exchange (ETDEWEB)

    Patrick Treado; Oksana Klueva; Jeffrey Beckstead

    2008-12-31

    Aerosol threat detection requires the ability to discern between threat agents and ambient background particulate matter (PM) encountered in the environment. To date, Raman imaging technology has been demonstrated as an effective strategy for the assessment of threat agents in the presence of specific, complex backgrounds. Expanding our understanding of the composition of ambient particulate matter background will improve the overall performance of Raman Chemical Imaging (RCI) detection strategies for the autonomous detection of airborne chemical and biological hazards. Improving RCI detection performance is strategic due to its potential to become a widely exploited detection approach by several U.S. government agencies. To improve the understanding of the ambient PM background with subsequent improvement in Raman threat detection capability, ChemImage undertook the Airborne Particulate Threat Assessment (APTA) Project in 2005-2008 through a collaborative effort with the National Energy Technology Laboratory (NETL), under cooperative agreement number DE-FC26-05NT42594. During Phase 1 of the program, a novel PM classification based on molecular composition was developed based on a comprehensive review of the scientific literature. In addition, testing protocols were developed for ambient PM characterization. A signature database was developed based on a variety of microanalytical techniques, including scanning electron microscopy, FT-IR microspectroscopy, optical microscopy, fluorescence and Raman chemical imaging techniques. An automated particle integrated collector and detector (APICD) prototype was developed for automated collection, deposition and detection of biothreat agents in background PM. During Phase 2 of the program, ChemImage continued to refine the understanding of ambient background composition. Additionally, ChemImage enhanced the APICD to provide improved autonomy, sensitivity and specificity. Deliverables included a Final Report detailing our

  1. Countering the nuclear terrorist threat

    International Nuclear Information System (INIS)

    Full text: An IND, as its name implies, is a nuclear explosive device. It produces nuclear yield, and this nuclear yield has catastrophic effects. An IND is the ultimate terrorist weapon. If a terrorist group decides not to pursue an actual nuclear device, it might well turn to a RDD. RDDs, or 'dirty bombs' as they are often called, spread radioactivity but they do not generate nuclear yield. The fabrication of a RDD requires radioactive material and a dispersal mechanism. Standards for safe handling and accountability of radioactive material vary around the world. Terrorist acquisition and use of an IND is a low-probability but high-consequence threat. Terrorist use of a RDD is a threat of higher probability but lower consequence. Two threats need to be considered for civil radiological and nuclear facilities. One is the theft of materials by terrorists, and the other is an attack on a facility to disperse radiological or nuclear materials. Facilities may include reactors as well as nuclear waste and storage areas. While important elements of a layered defense against these threats are already in place, improved international cooperation and a sustained investment in the science and technology needed to win the war on terrorism is necessary. (author)

  2. Analysis of High Energy Laser Weapon Employment from a Navy Ship

    OpenAIRE

    ANG, Ching Na

    2012-01-01

    This paper analyzes the employability of laser weapons on a Navy Littoral Combat Ship (LCS) class ship to counter small and fast boat threats. A general model of laser weapons is established to identify the attributes that characterize the laser weapon system. Quantitative values of each attribute are compared with current laser systems (that are under development) to identify potential laser types for employment on the Navy ship. In addition, plausible operational scenarios of suicide attack...

  3. Why we must abolish nuclear weapons after the end of the Cold War

    International Nuclear Information System (INIS)

    The end of the Cold War has offered a great opportunity to reduce or even abolish nuclear weapons, but the international community seemed to lose interest in nuclear weapons issues. Today, however, there are a lot of other major menaces to the survival of the mankind: pollution, hunger, poverty, ethnic conflicts. So the nuclear weapons issue is merely one of the most pressing threats to survival

  4. Prototype development of low-cost, augmented reality trainer for crew service weapons

    OpenAIRE

    Conger, Nathan W.

    2008-01-01

    A significant emerging threat to coalition forces in littoral regions is from small craft such as jet skis, fast patrol boats, and speedboats. These craft, when armed, are categorized as Fast Inshore Attack Craft (FIAC), and their arsenal can contain an array of weapons to include suicide bombs, crew-served weapons, anti-tank or ship missiles, and torpedoes. While these craft often have crude weapon technologies, they use an asymmetric tactic of large numbers of small, cheap, poorly arme...

  5. Ozone threat

    International Nuclear Information System (INIS)

    Ozone hole was first discovered in 1980. Thus 15 years even after the first warming, the world is no where near to the elimination of man made gases that threaten to destroy the ozone layer. Ozone depletion has become a matter of enormous threat which remains to be solved by the Scientists and intelligentia of the world. Ozone (O3) is a pungent poisonous gas. It forms a layer at a distance of about 15 miles above the earth's surface which helps shield living things from the sun shearing ultra violet light. If ozone is lost, more ultra violet light reaches the earth, which can lead to increasing rate of skin cancer, the death of micro organisms and the failure of crops and plants. It was in 1974 when it was discovered that Chlorofluorocarbons (CFCs) cold rise slowly to the upper atmosphere and destroy the earth's fragile ozone shield. Chlorofluorocarbons are commonly used as coolants (such as Freon) for home and automobile air conditioners and in the making of fast food containers. CFCs take about 100 years or more to reach he stratosphere to damage the ozone layers. In 1988, Scientists confirmed that upto 3% of the ozone layer over the more populated Northern Hemisphere has been destroyed. it is believed that for every 1% decrease in ozone, skin cancers are expected to rise 5 to 6 per cent due to the increase of ultraviolet light. Cases of cataracts and certain human immune system diseases are also expected to rise. (author)

  6. Public perspectives of nuclear weapons in the post-cold war environment

    Energy Technology Data Exchange (ETDEWEB)

    Jenkins-Smith, H.C.; Herron, K.G. [Univ. of New Mexico, Albuquerque, NM (United States). Institute for Public Policy; Barke, R.P. [Georgia Institute of Technology, Atlanta, GA (United States). School of Public Policy

    1994-04-01

    This report summarizes the findings of a nationwide survey of public perceptions of nuclear weapons in the post-cold war environment. Participants included 1,301 members of the general public, 1,155 randomly selected members of the Union of Concerned Scientists, and 1,226 employees randomly selected from the technical staffs of four DOE national laboratories. A majority of respondents from all three samples perceived the post-cold war security environment to pose increased likelihood of nuclear war, nuclear proliferation, and nuclear terrorism. Public perceptions of nuclear weapons threats, risks, utilities, and benefits were found to systematically affect nuclear weapons policy preferences in predictable ways. Highly significant relationships were also found between public trust and nuclear weapons policy preferences. As public trust and official government information about nuclear weapons increased, perceptions of nuclear weapons management risks decreased and perceptions of nuclear weapons utilities and benefits increased. A majority of respondents favored decreasing funding for: (1) developing and testing new nuclear weapons; (2) maintaining existing nuclear weapons, and (3) maintaining the ability to develop and improve nuclear weapons. Substantial support was found among all three groups for increasing funding for: (1) enhancing nuclear weapons safety; (2) training nuclear weapons personnel; (3) preventing nuclear proliferation; and (4) preventing nuclear terrorism. Most respondents considered nuclear weapons to be a persistent feature of the post-cold war security environment.

  7. Virtual nuclear weapons

    Energy Technology Data Exchange (ETDEWEB)

    Pilat, J.F.

    1997-08-01

    The term virtual nuclear weapons proliferation and arsenals, as opposed to actual weapons and arsenals, has entered in recent years the American lexicon of nuclear strategy, arms control, and nonproliferation. While the term seems to have an intuitive appeal, largely due to its cyberspace imagery, its current use is still vague and loose. The author believes, however, that if the term is clearly delineated, it might offer a promising approach to conceptualizing certain current problems of proliferation. The first use is in a reference to an old problem that has resurfaced recently: the problem of growing availability of weapon-usable nuclear materials in civilian nuclear programs along with materials made `excess` to defense needs by current arms reduction and dismantlement. It is argued that the availability of these vast materials, either by declared nuclear-weapon states or by technologically advanced nonweapon states, makes it possible for those states to rapidly assemble and deploy nuclear weapons. The second use has quite a different set of connotations. It is derived conceptually from the imagery of computer-generated reality. In this use, one thinks of virtual proliferation and arsenals not in terms of the physical hardware required to make the bomb but rather in terms of the knowledge/experience required to design, assemble, and deploy the arsenal. Virtual weapons are a physics reality and cannot be ignored in a world where knowledge, experience, materials, and other requirements to make nuclear weapons are widespread, and where dramatic army reductions and, in some cases, disarmament are realities. These concepts are useful in defining a continuum of virtual capabilities, ranging from those at the low end that derive from general technology diffusion and the existence of nuclear energy programs to those at the high end that involve conscious decisions to develop or maintain militarily significant nuclear-weapon capabilities.

  8. The nuclear weapons legacy

    International Nuclear Information System (INIS)

    On the 50th anniversary of the bombings of Hiroshima and Nagasaki, two new reports from the US DOE shed light on nuclear weapons production and its aftermath. This article summarizes and comments on the two reports: Closing the Circle on the Splitting of the Atom: the Environmental Legacy of Nuclear Weapons Production in the United States and What the Department of Energy is Doing About it; and Estimating the Cold War Mortgage: the 1995 Baseline Environmental Management Report

  9. The nuclear threat; La menace nucleaire

    Energy Technology Data Exchange (ETDEWEB)

    Tertrais, Bruno

    2011-01-26

    For a long time, a small group of big powers has been the only holder of nuclear weapons (US, USSR, Great Britain, France and China). Since then, new weapons have come out on the geopolitical scene: Israel, India, Pakistan, and some others remain uncertain and generate a worrying atmosphere (North Korea, Iran..). But what is the real risk with nuclear proliferation? Should we dread about it? Is nuclear terrorism a real threat? What are the political stakes of nuclear weapons? Is disarmament a real solution? These are some of the questions that the author answers in a precise and clear manner in this book. Contents: 1 - from monopoly to proliferation: who owns nuclear weapons today, why is it so coveted, is it easy to make one?; 2 - the newcomers: what do we really know about the Iranian nuclear programme, Iran and North Korea: between negotiation and confrontation; 3 - international control and regulation: do we have reliable information, how do we know what we know, Iraq: was there a 'lie' somewhere, who are the states who have renounced nuclear weapons?; 4 - the future: is there still a nuclear warfare risk, what if Pakistani weapons fall into islamic hands, is nuclear terrorism a fantasy or a real risk?

  10. Guided standoff weapons a threat to expeditionary air power

    OpenAIRE

    Vish, Jeffrey A.

    2006-01-01

    The Air Base has long been a potential target of attack for enemy planners. An effective way to attack the United States Air Force (USAF) is to avoid its usual dominance in the air and use an asymmetrical approach, attacking air bases with ground forces inserted into the Joint Rear Area. The history of airbase ground attacks from 1942 to 1994, documented in the book Snakes in the Eagles' Nest, shows that the dominant strategy employed by air base attackers has been the standoff attack. Rou...

  11. Towards a nuclear-weapon-free century

    International Nuclear Information System (INIS)

    In the last century, the rapid progress in science and technology enabled richer and more comfortable lives, but the other side of this double-edged sword is that science and technology have also been used to develop and improve high-tech weaponry. Due to this fact, deployed around the world are tens of thousands of nuclear weapons, and detonation of only a few of them would kill some hundreds of million of people and destroy out civilization. The human race stands at a crossroad. What should be done? It is a crucially important responsibility for the Japanese government to work for peace in which there will be no fear or threat of nuclear weapons

  12. Bio-Terrorism Threat and Casualty Prevention

    Energy Technology Data Exchange (ETDEWEB)

    NOEL,WILLIAM P.

    2000-01-01

    The bio-terrorism threat has become the ''poor man's'' nuclear weapon. The ease of manufacture and dissemination has allowed an organization with only rudimentary skills and equipment to pose a significant threat with high consequences. This report will analyze some of the most likely agents that would be used, the ease of manufacture, the ease of dissemination and what characteristics of the public health response that are particularly important to the successful characterization of a high consequence event to prevent excessive causalities.

  13. Protection of the population against radiation of nuclear weapons

    International Nuclear Information System (INIS)

    The papers include: information on the physical principles of several nuclear weapons; their radiation; long term effects of nuclear test; biological effects; shelter design and construction, and the management of major nuclear events in Switzerland. (G.Q.)

  14. 3 CFR - Continuation of Emergency With Respect to Weapons of Mass Destruction

    Science.gov (United States)

    2010-01-01

    ... Mass Destruction Presidential Documents Other Presidential Documents Notice of November 6, 2009 Continuation of Emergency With Respect to Weapons of Mass Destruction On November 14, 1994, by Executive Order... of nuclear, biological, and chemical weapons (weapons of mass destruction) and the means...

  15. Military applications of the laser weapons in the future battlefield

    Science.gov (United States)

    Celik, Hasan; Adana, Saban; Yahsi, Erhan

    2013-05-01

    Contemporary operating environment requires a wide range of tools to respond to a myriad of regular and irregular threats. Accordingly, conventional weapons do not suffice in some cases. As technology improves exponentially, the dominance of conventional weapons is slowly fading away by the advances in laser technology. This study first outlines the characteristics of laser weapons, then provides the military applications of them in land, maritime, air and space domains and finally exhibits implications for battlefield functions. This study concludes that any country that is seeking primacy in military terms must allocate extra time and resources to obtain this emerging technology. Since it seems that there are not adequate studies about the military applications and operational concepts of the laser weapons, this study tries to increase awareness about their potential advantages.

  16. Wounds and weapons

    Energy Technology Data Exchange (ETDEWEB)

    Vogel, H. [Asklepios Klinik St. Georg, Roentgenabteilung, Lohmuehlenstrasse 5, 20099 Hamburg (Germany)], E-mail: Hermann.vogel@ak-stgeorg.lbk-hh.de; Dootz, B. [Asklepios Klinik St. Georg, Roentgenabteilung, Lohmuehlenstrasse 5, 20099 Hamburg (Germany)

    2007-08-15

    Purpose: X-ray findings are described, which are typical for injuries due to conventional weapons. It is intended to demonstrate that radiographs can show findings characteristic for weapons. Material and method: The radiograms have been collected in Vietnam, Croatia, Serbia, Bosnia, Chad, Iran, Afghanistan, USA, Great Britain, France, Israel, Palestine, and Germany. Results: Radiograms of injuries due to hand grenades show their content (globes) and cover fragments. The globes are localized regionally in the victim's body. Survivors of cluster bombs show singular or few globes; having been hit by many globes would have been lethal. Shotguns produce characteristic distributions of the pallets and depth of penetration different from those of hand grenades and cluster bombs; cover fragments are lacking. Gunshot wounds (GSW) can be differentiated in those to low velocity bullets, high velocity projectiles, and projectiles, which disintegrate on impact. The radiogram furnishes the information about a dangerous shock and helps to recognize the weapon. Radiograms of victims of explosion show fragments and injuries due to the blast, information valid for therapy planning and prognosis. The radiogram shows details which can be used in therapy, forensic medicine and in war propaganda - examples could be findings typical for cluster bombs and for dumdum bullets; it shows the cruelty of the employment of weapons against humans and the conflict between the goal of medical care and those of military actions. Conclusion: Radiographs may show, which weapon has been employed; they can be read as war reports.

  17. Wounds and weapons

    International Nuclear Information System (INIS)

    Purpose: X-ray findings are described, which are typical for injuries due to conventional weapons. It is intended to demonstrate that radiographs can show findings characteristic for weapons. Material and method: The radiograms have been collected in Vietnam, Croatia, Serbia, Bosnia, Chad, Iran, Afghanistan, USA, Great Britain, France, Israel, Palestine, and Germany. Results: Radiograms of injuries due to hand grenades show their content (globes) and cover fragments. The globes are localized regionally in the victim's body. Survivors of cluster bombs show singular or few globes; having been hit by many globes would have been lethal. Shotguns produce characteristic distributions of the pallets and depth of penetration different from those of hand grenades and cluster bombs; cover fragments are lacking. Gunshot wounds (GSW) can be differentiated in those to low velocity bullets, high velocity projectiles, and projectiles, which disintegrate on impact. The radiogram furnishes the information about a dangerous shock and helps to recognize the weapon. Radiograms of victims of explosion show fragments and injuries due to the blast, information valid for therapy planning and prognosis. The radiogram shows details which can be used in therapy, forensic medicine and in war propaganda - examples could be findings typical for cluster bombs and for dumdum bullets; it shows the cruelty of the employment of weapons against humans and the conflict between the goal of medical care and those of military actions. Conclusion: Radiographs may show, which weapon has been employed; they can be read as war reports

  18. Is the Hybrid Threat a True Threat?

    Directory of Open Access Journals (Sweden)

    David L. Raugh

    2016-06-01

    Full Text Available Does the “hybrid threat” discussed in General Marty Dempsey’s 2015 United States National Military Strategy make logical sense? In this paper I define the national security threat risk assessment process, examine the most significant US security threats, and study the hybrid threat. I conclude that the hybrid threat is the one that could most exploit our nation’s critical vulnerabilities- both from a security and foreign policy perspective. I conclude with a study of security and economic methods to reduce this threat.

  19. Operational research in weapon system

    Directory of Open Access Journals (Sweden)

    R. S. Varma

    1958-04-01

    Full Text Available "The paper is divided into three parts: (a The first part deals with what operational research is. (bThe second part gives what we mean by Weapon Systems and discusses considerations that determine the choice of a particular weapon system from a class weapon systems. (cThe third part deals with some aspects of weapon replacement policy.The effectiveness of a weapon system is defined as E=D/C where E is weapon effectiveness (a comparative figure of merit; D is total damage inflicted or prevented and C is total cost, D and C being reduced to common dimensions. During the course of investigations, criteria regarding to choice of weapon or weapons from a set of weapon systems are established through production function and military effect curves. A procedure is described which maximizes the expectation of military utility in order to select a weapon system from the class of weapon systems. This is done under the following simplifying assumptions: (a Non- decreasing utility function; (b Constant average cost for each kind of weapons; and (c Independence of the performance of each unit of weapon. Some of the difficulties which arises when any of these restrictions is relaxed are briefly mentioned. Finally, the policy of weapon replacement and the factors governing the same are described."

  20. Beyond the nuclear weapon

    International Nuclear Information System (INIS)

    Since the end of the cold war, many people called for the elimination of nuclear weapons. That this decision seems difficult to realize because of the world political environment. Meanwhile the reduction of the nuclear weapons costs and risks believes more than ever a challenge of the international relations and more particularly in the proliferation domain. In this perspective the proliferation fight strategies need to be studied with a special interest in the domain of the alternatives and the possibilities of synergy. (A.L.B.)

  1. Countering the Nuclear Terrorist Threat

    International Nuclear Information System (INIS)

    The nuclear/radioactive threat to homeland security posed by terrorists can be broken into four categories. Of highest concern is the use of an improvised nuclear device (IND). An IND, as its name implies, is a nuclear explosive device. It produces nuclear yield, and this nuclear yield has catastrophic effects. An IND is the ultimate terrorist weapon, and terrorist groups are actively attempting to acquire nuclear weapons. Detonation of an IND could dwarf the devastation of the September 11 attack on the World Trade Center. Dealing with the aftermath of an IND would be horrific. Rescue efforts and cleanup would be hazardous and difficult. Workers would have to wear full protection suits and self-contained breathing apparatus. Because of the residual radioactivity, in certain locations they could only work short times before acquiring their ''lifetime'' dose. As with the Chernobyl event, some rescue workers might well expose themselves to lethal doses of radiation, adding to the casualty toll. Enormous volumes of contaminated debris would have to be removed and disposed. If a terrorist group decides not to pursue an actual nuclear device, it might well turn to Radiological Dispersal Devices (RDDs) or ''dirty bombs'' as they are often called. RDDs spread radioactivity but they do not generate nuclear yield. The fabrication of an RDD requires radioactive material and a dispersal mechanism. Radioactive materials are used all over the world for medical, industrial, and research applications. Standards for safe handling and accountability of radioactive material vary around the world. Stories in the press suggest inadequate controls on radiological materials in parts of the world. The effects of an RDD vary widely, and are measured in terms of contamination area, health effects to the exposed population, and economic consequences. Even a negligible, but measurable, exposure would exploit the general public's fear of things radioactive and would have significant

  2. The Nature of the Bioterrorism Threat

    Energy Technology Data Exchange (ETDEWEB)

    Regens, J. L.

    2003-02-25

    This analysis provides an overview of the nature of the bioterrorism threat. It identifies potential CDC Class A biological agents that are likely candidates for use in a terrorist incident and describes the known sources of vulnerability. The paper also summarizes S&T resources/needs and assesses response options for achieving effective biodefense against terrorist threats.

  3. Effects of Nuclear Weapons.

    Science.gov (United States)

    Sartori, Leo

    1983-01-01

    Fundamental principles governing nuclear explosions and their effects are discussed, including three components of a nuclear explosion (thermal radiation, shock wave, nuclear radiation). Describes how effects of these components depend on the weapon's yield, its height of burst, and distance of detonation point. Includes effects of three…

  4. The US nuclear weapon infrastructure and a stable global nuclear weapon regime

    Energy Technology Data Exchange (ETDEWEB)

    Immele, John D [Los Alamos National Laboratory; Wagner, Richard L [Los Alamos National Laboratory

    2009-01-01

    US nuclear weapons capabilities -- extant force structure and nuclear weapons infrastructure as well as declared policy -- influence other nations' nuclear weapons postures, at least to some extent. This influence can be desirable or undesirable, and is, of course, a mixture of both. How strong the influence is, and its nature, are complicated, controversial, and -- in our view -- not well understood but often overstated. Divergent views about this influence and how it might shape the future global nuclear weapons regime seem to us to be the most serious impediment to reaching a national consensus on US weapons policy, force structure and supporting infrastructure. We believe that a paradigm shift to capability-based deterrence and dissuasion is not only consistent with the realities of the world and how it has changed, but also a desirable way for nuclear weapon postures and infrastructures to evolve. The US and other nuclear states could not get to zero nor even reduce nuclear arms and the nuclear profile much further without learning to manage latent capability. This paper has defined three principles for designing NW infrastructure both at the 'next plateau' and 'near zero.' The US can be a leader in reducing weapons and infrastructure and in creating an international regime in which capability gradually substitutes for weapons in being and is transparent. The current 'strategy' of not having policy or a Congressionally-approved plan for transforming the weapons complex is not leadership. If we can conform the US infrastructure to the next plateau and architect it in such a way that it is aligned with further arms reductions, it will have these benefits: The extant stockpile can be reduced in size, while the smaller stockpile still deters attack on the US and Allies. The capabilities of the infrastructure will dissuade emergence of new challenges/threats; if they emerge, nevertheless, the US will be able to deal with them in

  5. The Optimum Replacement of Weapon

    Institute of Scientific and Technical Information of China (English)

    ZHANG Xiao; ZHANG Jin-chun

    2002-01-01

    The theory of LCC (Life Cycle Cost) is applied in this paper. The relation between the economic life of weapon and the optimum replacement is analyzed. The method to define the optimum replacement time of weapon is discussed.

  6. Nuclear power and nuclear weapons

    International Nuclear Information System (INIS)

    The proliferation of nuclear weapons and the expanded use of nuclear energy for the production of electricity and other peaceful uses are compared. The difference in technologies associated with nuclear weapons and nuclear power plants are described

  7. Cyber threat metrics.

    Energy Technology Data Exchange (ETDEWEB)

    Frye, Jason Neal; Veitch, Cynthia K.; Mateski, Mark Elliot; Michalski, John T.; Harris, James Mark; Trevino, Cassandra M.; Maruoka, Scott

    2012-03-01

    Threats are generally much easier to list than to describe, and much easier to describe than to measure. As a result, many organizations list threats. Fewer describe them in useful terms, and still fewer measure them in meaningful ways. This is particularly true in the dynamic and nebulous domain of cyber threats - a domain that tends to resist easy measurement and, in some cases, appears to defy any measurement. We believe the problem is tractable. In this report we describe threat metrics and models for characterizing threats consistently and unambiguously. The purpose of this report is to support the Operational Threat Assessment (OTA) phase of risk and vulnerability assessment. To this end, we focus on the task of characterizing cyber threats using consistent threat metrics and models. In particular, we address threat metrics and models for describing malicious cyber threats to US FCEB agencies and systems.

  8. Lead exposures and biological responses in military weapons systems: Aerosol characteristics and acute lead effects among US Army artillerymen: Final report

    Energy Technology Data Exchange (ETDEWEB)

    Bhattacharyya, M.H.; Stebbings, J.H.; Peterson, D.P.; Johnson, S.A.; Kumar, R.; Goun, B.D.; Janssen, I.; Trier, J.E.

    1993-03-01

    This study was to determine the concentration and chemical nature of lead (Pb) aerosols produced during the firing of artillery and to determine the exposures and biological responses of crew members exposed to lead aerosols during such firing. The concentrations of lead-containing aerosols at crew positions depended on wind conditions, with higher concentrations when firing into a head wind. Aerosol concentrations were highest in the muzzle blast zone. Concentrations of lead in the blood of crew members rose during the first 12 days of exposure to elevated airborne lead concentrations and then leveled off. There was no rapid decrease in blood lead concentrations after completion of firing. Small decreases in hematocrit and small increases in free erythrocyte porphyrin were correlated with increasing exposure to airborne lead. These changes were reversed by seven weeks after firing. Changes in nerve conduction velocity had borderline statistical significance to airborne lead exposure. In measuring nerve conduction velocity, differences in skin temperature must be taken into account.

  9. Applying Agile MethodstoWeapon/Weapon-Related Software

    Energy Technology Data Exchange (ETDEWEB)

    Adams, D; Armendariz, M; Blackledge, M; Campbell, F; Cloninger, M; Cox, L; Davis, J; Elliott, M; Granger, K; Hans, S; Kuhn, C; Lackner, M; Loo, P; Matthews, S; Morrell, K; Owens, C; Peercy, D; Pope, G; Quirk, R; Schilling, D; Stewart, A; Tran, A; Ward, R; Williamson, M

    2007-05-02

    This white paper provides information and guidance to the Department of Energy (DOE) sites on Agile software development methods and the impact of their application on weapon/weapon-related software development. The purpose of this white paper is to provide an overview of Agile methods, examine the accepted interpretations/uses/practices of these methodologies, and discuss the applicability of Agile methods with respect to Nuclear Weapons Complex (NWC) Technical Business Practices (TBPs). It also provides recommendations on the application of Agile methods to the development of weapon/weapon-related software.

  10. Medical implications of enhanced radiation weapons.

    Science.gov (United States)

    Reeves, Glen I

    2010-12-01

    During the 1960s through 1980s the United States and several other nations developed, and even considered deploying, enhanced-radiation warheads (ERWs). The main effect of ERWs (sometimes called "neutron bombs"), as compared to other types of nuclear weapons, is to enhance radiation casualties while reducing blast and thermal damage to the infrastructure. Five nations were reported to have developed and tested ERWs during this period, but since the termination of the "Cold War" there have been no threats of development, deployment, or use of such weapons. However, if the technology of a quarter of a century ago has been developed, maintained, or even advanced since then, it is conceivable that the grim possibility of future ERW use exists. The type of destruction, initial triage of casualties, distribution of patterns of injury, and medical management of ERWs will be shown to significantly differ from that of fission weapons. Emergency response planners and medical personnel, civilian or military, must be aware of these differences to reduce the horrible consequences of ERW usage and appropriately treat casualties. PMID:21265303

  11. Proposals for chemical weapons during the American Civil War.

    Science.gov (United States)

    Hasegawa, Guy R

    2008-05-01

    Proposals for chemical weapons that arose during the American Civil War are described. Most incendiary and all biological agents are excluded. The described proposals appeared primarily in periodicals or letters to government officials on both sides. The weapons were usually meant to temporarily disable enemy combatants, but some might have been lethal, and Civil War caregivers were ill-prepared to deal with the weapons' effects. Evidently, none of the proposed weapons were used. In only one instance was use against civilians mentioned. Among the agents most commonly proposed were cayenne pepper or other plant-based irritants such as black pepper, snuff, mustard, and veratria. Other suggested agents included chloroform, chlorine, hydrogen cyanide, arsenic compounds, sulfur, and acids. Proponents usually suggested that the chemicals be included in explosive artillery projectiles. Less commonly proposed vehicles of delivery included fire engines, kites, and manned balloons. Some of the proposed weapons have modern counterparts. PMID:18543573

  12. 32 CFR 234.10 - Weapons.

    Science.gov (United States)

    2010-07-01

    ... are prohibited: (1) Possessing a weapon. (2) Carrying a weapon. (3) Using a weapon. (b) This section... use a weapon in support of a security, law enforcement, or other lawful purpose while on the...

  13. Early retirement for weaponeers?

    International Nuclear Information System (INIS)

    Department of Energy's Lawrence Livermore Laboratory's once-vital nuclear weapons division is now in dire straits. The laboratory was established in 1952, during the titanic struggle over the hydrogen bomb, has grown steadily from $7 million to its peak of $1.1 billion in 1991. The future for key members of their most experienced weapons design team is uncertain. Over the past two years, Livermore's operating budget has fallen by 12.5 percent or $127.6 million. Nearly 750 employees, 10 percent of the work force, accepted early retirement offers last year. Further budget cuts will force another 300 to 600 personnel out by the end of 1995. The future resides in the U.S. Congress

  14. Nuclear weapons identification system

    International Nuclear Information System (INIS)

    A nuclear weapons identification system (NWIS) has been under development at the Oak Ridge Y-12 plant since 1984. NWIS employs active neutron interrogation to obtain a variety of time and frequency analysis signature to identify nuclear weapons in containers. Advantages of NWIS are (1) high sensitivity (small changes in configurations produce large changes in signatures); (2) insensitivity of some signatures to background radiation, (useful for storage configurations or for tracking of secondaries through the first stage of dismantlement since the presence of the primary on the assembled system does not affect some signatures for the secondary); (3) nonintrusive (does not reveal design information, which makes it useful for bilateral treaties or by the International Atomic Energy Agency (IAEA)); and (4) very difficult to deceive

  15. Illegal Weapons Exports?

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    Amnesty International, a human rights organization, released a report on June 11 accusing China of facilitating regional conflicts and human rights violations by exporting a large quantity of weapons to Sudan, Nepal, Myanmar and the Great Lakes countries of Africa. Responding to such charges, Teng Jianqun, a researcher with the China Arms Control and Disarmament Association, told the official Xinhua News Agency that China has always put its limited arms exports under strict control and surveillance, deno...

  16. A Novel Two-Stage Dynamic Decision Support based Optimal Threat Evaluation and Defensive Resource Scheduling Algorithm for Multi Air-borne threats

    OpenAIRE

    Naeem, Huma; Masood, Asif; Hussain, Mukhtar; Shoab A. Khan

    2009-01-01

    This paper presents a novel two-stage flexible dynamic decision support based optimal threat evaluation and defensive resource scheduling algorithm for multi-target air-borne threats. The algorithm provides flexibility and optimality by swapping between two objective functions, i.e. the preferential and subtractive defense strategies as and when required. To further enhance the solution quality, it outlines and divides the critical parameters used in Threat Evaluation and Weapon Assignment (T...

  17. Bill related to the struggle against proliferation of mass destruction weapons and their vectors

    International Nuclear Information System (INIS)

    This bill indicates the modifications brought to different French laws and codes (penal code, defence code, custom code) and defines provisions and penalties within the frame of struggle against the proliferation of weapons of mass destruction (nuclear weapons, biological weapons and toxin-based weapons, chemical weapons), and against the proliferation of their vectors. These modifications, provisions and penalties also concern double-use products. The bill also defines the modifications brought to the French penal procedure code. It finally addresses offenses related to these proliferations which can be considered as an act of terrorism

  18. 77 FR 27208 - Renewal of Threat Reduction Advisory Committee

    Science.gov (United States)

    2012-05-09

    ... of the Secretary Renewal of Threat Reduction Advisory Committee AGENCY: DoD. ACTION: Renewal of...), the Department of Defense gives notice that it is renewing the charter for the Threat Reduction... Biological Defense Programs), independent advice and recommendations on: a. Reducing the threat to the...

  19. Threats to Bitcoin Software

    OpenAIRE

    Kateraas, Christian H

    2014-01-01

    Collect and analyse threat models to the Bitcoin ecosystem and its software. The create misuse case, attack trees, and sequence diagrams of the threats. Create a malicious client from the gathered threat models. Once the development of the client is complete, test the client and evaluate its performance. From this, assess the security of the Bitcoin software.

  20. Weapons of Mass Destruction and the Principle of Unnecessary Suffering : The Use of Nuclear Weapons in an Armed Conflict

    OpenAIRE

    Krasny, Jaroslav; Kawano, Noriyuki

    2015-01-01

    This research is concerned with the use of nuclear weapons against combatants in an armed conflict and whether such a use violates or would violate the principle of unnecessary suffering as codified in St. Petersburg Declaration of 1868 and the Hague Conventions. In order to analyze what constitutes unnecessary suffering the method chosen for this research is comparison of the effects of nuclear, chemical and biological weapons on the human body. The reason for choosing this method is the abh...

  1. Terrorist Innovations in Weapons of Mass Effect, Phase II

    OpenAIRE

    Hafez, Mohammed M.; Rasmussen, Maria

    2012-01-01

    Approved for public display, distribution unlimited "On October 6-7, 2011, experts gathered for a workshop at the University of St. Andrews, Scotland to discuss the factors that both facilitate and hinder terrorist innovations. This workshop is part of a two-year Defense Threat Reduction Agency (DTRA) sponsored research project that aims to shed light on the preconditions, causes, and predictive indicators associated with terrorist innovation in weapons of mass effect (WMEs). Organized joi...

  2. Security considerations for network-centric weapon systems

    OpenAIRE

    Nesteruk, Erik A.

    2009-01-01

    This thesis describes the security risks for network-centric weapon systems as a combination of different aspects of security, each with its own threats and mitigation strategies. Computer and network security deals with cryptography, authentication, and attacks on software. Information security deals with the ability of the system to process information of different classifications but prevent disclosure to unauthorized users. Physical security ranges from hardware destruction to revers...

  3. The legacy of nuclear weapons

    International Nuclear Information System (INIS)

    It could be argued that discussion of the legacy of nuclear weapons should be strictly limited to the effects of the use of nuclear weapons at Hiroshima and Nagasaki in Japan in 1945. However, it seems reasonable also to include the activities related to the potential use of nuclear weapons, these being: testing of nuclear weapons, which was carried out principally by the USA and the USSR, but also by the United Kingdom, France and China; the military fuel cycle associated with the production of nuclear weapons, including uranium mining, reactors, fuel reprocessing, waste disposal and transport of nuclear weapons. Estimates of collective effective dose commitments arising from the most important human made sources of radiation that result in environmental releases of radioactive materials are presented 27 refs, 2 tabs

  4. 78 FR 67289 - Continuation of the National Emergency With Respect to the Proliferation of Weapons of Mass...

    Science.gov (United States)

    2013-11-12

    ... HOUSE, November 7, 2013. [FR Doc. 2013-27166 Filed 11-8-13; 8:45 am] Billing code 3295-F4 ... Emergency With Respect to the Proliferation of Weapons of Mass Destruction On November 14, 1994, by... proliferation of nuclear, biological, and chemical weapons (weapons of mass destruction) and the means...

  5. Survey and documentation of the potential and actual invasive alien plant species and other biological threats to biodiversity in Awash National Park, Ethiopia

    Directory of Open Access Journals (Sweden)

    Sebsebe DEMISSEW

    2011-01-01

    Full Text Available The study was conducted at the Awash National Park (ANP Ethiopia, todocument Invasive Alien Species (IAS and to assess the spread of Prosopis juliflora (Sw. DC. A total of 64 sample plots were laid systematically along the altitudinal gradient of 750 to 1916 m.Potential IAS were recorded. IAS which may threaten biodiversity of the park includes species such as Prosopis juliflora, Parthenium hysterophorus L., Cryptostegia grandiflora Roxb. ex R. Br., Parkinsonia aculeata L., Senna occidentalis (L. Link, Datura ferox L. and Xanthium strumarium L. Except P. juliflora and P. hysterophorus, all others were not recorded in Ethiopia as IAS. P.juliflora was recorded in three plots with cover of 1% to 10%. P. juliflora was also found spread in different parts of the park particularly following the route of cattle movement. P. hysterophoruswas recorded in and around nine sample plots. Plot 46, 47 and 48 werehighly infested by P. hysterophorus which covered more than 60, 70 and 80% of the ground layer respectively. C. grandiflora was recorded in 11 plots with cover ranging from 1% to 35%. In view of all the natural as well as anthropogenic threats to the biodiversity of the Park, the ANP is at high risk. The rich biodiversity needsimmediate management intervention.

  6. Nuclear terrorism: How real is the threat?

    International Nuclear Information System (INIS)

    After the end of the Cold War the threat of proliferation of weapons of mass destruction to non-state actors has increased and since non-territorial actors cannot be deterred as easily as states, new responses have to be found. The author offers a definition of nuclear terrorism which includes also attacks on, and sabotage of, nuclear reactors and the dispersal of radioactive waste, in addition to the possession or use of weapon-grade nuclear materials. It is held that the main bottleneck for would-be nuclear terrorists is not so much bomb design than access to nuclear material for which the territories of the former Soviet Union are a likely source, due to gaps in safety and security. The article discusses the smuggling of nuclear material from the former USSR's territories and lists seven possible methods of acquisition of nuclear materials by terrorists. The intentions of various types of groups to use weapons of mass destruction and their possible goals are analyzed and the question whether or not Osama Bin Laden has acquired nuclear materials is raised. A discussion of possible motivations for nuclear terrorism by non-state actors and a listing of facilitating and inhibiting factors with regard to terrorist use of weapons of mass destruction lead to the conclusion that nuclear terrorism by non-state actors is still a low probability event but that no risks can be taken and that a broad action plan to counter the threat is needed whereby the IAEA should stand in the forefront. (author)

  7. Weapons Neutron Research Facility (WNR)

    Data.gov (United States)

    Federal Laboratory Consortium — The Weapons Neutron Research Facility (WNR) provides neutron and proton beams for basic, applied, and defense-related research. Neutron beams with energies ranging...

  8. After fifty years of the nuclear age: Non-proliferation of nuclear weapons or elimination of them?

    International Nuclear Information System (INIS)

    Ever since the first test of the atomic bomb and the bombing of Hiroshima and Nagasaki in 1945, mankind lived with nuclear weapons. Nuclear weapons were inevitably connected with the Cold War, with its end new opportunity has come concerning prohibition of the use of nuclear weapons. Steps are to be undertaken in order to eliminate the nuclear weapons. First, would be the prohibition of the use or the threat of use of nuclear weapons. By excluding the possibility of the use of nuclear weapons, the world could be closer to nuclear disarmament than ever. The prohibition of the use of some type of weapons could be a breakthrough towards the elimination of such weapons. While the negotiations to eliminate nuclear weapons would be difficult, as were those to ban chemical weapons, a ban on the use of nuclear weapons would eventually lead to their elimination. During the Cold War, the imminent goal of disarmament was to stop the nuclear arms race between the two superpowers. But in the post-Cold War era an opportunity has developed for further steps towards nuclear disarmament, the elimination of nuclear weapons

  9. Germany and the role of nuclear weapons: between prohibition and revival

    OpenAIRE

    Meier, Oliver

    2016-01-01

    "Never since the end of the Cold War have the international community and Europe been so deeply divided over the role of nuclear weapons in security policy. There is disagreement within the United Nations over whether to begin negotiations on a treaty banning nuclear weapons. At the same time, Russia's aggression against Ukraine and Moscow's associated nuclear threats have triggered a new discussion in NATO about enhancing its nuclear deterrent. Both debates are difficult and uncomfortable fo...

  10. Effects of nuclear weapons. Third edition

    Energy Technology Data Exchange (ETDEWEB)

    Glasstone, S.; Dolan, P.J.

    1977-01-01

    Since the last edition of ''The Effects of Nuclear Weapons'' in 1962 much new information has become available concerning nuclear weapon effects. This has come in part from the series of atmospheric tests, including several at very high altitudes, conducted in the Pacific Ocean area in 1962. In addition, laboratory studies, theoretical calculations, and computer simulations have provided a better understanding of the various effects. A new chapter has been added on the electromagnetic pulse. The chapter titles are as follows: general principles of nuclear explosions; descriptions of nuclear explosions; air blast phenomena in air and surface bursts; air blast loading; structural damage from air blast; shock effects of surface and subsurface bursts; thermal radiation and its effects; initial nuclear radiation; residual nuclear radiation and fallout; radio and radar effects; the electromagnetic pulse and its effects; and biological effects. (LTN)

  11. Preventing the spread of nuclear weapons : The law of arms control and the international non-proliferation regime

    NARCIS (Netherlands)

    Coppen, T.

    2016-01-01

    The proliferation of nuclear weapons remains a severe threat to international peace, security and stability. In order to counter this threat, the international community has taken numerous measures, legal and otherwise, resulting in a global framework of treaties and political agreements known as th

  12. Nuclear obligations: Nuremberg law, nuclear weapons, and protest

    Energy Technology Data Exchange (ETDEWEB)

    Burroughs, J.R.

    1991-01-01

    Nuclear weapons use and deployment and nonviolent anti-nuclear protests are evaluated. Use of nuclear weapons would constitute war crimes and crimes against humanity as defined in both the Nuremberg Charter and Allied Control Council Law No. 10 and applied by the International Military Tribunal and other Nuremberg courts. Strategic and atomic bombing during World War 2 did not set a precedent for use of nuclear weapons. The consequentialist argument for World War 2 bombing fails and the bombing has also been repudiated by codification of the law of war in Protocol 1 to the 1949 Geneva Conventions. The legality of deploying nuclear weapons as instruments of geopolitical policy is questionable when measured against the Nuremberg proscription of planning and preparation of aggressive war, war crimes, and crimes against humanity and the United Nations Charter's proscription of aggressive threat of force. While states' practice of deploying the weapons and the arms-control treaties that regulate but do not prohibit mere possession provide some support for legality, those treaties recognize the imperative of preventing nuclear war, and the Nuclear Non-Proliferation Treaty commits nuclear-armed states to good-faith negotiation of nuclear disarmament.

  13. Nuclear obligations: Nuremberg law, nuclear weapons, and protest

    International Nuclear Information System (INIS)

    Nuclear weapons use and deployment and nonviolent anti-nuclear protests are evaluated. Use of nuclear weapons would constitute war crimes and crimes against humanity as defined in both the Nuremberg Charter and Allied Control Council Law No. 10 and applied by the International Military Tribunal and other Nuremberg courts. Strategic and atomic bombing during World War 2 did not set a precedent for use of nuclear weapons. The consequentialist argument for World War 2 bombing fails and the bombing has also been repudiated by codification of the law of war in Protocol 1 to the 1949 Geneva Conventions. The legality of deploying nuclear weapons as instruments of geopolitical policy is questionable when measured against the Nuremberg proscription of planning and preparation of aggressive war, war crimes, and crimes against humanity and the United Nations Charter's proscription of aggressive threat of force. While states' practice of deploying the weapons and the arms-control treaties that regulate but do not prohibit mere possession provide some support for legality, those treaties recognize the imperative of preventing nuclear war, and the Nuclear Non-Proliferation Treaty commits nuclear-armed states to good-faith negotiation of nuclear disarmament

  14. Prevention of the Outer Space Weaponization

    Science.gov (United States)

    Zhukov, Gennady P.

    2002-01-01

    9 states. The satellites of various functions (early warning, communication, data acquisition, reconnaissance and navigation) were actively used and continue to be used with the purposes of raising efficiency of ground armed forces, especially in fight against international terrorism. At the same time such satellites are not a weapon in the sense of that word since they do not create the threats of armed attack in outer space or from outer space. Moreover, they promote maintaining of stability in the international relations. For this reason the reconnaissance and data acquisition satellites used for the verification of observance by States of the arms limitation agreements are under international protection as national technical means of the control. Similar protection is enjoyed by the early warning satellites. With the help of space communication facilities the more reliable operative connection of the statesmen is organized in the strained situations. By this way the probability of making of the incorrect retaliatory decisions in critical political situations is reduced. At the same time it's necessary to take into consideration that the activities of such satellite systems are tightly connected with ground armed forces of the states. the earth, what from the point of view of international law may be qualified as establishing a partial demilitarization regime in outer space. After the prohibition of anti-satellite weapons (ASAT) and anti-satellite (ASAT) weapons it will be possible to speak about establishing of an international legal regime of complete demilitarization in outer space eliminating any kinds of weapon from outer space. in a peaceful time. weaponization.The main task of this paper is to analyze and to discuss the present binding regime of the outer space deweaponization and particular measures on consolidation and strengthening of this regime. agreements of the Russian Federation and the USA into multilateral Treaties. Such "immunity" would cover

  15. Rays as weapons

    Energy Technology Data Exchange (ETDEWEB)

    Vogel, H. [Asklepios Klinik St. Georg, Roentgenabteilung, Lohmuehlenstrasse 5, 20099 Hamburg (Germany)], E-mail: Hermann.vogel@ak-stgeorg.lbk-hh.de

    2007-08-15

    Purpose: Ionizing radiation is being regarded as life threatening. Therefore, accidents in nuclear power plants are considered equal threatening as nuclear bomb explosions, and attacks with dirty bombs are thought as dangerous as nuclear weapon explosions. However, there are differences between a nuclear bomb explosion, the largest imaginable accident in a nuclear power plant, and an attack with a dirty bomb. It is intended to point them out. Method: The processes are described, which damage in a nuclear bomb explosion, in the largest imaginable accident in a nuclear power plant, and in an attack with a dirty bomb. Their effects are compared with each other, i.e. explosion, heat, shock wave (blast), ionizing radiation, and fallout. Results: In the center of the explosion of a nuclear bomb, the temperature rises to 100 Mio deg.C, this induces damaging heat radiation and shock wave. In the largest imaginable accident in a nuclear power plant and in the conventional explosion of a dirty bomb, the temperature may rise up to 3000 deg. C, heat radiation and blast are limited to a short distance. In nuclear power plants, explosions due to oxyhydrogen gas or steam may occur. In nuclear explosions the dispersed radioactive material (fall out) consists mainly of isotopes with short half-life, in nuclear power plants and in dirty bomb attacks with longer half-life. The amount of fall out is comparable in nuclear bomb explosions with that in the largest imaginable accident in a nuclear power plant, it is smaller in attacks with dirty bombs. An explosion in a nuclear power plant even in the largest imaginable accident is not a nuclear explosion. In Hiroshima and Nagasaki, there were 200,000 victims nearly all by heat and blast, some 300 died by ionizing radiation. In Chernobyl, there have been less than 100 victims due to ionizing radiation up till now. A dirty bomb kills possibly with the explosion of conventional explosive, the dispersed radioactive material may damage

  16. Biological agents with potential for misuse: a historical perspective and defensive measures

    International Nuclear Information System (INIS)

    Biological and chemical agents capable of producing serious illness or mortality have been used in biowarfare from ancient times. Use of these agents has progressed from crude forms in early and middle ages, when snakes and infected cadavers were used as weapons in battles, to sophisticated preparations for use during and after the second World War. Cults and terrorist organizations have attempted the use of biological agents with an aim to immobilize populations or cause serious harm. The reasons for interest in these agents by individuals and organizations include relative ease of acquisition, potential for causing mass casualty or panic, modest financing requirement, availability of technology, and relative ease of delivery. The Centers for Disease Control and Prevention has classified Critical Biological Agents into three major categories. This classification was based on several criteria, which include severity of impact on human health, potential for delivery in a weapon, capacity to cause panic and special needs for development, and stockpiling of medication. Agents that could cause the greatest harm following deliberate use were placed in category A. Category B included agents capable of producing serious harm and significant mortality but of lower magnitude than category A agents. Category C included emerging pathogens that could be developed for mass dispersion in future and their potential as a major health threat. A brief description of the category A bioagents is included and the pathophysiology of two particularly prominent agents, namely anthrax and smallpox, is discussed in detail. The potential danger from biological agents and their ever increasing threat to human populations have created a need for developing technologies for their early detection, for developing treatment strategies, and for refinement of procedures to ensure survival of affected individuals so as to attain the ultimate goal of eliminating the threat from intentional use of

  17. Examination of Economic Feasibility of Nuclear Weapons in the Republic of Korea

    International Nuclear Information System (INIS)

    This observation implies that the popular view on nuclear weapons amongst Korean public is in part due to lack of knowledge about overall implications of possessing nuclear weapons. In this regard, pros and cons of nuclear weapons development need to be better characterized and understood by the public to support nuclear nonproliferation culture development. Noting lack of literature on characterizing the economics of nuclear weapons development, this study aims at performing economic feasibility analysis of nuclear weapons development in the ROK. For this purpose, an approach called Index technique based on the US experiences was applied to Korean historical data along with cost-benefit analysis and Multi-Criteria Decision Making Analysis. In this study, the scenario of nuclear weapons development against North Korean nuclear threat was compared with conventional weapons-based defense strategy. The comparison was based on cost benefit analysis and qualitative multi-criteria decision analysis. Results indicate that nuclear weapons development is not a desirable option. However, as this work was a rather simplistic academic exercise, further work is needed to support the outcome of the study. Outcome of these investigations would be useful for communication with the public regarding the need for nuclear weapons for national defense and to develop nuclear nonproliferation culture in the ROK

  18. Examination of Economic Feasibility of Nuclear Weapons in the Republic of Korea

    Energy Technology Data Exchange (ETDEWEB)

    Suh, Young A; Yim, Man Sung [Korea Advanced Institute of Science and Technology, Daejeon (Korea, Republic of)

    2015-05-15

    This observation implies that the popular view on nuclear weapons amongst Korean public is in part due to lack of knowledge about overall implications of possessing nuclear weapons. In this regard, pros and cons of nuclear weapons development need to be better characterized and understood by the public to support nuclear nonproliferation culture development. Noting lack of literature on characterizing the economics of nuclear weapons development, this study aims at performing economic feasibility analysis of nuclear weapons development in the ROK. For this purpose, an approach called Index technique based on the US experiences was applied to Korean historical data along with cost-benefit analysis and Multi-Criteria Decision Making Analysis. In this study, the scenario of nuclear weapons development against North Korean nuclear threat was compared with conventional weapons-based defense strategy. The comparison was based on cost benefit analysis and qualitative multi-criteria decision analysis. Results indicate that nuclear weapons development is not a desirable option. However, as this work was a rather simplistic academic exercise, further work is needed to support the outcome of the study. Outcome of these investigations would be useful for communication with the public regarding the need for nuclear weapons for national defense and to develop nuclear nonproliferation culture in the ROK.

  19. City mayors on the march. Hiroshima leading citizen campaign to ban nuclear weapons

    International Nuclear Information System (INIS)

    Led on our tragic experience 58 years ago, Hiroshima has continually called for the abolition of nuclear weapons and the realization of genuine and lasting world peace. Unfortunately, despite our efforts, this planet still bristles with enormous arsenals of nuclear weapons, and today we face an increasingly perilous nuclear crisis. We see States that have nuclear weapons taking more rigid positions regarding disarmament, and non-nuclear-weapon States frightened into seeking their own nuclear bombs. The global Nuclear Non-Proliferation Treaty (NPT). the pivotal international agreement regarding nuclear weapons, is teetering on the brink of collapse. The world's leading superpower, the United States, for example, has refused to sign the Comprehensive Nuclear-Test-Ban Treaty and is resuming research into small nuclear weapons. These steps run contrary to the enshrined commitment of nuclear powers to reduce atomic arsenals and move toward a nuclear-weapon free world. We cannot sit quietly as the world plunges toward unspeakable violence and misery. We must let our leaders know, first and foremost, that we demand immediate freedom from the nuclear threat. Nuclear weapons are heinous, cruel, inhumane weapons that threaten our entire species. In 1996, the International Court of Justice issued an advisory opinion declaring them illegal. At the Meeting of the Preparatory Committee to the 2005 NPT Review Conference held in April 2003 in Geneva the president of the World Conference of Mayors for Peace, a non-governmental organization (NGO) that now has 554 member cities in 107 countries and regions, the following demands, were made: A complete and total ban on all nuclear weapons everywhere; Removal of all nuclear weapons from hair-trigger alert immediately and withdrawal of all nuclear weapons deployed on foreign territory; It is high time for all recognized nuclear-weapon States to join in a multilateral process of nuclear disarmament and for de-facto nuclear-weapon States

  20. Nuclear weapons complex

    International Nuclear Information System (INIS)

    In this paper, GAO provides its views on DOE's January 1991 Nuclear Weapons Complex Reconfiguration Study. GAO believes that DOE's new reconfiguration study provides a starting point for reaching agreement on solutions to many of the complex's problems. Key decisions still need to be made about the size of the complex, where to relocate plutonium operations, what technologies should be used for new tritium production, and what to do with excess plutonium. The total cost for reconfiguring and modernizing is still uncertain and some management issues remain unresolved. Congress faces a difficult task in making these decisions given the conflicting demands for scare resources in a time of growing budget deficits and war in the Persian Gulf

  1. Areas free of nuclear weapons

    International Nuclear Information System (INIS)

    In fact there is considerable disagreement about the concept of zones free of nuclear weapons, but the different angles from which countries see this idea, conditions of entry into force and assess of their effectiveness in achieving objectives contributed to the lack of final formulation of one specific definition and not to develop an integrated aspects concept. There is a necessity to try to find a clear definition of zones free of nuclear weapons to address in a second phase to the basic purposes of the establishment. The article addressed the following points: the definition of zones free from nuclear weapons; international conventions establishing the zones free of nuclear weapons; advantages of treaties on the areas free of nuclear weapons, which can be summarized mainly in two basic goals: ensuring not to give birth to new nuclear states and achieving regional security and stability.

  2. Insiders and Insider Threats

    DEFF Research Database (Denmark)

    Hunker, Jeffrey; Probst, Christian W.

    2011-01-01

    Threats from the inside of an organization’s perimeters are a significant problem, since it is difficult to distinguish them from benign activity. In this overview article we discuss defining properties of insiders and insider threats. After presenting definitions of these terms, we go on to disc......Threats from the inside of an organization’s perimeters are a significant problem, since it is difficult to distinguish them from benign activity. In this overview article we discuss defining properties of insiders and insider threats. After presenting definitions of these terms, we go...

  3. Threat assessment using visual hierarchy and conceptual firearms ontology

    Science.gov (United States)

    Arslan, Abdullah N.; Hempelmann, Christian F.; Attardo, Salvatore; Blount, Grady Price; Sirakov, Nikolay Metodiev

    2015-05-01

    The work that established and explored the links between visual hierarchy and conceptual ontology of firearms for the purpose of threat assessment is continued. The previous study used geometrical information to find a target in the visual hierarchy and through the links with the conceptual ontology to derive high-level information that was used to assess a potential threat. Multiple improvements and new contributions are reported. The theoretical basis of the geometric feature extraction method was improved in terms of accuracy. The sample space used for validations is expanded from 31 to 153 firearms. Thus, a new larger and more accurate sequence of visual hierarchies was generated using a modified Gonzalez' clustering algorithm. The conceptual ontology is elaborated as well and more links were created between the two kinds of hierarchies (visual and conceptual). The threat assessment equation is refined around ammunition-related properties and uses high-level information from the conceptual hierarchy. The experiments performed on weapons identification and threat assessment showed that our system recognized 100% of the cases if a weapon already belongs to the ontology and in 90.8% of the cases, determined the correct third ancestor (level concept) if the weapon is unknown to the ontology. To validate the accuracy of identification for a very large data set, we calculated the intervals of confidence for our system.

  4. The emerging threat of superwarfarins: history, detection, mechanisms, and countermeasures.

    Science.gov (United States)

    Feinstein, Douglas L; Akpa, Belinda S; Ayee, Manuela A; Boullerne, Anne I; Braun, David; Brodsky, Sergey V; Gidalevitz, David; Hauck, Zane; Kalinin, Sergey; Kowal, Kathy; Kuzmenko, Ivan; Lis, Kinga; Marangoni, Natalia; Martynowycz, Michael W; Rubinstein, Israel; van Breemen, Richard; Ware, Kyle; Weinberg, Guy

    2016-06-01

    Superwarfarins were developed following the emergence of warfarin resistance in rodents. Compared to warfarin, superwarfarins have much longer half-lives and stronger affinity to vitamin K epoxide reductase and therefore can cause death in warfarin-resistant rodents. By the mid-1970s, the superwarfarins brodifacoum and difenacoum were the most widely used rodenticides throughout the world. Unfortunately, increased use was accompanied by a rise in accidental poisonings, reaching >16,000 per year in the United States. Risk of exposure has become a concern since large quantities, up to hundreds of kilograms of rodent bait, are applied by aerial dispersion over regions with rodent infestations. Reports of intentional use of superwarfarins in civilian and military scenarios raise the specter of larger incidents or mass casualties. Unlike warfarin overdose, for which 1-2 days of treatment with vitamin K is effective, treatment of superwarfarin poisoning with vitamin K is limited by extremely high cost and can require daily treatment for a year or longer. Furthermore, superwarfarins have actions that are independent of their anticoagulant effects, including both vitamin K-dependent and -independent effects, which are not mitigated by vitamin K therapy. In this review, we summarize superwarfarin development, biology and pathophysiology, their threat as weapons, and possible therapeutic approaches. PMID:27244102

  5. Verification of Chemical Weapons Destruction

    International Nuclear Information System (INIS)

    The Chemical Weapons Convention is the only multilateral treaty that bans completely an entire category of weapons of mass destruction under international verification arrangements. Possessor States, i.e. those that have chemical weapons stockpiles at the time of becoming party to the CWC, commit to destroying these. All States undertake never to acquire chemical weapons and not to help other States acquire such weapons. The CWC foresees time-bound chemical disarmament. The deadlines for destruction for early entrants to the CWC are provided in the treaty. For late entrants, the Conference of States Parties intervenes to set destruction deadlines. One of the unique features of the CWC is thus the regime for verifying destruction of chemical weapons. But how can you design a system for verification at military sites, while protecting military restricted information? What degree of assurance is considered sufficient in such circumstances? How do you divide the verification costs? How do you deal with production capability and initial declarations of existing stockpiles? The founders of the CWC had to address these and other challenges in designing the treaty. Further refinement of the verification system has followed since the treaty opened for signature in 1993 and since inspection work was initiated following entry-into-force of the treaty in 1997. Most of this work concerns destruction at the two large possessor States, Russia and the United States. Perhaps some of the lessons learned from the OPCW experience may be instructive in a future verification regime for nuclear weapons. (author)

  6. Review on Invasive Tree of Heaven ( Ailanthus altissima (Mill.) Swingle) Conflicting Values: Assessment of Its Ecosystem Services and Potential Biological Threat

    Science.gov (United States)

    Sladonja, Barbara; Sušek, Marta; Guillermic, Julia

    2015-10-01

    Globally, invasions by alien plants are rapidly increasing in extent and severity, leading to large-scale ecosystem degradation. One of the most widespread invasive alien plant species in Europe and North America, Tree of Heaven ( Ailanthus altissima (Mill.) Swingle) was introduced intentionally for use as an ornamental plant in the 18th century. Since then, it has spread and is now frequently found in a number of countries. Today, Tree of Heaven is considered one of the worst invasive plant species in Europe and is also listed as invasive in North America and many other countries. Millennium Ecosystem Assessment is one of many systems trying to list and categorize biological services to humans and to provide a tool for identifying services delivered by natural ecosystems. Invasive species have generally caused degradation of the services, have a major impact on the environment, and are threatening biodiversity and reducing overall species abundance and diversity. On the other hand, some invasive species can provide services useful to human well-being. In the present review A. altissima impacts on ecosystems are identified and positive influences on some ecosystem services are weighed against the negative effects on the environment and human health. The aim of the present review is to resume the general knowledge of A. altissima, group available references on distribution and ecology according to countries, compare ecosystem services provided or enhanced by A. altissima presence and the negative effects it causes, identify gaps in current knowledge, and give recommendations for future lines of research.

  7. Identifying and Mitigating Insider Threats

    DEFF Research Database (Denmark)

    Probst, Christian W.

    2011-01-01

    Organisations face many threats that coarsely can be separated in inside threats and outside threats. Threats from insiders are especially hard to counter since insiders have special knowledge and privileges. Therefore, malicious insider actions are hard to distinguish from benign actions. After ...... discussing new definitions of insiders and insider threats, this article gives an overview of how to mitigate insider threats and discusses conflicting goals when dealing with insider threats....

  8. Communication of 7 August 2007 from the Permanent Mission of Pakistan to the IAEA concerning the establishment of the oversight Board to monitor the implementation of Pakistan's export control on goods, technologies, materials and equipment related to nuclear and biological weapons and their Delivery Systems Act (Act No.V) 2004

    International Nuclear Information System (INIS)

    The Secretariat has received a Note Verbale dated 7 August 2007 from the Permanent Mission of Pakistan enclosing a copy of the Gazette of Pakistan S.R.O. No.693(I)/2007, dated 11 July 2007, regarding the establishment of the Oversight Board to monitor the implementation of Pakistan's Export Control on Goods, Technologies, Materials and Equipment related to Nuclear and Biological Weapons and their Delivery Systems Act (Act No.V) 2004, including the formation and functioning of Strategic Export Control Division. As requested in the Note Verbale, the Note Verbale and the enclosure thereto are circulated for the information of Member States

  9. OIL AS POLITICAL WEAPON

    Directory of Open Access Journals (Sweden)

    Mariana, BUICAN

    2013-12-01

    Full Text Available Oil (called by some black gold has not always been as coveted and used, but only in the last hundred years has established itself as a highly sought after as an indispensable proper functioning of modern economic activity that an important factor in international politics. International oil regime has changed in the last decades. In 1960, oil regime was a private oligopol which had links with governments main consuming countries. By then the price of a barrel of oil was two U.S. dollars and seven major transnational oil companies decided the amount of oil that will be produced. Meanwhile the world region with the largest oil exports were more strongly expressed nationalism and decolonization. Result, it was so in the late 60s in the region occur independent states. They have created an organization aim of this resource to their advantage - OPEC (Organization of Petroleum Exporting Countries. Thus since 1973 there have been changes in the international regime governing oil field, namely producing countries were fixed production rate and price. After this time the oil weapon has become increasingly important in the management of international relations. Oil influenced the great powers to Middle East conflicts that occurred in the last century, but their attitude about the emergence of new sources of oil outside OPEC. In the late 90's, Russia has become a major supplier of oil to the West.

  10. How electroshock weapons kill!

    Science.gov (United States)

    Lundquist, Marjorie

    2010-03-01

    Growing numbers of law enforcement officers now carry an electroshock weapon (ESW). Over 500 U.S. deaths have followed ESW use in the past 26 years; over 450 of these deaths followed use of an electromuscular disruptor in the past 9 years. Most training courses teach that ESWs are safe; that they can kill only by the direct effect of electric current on the heart; and that a death following use of an ESW always has some other cause. All these teachings are false! The last was disproved by Lundquist.^1 Williams^2 ruled out direct electrical effects as a cause of almost all the 213 deaths he studied, leaving disruption of normal physiological processes as the only alternative explanation. Careful study of all such deaths identifies 4 different ways that death has or could have been brought about by the ESW: kidney failure following rhabdomyolysis [rare]; cardiac arrest from hyperkalemia following rhabdomyolysis [undocumented]; lactic acid-induced ventricular fibrillation [conclusive proof impossible]; and [most common] anoxia from so much lactic acid in the circulating blood that it acts as an oxygen scavenger, continuously depleting the blood of oxygen until most of the lactate has been metabolized. ^1M. Lundquist, BAPS 54(1) K1.270(2009). ^2Howard E. Williams, Taser Electronic Control Devices and Sudden In-Custody Death, 2008.

  11. Comparison on decay process of explosive products for 233U and weapon-grade plutonium

    International Nuclear Information System (INIS)

    Comparison on the nuclear explosive products' radioactivity, biological hazard potential , energy deposition after nuclear explosion between the model of 233U and the model of weapon- grade plutonium was made. The detail analysis of the process of above physics quantities in the model of weapon-grade Plutonium was also given

  12. Wetland Preservation in Australia: The Administrative and Policital Threats

    Institute of Scientific and Technical Information of China (English)

    Mark Yaolin Wang

    2008-01-01

    The wetlands in Australia are of great physical, chemical and biological variety due to the continent's age, geological history and climate. The traditional physical and biological threats remain as the main challenges for wetland preservation in Australia. However, it has been increasingly recognized that the immediate survival of wetlands are being affected by more subtle threats, such as administrative and political threats. This paper identifies these non-physical threats and discusses how and why they have become the major barriers for sustainable wetland preservation in Australia. Finally, this paper calls for more practical policies and solutions to be implemented for sustainable wetland preservation in Australia.

  13. Physical security technologies for weapons complex reconfiguration facilities

    International Nuclear Information System (INIS)

    Sandia National Laboratories was a member of the Weapons Complex Reconfiguration (WCR) Safeguards and Security (S ampersand S) team providing assistance to the Department of Energy's (DOE) Office of Weapons Complex Reconfiguration. The physical security systems in the new and upgraded facilities being considered for the WCR had to meet DOE orders and other requirements set forth in the WCR Programmatic Design Criteria (PDC), incorporate the latest physical security technologies using proven state-of-the-art systems and meet fundamental security principles. The outcome was to avoid costly retrofits and provide effective and comprehensive protection against current and projected threats with minimal impact on operations, costs and schedule. Physical security requirements for WCR facilities include: (1) reducing S ampersand S life-cycle costs, (2) where feasible automating S ampersand S functions to minimize operational costs, access to critical assets and exposure of people to hazardous environments, (3) increasing the amount of delay to outsider adversary attack, (4) compartmentalizing the facility to minimize the number of personnel requiring access to critical areas and (5) having reliable and maintainable systems. To be most effective against threats physical security must be integrated with facility operations, safety and other S ampersand S activities, such as material control and accountability, nuclear measurements and computer and information security. This paper will discuss the S ampersand S issues, requirements, technology opportunities and needs. Physical security technologies and systems considered in the design effort of the Weapons Complex Reconfiguration facilities will be reviewed

  14. Canadians, nuclear weapons, and the Cold War security dilemma

    International Nuclear Information System (INIS)

    This dissertation provides a history of Canadian ideas about nuclear weapons from the late 1950s until the end of the Trudeau era in 1984. Throughout this period, Canadians reacted to the insecurity they felt in the world around them by expressing many conflicting, often irreconcilable views about a range of nuclear weapon issues, including Canada's acquisition of nuclear warheads in 1963, the U.S. ABM program in the 1960s and early 1970s, the role of Canadian nuclear technology in the development of India's first nuclear explosion, and the Trudeau government's decision to allow the U.S. military to test cruise missiles in northern Canada The dissertation concludes with an examination of the emergence of a broadly-based, increasingly mainstream and influential anti-nuclear movement in the early 1980s, the clearest manifestation of the insecurity Canadians experienced at the time. .The nuclear debates examined in this dissertation reveal that Canadians were divided over nuclear weapons, nuclear strategy, the arms race, proliferation, and arms control and disarmament. In particular, they came to fundamentally different conclusions about how Canada's nuclear weapon policies, and its support for the nuclear policies of its alliances, would contribute to international stability and order. Some believed that their security rested on the maintenance of a strong Western nuclear deterrent and supported Canada contributing to its credibility; others believed that the constant modernisation of nuclear arsenals fuelled by the superpower arms race posed a serious threat to their security. This conceptual dilemma-the security through nuclear strength argument versus the fear that the quest for security through quantitative and qualitative improvements of nuclear stockpiles increased the likelihood of nuclear war-left Canadians divided over the value and utility of nuclear weapons and the strategies developed around them. At the same time, Canadians' ideas about nuclear weapons

  15. Risk in the Weapons Stockpile

    Energy Technology Data Exchange (ETDEWEB)

    Noone, Bailey C [Los Alamos National Laboratory

    2012-08-14

    When it comes to the nuclear weapons stockpile, risk must be as low as possible. Design and care to keep the stockpile healthy involves all aspects of risk management. Design diversity is a method that helps to mitigate risk.

  16. Islamic State and Chemical Weapons

    Directory of Open Access Journals (Sweden)

    Lukáš Rafay

    2016-09-01

    Full Text Available The article deals with topic of Islamic State and chemical weapons. The issue is analysed in three dimensions: origin of used chemical weapons and possibility of independent production; known chemical attacks and tactical regularities in their execution; and traits of future chemical terrorist attacks. By providing a thorough examination of the problem, the article aims at predicting the future development of the group’s chemical program as well as describing any prospective chemical terrorist attacks in Europe

  17. Nuclear weapons and the law.

    Science.gov (United States)

    Murray, R K

    1999-01-01

    The history of the International Court of Justice (ICJ) is summarized, with a discussion of some of its earlier Advisory Opinions. The Advisory Opinion on the legality of nuclear arms is considered in the light of the principles of international humanitarian law and a review of nuclear weapons effects. The present government's position on nuclear weapons as outlined in the Strategic Defence Review (which ignores the issue of legality) is examined critically. PMID:10371869

  18. Alternative Threat Methodology

    Directory of Open Access Journals (Sweden)

    Charles B. King III

    2011-01-01

    Full Text Available Of the many challenges facing risk analysis practitioners, perhaps the most difficult to overcome is in the field of terrorist threat analysis. When estimating the threat associated with naturally occurring events, historical data provides a great deal of insight into the frequency of those events. Threat associated with accidents applies many operations research tools to gauge future failure-rates (Failure Mode and Effects Analysis being perhaps the most widely known. However, estimating the probability of an individual's or group's attacking a specific (or even a generic target is an element of risk analysis in which art and intuition are applied far more regularly than is science.

  19. Information Discovery from Complementary Literatures: Categorizing Viruses as Potential Weapons.

    Science.gov (United States)

    Swanson, Don R.; Smalheiser, Neil R.; Bookstein, A.

    2001-01-01

    This project demonstrates how techniques of analyzing complementary literatures might be applied to problems of defense against biological weapons. The article is based solely on the open-source scientific literature, and is oriented on informatics techniques. Findings are intended as a guide to the virus literature to support further studies that…

  20. Shipborne Laser Beam Weapon System for Defence against Cruise Missiles

    Directory of Open Access Journals (Sweden)

    J.P. Dudeja

    2000-04-01

    Full Text Available Sea-skim~ing cruise missiles pose the greatest threat to a surface ship in the present-day war scenario. The convenitional close-in-weapon-systems (CIWSs are becoming less reliable against these new challenges requiring extremely fast reaction time. Naval Forces see a high energy laser as a feasible andjeffective directed energy weapon against sea-skimming antiship cruise missiles becauseof its .ability to deliver destructive energy at the speed of light on to a distant target. The paper comparesthe technology and capability of deuterium fluoride (DF and chemical-oxygen-iodine laser (COIL in effectively performing the role of a shipborne CIWS altainst sea-skimming missiles. Out of these twolasers, it is argued that DF laser wo.uld be more effective a,s a shipborne weapon for defence against sea-skimmin,g cruise missiles. Besides the high energy laser as the primary (killing laser, othersub-systems required in the complete weapon system would be: A beacon laser to sense phase distor'ions in the primary laser, adaptive optics to compensate the atmospheric distortions, beam-directing optics, illuminating lasers, IRST sensors, surveillance and tracking radars, interfacing system, etc.

  1. Toward a psychology of human survival: Psychological approaches to contemporary global threats

    International Nuclear Information System (INIS)

    Nuclear weapons, population explosion, resource and food-supply depletion, and environmental deterioration have been posing increasing threats to human survival. Moreover, for the first time in history, all these major global threats are human caused and can, therefore, be traced in large part to psychological origins. After a brief overview of the nature and extent of current threats, this paper suggests criteria for an adequate psychology of human survival. The causes and effects of the threats are examined from various psychological perspectives and the psychological principles underlying effective responses are deduced. The ways in which mental health professionals may contribute to this most crucial task are discussed. 76 references

  2. Toward a psychology of human survival: Psychological approaches to contemporary global threats

    Energy Technology Data Exchange (ETDEWEB)

    Walsh, R. (Univ. of California, Irvine (USA))

    1989-04-01

    Nuclear weapons, population explosion, resource and food-supply depletion, and environmental deterioration have been posing increasing threats to human survival. Moreover, for the first time in history, all these major global threats are human caused and can, therefore, be traced in large part to psychological origins. After a brief overview of the nature and extent of current threats, this paper suggests criteria for an adequate psychology of human survival. The causes and effects of the threats are examined from various psychological perspectives and the psychological principles underlying effective responses are deduced. The ways in which mental health professionals may contribute to this most crucial task are discussed. 76 references.

  3. HEU core conversion of Russian production reactors: a major threat to the international RERTR regime

    International Nuclear Information System (INIS)

    This paper calls the attention for the major threat to the International Reduced Enrichment for Research and Test Reactors (RERTR) program, represented by the HEU core conversion of russian production reactors. This program aims to reduce and eventually eliminate international civilian commerce in nuclear weapons-usable, highly enriched uranium , and thereby significantly lower risks of the material being stolen or diverted by terrorist or states for producing nuclear weapons

  4. GLOBAL WARMING: IS A NEW THREAT?

    Energy Technology Data Exchange (ETDEWEB)

    Ayca Eminoglu

    2008-09-30

    In the Post Cold War era, the concepts of ''security'', ''national security'', and ''international security'' have changed with regard to their contents and meanings. Such developments made states to renew their national security policies. Security is a special form of politics as well. All security issues are political problems but not all political conflicts are security issues. In the Post Cold War era, differentiating and increasing numbers of elements that constitutes threat changed the concept of threat and widen the capacity of security. In this term, many elements lost its effect of being a threat but also new threatening elements emerged. Environmental problems, human rights, mass migration, micro nationalism, ethnic conflicts, religious fundamentalism, contagious diseases, international terrorism, economic instabilities, drug and weapon smuggling and human trafficking are the new problems emerged in international security agenda. Environmental problems no longer take place in security issues and can be mentioned as a ''low security'' issue. They are threats to the global commons i.e. the oceans, the seas, the ozone layer and the climate system, which are life supports for mankind as a whole. Global warming is one of the most important environmental issues of our day that effects human life in every field and can be defined as a 'serious threat to international security'. Because of global warming, environmental changes will occur and these changes will cause conflicting issues in international relations. Because of global warming dwindling freshwater supplies, food shortages, political instability and other conflicts may take place. Some IR scholars see a need for global cooperation in order to face the threat. At the background of global warming and its effects, states have to get preventive measures and normally, each state form its own measures, therefore as a

  5. Insider Threat - Material Control and Accountability Mitigation

    Energy Technology Data Exchange (ETDEWEB)

    Powell, Danny H [ORNL; Elwood Jr, Robert H [ORNL; Roche, Charles T [ORNL

    2011-01-01

    The technical objectives of nuclear safeguards are (1) the timely detection of diversion of significant quantities of nuclear material from peaceful uses to the manufacture of nuclear weapons or other nuclear explosive devices or for purposes unknown and (2) the deterrence of such diversion by the risk of early detection. The safeguards and security program must address both outsider threats and insider threats. Outsider threats are primarily addressed by the physical protection system. Insider threats can be any level of personnel at the site including passive or active insiders that could attempt protracted or abrupt diversion. This could occur by an individual acting alone or by collusion between an individual with material control and accountability (MC&A) responsibilities and another individual who has responsibility or control within both the physical protection and the MC&A systems. The insider threat is one that must be understood and incorporated into the safeguards posture. There have been more than 18 documented cases of theft or loss of plutonium or highly enriched uranium. The insider has access, authority, and knowledge, as well as a set of attributes, that make him/her difficult to detect. An integrated safeguards program is designed as a defense-in-depth system that seeks to prevent the unauthorized removal of nuclear material, to provide early detection of any unauthorized attempt to remove nuclear material, and to rapidly respond to any attempted removal of nuclear material. The program is also designed to support protection against sabotage, espionage, unauthorized access, compromise, and other hostile acts that may cause unacceptable adverse impacts on national security, program continuity, the health and safety of employees, the public, or the environment. Nuclear MC&A play an essential role in the capabilities of an integrated safeguards system to deter and detect theft or diversion of nuclear material. An integrated safeguards system with

  6. Facing ambiguous threats.

    Science.gov (United States)

    Roberto, Michael A; Bohmer, Richard M J; Edmondson, Amy C

    2006-11-01

    On February 1, 2003, the world watched in horror as the Columbia space shuttle broke apart while reentering the earth's atmosphere, killing all seven astronauts. Some have argued that NASA's failure to respond with appropriate intensity to the so-called foam strike that led to the accident was evidence of irresponsible or incompetent management. The authors' research, however, suggests that NASA was exhibiting a natural, albeit unfortunate, pattern of behavior common in many organizations. The foam strike is a prime example of what the authors call an ambiguous threat-a signal that may or may not portend future harm. Ambiguous threats differ from threats with obvious causes-say, a fire in the building-for which the response is clear. They also differ from unmistakable threats that may lack straightforward response paths (such as the frightening oxygen-tank explosion aboard Apollo 13). However, when the warning sign is ambiguous and the threat's potential effect is unclear, managers may choose to ignore or discount the risk. Such an approach can be catastrophic. Firms that do a good job of dealing with ambiguous threats do not improvise during a crisis; rather, they apply a rigorous set of detection and response capabilities that they have developed and practiced beforehand. In this article, the authors outline how to put such capabilities in place long before a crisis strikes. First, companies need to hone their teamwork and rapid problem-solving skills through practice. Second, they must learn to recognize weak signals, amplify the threat, and encourage employees to ask disconcerting "what if" questions in a safe environment. Finally, they should explore possible responses to threats through quick, low-cost experimentation. PMID:17131567

  7. The Changing Threat

    Directory of Open Access Journals (Sweden)

    Gabriel Siboni

    2010-06-01

    Full Text Available The purpose of this conference is to try to understand the changes in the threat against the State of Israel that have taken place in recent years, and to examine the components of the optimal response to the threat. Today’s seminar is organized within the framework of the INSS Military and Strategic Affairs Program, which aims to enhance the public discourse on subjects relevant to this discipline through conferences and the Military and Strategic Affairs journal.

  8. Biological warfare, bioterrorism, and biocrime.

    Science.gov (United States)

    Jansen, H J; Breeveld, F J; Stijnis, C; Grobusch, M P

    2014-06-01

    Biological weapons achieve their intended target effects through the infectivity of disease-causing infectious agents. The ability to use biological agents in warfare is prohibited by the Biological and Toxin Weapon Convention. Bioterrorism is defined as the deliberate release of viruses, bacteria or other agents used to cause illness or death in people, but also in animals or plants. It is aimed at creating casualties, terror, societal disruption, or economic loss, inspired by ideological, religious or political beliefs. The success of bioterroristic attempts is defined by the measure of societal disruption and panic, and not necessarily by the sheer number of casualties. Thus, making only a few individuals ill by the use of crude methods may be sufficient, as long as it creates the impact that is aimed for. The assessment of bioterrorism threats and motives have been described before. Biocrime implies the use of a biological agent to kill or make ill a single individual or small group of individuals, motivated by revenge or the desire for monetary gain by extortion, rather than by political, ideological, religious or other beliefs. The likelihood of a successful bioterrorist attack is not very large, given the technical difficulties and constraints. However, even if the number of casualties is likely to be limited, the impact of a bioterrorist attack can still be high. Measures aimed at enhancing diagnostic and therapeutic capabilities and capacities alongside training and education will improve the ability of society to combat 'regular' infectious diseases outbreaks, as well as mitigating the effects of bioterrorist attacks. PMID:24890710

  9. Radiological Weapons: How Great Is The Danger?

    Energy Technology Data Exchange (ETDEWEB)

    Moore, G M

    2003-06-01

    One of the underlying purposes of this paper is to provoke thinking about the interplay between the regulation of radioactive materials and the risk of their use in an radiological weapon (RW). Also considered in this paper are the types of RWs that a terrorist might use, the nature of the threat and danger posed by the various types of RWs, the essential elements that must be considered in responding to the terrorist use of an RW, and what steps may need to be taken a priori to minimize the consequences of the inevitable use of an RW. Because radiological dispersal devices (RDDs) have been the focus of so much recent concern and because RDDs are arguably the most likely of RWs to be used by a terrorist group, a major focus of this paper will be on RDDs. Radiological weapons are going to be used by some individual or group, if not this year then next year, or at some time in the foreseeable future. A policy of focusing resources solely on prevention of their use would leave any government open to significant economic disruption when the inevitable use occurs. Preplanning can limit the injuries, property damage, and economic losses that might result from the use of an RW. Moreover, a combination of efforts to prevent and to minimize the impact of RWs may significantly discourage potential users. The dangers from RWs can be dealt with while society continues to enjoy the benefits of nuclear technology that were promised under Atoms for Peace. However, some restructuring of our use of radioactive materials is necessary to ensure that the current and future uses of radioactive materials outweigh the potential disruption caused by misuse of the materials in RWs.

  10. Biologic

    CERN Document Server

    Kauffman, L H

    2002-01-01

    In this paper we explore the boundary between biology and the study of formal systems (logic). In the end, we arrive at a summary formalism, a chapter in "boundary mathematics" where there are not only containers but also extainers ><, entities open to interaction and distinguishing the space that they are not. The boundary algebra of containers and extainers is to biologic what boolean algebra is to classical logic. We show how this formalism encompasses significant parts of the logic of DNA replication, the Dirac formalism for quantum mechanics, formalisms for protein folding and the basic structure of the Temperley Lieb algebra at the foundations of topological invariants of knots and links.

  11. Elimination of ballistic missiles: An important step towards a nuclear-weapon-free world

    International Nuclear Information System (INIS)

    Although the Non-Proliferation Treaty preamble emphasises 'the elimination from national arsenals of nuclear weapons and the means of their delivery pursuant to a Treaty on general and complete disarmament under strict and effective international control', the Non-Proliferation Treaty does not further specify how this ultimate goal could be achieved for delivery systems. Delivery systems are an important and costly part of nuclear weapons which should be sophisticated, therefore the control of nuclear-capable delivery systems would be an important step to make nuclear weapons useless and reduce the threat od their use. This is especially true for ballistic missiles, which represent effective and powerful means to deploy nuclear weapons

  12. Scientific and technical development and the chemical weapon convention

    International Nuclear Information System (INIS)

    The Chemical Weapons Convention (CWC) was drafted with the recognition that it is impossible to envision every way in which toxic chemicals might be used for aggressive purposes. As terrorist organizations and rogue states replace the major powers as the most likely candidates to employ chemical weapons, the agents of choice may differ from those developed for battlefield use. Twenty- first century chemical warfare may target civilians or agricultural production, and clandestine production-facilities may manufacture toxic agents from chemical precursors, not monitored under the CWC control regime. The effects (on CWC implementation) of changing industrial technologies, including ongoing developments in chemical process technology, dual-use industrial chemicals, and rapid methods for discovering biologically active chemicals, are considerable Also considered is how commercial technologies could be misused for the development of novel chemical weapons, and how such abuses might be detected and monitored. (author)

  13. Vulnerability of populations and the urban health care systems to nuclear weapon attack – examples from four American cities

    OpenAIRE

    Dallas Cham E; Bell William C

    2007-01-01

    Abstract Background The threat posed by the use of weapons of mass destruction (WMD) within the United States has grown significantly in recent years, focusing attention on the medical and public health disaster capabilities of the nation in a large scale crisis. While the hundreds of thousands or millions of casualties resulting from a nuclear weapon would, in and of itself, overwhelm our current medical response capabilities, the response dilemma is further exacerbated in that these resourc...

  14. Reducing the threat of nuclear theft and sabotage

    International Nuclear Information System (INIS)

    The appalling events of September II, 2001 make clear that the threat of well-organized global terrorist groups bent on causing mass destruction is not hypothetical but real. There is evidence that Osama bin Laden's Al Quaida organization is seeking weapons of mass destruction, and has attempted to purchase stolen nuclear material from the former Soviet Union for use in nuclear explosives. Ensuring that the technologies and materials of weapons of mass destruction - especially weapons-usable nuclear materials, do not fall into the hands of terrorist groups or hostile states must therefore be a central element of the coming global battle to prevent mass-destruction terrorism. At the same time, nuclear facilities and radioactive materials - along with a wide range of other especially hazardous facilities and materials - must be protected from mass-consequence sabotage. Limited access to fissile materials, the essential ingredients of nuclear weapons, is the principal technical barrier to nuclear proliferation in the world today. The international community has an overwhelming interest in seeing that all such material is secure and accounted for. These events highlight the urgent need to: Dramatically expand international cooperation to upgrade security and accounting for weapons- usable nuclear material, in the former Soviet Union and worldwide, with the goal of ensuring that all such material is protected to stringent standards within a few years; Ensure that all nuclear facilities and materials (and other particularly hazardous facilities) are secure from mass-consequence sabotage; Strengthen national and international standards for security of nuclear materials and facilities; Greatly expand international efforts to interdict nuclear smuggling, including the difficult but essential task of strengthening efforts to share intelligence in this critical area; Reduce the number of sites where significant quantities of weapons-usable nuclear material exist, and the size

  15. The Effects of Nuclear Weapons

    Energy Technology Data Exchange (ETDEWEB)

    Glasstone, Samuel

    1964-02-01

    This book is a revision of "The Effects of Nuclear Weapons" which was issued in 1957. It was prepared by the Defense Atomic Support Agency of the Department of Defense in coordination with other cognizant governmental agencies and was published by the U.S. Atomc Energy Commission. Although the complex nature of nuclear weapons effects does not always allow exact evaluation, the conclusions reached herein represent the combined judgment of a number of the most competent scientists working the problem. There is a need for widespread public understanding of the best information available on the effects of nuclear weapons. The purpose of this book is to present as accurately as possible, within the limits of national security, a comprehensive summary of this information.

  16. A nuclear-weapon-free zone from the Black Sea to the Baltic Sea

    International Nuclear Information System (INIS)

    In 1995, at the Extension and Review Conference of the parties to the Non-Proliferation Treaty, Belarus introduced the new idea of establishing the nuclear-weapon-free zone 'in the center of Europe', as an alternative to a military and nuclear expansion eastwards by the Western military alliance NATO. The geographical scope of the zone from the Black Sea to the Baltic Sea could encompass the former Warsaw pact territory west of Russian federation including: the three Baltic states (Estonia, Latvia, Lithuania), four Visegrad states (Poland, Czech Republic, Slovakia, Hungary), newly independent states (Belarus, Ukraine, Moldova), Romania and Bulgaria. The success of nuclear-weapon-free zone is dependent on how it would be accepted by the nuclear-weapon powers and the surrounding world. There would be four measures of central importance for the achievement of a nuclear-weapon-free zone in general and in European case: non-possession of nuclear weapons by zonal states; non-stationing of nuclear weapons within the zone by any state; non-use or no-threat of use of nuclear weapons throughout the zone or against targets within the zone; and verification that parties comply with their treaty obligations

  17. The future of nuclear weapons: Proliferation in South Asia

    Energy Technology Data Exchange (ETDEWEB)

    Kamal, N. [Institute of Strategic Studies, Islamabada (Pakistan)

    1992-12-31

    The signing of the Intermediate-Range Nuclear Forces (INF) Treaty in December 1987, followed by the dramatic changes in East-West relations since 1989 and the more recent Soviet-American strategic arms limitation agreement, have greatly eased public concerns about the danger of nuclear war. The context has also changed for the Nonaligned Movement, which had made nuclear disarmament and condemnation of the concept of nuclear deterrence the primary themes of its multilateral disarmament diplomacy. More important would be the interrelationship among the states possessing nuclear weapons (Russia, Ukraine, Belarus, and Kazakhstan). In any case, there is little risk of a revival of nuclear competition. Both France and China have decided to sign the Treaty on the Nonproliferation of Nuclear Weapons (NPT); they are the only two nuclear-weapon states that have stayed outside the regime. Meanwhile, Brazil and Argentina have moved further down the nonproliferation road by engaging in confidence-building measures and moving closer to joining the Latin American nuclear-weapons-free zone established under the Treaty of Tlatelolco in 1967. South Africa has also agreed to embrace the NPT as well as a nuclear-weapons-free zone regime for the entire African continent, while North Korea has agreed to sign a safeguard agreement with the International Atomic Energy Agency (IAEA), thereby allowing in principle international inspection of its nuclear facilities. In the third world regions, the dangers of nuclear proliferation and competitive nuclear buildup are most pronounced in South Asia, a region where a variety of complicating problems exist: acute threat perceptions, historical emity, religious and sectarian animosity, ethnic antagonism, territorial disputes, ambitions for regional dominance, and domestic political instability. This chapter will focus primarily on South Asia, although references will also be made to other regions, where relevant. 17 refs.

  18. Concealed weapons detection using low-frequency magnetic imaging

    Science.gov (United States)

    Zollars, Byron G.; Sallee, Bradley; Durrett, Michael G.; Cruce, Clay; Hallidy, William

    1997-02-01

    Military personnel, law-enforcement officers, and civilians face ever-increasing dangers from persons carrying concealed handguns and other weapons. In direct correspondence with this danger is a need for more sophisticated means of detecting concealed weapons. We have developed a novel concealed-weapons detector based on the principle of low- frequency magnetic imaging. The detector is configured as a portal, and constructs an image of electrically conductive objects transported through it with a potential spatial resolution of approximately 1 inch. Measurements on a breadboard version of the weapons detector have, to date, yielded a resolution of 2 inches. In operation, magnetic dipole radiation, emitted by transmitting antennas in the perimeter of the portal, is scattered from conductive objects and is picked up by receive antennas, also positioned around the portal. With sufficient measurements, each with a different geometry, a solution to the inverse scattering problem can be found. The result is an image of conductive objects in the detector. The detector is sensitive to all metals, semiconductors, and conductive composites. The measured conductivity image formed by the detector is combined with the video signal from a visible CCD camera to form a composite image of persons transiting the detector portal and the conductive objects they are carrying. Accompanying image recognition software could be used to determine the threat level of objects based upon shape, conductivity, and placement on the person of the carrier, and provide cueing, logging, or alarm functions to the operator if suspect weapons are identified. The low- power, low-frequency emissions from the detector are at levels considered safe to humans and medical implants..

  19. The Effects of Nuclear Weapons

    Energy Technology Data Exchange (ETDEWEB)

    Glasstone, Samuel

    1957-06-01

    This handbook prepared by the Armed Forces Special Weapons Project of the Department of Defense in coordination with other cognizant government agencies and published by the United States Atomic Energy Commission, is a comprehensive summary of current knowledge on the effects of nuclear weapons. The effects information contained herein is calculated for yields up to 20 megatons and the scaling laws for hypothetically extending the calculations beyond this limit are given. The figure of 20 megatons however is not be taken as an indication of capabilities or developments.

  20. Concealed Threat Detection at Multiple Frames-per-second

    Energy Technology Data Exchange (ETDEWEB)

    Chang, J T

    2005-11-08

    In this LDRD project, our research purpose is to investigate the science and technology necessary to enable real-time array imaging as a rapid way to detect hidden threats through obscurants such as smoke, fog, walls, doors, and clothing. The goal of this research is to augment the capabilities of protective forces in concealed threat detection. In the current context, threats include people as well as weapons. In most cases, security personnel must make very fast assessments of a threat based upon limited amount of data. Among other attributes, UWB has been shown and quantified to penetrate and propagate through many materials (wood, some concretes, non-metallic building materials, some soils, etc.) while maintaining high range resolution. We have build collaborations with university partners and government agencies. We have considered the impact of psychometrics on target recognition and identification. Specifically we have formulated images in real-time that will engage the user's vision system in a more active way to enhance image interpretation capabilities. In this project, we are researching the use of real time (field programmable gate arrays) integrated with high resolution (cm scale), ultra wide band (UWB) electromagnetic signals for imaging personnel through smoke and walls. We evaluated the ability of real-time UWB imaging for detecting smaller objects, such as concealed weapons that are carried by the obscured personnel. We also examined the cognitive interpretation process of real time UWB electromagnetic images.

  1. A Physicist Looks at the Terrorist Threat

    Science.gov (United States)

    Muller, Richard

    2009-05-01

    Many people fear a terrorist nuclear device, smuggled into the United States, as the one weapon that could surpass the destruction and impact of 9-11. I'll review the design of nuclear weapons, with emphasis on the kinds that can be developed by rogue nations, terrorist groups, and high-school students. Saddam, prior to the first gulf war, was developing a uranium bomb, similar to the one that destroyed Hiroshima. His calutrons (named after my university) were destroyed by the United Nations. The North Korean nuclear weapon was, like the U.S. bomb used on Nagasaki, based on plutonium. Its test released the energy equivalent of about 400 tons of TNT. Although some people have speculated that they were attempting to build a small bomb, it is far more likely that this weapon was a fizzle, with less than 1 percent of the plutonium exploded. In contrast, the energy released from burning jet fuel at the 9-11 World Trade Center attack was the equivalent of 900 tons of TNT for each plane -- over twice that of the North Korean Nuke. The damage came from the fact that gasoline delivers 10 kilocalories per gram, about 15 times the energy of an equal weight of TNT. It is this huge energy per gram that also accounts for our addiction to gasoline; per gram, high performance lithium-ion computer batteries carry only 1 percent as much energy. A dirty bomb (radiological weapon) is also unattractive to terrorists because of the threhold effect: doses less than 100 rem produce no radiation illness and will leave no dead bodies at the scene. That may be why al Qaeda instructed Jose Padilla to abandon his plans for a dirty bomb attack in Chicago, and to try a fossil fuel attack (natural gas) instead. I will argue that the biggest terrorist threat is the conventional low-tech one, such as an airplane attack on a crowded stadium using the explosive fuel that they can legally buy at the corner station.

  2. REVOLUTION IN MILITARY AFFAIRS, MISSILE DEFENCE AND WEAPONS IN SPACE: THE US STRATEGIC TRIAD

    Directory of Open Access Journals (Sweden)

    Joelien Pretorius

    2011-07-01

    Full Text Available American plans for Missile Defence (MD and the weaponisation of space should be analysed in the larger framework of the contemporary Revolution in Military Affairs (RMA.1 Soviet military analysts have written about this revolution from as early as the 1970s, but it was the application of information age technology (IT in the 1991 Gulf War that captured the imagination of military planners and policy makers, especially in the US. The US is actively pursuing an RMA, conceptualised as integrating new IT into weapons systems and integrated command, control, computers, intelligence, surveillance and reconnaissance (C4ISR and, in turn, doctrinal, operational and organisational change in the military to take advantage of information dominance on the battlefield. This relates to MD and the weaponisation of space in two ways. Firstly, very few countries have the financial and technological capability to modernise their defence forces along the lines of a US-defined RMA, which means that they may resort to so-called asymmetric means to exploit the vulnerabilities or weaknesses of a strong, conventional power. Ballistic missiles (in association with chemical, biological or nuclear payloads are one of the asymmetrical threats most commonly cited in speeches and military documents of the US and used as justification of MD. Secondly, the RMA increases the US military’s reliance on space-based military assets for C4ISR. Placing weapons in space to protect these assets is seen as a logical step to ensure a key aspect of US dominance on the battlefield. This paper

  3. Advanced Research Workshop on Preparedness for Nuclear and Radiological Threats

    CERN Document Server

    Diamond, David; Nuclear Threats and Security Challenges

    2015-01-01

    With the dissolution of the Soviet Union the nuclear threats facing the world are constantly evolving and have grown more complex since the end of the Cold War. The diversion of complete weapon systems or nuclear material to rogue nations and terrorist organizations has increased. The events of the past years have proved the necessity to reevaluate these threats on a level never before considered.  In recognition that no single country possesses all of the answers to the critical scientific, institutional and legal questions associated with combating nuclear and radiological terrorism, the NATO Advanced Research Workshop on “Preparedness for Nuclear and Radiological Threats” and this proceeding was structured to promote wide-ranging, multi-national exploration of critical technology needs and underlying scientific challenges to reducing the threat of nuclear/radiological terrorism; to illustrate through country-specific presentations how resulting technologies were used in national programs; and to outli...

  4. Ethical Proactive Threat Research

    Science.gov (United States)

    Aycock, John; Sullins, John

    Through a provocative examination of the positive effects of computer security research on regular users, we argue that traditional security research is insufficient. Instead, we turn to a largely untapped alternative, proactive threat research, a fruitful research area but an ethical minefield. We discuss practices for ethical research and dissemination of proactive research.

  5. Weapons engineering tritium facility overview

    Energy Technology Data Exchange (ETDEWEB)

    Najera, Larry [Los Alamos National Laboratory

    2011-01-20

    Materials provide an overview of the Weapons Engineering Tritium Facility (WETF) as introductory material for January 2011 visit to SRS. Purpose of the visit is to discuss Safety Basis, Conduct of Engineering, and Conduct of Operations. WETF general description and general GTS program capabilities are presented in an unclassified format.

  6. The acquisition of dangerous biological materials :

    Energy Technology Data Exchange (ETDEWEB)

    Aceto, Donato Gonzalo; Astuto-Gribble, Lisa M.; Gaudioso, Jennifer M.

    2007-11-01

    Numerous terrorist organizations have openly expressed interest in producing and deploying biological weapons. However, a limiting factor for many terrorists has been the acquisition of dangerous biological agents, as evidenced by the very few successful instances of biological weapons use compared to the number of documented hoaxes. Biological agents vary greatly in their ability to cause loss of life and economic damage. Some agents, if released properly, can kill many people and cause an extensive number of secondary infections; other agents will sicken only a small number of people for a short period of time. Consequently, several biological agents can potentially be used to perpetrate a bioterrorism attack but few are likely capable of causing a high consequence event. It is crucial, from a US national security perspective, to more deeply understand the likelihood that terrorist organizations can acquire the range of these agents. Few studies have attempted to comprehensively compile the technical information directly relevant to the acquisition of dangerous bacteria, viruses and toxins. In this report, technical fact sheets were assembled for 46 potentially dangerous biological agents. Much of the information was taken from various research sources which could ultimately and significantly expedite and improve bioterrorism threat assessments. By systematically examining a number of specific agent characteristics included in these fact sheets, it may be possible to detect, target, and implement measures to thwart future terrorist acquisition attempts. In addition, the information in these fact sheets may be used as a tool to help laboratories gain a rudimentary understanding of how attractive a method laboratory theft is relative to other potential acquisition modes.

  7. Foams for barriers and nonlethal weapons

    Science.gov (United States)

    Rand, Peter B.

    1997-01-01

    Our times demand better solutions to conflict resolution than simply shooting someone. Because of this, police and military interest in non-lethal concepts is high. Already in use are pepper sprays, bean-bag guns, flash-bang grenades, and rubber bullets. At Sandia we got a head start on non- lethal weapon concepts. Protection of nuclear materials required systems that went way beyond the traditional back vault. Dispensable deterrents were used to allow a graduated response to a threat. Sticky foams and stabilized aqueous foams were developed to provide access delay. Foams won out for security systems simply because you could get a large volume from a small container. For polymeric foams the expansion ratio is thirty to fifty to one. In aqueous foams expansion ratios of one thousand to ne are easily obtained. Recent development work on sticky foams has included a changeover to environmentally friendly solvents, foams with very low toxicity, and the development of non-flammable silicone resin based foams. High expansion aqueous foams are useful visual and aural obscurants. Our recent aqueous foam development has concentrated on using very low toxicity foaming agents combined with oleoresin capsicum irritant to provide a safe but highly irritating foam.

  8. Direct-energy weapons : invisible and invincible?

    OpenAIRE

    Deveci, Bayram Mert

    2007-01-01

    A military weapon is any tool used to increase the reach or power of a nation. Simply, it can be said that each era witnesses the deployment of new and powerful mass destruction weaponry. What will this century's most powerful weapon be? Directed-energy weapons, which offer advantages over conventional weapons by providing attack at the speed of light, precise targeting, rapid engagement of multiple targets, adjustable damage capacity, low operational cost, reduced logistic support, a nea...

  9. Seaborne Delivery Interdiction of Weapons of Mass Destruction (WMD)

    Energy Technology Data Exchange (ETDEWEB)

    Glauser, H

    2011-03-03

    Over the next 10-20 years, the probability of a terrorist attack using a weapon of mass destruction (WMD) on the United States is projected to increase. At some point over the next few decades, it may be inevitable that a terrorist group will have access to a WMD. The economic and social impact of an attack using a WMD anywhere in the world would be catastrophic. For weapons developed overseas, the routes of entry are air and sea with the maritime vector as the most porous. Providing a system to track, perform a risk assessment and inspect all inbound marine traffic before it reaches US coastal cities thereby mitigating the threat has long been a goal for our government. The challenge is to do so effectively without crippling the US economy. The Portunus Project addresses only the maritime threat and builds on a robust maritime domain awareness capability. It is a process to develop the technologies, policies and practices that will enable the US to establish a waypoint for the inspection of international marine traffic, screen 100% of containerized and bulk cargo prior to entry into the US if deemed necessary, provide a palatable economic model for transshipping, grow the US economy, and improve US environmental quality. The implementation strategy is based on security risk, and the political and economic constraints of implementation. This article is meant to provide a basic understanding of how and why this may be accomplished.

  10. 32 CFR 1903.10 - Weapons.

    Science.gov (United States)

    2010-07-01

    ... or causing to be present a weapon on an Agency installation, or attempting to do so is prohibited. (b) Knowingly possessing or causing to be present a weapon on an Agency installation, incident to hunting or..., or from his or her designee to possess, carry, transport, or use a weapon in support of the...

  11. Physical protection technologies for the reconfigured weapons complex

    International Nuclear Information System (INIS)

    Sandia National Laboratories was a member of the Weapons Complex Reconfiguration (WCR) Safeguards and Security (S ampersand S) team providing assistance to the Department of Energy's (DOE) Office of Weapons Complex Reconfiguration. New and improved S ampersand S concepts, approaches and technologies were needed to support both new and upgraded facilities. Physical protection technologies used in these facilities were to use proven state-of-the-art systems in such areas as image processing, alarm communications and display, entry control, contraband detection, intrusion detection and video assessment, access delay, automation and robotics, and various insider protection systems. Factors considered in the selection of these technologies were protection against the design basis threat, reducing S ampersand S life-cycle costs, automation of S ampersand S functions to minimize operational costs, access to critical assets and exposure of people to hazardous environments, increasing the amount of delay to an outsider adversary and having reliable and maintainable systems. This paper will discuss the S ampersand S issues, requirements, technology opportunities and needs. Physical protection technologies and systems considered in the design effort of the Weapons Complex Reconfiguration facilities will be reviewed

  12. 'NRBC' threat: is this concept still valid?

    International Nuclear Information System (INIS)

    About 10 years ago, after the Sarin attack in Tokyo, the world discover that terrorists could use again radio-nuclear, chemical or biological agents to launch attacks, just to cause terror and disruption of western economies. This has forged the acronym 'NRBC'. In terms of likelihood, nuclear and radiological attacks could be considered among the most easy to prepare, and some possible acts are listed in this paper. A considerable amount of work has been prepared for the preparedness against radio-nuclear attacks, during the last 3 years, by World Health Organization (WHO), International Atomic Energy Agency (IAEA), the Atomic Energy Agency (AEN) as well as by the International Commission of Radio Protection (ICRP). A series of documents have been issued from international cooperation. These documents shows specificities to the R/N threat in terms of health consequences, that make this threat less prone to international cooperative efforts than biological threats. In addition, the Ministers of Health of the G7 countries have created an 'Global Health Security Initiative' (GHSI) in 2002 to anticipate crisis such as the anthrax problem, or other possible NRBC threats

  13. A Lesson Not to Be Learned? Understanding Stereotype Threat Does Not Protect Women from Stereotype Threat

    Science.gov (United States)

    Tomasetto, Carlo; Appoloni, Sara

    2013-01-01

    This research examines whether reading a text presenting scientific evidence concerning the phenomenon of stereotype threat improves or disrupts women's performance in a subsequent math task. In two experimental conditions participants (N=118 ) read a text summarizing an experiment in which stereotypes, and not biological differences, were shown…

  14. Hostile fire indicator threat data collection for helicopter-mounted applications

    Science.gov (United States)

    Naz, P.; Hengy, S.; De Mezzo, S.

    2013-05-01

    This paper briefly describes the set-up of the sensors and the instrumentation deployed by the French-German Research Institute of Saint-Louis (ISL) during the last NATO/ACG3/SG2 HFI Threat Data Collection (Trial PROTEUS which has been conducted during the summer 2012 in Slovenia). The main purpose of this trial was the measurements of weapon and ammunition signatures for threat warning and hostile fire indicator (HFI) system development. The used weapons vary from small caliber rifles to anti-tank rockets in ground-to-ground shooting configurations. For the ISL team, the objectives consisted in measuring the acoustic signals for detection and localization of weapon firing events. Experimental results of sound localization obtained by using ground based sensors are presented and analyzed under various conditions.

  15. Patient Safety Threat - Syringe Reuse

    Science.gov (United States)

    ... HAIs HICPAC One & Only Campaign A Patient Safety Threat – Syringe Reuse Recommend on Facebook Tweet Share Compartir ... need to be aware of a very serious threat to their health - the reuse of needles or ...

  16. Atomic Weapons Establishment Bill [Money

    International Nuclear Information System (INIS)

    The debate concerns the authorisation of payment of the money required to reorganise the atomic weapons establishment in the United Kingdom provided for in the Atomic Weapons Establishment Bill in progress through Parliament. In the Bill the contractorisation of the establishment is recommended and some sort of Government owned company operated scheme set up. The debate lasted about half an hour and is reported verbatim. The issues raised concerned the actual sums likely to be incurred in the formation of a Company to carry out the designated activities of the Bill. These are connected with the research, development, production or maintenance of nuclear devices and the premises needed. The government spokesman suggested the sums required to support the Bill would not be large and the resolution was agreed to without a vote. (UK)

  17. WEAPONS OF MASS DESTRUCTION AS TOOL OF INTERNATIONAL POLITICS

    OpenAIRE

    TANSİ, Deniz

    2009-01-01

    Weapons of Mass Destruction (WMD) has become serious issue especially after Cold War why symetric war perception has changed. In Cold War era, armament competition has been based for two blocks which has been between NATO and Warsaw Pacts. So Cold War has also involved to control of the armament process. Two blocks has signed treaties or agreements about disarmament concept. Conventional and nuclear arms were the main discussion issues in that era. Beside those arms, biologic or chemical arms...

  18. The motivation for biological aggression is an inherent and common aspect of the human behavioural repertoire.

    Science.gov (United States)

    Rózsa, Lajos

    2009-02-01

    According to a widespread opinion shared by the vast majority of historians, instances of aggression using pathogen weapons constitute extremely rare events in human history. Similarly, students of human behaviour tend to believe that their science plays no role in explaining this phenomenon, which is held to be exceptional and abnormal. Contrary to this dominant view, I argue that Hamiltonian spite - like Hamiltonian altruism - is an inherent part of the human behavioural repertoire and it includes the use of pathogens for spiteful purposes. This paradigm is supported by the following observations. The use of pathogens as weapons emerged far before the scientific understanding of the nature of infections and epidemics, though it has been underrepresented in written history ever since. It is also present in our expectations concerning the likely behaviour of an enemy and it is also a frequent component of threats. Several languages appear to bear linguistic references to our motivation for biological aggression in profanity. Finally, given that wartime epidemics kill people at a rate comparable to (or exceeding) that of mechanical weapons, all wars fought in recorded history incorporated an element of aggression through biological means. On the basis of these arguments, I claim that the motivation for biological aggression is an inherent and common aspect of past and present human behaviour. PMID:19006651

  19. International conference 'Addressing the issues of potential terrorism and guarding against weapons of mass destruction in Central Asia' Proceedings

    International Nuclear Information System (INIS)

    Over a period of 20 century, starting from First World War, the weapons of mass destruction (W D M) arouse serious concern in world community. Geneva's protocol of 1925 prohibits the use of chemical and biological weapons. Once nuclear weapon was created, the W D M proliferation becomes the subject of high concern. Nowadays, trans national organized criminal groups and international terrorist networks are appeared in the world scene, which show their interest in obtaining an access to sensitive materials, technologies, weapons and their distribution

  20. The changing proliferation threat

    Energy Technology Data Exchange (ETDEWEB)

    Sopko, J.F.

    1996-12-31

    Technological advances and new adversaries with new motives have reduced the relevancy and effectiveness of the American nonproliferation strategy that was developed during the Cold War. The Cold War`s end and the breakup of the Soviet Union have created new proliferation dangers even as they have reduced others. The familiar balance of nuclear terror that linked the superpowers and their client states for nearly 50 years in a choreographed series of confrontations has given way to a much less predictable situation, where weapons of unthinkable power appear within the grasp of those more willing to use them. Rogue nations and {open_quotes}clientless{close_quotes} states, terrorist groups, religious cults, ethnic minorities, disaffected political groups, and even individuals appear to have jointed a new arms race toward mass destruction. The author describes recent events that suggest the new trends and a serious challenge to US national security.

  1. Real-time threat evaluation in a ground based air defence environment

    Directory of Open Access Journals (Sweden)

    JN Roux

    2008-06-01

    Full Text Available In a military environment a ground based air defence operator is required to evaluate the tactical situation in real-time and protect Defended Assets (DAs on the ground against aerial threats by assigning available Weapon Systems (WSs to engage enemy aircraft. Since this aerial environment requires rapid operational planning and decision making in stress situations, the associated responsibilities are typically divided between a number of operators and computerized systems that aid these operators during the decision making processes. One such a Decision Support System (DSS, a threat evaluation and weapon assignment system, assigns threat values to aircraft (with respect to DAs in real-time and uses these values to propose possible engagements of observed enemy aircraft by anti-aircraft WSs. In this paper a design of the threat evaluation part of such a DSS is put forward. The design follows the structured approach suggested in [Roux JN & van Vuuren JH, 2007, Threat evaluation and weapon assignment decision support: A review of the state of the art, ORiON, 23(2, pp. 151-187], phasing in a suite of increasingly complex qualitative and quantitative model components as more (reliable data become available.

  2. Threat modeling designing for security

    CERN Document Server

    Shostack, Adam

    2014-01-01

    Adam Shostack is responsible for security development lifecycle threat modeling at Microsoft and is one of a handful of threat modeling experts in the world. Now, he is sharing his considerable expertise into this unique book. With pages of specific actionable advice, he details how to build better security into the design of systems, software, or services from the outset. You'll explore various threat modeling approaches, find out how to test your designs against threats, and learn effective ways to address threats that have been validated at Microsoft and other top companies. Systems secur

  3. Susceptibility and hardening of electronic systems to fast transient threats: new challenges ahead

    Directory of Open Access Journals (Sweden)

    F. Sabath

    2004-01-01

    Full Text Available The field of susceptibility and hardening of electronic systems to transient threats has experienced a significant growth during the past ten years. Driven by the development in the area of non-lethal electromagnetic weapons it has become necessary to extend the classical set of transient threats, consisting of LEMP, ESD and NEMP, by a fast transient threat with an extreme bandwidth. The investigation of the susceptibility to those UWB threats, characterized by a bandwidth of more than a quarter of the center frequency, rise times of less than 200 ps and pulse durations in the ns regime, is of special interest. This paper presents an overview of current challenges of the hardening against UWB threats. It discusses recent research trends in transient susceptibility measurements, protection concepts and methods of analysis.

  4. Is force ever justified in preventing a State from acquiring nuclear weapons?

    OpenAIRE

    Dobra, Alexandra

    2010-01-01

    In order to provide a grounded argument, the present paper asks the following questions. Why do States acquire nuclear weapons? Why do finally States tend to prevent this acquisition? What does the use of force imply? This logical structure adduces the argument sustaining the avoidance of the use of force as a viable preventive tool. It concentrates exclusively on States instituting a threat and on the force-led circumventive strategies’ implications used by non-threatening States to prevent ...

  5. The vulnerability of laser warning systems against guided weapons based on low power lasers

    OpenAIRE

    Al-Jaberi, Mubarak

    2006-01-01

    Laser assisted weapons, such as laser guided bombs, laser guided missiles and laser beam-riding missiles pose a significant threat to military assets in the modern battlefield. Laser beam-riding missiles are particularly hard to detect because they use low power lasers. Most laser warning systems produced so far can not detect laser beam-riding missiles because of their weak emissions which have signals less than 1% of laser range finder power . They are even harder to defeat because current ...

  6. 2002-2003 Engineering Accomplishments: Unconventional Nuclear Weapons Detection

    International Nuclear Information System (INIS)

    The Defense Threat Reduction Agency, DTRA, is a federal agency charged with safeguarding the nation from weapons of mass destruction, in particular nuclear weapons such as crude devices, and radiological dispersal devices (RDD), also known as dirty bombs. Both of which could be delivered using unconventional means such as by transporting them by a car or boat. Two years ago DTRA partnered with NNSA to evaluate commercially available technologies that could be deployed quickly to defend against threats posed by unconventional nuclear weapons under a program called the Unconventional Nuclear Warfare Defense (UNWD) Program. Lawrence Livermore National Laboratory (LLNL) was one of several National laboratories that participated in this program, which consisted in developing, deploying, and demonstrating detection systems suitable for military base protection. Two key contributions to this program by the LLNL team were the development of two Radiation Detection Buoys (RDB) deployed at Naval Base in Kings Bay in Georgia, and the Detection and Tracking System (DTS) demonstrated at Fort Leonard Wood Missouri, headquarters for the Total Force's Maneuver Support Center (MANSCEN). The RDB's were designed to detect the potential transportation of an unconventional nuclear or radiological weapon by a boat. The RDB's consisted of two commercial marine buoys instrumented with several types of detectors sensitive to gamma rays and neutrons, two key modes of energy emitted by radioactive materials. The engineering team selected a standard marine buoy as the overall system platform for this deployment since buoys are already designed to sustain the harsh marine environment, and also for their covertness, since once deployed, they look just like any other buoy on the water. Since this was the first time such a system was ever deployed, the team choose to instrument the buoys with a suite of different types of detectors with the goal to learn which detectors would be best suited for

  7. North Korea's nuclear weapons development. Implications for future policy

    International Nuclear Information System (INIS)

    This essay assesses North Korea's long-standing quest for nuclear weapons; alternative strategies for inhibiting Pyongyang's weapons development; and the potential implications for regional security and nonproliferation should the Democratic People's Republic of Korea (DPRK) retain and enhance its weapons programs. North Korea's pursuit of a nuclear weapons capability has long provoked heated debate among policy makers and research analysts about the purposes of engagement with the North, reflecting the repeated frustrations in efforts to negotiate Korean denuclearization. These debates reflect widely divergent views of the North Korean regime; its sustainability as an autonomous political, economic, and military system; and the potential consequences of continued nuclear development in this isolated, highly idiosyncratic state. These questions assume additional salience as North Korea approaches a leadership succession for only the second time in its six-decade history. The effort to inhibit North Korea's pursuit of nuclear weapons is among the longest running and least successful sagas in international security and non-proliferation policy of the past quarter century. In early 2010, Pyongyang claims a rudimentary nuclear capability by possession of weaponized plutonium, the conduct of two nuclear tests, and advances in the production of enriched uranium as an alternative means of fissile material production, though the latter step is nominally justified as a source for reactor fuel. North Korea defends its pursuit of a nuclear deterrent to counter what Pyongyang deems existential threats posed by the United States.Despite the resumption of high-level diplomatic contact between Washington and Pyongyang in late 2009, realization of a non-nuclear Korean Peninsula remains a very remote prospect. The DPRK insists that a peace agreement between the U.S. and North Korea and hence the cessation of 'hostile DPRK-U.S. relations' are necessary before any consideration of

  8. Energy security and renewable electricity trade-Will Desertec make Europe vulnerable to the 'energy weapon'?

    International Nuclear Information System (INIS)

    Solar power imports to Europe from the deserts of North Africa, as foreseen in the Desertec concept, is one possible way to help decarbonising the European power sector by 2050. However, this approach raises questions of threats to European energy security in such an import scenario, particularly in the light of increasing import dependency and Russia's use of the 'energy weapon' in recent years. In this paper we investigate the threat of North African countries using the Desertec electricity exports as an 'energy weapon'. We develop and use a new model to assess the interdependence - the bargaining power symmetry, operationalised as costs - of a disruption in a future renewable electricity trade between North Africa and Europe. If Europe maintains current capacity buffers, some demand-response capability and does not import much more than what is described in the Desertec scenario, it is susceptible to extortion and political pressure only if all five exporter countries unite in using the energy weapon. Europe is not vulnerable to extortion by an export cut from only one country, as the European capacity buffers are sufficient to restore the power supply: no single exporter country would have sustained bargaining power over Europe. - Highlights: → European vulnerability to energy weapon extortion in a Desertec-style electricity future is assessed. → The vulnerability to the energy weapon is conceptualised as the direct disruption costs on both sides. → The paper shows that Europe is not vulnerable to single-country export disruptions. → If all exporters cut supplies simultaneously, Europe may be vulnerable to the energy weapon.

  9. Overall View of Chemical and Biochemical Weapons

    OpenAIRE

    Vladimír Pitschmann

    2014-01-01

    This article describes a brief history of chemical warfare, which culminated in the signing of the Chemical Weapons Convention. It describes the current level of chemical weapons and the risk of using them. Furthermore, some traditional technology for the development of chemical weapons, such as increasing toxicity, methods of overcoming chemical protection, research on natural toxins or the introduction of binary technology, has been described. In accordance with many parameters, chemical we...

  10. Categorizing threat : building and using a generic threat matrix.

    Energy Technology Data Exchange (ETDEWEB)

    Woodard, Laura; Veitch, Cynthia K.; Thomas, Sherry Reede; Duggan, David Patrick

    2007-09-01

    The key piece of knowledge necessary for building defenses capable of withstanding or surviving cyber and kinetic attacks is an understanding of the capabilities posed by threats to a government, function, or system. With the number of threats continuing to increase, it is no longer feasible to enumerate the capabilities of all known threats and then build defenses based on those threats that are considered, at the time, to be the most relevant. Exacerbating the problem for critical infrastructure entities is the fact that the majority of detailed threat information for higher-level threats is held in classified status and is not available for general use, such as the design of defenses and the development of mitigation strategies. To reduce the complexity of analyzing threat, the threat space must first be reduced. This is achieved by taking the continuous nature of the threat space and creating an abstraction that allows the entire space to be grouped, based on measurable attributes, into a small number of distinctly different levels. The work documented in this report is an effort to create such an abstraction.

  11. The radiation effects of nuclear weapons explosions

    International Nuclear Information System (INIS)

    The energy resulting from nuclear weapons explosions consists of thermal energy (heat radiation), shock waves, initial radiation (nuclear ray flash, gamma and neutron flash), and nuclear radiation of the fission products (fallout). The contribution of the different energy components depends on the energy amounts produced by fission or fusion reactions (A-weapon, H-weapon), on the components used for conversion to helium-4 (deuterium, tritium, lithium), the weapon design (radiation absorption and induced activity in auxiliaries), and on the type of employment (atmospheric, ground, or underground explosion). The damaging effects vary accordingly, consisting of thermal damage, blast effects, and radiation injuries. The effects are explained and compared. (orig.)

  12. Nuclear weapons non proliferation treaty

    International Nuclear Information System (INIS)

    Taking into account the devastation that a nuclear war would inflict upon mankind, and the resulting need to do all that is in our power to keep such a tragedy from occuring, as well as to implement measures to safeguard all the peoples' safety, each State that owns nuclear weapons and that is a part of the Treaty pledges not to trade nuclear weapons, other explosive devices nor the control over such instruments to any other entity whatsoever, wether directly or indirectly. Likewise, all States that does not posses any nuclear weaponry and that are part of the Treaty, in turn pledge not to receive from any other entity nuclear weaponry or other explosive devices in trade, wether directly or indirectly; not to manufacture or otherwise acquire this fashion of weaponry and not to request or accept any help whatsoever in the manufacturing of nuclear weaponry or related devices. The present Treaty remains open to the subscription of other countries, on July 26, 1968, with Mexico as one of the signatory countries

  13. Revising Australia's Design Basis Threat

    International Nuclear Information System (INIS)

    Australia’s Design Basis Threat (DBT) was revised in 2012, ten years after the previous review. Using the IAEA’s Nuclear Security Series Guidance document on DBTs the Australian Safeguards and Non-Proliferation Office used an interagency process to devise a series of threat profiles which were distilled into the final DBT. Challenges to the review process included setting the scope, treating insider, cyber and air-borne threats, and interpretation of the final product. (author)

  14. Recurrent dreams: Recurring threat simulations?

    Science.gov (United States)

    Valli, K; Revonsuo, A

    2006-06-01

    Zadra, Desjardins, and Marcotte (2006) have made a valuable contribution to the empirical testing of the Threat Simulation Theory (TST) (Revonsuo, 2000a) in recurrent dreams. For the most part, their results are in accordance with the theory, while some findings seem to conflict with the predictions of TST. In our commentary, we consider some alternative ways to interpret the results, and we conclude that many prominent features of most recurrent dreams seem to be manifestations of a threat simulation function, leading to repeated rehearsal of threat perception and avoidance, but a minority of recurrent dreams seem to have origins unrelated to threat simulation. PMID:16019227

  15. Novel fluorescence-based integrated sensor for chemical and biological agent detection

    Science.gov (United States)

    Frye-Mason, Greg; Leuschen, Martin; Wald, Lara; Paul, Kateri; Hancock, Lawrence F.; Fagan, Steve; Krouse, Justin; Hutchinson, Kira D.

    2004-12-01

    There is a renewed interest in the development of chemical and biological agent sensors due to the increased threat of weapons deployment by terrorist organizations and rogue states. Optically based sensors address the needs of military and homeland security forces in that they are reliable, rapidly deployed, and can provide continuous monitoring with little to no operator involvement. Nomadics has developed optically based chemical weapons sensors that utilize reactive fluorescent chromophores initially developed by Professor Tim Swager at MIT. The chromophores provide unprecedented sensitivity and selectivity toward toxic industrial chemicals and certain chemical weapon agents. The selectivity is based upon the reactivity of the G-class nerve agents (phosphorylation of acetylcholinesterase enzyme) that makes them toxic. Because the sensor recognizes the reactivity of strong electrophiles and not molecular weight, chemical affinity or ionizability, our system detects a specific class of reactive agents and will be able to detect newly developed or modified agents that are not currently known. We have recently extended this work to pursue a combined chemical/biological agent sensor system incorporating technologies based upon novel deep ultraviolet (UV) light emitting diodes (LEDs) developed out of the DARPA Semiconductor UV Optical Sources (SUVOS) program.

  16. 36 CFR 1002.4 - Weapons, traps and nets.

    Science.gov (United States)

    2010-07-01

    ..., the following are prohibited: (i) Possessing a weapon, trap or net. (ii) Carrying a weapon, trap or net. (iii) Using a weapon, trap or net. (2) Weapons, traps or nets may be carried, possessed or used... possessing a loaded weapon in a motor vehicle, vessel or other mode of transportation is prohibited,...

  17. Biological consequences of nuclear war

    International Nuclear Information System (INIS)

    Irradiation probability due to radionuclide fallout is shown to exceed 1 Gy even for the territories which have not been affected by nuclear weapons direct explosions. If some people survive in the nuclear war, their heredity would be affected. Genetic consequences of nuclear war complete the process of Homo sapiens disappearance from the Earth. Space weapons development will deteriorate the prospects of civilization ruin as a result of biological aftereffects of nuclear war and possible application of new arms, as well as chemical and biologic weapons

  18. Weapons barrel life cycle determination

    Directory of Open Access Journals (Sweden)

    Nebojša Pene Hristov

    2013-10-01

    Full Text Available This article describes the dynamic processes within the gun barrel during the firing process in exploitation. It generally defines the basic principles of constructing tube elements, and shows the distortion of the basic geometry of the tube interior due to wear as well as the impact it causes during exploitation. The article also defines basic empirical models as well as a model based on fracture mechanics for the calculation of a use-life of the barrel, and other elements essential for the safe use of the barrel as the basic weapon element. Erosion causes are analysed in order to control and reduce wear and prolong the lifetime of the gun barrel. It gives directions for the reparation of barrels with wasted resources. In conclusion, the most influential elements of tube wear are given as well as possible modifications of existing systems, primarily propellant charges, with a purpose of prolonging lifetime of gun barrels. The guidelines for a proper determination of the lifetime based on the barrel condition assessment are given as well. INTRODUCTION The barrel as the basic element of each weapon is described as well as the processes occurring during the firing that have impulsive character and are accompanied by large amounts of energy. The basic elements of barrel and itheir constructive characteristics are descibed. The relation between Internal ballistics, ie calculation of the propellant gas pressure in the firing process, and structural elements defined by the barrel material resistance is shown. In general, this part of the study explains the methodology of the gun barrel structural elements calculation, ie. barrel geometry, taking into account the degrees of safety in accordance with Military Standards.   TUBE WEAR AND DEFORMATIONS The weapon barrel gradually wears out during exploitation due to which it no longer satisfies the set requirements. It is considered that the barrel has experienced a lifetime when it fails to fulfill the

  19. North Korea, Nuclear Weapons, and No Good Options?

    DEFF Research Database (Denmark)

    Cohen, Michael David

    2013-01-01

    senior military associates to experience fear of imminent nuclear war or conventional regime change. I show that the effect of such fear would depend on whether or not Kim believes that he has control over the occurrence of these events. I argue that if he experiences fear and believes that he has some......How would Pyongyang’s development of the capability to target the United States with nuclear weapons influence North Korea’s foreign policy? I argue that it would cause more dangerous crises than those of the last decade, and predict that these crises would eventually cause Kim Jong Un and his...... control over whether these extreme events actually happen, he will moderate his nuclear threats and behave more like other experienced nuclear powers. But if he experiences fear and believes that he has no control, he will likely pursue policies that could cause nuclear war. I use this insight to...

  20. The gas centrifuge and the nonproliferation of nuclear weapons

    International Nuclear Information System (INIS)

    The gas centrifuge is a particularly challenging technology for the institutions of the existing nonproliferation regime. Centrifuge facilities can be reconfigured for the production of weapon-grade uranium in a comparatively short time-frame, while clandestine facilities are virtually impossible to detect with technical intelligence tools. A potential expansion in nuclear power and the natural maturing of states technical abilities suggest a world where centrifuge proliferation could become an even more serious threat to global security. This overview reviews the proliferation-relevant technical characteristics of the gas centrifuge and examines how effective control strategies must differ from traditional approaches. A well-informed policymaking process is needed to address these issues. We outline current gaps in understanding that ought to be closed in order to formulate robust nonproliferation policies. (authors)

  1. Biophysics and the Challenges of Emerging Threats

    CERN Document Server

    Puglisi, Joseph D

    2009-01-01

    This volume is a collection of articles from the proceedings of the International School of Structural Biology and Magnetic Resonance 8th Course: Biophysics and the Challenges of Emerging Threats. This NATO Advance Study Institute (ASI) was held in Erice at the Ettore Majorana Foundation and Centre for Scientific Culture on 19 through 30 June 2007. The ASI brought together a diverse group of experts who bridged the fields of virology and biology, biophysics, chemistry and physics. Prominent lecturers and students from around the world representant a total of 24 countries participated in the NATO ASI organized by Professors Joseph Puglisi (Stanford University, USA) and Alexander Arseniev (Moscow, RU). The central hypothesis underlying this ASI was that interdisciplinary research, merging principles of physics, chemistry and biology, can drive new discovery in detecting and fighting bioterrorism agents, lead to cleaner environments, and help propel development in NATO partner countries. The ASI merged the relat...

  2. Nato's response to the challenge of weapons of mass destruction

    International Nuclear Information System (INIS)

    Full text: This short presentation will cover the alliance's response to chemical, biological, radiological and nuclear (CBRN) proliferation, placing this in the context of the dangers involved in the potential use of such devices by non-state actors. It will include the political measures taken by NATO, the ongoing work with Russia, activities underway within the Euro-Atlantic Partnership Council, as well as the concrete 'deliverables' for the Prague Summit in November 2002. NATO deals with these issues both from the point of view of deployed military forces, as well as civil emergency planning measures, and the overview covers both elements. The alliance has recognized since the early 1990s that it is important to strengthen efforts against proliferation. The principal goal remains that of preventing proliferation from taking place, or, should it take place, to reverse it through diplomatic means. Hand in hand with such an approach goes the important role of ensuring an appropriate defense posture against the possible use of WMD. It is very important to maintain the flexibility and effectiveness of alliance forces despite the presence, the threat or the use of nuclear, biological and chemical weapons. In this context, the alliance draws upon a mix of means to address the challenges of proliferation, including deterrence and offensive and defensive means, and enhancing the effectiveness of arms control, disarmament and non-proliferation, as well as diplomatic and counter-proliferation measures. In the wake of 11 September, there is clearly an increased awareness of the potential use of WMD by non-state actors. As a result, NATO has adapted its work program to the evolving demands of the Committees we support. That said, there is a great deal of continuity in the work of a committee such as the senior defense group on proliferation - in terms of what it has been doing over recent years to enhance military readiness to operate in a WMD environment. Many of the

  3. Color image fusion for concealed weapon detection

    NARCIS (Netherlands)

    Toet, A.

    2003-01-01

    Recent advances in passive and active imaging sensor technology offer the potential to detect weapons that are concealed underneath a person's clothing or carried along in bags. Although the concealed weapons can sometimes easily be detected, it can be difficult to perceive their context, due to the

  4. Overview of surplus weapons plutonium disposition

    Energy Technology Data Exchange (ETDEWEB)

    Rudy, G.

    1996-05-01

    The safe disposition of surplus weapons useable plutonium is a very important and urgent task. While the functions of long term storage and disposition directly relate to the Department`s weapons program and the environmental management program, the focus of this effort is particularly national security and nonproliferation.

  5. Nuclear weapons, nuclear effects, nuclear war

    Energy Technology Data Exchange (ETDEWEB)

    Bing, G.F.

    1991-08-20

    This paper provides a brief and mostly non-technical description of the militarily important features of nuclear weapons, of the physical phenomena associated with individual explosions, and of the expected or possible results of the use of many weapons in a nuclear war. Most emphasis is on the effects of so-called ``strategic exchanges.``

  6. Taser and Conducted Energy Weapons.

    Science.gov (United States)

    LeClair, Thomas G; Meriano, Tony

    2015-01-01

    It is clear that CEWs are an increasingly prevalent law enforcement tool, adopted to address a complex and challenging problem. The potential for serious injury from a single deployment of a CEW is extremely low. The debate regarding the link between these electrical weapons and sudden in-custody death is likely to continue because their use is often in complex and volatile situations. Any consideration of injuries has to be put into that context. One must also consider what injuries to a subject would result if an alternative force method was used. Furthermore, the potential benefits of CEWs, including reduction in injuries to the public and law-enforcement officers, need to be considered. PMID:26630100

  7. AWRE: Atomic Weapons Research Establishment

    International Nuclear Information System (INIS)

    This reviews the work of AWRE at Aldermaston and Foulness. The main programme is nuclear and is concerned with the design and development of warheads for strategic and tactical nuclear weapons for the British nuclear deterrent, including those for the Royal Navy's missile carrying submarine fleet. The work is described grouped as design physics, development and materials. Services to these groups and to the whole establishment are provided by Engineering, Safety and Administration. The work ranges from long-term fundamental research, the development of technology, design, prototype development to the environmental testing of engineered products. In materials research the emphasis is on plutonium, uranium and beryllium, on high explosives and a wide range of inorganic and organic materials. The physics of the earth's crust is studied to aid detection of underground nuclear explosions. Reactor research facilities include the two reactors, Herald and Viper. (U.K.)

  8. Nuclear energy and nuclear weapons

    International Nuclear Information System (INIS)

    We all want to prevent the use of nuclear weapons. The issue before us is how best to achieve this objective; more specifically, whether the peaceful applications of nuclear energy help or hinder, and to what extent. Many of us in the nuclear industry are working on these applications from a conviction that without peaceful nuclear energy the risk of nuclear war would be appreciably greater. Others, however, hold the opposite view. In discussing the subject, a necessary step in allaying fears is understanding some facts, and indeed facing up to some unpalatable facts. When the facts are assessed, and a balance struck, the conclusion is that peaceful nuclear energy is much more part of the solution to preventing nuclear war than it is part of the problem

  9. Public views on multiple dimensions of security: nuclear weapons, terrorism, energy, and the environment: 2007

    International Nuclear Information System (INIS)

    We analyze and compare findings from identical national surveys of the US general public on nuclear security and terrorism administered by telephone and Internet in mid-2007. Key areas of investigation include assessments of threats to US security; valuations of US nuclear weapons and nuclear deterrence; perspectives on nuclear proliferation, including the specific cases of North Korea and Iran; and support for investments in nuclear weapons capabilities. Our analysis of public views on terrorism include assessments of the current threat, progress in the struggle against terrorism, preferences for responding to terrorist attacks at different levels of assumed casualties, and support for domestic policies intended to reduce the threat of terrorism. Also we report findings from an Internet survey conducted in mid 2007 that investigates public views of US energy security, to include: energy supplies and reliability; energy vulnerabilities and threats, and relationships among security, costs, energy dependence, alternative sources, and research and investment priorities. We analyze public assessments of nuclear energy risks and benefits, nuclear materials management issues, and preferences for the future of nuclear energy in the US. Additionally, we investigate environmental issues as they relate to energy security, to include expected implications of global climate change, and relationships among environmental issues and potential policy options.

  10. American security perspectives: public views on energy, environment, nuclear weapons and terrorism: 2008

    International Nuclear Information System (INIS)

    We analyze and compare findings from matching national surveys of the US general public on US energy and environmental security administered by telephone and Internet in mid-2008. Key areas of investigation include: energy supplies and reliability; energy vulnerabilities and threats, and relationships among security, costs, energy dependence, alter-native sources, and research and investment priorities. We analyze public assessments of nuclear energy risks and benefits, nuclear materials management issues, and preferences for the future of nuclear energy in the US. Additionally, we investigate environmental issues as they relate to energy security, to include evolving perspectives on global climate change and relationships among environmental issues and potential policy options. We also report findings from an Internet survey of the general public conducted in mid-2008 that investigates assessments of threats to US security; valuations of US nuclear weapons and nuclear deterrence; perspectives on nuclear proliferation; and support for investments in nuclear weapons capabilities. Our analysis of public views on terrorism include assessments of the current threat, progress in the struggle against terrorism, preferences for responding to terrorist attacks at different levels of assumed casualties, and support for domestic policies intended to reduce the threat of terrorism.

  11. Weapon Control System for Airborne Application.

    Directory of Open Access Journals (Sweden)

    M. Sankar Kishore

    2000-07-01

    Full Text Available The integrated fire' control system (IFCS plays an important role in the present-day fighter aircraft and helicopters. Wecapons, such as missiles (active/passive, rockets and guns may be present on thelfighter aircraft or helicopter .IFCS monitors the status of the weapons present on the vehicle and passes the information to pilot/co-pilot. Depending upon the health/availability of the weapons, IFCS selects/fires the weapons. An attempt has been made to bring out the details of one such IFCS. As a I stepping stone, smaller version is developed and same philosophy can be used for integrating ftlore and I more weapons. Here, emphasis has been made on design and development of weapon control unit which is the heart f IFCS, both in hardware and software. The system has been developed using a 486 DX2 processor, and an elaborate software has been developed in PL/M.

  12. Linking Stereotype Threat and Anxiety

    Science.gov (United States)

    Osborne, Jason W.

    2007-01-01

    Claude Steele's stereotype threat hypothesis has attracted significant attention in recent years. This study tested one of the main tenets of his theory--that stereotype threat serves to increase individual anxiety levels, thus hurting performance--using real-time measures of physiological arousal. Subjects were randomly assigned to either high or…

  13. Bomb Threat Assessments. Fact Sheet

    Science.gov (United States)

    Tunkel, Ronald F.

    2010-01-01

    This information provides a brief, summary outline of how investigators should assess anonymous bomb threats at schools. Applying these principles may help administrators and law enforcement personnel accurately assess the viability and credibility of a threat and appropriately gauge their response. Any credible evidence provided by teachers or…

  14. Bio-threat microparticle simulants

    Science.gov (United States)

    Farquar, George Roy; Leif, Roald N

    2012-10-23

    A bio-threat simulant that includes a carrier and DNA encapsulated in the carrier. Also a method of making a simulant including the steps of providing a carrier and encapsulating DNA in the carrier to produce the bio-threat simulant.

  15. Threat Modelling for Active Directory

    OpenAIRE

    Chadwick, David W

    2004-01-01

    This paper analyses the security threats that can arise against an Active Directory server when it is included in a Web application. The approach is based on the STRIDE classification methodology. The paper also provides outline descriptions of countermeasures that can be deployed to protect against the different threats and vulnerabilities identified here.

  16. Psychoanalysis and the nuclear threat

    Energy Technology Data Exchange (ETDEWEB)

    Levine, H.B.; Jacobs, D.; Rubin, L.J.

    1988-01-01

    {ital Psychoanalysis and the Nuclear Threat} provides coverage of the dynamic and clinical considerations that follow from life in the nuclear age. Of special clinical interest are chapters dealing with the developmental consequences of the nuclear threat in childhood, adolescence, and adulthood, and those exploring the technical issues raised by the occurrence in analytic and psychotherapeutic hours of material related to the nuclear threat. Additional chapters bring a psychoanalytic perspective to bear on such issues as the need to have enemies, silence as the real crime, love, work, and survival in the nuclear age, the relationship of the nuclear threat to issues of mourning and melancholia, apocalyptic fantasies, the paranoid process, considerations of the possible impact of gender on the nuclear threat, and the application of psychoanalytic thinking to nuclear arms strategy. Finally, the volume includes the first case report in the English language---albeit a brief psychotherapy---involving the treatment of a Hiroshima survivor.

  17. Toxikological and health aspects of nonlethal chemical weapons.

    OpenAIRE

    HAMERNÍKOVÁ, Magdalena

    2010-01-01

    ABSTRACT Toxicology and Health Aspects of Non-lethal Chemical Weapons. Non-lethal chemical weapons, which belong among the mass destruction weapons, have been one of the most frequently discussed topics recently. These weapons are able to disbar manpower or combat technology and weapons smartly and temporarily with minimum costs. The range of possible application of chemical weapons as non-lethal is probably wider compared to any other type, and there are a lot of means capable of immediate w...

  18. Calculating the new global nuclear terrorism threat

    International Nuclear Information System (INIS)

    Experts from around the world are meeting at the IAEA on 29 October to 2 November at an international symposium on nuclear safeguards, verification, and security. A special session on 2 November focuses on the issue of combating nuclear terrorism. Although terrorists have never used a nuclear weapon, reports that some terrorist groups, particularly al-Qaeda, have attempted to acquire nuclear material is a cause of great concern. According to the IAEA, since 1993, there have been 175 cases of trafficking in nuclear material and 201 cases of trafficking in other radioactive sources (medical, industrial). However, only 18 of these cases have actually involved small amounts of highly enriched uranium or plutonium, the material needed to produce a nuclear bomb. IAEA experts judge the quantities involved to be insufficient to construct a nuclear explosive device. The IAEA experts have evaluated the risks for nuclear terrorism in these three categories: Nuclear facilities; Nuclear Material; Radioactive Sources. The IAEA is proposing a number of new initiatives, including strengthening border monitoring, helping States search for and dispose of orphan sources and strengthening the capabilities of the IAEA Emergency Response Centre to react to radiological emergencies following a terrorist attack. In the short term, the IAEA estimates that at least $30-$50 million annually will be needed to strengthen and expand its programs to meet this terrorist threat

  19. Mobbing, threats to employees

    Directory of Open Access Journals (Sweden)

    Tatjana Vene

    2012-02-01

    Full Text Available RQ: Is there a connection among perception of hostile and unethical communication, timely removal of causes and employee satisfaction?Purpose: Perceived mobbing in the organization, analysing causes and timely removal of them without any effect; achieve an environment of satisfied employees. The purpose is to study the relationship amongthe categories: perceiving mobbing, removing the effects, employee satisfaction.Methods: Qualitative research approach, method of interview by using the seven steps principles.Results: The findings clearly state that being aware of the negative factors and psychological abuse in organizations was present. The interview participants perceived different negative behaviours especially by the female population and from the side of superiors. In some organizations perceived negative factors are insults,insinuations, low wages, inadequate working day, competition, lobbying, and verbal threats. All negative factors lead to serious implications for employees, in which the organization can lose its reputation, productivity is reduced, costs of employment can increase with more sick leaves and in extreme cases, the results can be soserious that the organization can end in bankruptcy or liquidation.Organization: The result of the study warns management to acceptcertain actions and remediate the situation in organizations. The employer and managers must do everything to protect their subordinates from violence and potential offenders.Society: The research study warns on the seriousness of mobbing among employees, the aim is to bring the issue to individuals and society. The victim usually needs help (health costs, losses in the pension system, increased unemployment, and lower productivity of the whole society.Originality: In view of the sensitivity of the issues, the author concludes that the existing research studies are based especially on closed questions (questionnaires; however, interviews create mutual trust between

  20. Stereotype Threat as Validity Threat: The Anxiety-Sex-Threat Interaction

    Science.gov (United States)

    Delgado, Ana R.; Prieto, Gerardo

    2008-01-01

    Stereotype threat has been invoked to explain underperformance on a variety of groups for whom the stereotypes allege inferior cognitive abilities. In math testing, stereotype threat has been used to explain sex differences in test performance. This paper describes an experimental study on a large sample (n = 313), in which the role of anxiety and…

  1. Nuclear theft and sabotage. Priorities for reducing new threats

    International Nuclear Information System (INIS)

    The appalling attacks of 11 September 2001 in the United States make clear that the threat of large, well-organized global terrorist groups bent on causing mass destruction is not hypothetical but real. The attackers achieved horrifying destruction with box-cutters. The results could have been even more horrific if the attackers would have had access to, and used, weapons of mass destruction. Ensuring that technologies and materials for weapons of mass destruction - especially weapons-usable nuclear materials, whose acquisition is the most difficult part of making a nuclear bomb - do not fall into the hands of terrorist groups or hostile States must be a central element of the coming global effort to prevent catastrophic terrorism. At the same time, nuclear facilities and materials - along with a wide range of other especially hazardous facilities and materials must be protected from mass-consequence sabotage. Securing these materials and facilities must be a top priority on the international agenda - pursued at every opportunity, at every level of authority, until the job is done. At the same time, the threats against which we must defend have to be fundamentally reconsidered. On 11 September, the threat revealed itself to be bigger, smarter, better organized, and more deadly than the threats most of the world's security systems were designed to defend against. We must ensure that our defensive response is every bit as intelligent and capable as the September attackers. And we may have to rethink some of the approaches to nuclear energy that the world has been pursuing or contemplating. Every reasonable effort must be made to ensure that nuclear materials and facilities are effectively secured. In the past, many scenarios with enormously high consequences were dismissed as too unlikely to contribute much to overall risk - but now many of these probability estimates will have to be revised. A far-reaching new effort is needed to strengthen security for nuclear

  2. Chemical and Biological Warfare: Should Rapid Detection Techniques Be Researched To Dissuade Usage? A Review

    OpenAIRE

    Mark R. Hurst; Ebtisam Wilkins

    2005-01-01

    Chemistry, microbiology and genetic engineering have opened new doorways for the human race to propel itself to a better future. However, there is a darker side to Bioengineering. One element of this is the manufacture and proliferation of biological and chemical weapons. It is clearly in the interest of humankind to prevent the future use of such weapons of mass destruction. Though many agents have been proposed as potential biological and chemical weapons, the feasibility of these weapons i...

  3. Nuclear-weapon-free zones: Pursuing security, region by region. Conference of States Parties and Signatories of treaties that establish nuclear-weapon-free zones

    International Nuclear Information System (INIS)

    The development of nuclear-weapon-free zones, over the past four decades, is a testament to what nations can do, region by region, to achieve common security objectives. In fact, when considering the history of nuclear non-proliferation efforts, it might be said that here in Mexico City is where it all began. The 1967 Treaty of Tlatelolco was the first multilateral treaty to establish a region free of nuclear weapons and a requirement for comprehensive IAEA safeguards for its parties - and clearly gave impetus to the conclusion of the Treaty on the Non-Proliferation of Nuclear Weapons. Nuclear-weapon-free zones provide tangible security benefits. They help to reassure the larger international community of the peaceful nuclear intentions of countries in these regions. They provide their members with security assurances against the use, or threat of use, of nuclear weapons by a nuclear-weapon State. They include control mechanisms for dealing with non-compliance in a regional setting. And in all cases, they prohibit the development, stationing or testing of nuclear weapons in their respective regions. An important benefit of these zones is that they open a forum for expanded regional dialogue on issues of security. Because the causes of insecurity vary from region to region, security solutions do not come in a 'one-size-fits-all' package. It is for this reason that regional dialogues, as we see in the nuclear-weapon-free zones, are so beneficial. It is clear that such treaties, and such security dialogues, would be invaluable in other areas of the world, such as the Middle East and the Korean Peninsula. Since the end of the Cold War, the international security landscape has undergone dramatic changes. For example, the rise in terrorism, the discovery of clandestine nuclear programmes, and the emergence of covert nuclear procurement networks have heightened our awareness of vulnerabilities in the nuclear non-proliferation regime. This statement focuses on two issues

  4. Toward a nuclear weapons free world?

    Energy Technology Data Exchange (ETDEWEB)

    Maaranen, S.A. [Los Alamos National Lab., NM (United States). Center for International Security Affairs

    1996-09-01

    Doubts about the wisdom of relying on nuclear weapons are as old as nuclear weapons themselves. But despite this questioning, nuclear weapons came to be seen as the indispensable element of American (indeed Western) security during the Cold War. By the 1970s and 1980s, however, discontent was growing about the intense US-Soviet nuclear arms competition, as it failed to provide any enduring improvement in security; rather, it was seen as creating ever greater risks and dangers. Arms control negotiations and limitations, adopted as a means to regulate the technical competition, may also have relieved some of the political pressures and dangers. But the balance of terror, and the fears of it, continued. The Strategic Defense Initiative (SDI) under President Reagan was a very different approach to escaping from the precarious protection of nuclear weapons, in that it sought a way to continue to defend the US and the West, but without the catastrophic risks of mutual deterrence. As such, SDI connoted unhappiness with the precarious nuclear balance and, for many, with nuclear weapons in general. The disappearance of the Warsaw Pact, the disintegration of the Soviet Union, and the sudden end of the Cold War seemed to offer a unique opportunity to fashion a new, more peaceful world order that might allow for fading away of nuclear weapons. Scholars have foreseen two different paths to a nuclear free world. The first is a fundamental improvement in the relationships between states such that nuclear weapons are no longer needed. The second path is through technological development, e.g., missile defenses which could provide effective protection against nuclear attacks. The paper discusses nuclear weapon policy in the US, views of other nuclear states, the future of nuclear weapons, and issues in a less-nuclear world.

  5. Global Threats to Child Safety.

    Science.gov (United States)

    Mace, Sharon E

    2016-02-01

    Children have rights, as enumerated in the Declaration of the Rights of the Child, and need protection from violence, exploitation, and abuse. Global threats to child safety exist. These threats include lack of basic needs (food, clean water, sanitation), maltreatment, abandonment, child labor, child marriage, female genital mutilation, child trafficking, disasters, and armed conflicts/wars. Recent disasters and armed conflicts have led to a record number of displaced people especially children and their families. Strategies and specific programs can be developed and implemented for eliminating threats to the safety of children. PMID:26613687

  6. Toxicological issues after depleted uranium weapons attacked

    International Nuclear Information System (INIS)

    Depleted Uranium (DU) is a byproduct of the uranium enrichment for producing nuclear reactor or nuclear weapon. DU is used in the military as an armor-piercing projectile due to its hardness, strength, and density. A lot of DU weapons were fired in the Gulf War, and bring about critical environmental and internal contamination. Therefore, DU becomes suddenly a hot issue. Some toxicological problems after DU weapons attacked have been reviewed, which include features of internal DU contamination. Hazard of wound contamination and inhalation with insoluble uranium, and other urgent toxicological issues. The healthy effects of implanted with depleted uranium pellets were illustrated in particular

  7. Weapon Control System for Airborne Application.

    OpenAIRE

    M. Sankar Kishore

    2000-01-01

    The integrated fire' control system (IFCS) plays an important role in the present-day fighter aircraft and helicopters. Wecapons, such as missiles (active/passive), rockets and guns may be present on thelfighter aircraft or helicopter .IFCS monitors the status of the weapons present on the vehicle and passes the information to pilot/co-pilot. Depending upon the health/availability of the weapons, IFCS selects/fires the weapons. An attempt has been made to bring out the details of one such IFC...

  8. ENVIRONMENTAL CONTAMINATION FROM WEAPON TESTS

    Energy Technology Data Exchange (ETDEWEB)

    none

    1958-10-01

    The program of the Atomic Energy Commission on environmental contamination from weapons tests is designed for the overall evaluation of the hazard to humans from test operations. It is limited to studies of the deposition of activity at long range rather than the problems associated with immediate, close-in fallout. The program has largely been a study of Sr{sup 90}, since considerations based on experience and measurement indicate that it is the isotope of greatest potential hazard. Data are presented pertinent to the monitoring of long-range fallout, particularly Sr{sup 90} and Cs{sup 137}. Values are tabulated for the fallout deposition, air concentrations, water concentrations, and the amounts in foods and human bone. In addition, results are given for some experimental investigations. The report of these results is not interpretative although certain papers that do attempt to interpret the present situation with respect to Sr{sup 90} in particular are reprinted. Bibliographies are presented covering the period since the 1957 hearings before the Joint Committee on Atomic Energy concerning the nature of radioactive fallout and its effects on man. A document list of submissions to the United Nations Scientific Committee on the Effects of Atomic Radiation is given to illustrate the work done in other countries. Several papers on the subject, which have not been generally available, are reprinted.

  9. Voice command weapons launching system

    Science.gov (United States)

    Brown, H. E.

    1984-09-01

    This abstract discloses a voice-controlled weapons launching system for use by a pilot of an aircraft against a plurality of simultaneously appearing (i.e., existing) targets, such as two or more aggressor aircraft (or tanks, or the like) attacking more aggressor aircraft. The system includes, in combination, a voice controlled input device linked to and controlling a computer; apparatus (such as a television camera, receiver, and display), linked to and actuated by the computer by a voice command from the pilot, for acquiring and displaying an image of the multi-target area; a laser, linked to and actuated by the computer by a voice command from the pilot to point to (and to lock on to) any one of the plurality of targets, with the laser emitting a beam toward the designated (i.e., selected) target; and a plurality of laser beam-rider missiles, with a different missile being launched toward and attacking each different designated target by riding the laser beam to that target. Unlike the prior art, the system allows the pilot to use his hands full-time to fly and to control the aircraft, while also permitting him to launch each different missile in rapid sequence by giving a two-word spoken command after he has visually selected each target of the plurality of targets, thereby making it possible for the pilot of a single defender aircraft to prevail against the plurality of simultaneously attacking aircraft, or tanks, or the like.

  10. Heat Waves Are Health Threats

    Science.gov (United States)

    ... https://medlineplus.gov/news/fullstory_159694.html Heat Waves Are Health Threats Drink plenty of water and ... 2016 SATURDAY, July 2, 2016 (HealthDay News) -- Heat waves are more than uncomfortable, they can be deadly. ...

  11. Today's threat and tomorrow's reaction

    International Nuclear Information System (INIS)

    Full text: The events of September 11 have only confirmed our past nightmares and warnings to industries, agencies, and governments. The threat of even more significant catastrophic attacks, using nuclear materials, was just as real ten years ago, as it is today. In many cases, our vulnerability remains the same as years ago. There is a dire need for all organizations to agree upon threats and vulnerabilities, and to implement appropriate protections, for nuclear materials or other 'means' to achieve an event of mass destruction. All appropriate organizations (industries, agencies, and governments) should be able to define, assess, and recognize international threats and vulnerabilities in the same manner. In complimentary fashion, the organizations should be able to implement safeguards against this consistent generic threat. On an international scale the same threats, and most vulnerabilities, pose high risks to all of these organizations and societies. Indeed, in today's world, the vulnerabilities of one nation may clearly pose great risk to another nation. Once threats and vulnerabilities are consistently recognized, we can begin to approach their mitigation in a more 'universal' fashion by the application of internationally recognized and accepted security measures. The path to recognition of these security measures will require agreement on many diverse issues. However, once there is general agreement, we can then proceed to the acquisition of diverse national and international resources with which to implement the security measures 'universally' to eliminate 'weak-links' in the chain of nuclear materials, on a truly international scale. I would like to discuss: developing a internationally acceptable 'generic' statement of threat, vulnerability assessment process, and security measure; proposing this international statement of threat, vulnerability assessment process, and appropriate security measures to organizations (industries, agencies, and governments

  12. Identity, Power, and Threat Perception

    OpenAIRE

    David L. Rousseau; Rocio Garcia-Retamero

    2007-01-01

    Realists in international relations and realistic conflict theorists in social psychology argue that the perception of threat in intergroup conflict is a function of power asymmetries between groups. In contrast, social constructivists and social identity theorists argue that a shared sense of identity can reduce perceptions of intergroup threat. In this article, we test these competing arguments using three laboratory experiments conducted in two different countries (Spain and the United Sta...

  13. Affirmative Action and Stereotype Threat

    OpenAIRE

    Cohen, Alma

    2015-01-01

    This paper provides experimental evidence on the effect of affirmative action (AA). In particular, we investigate whether affirmative action has a ”stereotype threat effect” – that is, whether AA cues a negative stereotype that leads individuals to conform to the stereotype and adversely affects their performance. Stereotype threat has been shown in the literature to be potentially significant for individuals who identify strongly with the domain of the stereotype and who engage in complex st...

  14. Smallest organism; highest threat.

    Science.gov (United States)

    Pant, Amit; Chikhale, Rupesh; Wadibhasme, Pankaj; Menghani, Sunil; Khedekar, Pramod

    2012-01-01

    Ever since the discovery of virus in beginning of 20th century, infections caused by these organisms have captured attention of researchers. The evolution of viruses is still a controversy, even same for their categorization in either living or non-living. It is clear that besides many controversies virus remains challenging to treat as well as to control in some extent. Though vaccines are available as prophylactic tool and antiviral drugs for treatment, still virus exist in host cells if they successfully invade biological machinery. Now it remains as challenge to treat these smallest organisms with high degree of efficacy and safety. To answer the demand of the present world there is urgent need of more potent and novel drugs for treatment and vaccines to prevent infection. Answer to this problem will definitely reduce casualties occurring worldwide. This review presents few of the pandemics, their causative agents, current status of treatment and future prospective. PMID:23922535

  15. Pathways to the acquisition of nuclear weapons

    International Nuclear Information System (INIS)

    Countries desirous of acquiring nuclear weapons may follow a number of different paths. Some of the decisions that must be made along the way include: the type of fissile material used (plutonium or high enriched uranium), fuel cycle processes employed, weapon design, degree and type of foreign assistance, and whether the program is covert or overt. Although obtaining special fissionable material has traditionally been the most difficult step in the process of creating a nuclear weapon, other steps in the process can also be quite formidable. As there is no 'one size fits all' model for the proliferation of nuclear weapons, all possible means of obtaining materials and technologies must be considered to effectively combat their spread

  16. Computational Challenges in Nuclear Weapons Simulation

    Energy Technology Data Exchange (ETDEWEB)

    McMillain, C F; Adams, T F; McCoy, M G; Christensen, R B; Pudliner, B S; Zika, M R; Brantley, P S; Vetter, J S; May, J M

    2003-08-29

    After a decade of experience, the Stockpile Stewardship Program continues to ensure the safety, security and reliability of the nation's nuclear weapons. The Advanced Simulation and Computing (ASCI) program was established to provide leading edge, high-end simulation capabilities needed to meet the program's assessment and certification requirements. The great challenge of this program lies in developing the tools and resources necessary for the complex, highly coupled, multi-physics calculations required to simulate nuclear weapons. This paper describes the hardware and software environment we have applied to fulfill our nuclear weapons responsibilities. It also presents the characteristics of our algorithms and codes, especially as they relate to supercomputing resource capabilities and requirements. It then addresses impediments to the development and application of nuclear weapon simulation software and hardware and concludes with a summary of observations and recommendations on an approach for working with industry and government agencies to address these impediments.

  17. Health and environmental effects of nuclear weapons

    International Nuclear Information System (INIS)

    This report briefly reviews previous WHO work on the health consequences of nuclear war and concentrates on current information about the effects of nuclear weapons on health, and related environmental problems. 15 refs

  18. Weapons dismantlement issues in independent Ukraine

    Energy Technology Data Exchange (ETDEWEB)

    Zack, N.R. [Los Alamos National Lab., NM (United States); Kirk, E.J. [American Association for the Advancement of Science, Washington, DC (United States)

    1994-07-01

    The American Association for the Advancement of Science sponsored a seminar during September 1993, in Kiev, Ukraine, entitled ``Toward a Nuclear Free Future -- Barriers and Problems.`` It brought together Ukrainians, Belarusians, and Americans to discuss the legal, political, safeguards and security, economic, and technical dimensions of nuclear weapons dismantlement and destruction. US representatives initiated discussions on legal and treaty requirements and constraints, safeguards and security issues surrounding dismantlement, storage and disposition of nuclear materials, warhead transportation, and economic considerations. Ukrainians gave presentations on arguments for and against the Ukraine keeping nuclear weapons, Ukrainian Parliament non-approval of START I, alternative strategies for dismantling silos and launchers, and economic and security implications of nuclear weapons removal from the Ukraine. Participants from Belarus discussed proliferation and control regime issues, This paper will highlight and detail the issues, concerns, and possible impacts of the Ukraine`s dismantlement of its nuclear weapons.

  19. Peaceful uses of nuclear weapon plutonium

    International Nuclear Information System (INIS)

    In 1993, the U.S.A. and the CIS signed Start 2 (the Strategic Arms Reduction Treaty) in which they committed themselves the reduce their nuclear weapon arsenals to a fraction of that of 1991. For forty-five years the antagonism between the superpowers had been a dominating factor in world history, determining large areas of social life. When Start 2 will have been completed in 2003, some 200 t of weapon grade plutonium and some 2000 t of highly enriched uranium (Heu) will arise from dismantling nuclear weapons. In the absence of the ideological ballast of the debate about Communism versus Capitalism of the past few decades there is a chance of the grave worldwide problem of safe disposal and utilization of this former nuclear weapon material being solved. Under the heading of 'swords turned into plowshares', plutonium and uranium could be used for peaceful electricity generation. (orig.)

  20. Nuclear Weapons Effects (Self-Teaching Materials).

    Science.gov (United States)

    Defense Civil Preparedness Agency (DOD), Battle Creek, MI.

    Developed by the Civil Defense Preparedness Agency, this autoinstructional text deals with nuclear weapons effects. The destructive effects of an atomic blast are first introduced, and then long-term radioactive consequences are stressed. (CP)

  1. Democracy, public opinion, and nuclear weapons

    International Nuclear Information System (INIS)

    To the degree that people's fears of nuclear war are deep and pervasive, they become subject to manipulation by cynical or politically utopian promises, whether those promises be to abolish nuclear weapons from the earth or to create a leakproof peace shield (SDI). But the basic yearning for protection could also be mobilized to support serious arms reduction and arms control agreements. Nuclear weapons provide the basis for a vivid form of symbolic politics, perhaps equivalent in foreign policy considerations to the Korean and Vietnam wars during their durations, and in similar ways (although not necessarily as severe) as unemployment does among domestic policy issues. This paper presents survey research directed specifically at the role of public opinion on nuclear imagery (difference between expectation of nuclear war versus any kind of weapon war; willingness to spend on nuclear weapons versus conventional ones or general defense spending) can help in understanding these phenomena

  2. Weapon plutonium in accelerator driven power system

    International Nuclear Information System (INIS)

    Accelerator Driven Systems are planned to be developed for the use (or destruction) of dozens of tons of weapon-grade Plutonium (W-Pu) resulted from the reducing of nuclear weapons. In the paper are compared the parameters of various types of accelerators, the physical properties of various types of targets and blankets, and the results of fuel cycle simulation. Some economical aspects are also discussed

  3. Color image fusion for concealed weapon detection

    OpenAIRE

    Toet, A

    2003-01-01

    Recent advances in passive and active imaging sensor technology offer the potential to detect weapons that are concealed underneath a person's clothing or carried along in bags. Although the concealed weapons can sometimes easily be detected, it can be difficult to perceive their context, due to the non-literal nature of these images. Especially for dynamic crowd surveillance purposes it may be impossible to rapidly asses with certainty which individual in the crowd is the one carrying the ob...

  4. Prions: the danger of biochemical weapons

    OpenAIRE

    Eric Almeida Xavier

    2014-01-01

    The knowledge of biotechnology increases the risk of using biochemical weapons for mass destruction. Prions are unprecedented infectious pathogens that cause a group of fatal neurodegenerative diseases by a novel mechanism. They are transmissible particles that are devoid of nucleic acid. Due to their singular characteristics, Prions emerge as potential danger since they can be used in the development of such weapons. Prions cause fatal infectious diseases, and to date there is no therapeutic...

  5. Examining the discourse on nuclear weapons

    OpenAIRE

    Ghafele, Roya

    2000-01-01

    Nuclear weapons and language - is there a connection? Linguistics is an established science, but what has it got to do with nuclear weapons? This article was inspired by several international disarmament negotiations where I noticed that diplomats work in a communicative reality related to the nuclear arms issue. But is anyone involved in this highly political process aware of the activity of that process of talking? Observations showed that the political problem around the issue of nuclear a...

  6. Responsibilities of the nuclear-weapon states

    International Nuclear Information System (INIS)

    The responsibilities of Nuclear Weapon States are presented by a straightforward analysis together with the ways in which they could fulfill them. The complete undertaking of all the commitments by the Nuclear Weapon States may take a long time. However they do not have a single excuse to neglect such a historic opportunity to do their best to provide a genuinely secure world environment for the international community, of which they too are members

  7. Chemical Weapons and Problems of Verification

    Directory of Open Access Journals (Sweden)

    P.K. Ramachandran

    1990-01-01

    Full Text Available This paper reviews the existing treaties for ban and verification of the production and use of chemical weapons. The proposed Chemical Weapons Convection, its thrust areas of verifications, the organisations for and process of verification are described briefly. Various technical verification measures including field techniques, such as detector papers, tubes, enzyme tickets, etc. and analytical methods such as gas chromatography, microsensors, different spectrometry methods including IR techniques and stationary system are also discussed.

  8. Pantex: safety in nuclear weapons processing.

    Science.gov (United States)

    Johannesen, R E; Farrell, L M

    2000-11-01

    The Pantex Plant, located in the Texas panhandle near Amarillo, is a major Department of Energy (DOE) participant in maintaining the safety of the nation's nuclear weapons resources and protecting the employees, public, and environment. With more than 168,000 person-years of operations involving nuclear materials, explosives, and hazardous chemicals, Pantex has maintained a notable safety record. This article overviews the nuclear weapon activities at Pantex and describes their safety culture. PMID:11045518

  9. Evolutionary function of dreams: A test of the threat simulation theory in recurrent dreams.

    Science.gov (United States)

    Zadra, Antonio; Desjardins, Sophie; Marcotte, Eric

    2006-06-01

    proposed an intriguing and detailed evolutionary theory of dreams which stipulates that the biological function of dreaming is to simulate threatening events and to rehearse threat avoidance behaviors. The goal of the present study was to test this theory using a sample of 212 recurrent dreams that was scored using a slightly expanded version of the DreamThreat rating scale. Six of the eight hypotheses tested were supported. Among the positive findings, 66% of the recurrent dream reports contained one or more threats, the threats tended to be dangerous and aimed at the dreamer, and when facing a threat, the dreamer tended to take defensive or evasive actions that were possible and reasonable. However, less than 15% of the recurrent dreams depicted realistic and probable situations critical for one's physical survival or reproductive success and the dreamer rarely succeeded in fleeing the threat despite important and appropriate efforts. The findings thus provide mixed support for the threat simulation theory. PMID:16720254

  10. Memory impairment in the weapon focus effect.

    Science.gov (United States)

    Saunders, Jo

    2009-04-01

    Two experiments are reported in which postevent source of misinformation was manipulated within weapon-present and weapon-absent scenarios. Participants viewed slides depicting either a weapon or a newspaper event and then received either incomplete questioning or a narrative. Both postevent sources contained misleading information about a central and peripheral detail concerning either the weapon or the newspaper scenario. With a modified test in Experiment 1, questioning was found to increase misinformation effects concerning the central item, as compared with a narrative, and more misinformation effects were found for the weapon-peripheral than for the newspaper-peripheral item. In Experiment 2, the participants were more likely to claim to have seen contradictory and additive misinformation about the central item in the slides following questioning, and more contradictory and additive misinformation effects occurred for the weapon-peripheral than for the newspaper-peripheral item. The findings are considered in terms of the effects of both postevent and encoding factors on memory. PMID:19246347

  11. Some mathematics of nuclear weapons proliferation

    International Nuclear Information System (INIS)

    Full text: In the many decades since the first demonstration of the power of nuclear weapons we have created a 'data set' that we may analyze to see if simple principles account for the observed history. There was initial fear that the proliferation of weapons would be exponential, driven by the principle that each nation would desire to have weapons to deter each other nuclear-armed nation. The doubling time could be taken as four years, between the tests of the US in 1945 and the USSR in 1949. By 1985, with ten doubling times, we would have had 1024 nuclear weapons states, far from the data. If we make a different hypothesis, that each nation is deterred from seeking nuclear weapons by each existing nuclear state, we obtain a differential equation leading to an expression for a much slower rate of increase, which is indeed found to be closely followed. If we have an understanding of the processes that lead to the proliferation of nuclear weapons, we can be better at strengthening the barriers to further growth. The mathematical equations and relevant plots will be used to illustrate these observations. (author)

  12. China's mixed signals on nuclear weapons

    International Nuclear Information System (INIS)

    Ultimately, it is nuclear whether the Chinese leadership has made up its collective mind on practical nuclear weapons. It is known from Chinese official sources, including articles in Communist Party and military publications and histories of the Chinese nuclear program, that an internal debate has proceeded for more than two decades, punctuated by occasional nuclear exercises or low-yield warhead tests. But China presumably has less reason now to pursue development of tactical nuclear weapons than in previous decades: relations with the Soviet Union have improved and military confrontation has eased; China's relations with India and Vietnam are also improving. The decision may already have been made, however, and the weapons built. The mystery surrounding Chinese tactical nuclear weapons is itself interesting, but it is also symbolic of the difficulty of understanding China's nuclear weapons program and policies. The West has accumulated a considerable body of knowledge about China's nuclear forces, especially historical material. But important aspects of China's nuclear behavior and its future as a nuclear power are hard to discern. A key question is China's future role in the spread of nuclear-capable weapons to other countries. China might add to international efforts to stem the proliferation of nuclear related technology, or it might become the world's missile merchant. It could make a constructive contribution to arms control efforts in general, or it could act as a spoiler

  13. 36 CFR 2.4 - Weapons, traps and nets.

    Science.gov (United States)

    2010-07-01

    ... prohibited: (i) Possessing a weapon, trap or net (ii) Carrying a weapon, trap or net (iii) Using a weapon... this chapter; (B) The taking of fish is authorized by law in accordance with § 2.3 of this part. (ii... their ready use. (b) Carrying or possessing a loaded weapon in a motor vehicle, vessel or other mode...

  14. Security in the Mediterranean basin: terrorism and weapons of mass destruction; La securite dans le bassin mediterraneen: terrorisme et armes de destruction massive

    Energy Technology Data Exchange (ETDEWEB)

    Benoit, L. [Tours Univ., 37 (France); Groupe d' Etudes et de Recherches sur la Cooperation Internationale et Europeenne (GERCIE), 37 - Tours (France)

    2006-08-15

    The european union has appreciated the gravity of the threat from terrorism and weapons of mass destruction, and has adopted a strategy for keeping up its guard, particularly in the Mediterranean basin. The author reviews what is being done to meet these scourges. (author)

  15. Bill related to the struggle against proliferation of mass destruction weapons and their vectors; Projet de Loi relatif a la lutte contre la proliferation des armes de destruction massive et de leurs vecteurs

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2010-07-01

    This bill indicates the modifications brought to different French laws and codes (penal code, defence code, custom code) and defines provisions and penalties within the frame of struggle against the proliferation of weapons of mass destruction (nuclear weapons, biological weapons and toxin-based weapons, chemical weapons), and against the proliferation of their vectors. These modifications, provisions and penalties also concern double-use products. The bill also defines the modifications brought to the French penal procedure code. It finally addresses offenses related to these proliferations which can be considered as an act of terrorism

  16. Enhanced chemical weapon warning via sensor fusion

    Science.gov (United States)

    Flaherty, Michael; Pritchett, Daniel; Cothren, Brian; Schwaiger, James

    2011-05-01

    Torch Technologies Inc., is actively involved in chemical sensor networking and data fusion via multi-year efforts with Dugway Proving Ground (DPG) and the Defense Threat Reduction Agency (DTRA). The objective of these efforts is to develop innovative concepts and advanced algorithms that enhance our national Chemical Warfare (CW) test and warning capabilities via the fusion of traditional and non-traditional CW sensor data. Under Phase I, II, and III Small Business Innovative Research (SBIR) contracts with DPG, Torch developed the Advanced Chemical Release Evaluation System (ACRES) software to support non real-time CW sensor data fusion. Under Phase I and II SBIRs with DTRA in conjunction with the Edgewood Chemical Biological Center (ECBC), Torch is using the DPG ACRES CW sensor data fuser as a framework from which to develop the Cloud state Estimation in a Networked Sensor Environment (CENSE) data fusion system. Torch is currently developing CENSE to implement and test innovative real-time sensor network based data fusion concepts using CW and non-CW ancillary sensor data to improve CW warning and detection in tactical scenarios.

  17. Biological and Chemical Security

    Energy Technology Data Exchange (ETDEWEB)

    Fitch, P J

    2002-12-19

    The LLNL Chemical & Biological National Security Program (CBNP) provides science, technology and integrated systems for chemical and biological security. Our approach is to develop and field advanced strategies that dramatically improve the nation's capabilities to prevent, prepare for, detect, and respond to terrorist use of chemical or biological weapons. Recent events show the importance of civilian defense against terrorism. The 1995 nerve gas attack in Tokyo's subway served to catalyze and focus the early LLNL program on civilian counter terrorism. In the same year, LLNL began CBNP using Laboratory-Directed R&D investments and a focus on biodetection. The Nunn-Lugar-Domenici Defense Against Weapons of Mass Destruction Act, passed in 1996, initiated a number of U.S. nonproliferation and counter-terrorism programs including the DOE (now NNSA) Chemical and Biological Nonproliferation Program (also known as CBNP). In 2002, the Department of Homeland Security was formed. The NNSA CBNP and many of the LLNL CBNP activities are being transferred as the new Department becomes operational. LLNL has a long history in national security including nonproliferation of weapons of mass destruction. In biology, LLNL had a key role in starting and implementing the Human Genome Project and, more recently, the Microbial Genome Program. LLNL has over 1,000 scientists and engineers with relevant expertise in biology, chemistry, decontamination, instrumentation, microtechnologies, atmospheric modeling, and field experimentation. Over 150 LLNL scientists and engineers work full time on chemical and biological national security projects.

  18. Weapon target assignment problem satisfying expected damage probabilities based on ant colony algorithm

    Institute of Scientific and Technical Information of China (English)

    Wang Yanxia; Qian Longjun; Guo Zhi; Ma Lifeng

    2008-01-01

    A weapon target assignment (WTA) model satisfying expected damage probabilities with an ant colony algorithm is proposed.In order to save armament resource and attack the targets effectively,the strategy of the weapon assignment is that the target with greater threat degree has higher priority to be intercepted.The effect of this WTA model is not maximizing the damage probability but satisfying the whole assignment result.Ant colony algorithm has been successfully used in many fields,especially in combination optimization.The ant colony algorithm for this WTA problem is described by analyzing path selection,pheromone update,and tabu table update.The effectiveness of the model and the algorithm is demonstrated with an example.

  19. External Second Gate, Fourier Transform Ion Mobility Spectrometry: Parametric Optimization for Detection of Weapons of Mass Destruction

    OpenAIRE

    Tarver, Edward E.

    2004-01-01

    Abstract: Ion mobility spectrometry (IMS) is recognized as one of the most sensitive and robust techniques for the detection of narcotics, explosives and chemical warfare agents. IMS is widely used in forensic, military and security applications. Increasing threat of terrorist attacks, the proliferation of narcotics, Chemical Weapons Convention (CWC) treaty verification as well as humanitarian de-mining efforts have mandated that equal importance be placed on the time required to obtain resul...

  20. Analysis and design of a cooperative weapon assignment module for advanced battle manager of a ballistic missile defense system

    OpenAIRE

    Brown, Willie D.

    2006-01-01

    The United States is in the midst of an ambitious effort to build and deploy a wide range of ballistic missile defense systems. These ballistic missile defense systems will be effective against a host of current and postulated threats from ballistic missiles. In this thesis study, we explore the process of enhancing the effectiveness of weapon assignment for a system of systems. First, analysis of information is drawn from current proposed system of the ABM and its construction from the ...

  1. [Shiga toxin and tetanus toxin as a potential biologic weapon].

    Science.gov (United States)

    Toczyska, Izabela; Płusa, Tadeusz

    2015-09-01

    Toxins produced by the bacteria are of particular interest as potential cargo combat possible for use in a terrorist attack or war. Shiga toxin is usually produced by shiga toxigenic strains of Escherichia coli (STEC - shigatoxigenic Escherichia coli). To infection occurs mostly after eating contaminated beef. Clinical syndromes associated with Shiga toxin diarrhea, hemorrhagic colitis, hemolytic uremic syndrome (HUS - hemolytic uremic syndrome) or thrombotic thrombocytopenic purpura. Treatment is symptomatic. In HUS, in which mortality during an epidemic reaches 20%, extending the kidney injury dialysis may be necessary. Exposure to tetanus toxin produced by Clostridium tetani, resulting in the most generalized tetanus, characterized by increased muscle tension and painful contractions of individual muscle groups. In the treatment beyond symptomatic behavior (among others spasticity medications, anticonvulsants, muscle relaxants) is used tetanus antitoxin and antibiotics (metronidazole choice). A common complication is acute respiratory failure - then it is necessary to implement mechanical ventilation. PMID:26449578

  2. [Saxitoxins and tetrodotokxins as a new biological weapon].

    Science.gov (United States)

    Wesołowski, Adam; Płusa, Tadeusz

    2015-09-01

    Saxitoxins (STX) and tetrodotoxins (TTX) are a group of chemical compounds produced by certain species of marine algae and fish. Lethal dose for a human is about 0.5-2.0 mg when the toxin enters the body via food, and 0.05 mg of poisoning at the time of injection. In the case of aerosol the lethal dose for human being is 5 mg/min/m(3). STX and TTX poisoning cause mostly symptoms from the nervous system in the form of: paresthesia around the lips, tongue, gums, distal segments of the limbs, headache, dysphonia, astigmatism, floating feeling, muscle weakness, paralysis of cranial and peripheral nerves. There is no specific antidote for STX and TTX. It is recommended supportive treatment. PMID:26449582

  3. 28 CFR 36.208 - Direct threat.

    Science.gov (United States)

    2010-07-01

    ... 28 Judicial Administration 1 2010-07-01 2010-07-01 false Direct threat. 36.208 Section 36.208... ACCOMMODATIONS AND IN COMMERCIAL FACILITIES General Requirements § 36.208 Direct threat. (a) This part does not... individual poses a direct threat to the health or safety of others. (b) Direct threat means a...

  4. Comparative Environmental Threat Analysis: Three Case Studies.

    Science.gov (United States)

    Latour, J. B.; Reiling, R.

    1994-01-01

    Reviews how carrying capacity for different environmental problems is operationalized. Discusses whether it is possible to compare threats, using the exceeding of carrying capacity as a yardstick. Points out problems in comparative threat analysis using three case studies: threats to European groundwater resources, threats to ecosystems in Europe,…

  5. Implications of a North Korean Nuclear Weapons Program

    Energy Technology Data Exchange (ETDEWEB)

    Lehman, R.F. II

    1993-07-01

    The Democratic People`s Republic of Korea (DPRK) is one of the Cold War`s last remaining totalitarian regimes. Rarely has any society been as closed to outside influences and so distant from political, economic, and military developments around the globe. In 1991 and in 1992, however, this dictatorship took a number of political steps which increased Pyongyang`s interaction with the outside world. Although North Korea`s style of engagement with the broader international community involved frequent pauses and numerous steps backward, many observers believed that North Korea was finally moving to end its isolated, outlaw status. As the end of 1992 approached, however, delay and obstruction by Pyongyang became intense as accumulating evidence suggested that the DPRK, in violation of the nuclear Non-Proliferation Treaty (NPT), was seeking to develop nuclear weapons. On March 12, 1993, North Korea announced that it would not accept additional inspections proposed by the International Atomic Energy Agency (IAEA) to resolve concerns about possible violations and instead would withdraw from the Treaty. Pyongyang`s action raised the specter that, instead of a last act of the Cold War, North Korea`s diplomatic maneuvering would unravel the international norms that were to be the basis of stability and peace in the post-Cold War era. Indeed, the discovery that North Korea was approaching the capability to produce nuclear weapons suggested that the nuclear threat, which had been successfully managed throughout the Cold War era, could increase in the post-Cold War era.

  6. Chemical Disarmament: Current Problems in Implementing the Chemical Weapons Convention

    Directory of Open Access Journals (Sweden)

    Matoušek, J.

    2006-03-01

    Full Text Available The Chemical Weapons Convention (CWC is briefly characterised by stressing its main pillars, such as verified destruction ofCWstockpiles and destruction/conversion ofCWproduction facilities (CWPFs, verified non-production of CW by the chemical industries, assistance and protection, and international cooperation. The CWC´s leading principle in defining theCW(protecting it generally against scientific and technological development, i. e. so called General Purpose Criterion is thoroughly elucidated showing its relation to the CWC´s sophisticated verification system. Status of implementation (as of August 2005 shows main data obligatory declared by the States Parties (SP, among them 6 possessors of CW stockpiles (Russia, USA, India, South Korea, Albania and Libya. From the declared 71 373 agent-tons, 12 889 have been destroyed, from the declared 8 679 M items of munitions (containers, 2 420 have been destroyed, which means that the anticipated 10 years deadline for CW destruction (after entry into force – EIF will be not managed. For Russia and USA the allowed extension by another 5 years has been already agreed. From the 64 CWPFs (operational after 1946, declared by 12 SPs, 53 have been certified as destroyed/converted. The Organisation for the Prohibition of Chemical Weapons (OPCW is briefly presented and main results of the First Review Conference (2003 analysed on the base of the adopted principal documents. Future problems of implementing the CWC are connected in the first line with its universality, because among 16 non-SPs, several countries (located mainly in the Near East and on the Korean peninsula are presumed to be CW-possessors. Special emphasis is laid on both, threats and benefits of the scientific and technological development for current implementing the CWC as well as of its implementation in future after all CW stockpiles have been destroyed.

  7. Radiological threat, public and media: a psychosociological view

    Energy Technology Data Exchange (ETDEWEB)

    Arciszewski, T. [University Rene Descartes - Paris 5, 92 - Boulogne (France)

    2006-07-01

    Nuclear risk has become a major social communication along the 20. century because of its critical socio-political impact. That communication is not limited to expert speeches and simple acceptation. The way people understand that kind of threat is based on beliefs and on imaginary pictures. Consequently, and because it shapes people attitude, expectations and behaviours, their analysis is a key for policy and prevention. We will present, in the light of the research on risk perception and social psychology theoretical background, how people can manage with the nuclear fear. Some particular points will be studied: the nature of nuclear threat and fear, the cultural and media coverage and the consequences of this threat on behaviour. We will first focus on what a societal threat is and of which nature is the nuclear threat. We will rely on statistical data on risk perception. We have to consider the two main fields of information: first the nuclear threat as a mass destruction weapon and second, the radiological risk as a consequence of civil use of radiological material. Those two aspects, deeply related for most people, make the roots for the described fears. Then, the perception of the risks relative to nuclear is necessarily influenced by this representation. The representation of the nuclear power is and will be for next years, related to the nuclear mushroom as experimentally pointed o ut by Fiske, both with the abnormal children of Chernobyl. How can we change that vision? Not to be a liar, it will be hard work because it a old story, a long construction of what will be the future of mankind, something deeply influenced by media, movie, geopolitical facts like the cold war or technological accident like Three Mile Island or Chernobyl. It has to deal with the problem of media transmission of fears, which is a problem in itself, but due to the scientific base of our problem, particularly relevant. Moreover, there is a strong cultural background that maintains

  8. Radiological threat, public and media: a psychosociological view

    International Nuclear Information System (INIS)

    Nuclear risk has become a major social communication along the 20. century because of its critical socio-political impact. That communication is not limited to expert speeches and simple acceptation. The way people understand that kind of threat is based on beliefs and on imaginary pictures. Consequently, and because it shapes people attitude, expectations and behaviours, their analysis is a key for policy and prevention. We will present, in the light of the research on risk perception and social psychology theoretical background, how people can manage with the nuclear fear. Some particular points will be studied: the nature of nuclear threat and fear, the cultural and media coverage and the consequences of this threat on behaviour. We will first focus on what a societal threat is and of which nature is the nuclear threat. We will rely on statistical data on risk perception. We have to consider the two main fields of information: first the nuclear threat as a mass destruction weapon and second, the radiological risk as a consequence of civil use of radiological material. Those two aspects, deeply related for most people, make the roots for the described fears. Then, the perception of the risks relative to nuclear is necessarily influenced by this representation. The representation of the nuclear power is and will be for next years, related to the nuclear mushroom as experimentally pointed o ut by Fiske, both with the abnormal children of Chernobyl. How can we change that vision? Not to be a liar, it will be hard work because it a old story, a long construction of what will be the future of mankind, something deeply influenced by media, movie, geopolitical facts like the cold war or technological accident like Three Mile Island or Chernobyl. It has to deal with the problem of media transmission of fears, which is a problem in itself, but due to the scientific base of our problem, particularly relevant. Moreover, there is a strong cultural background that maintains

  9. Implementing the chemical weapons convention

    International Nuclear Information System (INIS)

    In 1993, as the CWC ratification process was beginning, concerns arose that the complexity of integrating the CWC with national law could cause each nation to implement the Convention without regard to what other nations were doing, thereby causing inconsistencies among States as to how the CWC would be carried out. As a result, the author's colleagues and the author prepared the Manual for National Implementation of the Chemical Weapons Convention and presented it to each national delegation at the December 1993 meeting of the Preparatory Commission in The Hague. During its preparation, the Committee of CWC Legal Experts, a group of distinguished international jurists, law professors, legally-trained diplomats, government officials, and Parliamentarians from every region of the world, including Central Europe, reviewed the Manual. In February 1998, they finished the second edition of the Manual in order to update it in light of developments since the CWC entered into force on 29 April 1997. The Manual tries to increase understanding of the Convention by identifying its obligations and suggesting methods of meeting them. Education about CWC obligations and available alternatives to comply with these requirements can facilitate national response that are consistent among States Parties. Thus, the Manual offers options that can strengthen international realization of the Convention's goals if States Parties act compatibly in implementing them. Equally important, it is intended to build confidence that the legal issues raised by the Convention are finite and addressable. They are now nearing competition of an internet version of this document so that interested persons can access it electronically and can view the full text of all of the national implementing legislation it cites. The internet address, or URL, for the internet version of the Manual is http: //www.cwc.ard.gov. This paper draws from the Manual. It comparatively addresses approximately thirty

  10. Implementing the chemical weapons convention

    Energy Technology Data Exchange (ETDEWEB)

    Kellman, B.; Tanzman, E. A.

    1999-12-07

    In 1993, as the CWC ratification process was beginning, concerns arose that the complexity of integrating the CWC with national law could cause each nation to implement the Convention without regard to what other nations were doing, thereby causing inconsistencies among States as to how the CWC would be carried out. As a result, the author's colleagues and the author prepared the Manual for National Implementation of the Chemical Weapons Convention and presented it to each national delegation at the December 1993 meeting of the Preparatory Commission in The Hague. During its preparation, the Committee of CWC Legal Experts, a group of distinguished international jurists, law professors, legally-trained diplomats, government officials, and Parliamentarians from every region of the world, including Central Europe, reviewed the Manual. In February 1998, they finished the second edition of the Manual in order to update it in light of developments since the CWC entered into force on 29 April 1997. The Manual tries to increase understanding of the Convention by identifying its obligations and suggesting methods of meeting them. Education about CWC obligations and available alternatives to comply with these requirements can facilitate national response that are consistent among States Parties. Thus, the Manual offers options that can strengthen international realization of the Convention's goals if States Parties act compatibly in implementing them. Equally important, it is intended to build confidence that the legal issues raised by the Convention are finite and addressable. They are now nearing competition of an internet version of this document so that interested persons can access it electronically and can view the full text of all of the national implementing legislation it cites. The internet address, or URL, for the internet version of the Manual is http: //www.cwc.ard.gov. This paper draws from the Manual. It comparatively addresses approximately thirty

  11. Proliferation concerns in the Russian closed nuclear weapons complex cities : a study of regional migration behavior.

    Energy Technology Data Exchange (ETDEWEB)

    Flores, Kristen Lee

    2004-07-01

    The collapse of the Soviet Union in 1991 left the legacy of the USSR weapons complex with an estimated 50 nuclear, chemical, and biological weapons cities containing facilities responsible for research, production, maintenance, and destruction of the weapons stockpile. The Russian Federation acquired ten such previously secret, closed nuclear weapons complex cities. Unfortunately, a lack of government funding to support these facilities resulted in non-payment of salaries to employees and even plant closures, which led to an international fear of weapons material and knowledge proliferation. This dissertation analyzes migration in 33 regions of the Russian Federation, six of which contain the ten closed nuclear weapons complex cities. This study finds that the presence of a closed nuclear city does not significantly influence migration. However, the factors that do influence migration are statistically different in regions containing closed nuclear cities compared to regions without closed nuclear cities. Further, these results show that the net rate of migration has changed across the years since the break up of the Soviet Union, and that the push and pull factors for migration have changed across time. Specifically, personal and residential factors had a significant impact on migration immediately following the collapse of the Soviet Union, but economic infrastructure and societal factors became significant in later years. Two significant policy conclusions are derived from this research. First, higher levels of income are found to increase outmigration from regions, implying that programs designed to prevent migration by increasing incomes for closed city residents may be counter-productive. Second, this study finds that programs designed to increase capital and build infrastructure in the new Russian Federation will be more effective for employing scientists and engineers from the weapons complex, and consequently reduce the potential for emigration of

  12. Taking the sting out of the nuclear threat

    Energy Technology Data Exchange (ETDEWEB)

    Ravenal, E.C.

    1983-10-01

    A policy of incentives to discourage the first use of nuclear weapons can help to reduce the threat of nuclear war, but the author takes issue with the logic of those who propose requiring a conventional buildup in Europe as a condition for a no-first-use policy because it would be costly and could still lead to an escalation to nuclear war. Inherent questions about deterrence and alliance reflect the cost of pursuing invulnerability and maintaining crisis stability. Since unnecessary and tempting targets encourage first use, the author feels that the US should design a foreign policy of war avoidance and self-reliance that accommodates both short-run utilitarian action and long-term ethical principles, both of which are necessary to relieve tensions. (DCK)

  13. Prions: the danger of biochemical weapons

    Directory of Open Access Journals (Sweden)

    Eric Almeida Xavier

    2014-09-01

    Full Text Available The knowledge of biotechnology increases the risk of using biochemical weapons for mass destruction. Prions are unprecedented infectious pathogens that cause a group of fatal neurodegenerative diseases by a novel mechanism. They are transmissible particles that are devoid of nucleic acid. Due to their singular characteristics, Prions emerge as potential danger since they can be used in the development of such weapons. Prions cause fatal infectious diseases, and to date there is no therapeutic or prophylactic approach against these diseases. Furthermore, Prions are resistant to food-preparation treatments such as high heat and can find their way from the digestive system into the nervous system; recombinant Prions are infectious either bound to soil particles or in aerosols. Therefore, lethal Prions can be developed by malicious researchers who could use it to attack political enemies since such weapons cause diseases that could be above suspicion.

  14. 对抗高超声速武器的机载激光武器发展研究%Research on the Development of Airborne Laser Weapons Against Hypersonic Weapons

    Institute of Scientific and Technical Information of China (English)

    张同鑫; 李权

    2016-01-01

    The military threat of hypersonic weapon to current air defense system, and the potential military value of airborne laser weapon confronted to the hypersonic weapon were illustrated. Detailed introduction was made on the technical barriers of airborne laser weapon and the state of the art research progress. It is emphasized that now to research airborne laser weapon, its weight and size must be decreased, beam control system and aiming and tracking system in dynamic environments must be researched, special aerodynamic layout must be designed and smart energy sources management must be established.%介绍了高超声速武器对现有军事防御系统的威胁,机载激光武器对抗高超声速武器的军事价值。详细描述了国外机载激光武器的研究进展以及研究机载激光武器的技术难点,指出当前研究机载激光武器必须进一步降低激光武器的重量和体积,研发动态环境的光束控制与瞄准跟踪系统,开展特殊气动布局设计研究,建立周密的能源管理系统。

  15. Controlling weapons of mass destruction through the rule of law

    Energy Technology Data Exchange (ETDEWEB)

    Tanzman, E.A.

    1995-08-08

    Many who speak of the end of the Cold War emphasize the improvement in international relations when they speak of the momentous consequences of this event. According to this image, the half century since Trinity has been a period of sparse international communication during which the Eastern and Western blocs hibernated in their isolated dens of security alliances. The emphasis in the phrase ``Cold War`` was on the word ``cold,`` and relations with the former Communist regimes are now ``warm`` by comparison. It is equally valid to consider what has happened to the word ``was` in this highly descriptive phrase. While meaningful international dialogue was in a state of relative lethargy during much of the last fifty years, the military establishments of the Great Powers were actively engaged in using as much force as possible in their efforts to control world affairs, short of triggering a nuclear holocaust. Out of these military postures a tense peace ironically emerged, but the terms by which decisions were made about controlling weapons of mass destruction (i.e., nuclear, chemical, and biological weapons) were the terms of war. The thesis of this paper is that the end of the Cold War marks a shift away from reliance on military might toward an international commitment to controlling weapons,of mass destruction through the ``rule of law.`` Rawls wrote that ``legal system is a coercive order of public rules addressed to rational persons for the purpose of regulating their conduct and providing the framework for social cooperation. The regular and impartial administration of public rules, becomes the rule of law when applied to the legal system.`` Inparticular, Rawls identifies as part of this system of public rules those laws that aim to prevent free riders on the economic system and those that aim to correct such externalities as environmental pollution.``

  16. Measuring Vulnerability to Stereotype Threat

    Science.gov (United States)

    Barnard, Lucy; Burley, Hansel; Olivarez, Arturo; Crooks, Steven

    2008-01-01

    Introduction: In this study, we examined the psychometric properties of an instrument intended to measure vulnerability to stereotype threat. Method: We revised the instrument through assessing score reliability and then examined a domain specific model using confirmatory factor analyses. After examining the responses of the total sample…

  17. Threat from Emerging Vectorborne Viruses

    Centers for Disease Control (CDC) Podcasts

    2016-06-09

    Reginald Tucker reads an abridged version of the commentary by CDC author Ronald Rosenberg, Threat from Emerging Vectorborne Viruses.  Created: 6/9/2016 by National Center for Emerging and Zoonotic Infectious Diseases (NCEZID).   Date Released: 6/9/2016.

  18. Cyber Threats to Nuclear Infrastructures

    International Nuclear Information System (INIS)

    Nuclear facility personnel expend considerable efforts to ensure that their facilities can maintain continuity of operations against both natural and man-made threats. Historically, most attention has been placed on physical security. Recently however, the threat of cyber-related attacks has become a recognized and growing world-wide concern. Much attention has focused on the vulnerability of the electric grid and chemical industries to cyber attacks, in part, because of their use of Supervisory Control and Data Acquisition (SCADA) systems. Lessons learned from work in these sectors indicate that the cyber threat may extend to other critical infrastructures including sites where nuclear and radiological materials are now stored. In this context, this white paper presents a hypothetical scenario by which a determined adversary launches a cyber attack that compromises the physical protection system and results in a reduced security posture at such a site. The compromised security posture might then be malevolently exploited in a variety of ways. The authors conclude that the cyber threat should be carefully considered for all nuclear infrastructures.

  19. Cyber Threats to Nuclear Infrastructures

    Energy Technology Data Exchange (ETDEWEB)

    Robert S. Anderson; Paul Moskowitz; Mark Schanfein; Trond Bjornard; Curtis St. Michel

    2010-07-01

    Nuclear facility personnel expend considerable efforts to ensure that their facilities can maintain continuity of operations against both natural and man-made threats. Historically, most attention has been placed on physical security. Recently however, the threat of cyber-related attacks has become a recognized and growing world-wide concern. Much attention has focused on the vulnerability of the electric grid and chemical industries to cyber attacks, in part, because of their use of Supervisory Control and Data Acquisition (SCADA) systems. Lessons learned from work in these sectors indicate that the cyber threat may extend to other critical infrastructures including sites where nuclear and radiological materials are now stored. In this context, this white paper presents a hypothetical scenario by which a determined adversary launches a cyber attack that compromises the physical protection system and results in a reduced security posture at such a site. The compromised security posture might then be malevolently exploited in a variety of ways. The authors conclude that the cyber threat should be carefully considered for all nuclear infrastructures.

  20. Are Cyber Weapons Effective Military Tools

    Directory of Open Access Journals (Sweden)

    Emilio Iasiello

    2015-03-01

    Full Text Available Cyber-attacks are often viewed in academic and military writings as strategic asymmetric weapons, great equalizers with the potential of leveling the battlefield between powerful nations and those less capable. However, there has been little evidence to suggest that cyber-attacks are a genuine military option in a state-on-state conflict. In instances of actual military operations (e.g., Afghanistan, Georgia, Iraq, and Israel/Gaza, there is little accompanying evidence of a military conducting cyber-attacks against either a civilian or military target. Given that some of the nation states that have been involved in military conflict or peacekeeping missions in hostile areas are believed to have some level of offensive cyber capability, this may be indicative. More substantive examples demonstrate that cyber-attacks have been more successful in non-military activities, as they may serve as a clandestine weapon of subterfuge better positioned to incapacitate systems without alerting the victims, veiling the orchestrator’s true identity via proxy groups and plausible deniability. Consequently, this paper provides a counter argument to the idea that cyber tools are instrumental military weapons in modern day warfare; cyber weapons are more effective options during times of nation state tension rather than military conflict, and are more serviceable as a signaling tool than one designed to gain military advantage. In situations where state-on-state conflict exists, high value targets that need to be neutralized would most likely be attacked via conventional weapons where battle damage assessment can be easily quantified. This raises the question: are cyber weapons effective military tools?

  1. A low cost maritime control aircraft-ship-weapons system. [antiship missile defense

    Science.gov (United States)

    Fluk, H.

    1981-01-01

    It is pointed out that the long-range antiship standoff missile is emerging as the foremost threat on the seas. Delivered by high speed bombers, surface ships, and submarines, a missile attack can be mounted against selected targets from any point on the compass. An investigation is conducted regarding the configuration of a system which could most efficiently identify and destroy standoff threats before they launch their weapons. It is found that by using ships for carrying and launching missiles, and employing aircraft with a powerful radar only for search and missile directing operations, aircraft cost and weight can be greatly reduced. The employment of V/STOL aircraft in preference to other types of aircraft makes it possible to use ships of smaller size for carrying the aircraft. However, in order to obtain an all-weather operational capability for the system, ships are selected which are still big enough to display the required stability in heavy seas.

  2. Nuclear weapon testing and the monkey business

    International Nuclear Information System (INIS)

    Reasons for India's total ban on the export of rhesus monkeys to U.S. have been explained. The major reason is that some of the animals were used in nuclear weapon related radiation experiments. This was a clear violation of a stricture in the agreement about supply of monkeys. The stricture prohibited the use of animals for research concerning military operations, including nuclear weapon testing. It is pleaded that a strict enforcement of strictures rather than a total ban on the export of monkeys would be better in the interest of advancement of knowledge in human medicine and disease control. (M.G.B.)

  3. Global threat reduction initiative Russian nuclear material removal progress

    International Nuclear Information System (INIS)

    In December 1999 representatives from the United States, the Russian Federation, and the International Atomic Energy Agency (IAEA) started discussing a program to return to Russia Soviet- or Russian-supplied highly enriched uranium (HEU) fuel stored at the Russian-designed research reactors outside Russia. Trilateral discussions among the United States, Russian Federation, and the International Atomic Energy Agency (IAEA) have identified more than 20 research reactors in 17 countries that have Soviet- or Russian-supplied HEU fuel. The Global Threat Reduction Initiative's Russian Research Reactor Fuel Return Program is an important aspect of the U.S. Government's commitment to cooperate with the other nations to prevent the proliferation of nuclear weapons and weapons-usable proliferation-attractive nuclear materials. To date, 496 kilograms of Russian-origin HEU have been shipped to Russia from Serbia, Latvia, Libya, Uzbekistan, Romania, Bulgaria, Poland, Germany, and the Czech Republic. The pilot spent fuel shipment from Uzbekistan to Russia was completed in April 2006. (author)

  4. Nuclear Weapons Enterprise Transformation - A Sustainable Approach

    International Nuclear Information System (INIS)

    Nuclear weapons play an essential role in United States (U.S.) National Security Policy and a succession of official reviews has concluded that nuclear weapons will continue to have a role for the foreseeable future. Under the evolving U.S. government policy, it is clear that role will be quite different from what it was during the Cold War. The nuclear-weapons stockpile as well as the nuclear-weapons enterprise needs to continue to change to reflect this evolving role. Stockpile reductions in the early 1990s and the Stockpile Stewardship Program (SSP), established after the cessation of nuclear testing in 1992, began this process of change. Further evolution is needed to address changing security environments, to enable further reductions in the number of stockpiled weapons, and to create a nuclear enterprise that is cost effective and sustainable for the long term. The SSP has successfully maintained the U.S. nuclear stockpile for more than a decade, since the end of nuclear testing. Current plans foresee maintaining warheads produced in the 1980s until about 2040. These warheads continue to age and they are expensive to refurbish. The current Life Extension Program plans for these legacy warheads are straining both the nuclear-weapons production and certification infrastructure making it difficult to respond rapidly to problems or changes in requirements. Furthermore, refurbishing and preserving Cold-War-era nuclear weapons requires refurbishing and preserving an infrastructure geared to support old technology. Stockpile Stewardship could continue this refurbishment approach, but an alternative approach could be considered that is more focused on sustainable technologies, and developing a more responsive nuclear weapons infrastructure. Guided by what we have learned from SSP during the last decade, the stewardship program can be evolved to address this increasing challenge using its computational and experimental tools and capabilities. This approach must start

  5. Managing threats from emerging technologies: can safeguards show the way?

    International Nuclear Information System (INIS)

    The system of international nuclear safeguards implemented by the International Atomic Energy Agency (IAEA) is primarily a means of verification of states’ commitments under various legal instruments, principally the Nuclear Non‑Proliferation Treaty (NPT), to utilize controlled nuclear fission for peaceful purposes only. However, the safeguards system can also be seen as a mechanism through which states acted to reduce the threat posed by a new technology that had a transformative impact on existing national security paradigms when it emerged in the twentieth century. In the twenty‑first century, new technologies with equally profound national security implications are emerging. These include biotechnology and synthetic biology, nano technology, information technology, cognitive science, robotics and artificial intelligence. Throughout its history, the safeguards system has evolved to accommodate new technologies, new undertakings and new threats. Because multiple emerging technologies now constitute potential national security threats, it is appropriate to consider whether and how the lessons and successes of the safeguards system, including its capacity to evolve in response to changing requirements, could be leveraged to mitigate the threat posed by these new technologies. This paper addresses the possibility of re‑imagining safeguards in a way that makes them applicable to a broader range of technology‑based threats without compromising their effectiveness for their original purpose.

  6. Advanced Algorithms for Rapidly Reconstructing Clandestine Releases of Biological Agents in Urban Areas

    Energy Technology Data Exchange (ETDEWEB)

    Shinn, J.H.; Hall, C.H.; Neher, L.A.; Wilder, F.J.; Gouveia, D.W.; Layton, D.W.; Daniels, J.I.

    2000-02-25

    As the United States plays a greater role in the 21st Century as global peacekeeper and international defender of human rights and democratic principles, there is an increasing likelihood that it will become the focus of acts of terrorism. Such acts of terrorism--sometimes described as ''asymmetric''--could involve the threat or use of weapons of mass destruction (WMD), particularly those considered unconventional, which include ones designed to release chemical or biological agents. In fact, biological agents are of great concern because, as noted by D.A. Henderson of the Center for Civilian Biodefense Studies at Johns Hopkins University in Baltimore, MD, ''... with shortages of hospital space, vaccines, antibiotics, there would be chaos.'' (Williams, 2000). Unfortunately, potential aggressor nations, terrorist groups, and even individuals, can, for a modest cost and effort, develop covert capabilities for manufacturing, transporting, and offensively using biological weapons of mass destruction. Furthermore, there is evidence to indicate that terrorist increasingly are targeting civilian populations--in order to inflict indiscriminate casualties--as well as other more traditional targets such as symbolic buildings or organizations (see Tucker, 1999), which suggest that introducing rapid treatment after a biological event may be more practical than concentrating on prevention (see Siegrist, 1999), especially because sensors are unlikely to be placed in all major urban areas to detect even an atmospheric biological release. For these reasons, and because symptoms for the majority of those effected may not occur or be directly identified for several days, early identification of a covert undetected biological event (CUBE) will contribute to timely medical intervention, which can save many lives.

  7. The monitoring and verification of nuclear weapons

    Energy Technology Data Exchange (ETDEWEB)

    Garwin, Richard L., E-mail: RLG2@us.ibm.com [IBM Fellow Emeritus, IBM Thomas J. Watson Research Center, P.O. Box 218, Yorktown Heights, NY 10598 (United States)

    2014-05-09

    This paper partially reviews and updates the potential for monitoring and verification of nuclear weapons, including verification of their destruction. Cooperative monitoring with templates of the gamma-ray spectrum are an important tool, dependent on the use of information barriers.

  8. Stochastic Duel with Several Types of Weapons

    Directory of Open Access Journals (Sweden)

    N. Bhashyam

    1967-04-01

    Full Text Available This paper attempts to study a 'Stochastic Duel' model wherein each of the contestants has got more than one type of weapons. The ultimate probability of win for each of them is evaluated and the results for a few particular cases are given.

  9. Europium-155 in Debris from Nuclear Weapons

    DEFF Research Database (Denmark)

    Aarkrog, Asker; Lippert, Jørgen Emil

    1967-01-01

    The lithium-drifted germanium detector enables determination of europium-155 on a routine basis in environmental samples contaminated with debris from nuclear weapons. From measurements of europium-155, cesium-144, and strontium-90 in air filters collected between 1961 and 1966, the yield of...

  10. Siamese twins - nuclear weapons and reactors

    International Nuclear Information System (INIS)

    The historical development of nuclear weapons and civil nuclear power is summarized. The initiative by President Eisenhower in launching the 'atoms for peace' programme is mentioned, and the intentions and shortcomings of the Non-Proliferation Treaty are outlined. The developments in individual countries are discussed under the headings: who has the bomb (query); nuclear flashpoints; the nuclear state; BNFL's involvement. (U.K.)

  11. The Spear: An Effective Weapon Since Antiquity

    Directory of Open Access Journals (Sweden)

    Robert E. Dohrenwend

    2012-07-01

    Full Text Available The spear is perhaps man’s oldest weapon, and may even be his oldest tool. Over the hundreds of thousands of years of the weapon’s existence, it evolved from a pointed stick into an efficient hunting missile, and then became the most effective hand-held bladed weapon humans ever devised. The spear and its use is the only martial art originally devised for use against species other than our own, and more than any other weapon, the spear emphasizes the relationship between hunting and warfare. Virtually without exception, the spear is present wherever there are humans. The spear may claim to be the senior martial art, and the weapon is still in use today. Early techniques are preserved by the small number of Japanese sojutsu schools, and modern Chinese martial artists have developed elegant and impressive gymnastic routines for the spear. The javelin throw is a modern Olympic track and field event, and there are people who have resurrected the Aztec atlatl for sporting competition. Today, the spear is still used in Europe for hunting wild boar, and the continued issue of the obsolete bayonet to modern soldiers testifies to a deep, almost instinctive respect still possessed by the military for the spear.

  12. Europium-155 in Debris from Nuclear Weapons

    DEFF Research Database (Denmark)

    Aarkrog, Asker; Lippert, Jørgen Emil

    1967-01-01

    The lithium-drifted germanium detector enables determination of europium-155 on a routine basis in environmental samples contaminated with debris from nuclear weapons. From measurements of europium-155, cesium-144, and strontium-90 in air filters collected between 1961 and 1966, the yield...

  13. Impulse noise trauma during army weapon firing

    OpenAIRE

    Munjal, K. R.; Singh, V. P.

    1997-01-01

    A 100 infanty personnel firing modern weapons such as the Anti Tank Guided Missile, 106mm Recoiless Gun (RCL), 84mm Rocket Launcher (RL) and 81mm Mortar were studied for the effect of impulse noise on the ear and the evolution of the Temporary Threshold Shift (TTS), Recovery Time (RT) and Permanent Threshold Shift (PTS) was traced.

  14. Managing nuclear weapons in the United States

    Energy Technology Data Exchange (ETDEWEB)

    Miller, G.

    1993-03-16

    This report discusses the management and security of nuclear weapons in the post-cold war United States. The definition of what constitutes security is clearly changing in the US. It is now a much more integrated view that includes defense and the economy. The author tries to bring some semblance of order to these themes in this brief adaptation of a presentation.

  15. Creating competitive weapons from information systems.

    Science.gov (United States)

    Wiseman, C; MacMillan, I C

    1984-01-01

    As the pace of competition intensifies in the 1980s, information systems will emerge as critical new weapons in the battle to gain an advantage over competitors. The authors show how a business can use modern information technologies to create a competitive edge by adding value to present products and services. PMID:10269062

  16. On the reduction of nuclear weapons

    OpenAIRE

    Bacher, Robert F.

    1981-01-01

    The United States, in 1946, proposed that an international authority be formed to control the dangerous parts of atomic energy. The proposal met with very little success, except to lead to the conclusion that there was no apparent reason why it was not technically feasible. Discussions on nuclear weapons testing, initiated in 1958, reached some agreement on test restrictions in Subsequent years.

  17. Is China Threat a Hoax?

    Institute of Scientific and Technical Information of China (English)

    Niu Weigan; Ma Zongshi

    2008-01-01

    The Beijing Olympics has focused unprecedented world attention on China this year. Many people hail the Games as an occasion that showcases China's growing contribution to world development and harmony. But intent on politicizing this global event, a few modern Cassandras still cling to the flawed China Threat theory. In this paper, the author traces the origins of this fallacious theory. He sees it as a product of Western empiricism viewed through an historical and philosophical prism. He argues that the assertion of threat arises from a generalization of historical facts. The assertion links China's growing clout with declining Western dominance in international affairs. Starting with the myth that peace is possible only among democracies, the theory predicts the inevitability of conflict between the West and China, a country with an alleged expansionist tradition and under an authoritarian system.

  18. Countering 21st Century Threats

    DEFF Research Database (Denmark)

    Scharling Pedersen, Peter; Pillai, Chad M.; Hun, Lee Jae

    2015-01-01

    The United States and its Allies confront an increasingly volatile world where threats range from traditional state-on-state challenges to non-state transnational networks. To successfully combat these 21st Century problems, in an era of resource and geo-political power constraints, the U.S. and......), Counter-Terrorism (CT), and Security and Stability Operations (SSO). • Establishing a construct that allows a strategic Whole-of-Government capacity for operations coordinated by joint interagency task forces. • Continue to developing the Global SOF network. • Increased intelligence sharing in areas of...... shared interests pre-crisis. • Establish political agreements and/or intentions with partners to address potential threats. • Establishing mutual trust through Building Partnership Capacity with capable SOF and intelligence organizations....

  19. The risk of nuclear weapons proliferation

    International Nuclear Information System (INIS)

    During the later years the risks of nuclear proliferation have again become a major topic of interest. This is primarily due to the acute problems caused by Iraq, North Korea, and the 3 new states of the former USSR, Ukraine, Kazakhstan and Belarus. Analysis shows that security problems and prestige are the two most important motives, when the risks of proliferation are considered. But motives are not enough. To produce nuclear weapons a number of technological requirements must also be fulfilled. The country must be able to produce almost pure fissile material, i.e. 235U or 239Pu. It must also be able to solve a number of metallurgical, explosive, ignition, physics and other problems. These are in particular non-trivial, if a implosion weapon is to be designed. A review is made of the nuclear facilities in a number of the countries which have been suggested as possible future nuclear weapons countries. In particular facilities which can produce almost pure fissile materials, 235U and 239Pu, are considered. The possibility of nuclear terrorists have often been discussed in the media. However, it seems very unlikely that even a major terrorist or mafia organization will be able to solve all the weapons design problems, even if they could steal the fissile material. It is finally discussed what can be done to reduce the risk of further nuclear proliferation. Political pressure can be brought to bear on countries outside the NPT to join it, but it can be counter-productive, and sometimes the countries that are able to exert such pressure, are not willing to do so for other political reasons. The problem of countries which are party to the NPT, but which are believed to acquire nuclear weapons capability in violation of the treaty, can be countered by unannounced inspections of non-declared facilities. However, such inspections can only be meaningfully performed if the necessary intelligence is available. (EG)

  20. Sea Level Threat in Tuvalu

    OpenAIRE

    Than Aung; Awnesh Singh; Uma Prasad

    2009-01-01

    Problem statement: Recently the impacts of climate change, in particular, sea level rise, had been a major concern for many Pacific island countries. In early 2000, there were a series of media coverage over sea level rise issues using Tuvalu as an example. The daily life of Tuvalu revolves around the ocean and the immediate threat on the islands people, economy, environment and its islands is of concern to the Tuvalu government. The Tuvalu government has concluded that Tuvalu was destined to...

  1. Affirmative action and stereotype threat

    OpenAIRE

    Bracha, Anat; Cohen, Alma; Conell-Price, Lynn

    2013-01-01

    In spite of the apparent success of affirmative action (AA) in the past, many oppose such policies. Opponents argue that the cost of attaining proportional representation by preferential policies is too high, reducing the quality of selected groups and stigmatizing members of the protected class. One way in which preferential policies might harm groups they are designed to benefit is by producing stereotype threat; that is, cueing a negative stereotype may lead individuals to conform to it. A...

  2. Cyber Terrorism– Global Security Threat

    OpenAIRE

    Bogdanoski, Mitko; Petreski, Drage

    2013-01-01

    It is more than obvious that the way of conducting terrorism with the time is becoming more sophisticated. The cyber terrorism is real threat to fast technology development. Potential targets are systems which control the nation’s defenses and critical infrastructure. The terrorist of the future will win the wars without firing a shot - just by destroying infrastructure that significantly relies on information technology. The fast growth of the Internet users and Internet dependence dramat...

  3. Symbian `vulnerability' and Mobile Threats

    OpenAIRE

    Gharibi, Wajeb

    2012-01-01

    Modern technologies are becoming ever more integrated with each other. Mobile phones are becoming increasing intelligent, and handsets are growing ever more like computers in functionality. We are entering a new era - the age of smart houses, global advanced networks which encompass a wide range of devices, all of them exchanging data with each other. Such trends clearly open new horizons to malicious users, and the potential threats are self evident. In this paper, we study and discuss one o...

  4. Filling in biodiversity threat gaps

    DEFF Research Database (Denmark)

    Joppa, Lucas; O'Connor, Brian; Visconti, Piero;

    2016-01-01

    he diversity of life on Earth—which provides vital services to humanity (1)—stems from the difference between rates of evolutionary diversification and extinction. Human activities have shifted the balance (2): Species extinction rates are an estimated 1000 times the “background” rate (3) and cou...... United Nations' 2030 Agenda for Sustainable Development and its 17 Sustainable Development Goals (SDGs). We identify major gaps in data available for assessing global biodiversity threats and suggest mechanisms for closing them....

  5. Subordinates as Threats to Leaders

    OpenAIRE

    Glazer, Amihai; Segendorff, Björn

    2001-01-01

    A leader of an organization may view a subordinate as threatening or weakening the leader's position. The threat may increase with the subordinate's ability and reduce the rents the leader wins. In particular, a leader who trains his subordinate reduces the cost to the owner of a firm in replacing the leader, and so reduces the leader's bargaining power. The leader therefore provides inefficiently low training for the subordinate.

  6. Joseph A. Burton Forum Award Lecture: Managing Nuclear and Biological Risks: Building Resilience through International Cooperation

    Science.gov (United States)

    Pregenzer, Arian

    2012-03-01

    International technical cooperation has long been an important nonproliferation strategy, especially since the 1990s when cooperative threat reduction (CTR) to prevent theft or illicit transfer of nuclear weapons, material and expertise in the former Soviet Union became a keystone of U.S. policy. The CTR approach expanded to include engagement with scientists and engineers with expertise relevant to biological and chemical weapons, and continued in the 2000s with efforts in Iraq and Libya, and cooperation with a wide range of countries on export control and nuclear and biological security. In general, the goal of such efforts has been to prevent proliferation or WMD terrorism. In most cases, the United States (or the West) defines the threat, and then funds partner countries to implement solutions. This presentation will argue that the future requires a new approach. Nuclear capabilities are more widely available than ever before, repercussions of the A.Q. Khan network continue to unfurl, and countries such as the DPRK engage in illicit cooperation. In addition, there has been a global boom in biotechnology with many nations, particularly across South and East Asia, investing in the biotech industry as a source of fuels, food, and materials for their rapidly expanding populations. Compared to the 1990s, today's threat is more diffuse, and the line between legitimate and illegitimate technical capability is no longer so clear. In addition, the West has many fewer resources to invest due to the global economic downturn. In this environment, full commitment of all countries that benefit from nuclear and biological advances will be required to assure the safety and security of all. Technical cooperation can continue to play an important role, but with some significant changes: First, challenges should be defined from a local perspective to ensure full commitment and participation. Second, the goal of cooperation should shift from preventing specific threats to building

  7. The future of nuclear weapons in Europe workshop summary

    International Nuclear Information System (INIS)

    A summary is presented of a workshop that addressed the future of nuclear weapons in Europe. The workshop topics included the evolving European security environment; the Soviet Union, Eastern Europe, and nuclear weapons; the United States, NATO, and nuclear weapons; and Western Europe and nuclear weapons. The workshop, held at Los Alamos July 26, 1991, was sponsored by the Center for National Security Studies of the Los Alamos National Laboratory

  8. Antibiotic and Antimicrobial Resistance: Threat Report 2013

    Science.gov (United States)

    ... this? Submit What's this? Submit Button Antibiotic Resistance Threats in the United States, 2013 Recommend on Facebook Tweet Share Compartir This report, Antibiotic resistance threats in the United States, 2013 gives a first- ...

  9. 10 CFR Appendix H to Part 73 - Weapons Qualification Criteria

    Science.gov (United States)

    2010-01-01

    ... Draw weapon and fire 2 rounds from prone position Shotgun 1 1 7 yards 2 Double 0 buck-shot 4 seconds At... position, then fire 2 rounds and reholster 2 15 yards 2 5 seconds Standing, draw weapon, move to kneeling...) Standing, draw weapon, fire 2 rounds, move to kneeling position and fire 2 rounds, reload and...

  10. Stereotype Threat and Survey Response Bias

    OpenAIRE

    King, Kenya Latonya

    2014-01-01

    Stereotype threat is the threat of confirming a negative stereotype about a group with which a person identifies. Researchers have found that stereotype threat can result in underperformance in multiple domains, shifts in social behavior, and shifts in assessed implicit attitudes, the likelihood of which increases as an individual's concern about the domain of interest increases. According to theory, this threat can be "alleviated",thereby diminishing or eliminating its impact. In this projec...

  11. The role of threats in animal cooperation

    OpenAIRE

    Cant, Michael A.

    2010-01-01

    In human societies, social behaviour is strongly influenced by threats of punishment, even though the threats themselves rarely need to be exercised. Recent experimental evidence suggests that similar hidden threats can promote cooperation and limit within-group selfishness in some animal systems. In other animals, however, threats appear to be ineffective. Here I review theoretical and empirical studies that help to understand the evolutionary causes of these contrasting patterns, and identi...

  12. Threats to an ecosystem service: pressures on pollinators

    OpenAIRE

    Vanbergen, Adam J. and the Insect Pollinators Initiative

    2013-01-01

    Insect pollinators of crops and wild plants are under threat globally and their decline or loss could have profound economic and environmental consequences. Here, we argue that multiple anthropogenic pressures – including land-use intensification, climate change, and the spread of alien species and diseases – are primarily responsible for insect-pollinator declines. We show that a complex interplay between pressures (eg lack of food sources, diseases, and pesticides) and biological processes ...

  13. Security of radioactive sources: Threats and answers

    International Nuclear Information System (INIS)

    The general issue of the security of radioactive sources is presented as a prime but constitutive element of radiation safety, focusing particularly on the perceived threats for the malevolent use of radioactive sources and on the possible answers to these threats. The paper discusses the source security threat and the possible international response, and presents an overall outlook for the future. (author)

  14. Stereotype Threat, Test Anxiety, and Mathematics Performance

    Science.gov (United States)

    Tempel, Tobias; Neumann, Roland

    2014-01-01

    We investigated the combined effects of stereotype threat and trait test anxiety on mathematics test performance. Stereotype threat and test anxiety interacted with each other in affecting performance. Trait test anxiety predicted performance only in a diagnostic condition that prevented stereotype threat by stereotype denial. A state measure of…

  15. 24 CFR 9.131 - Direct threat.

    Science.gov (United States)

    2010-04-01

    ... 24 Housing and Urban Development 1 2010-04-01 2010-04-01 false Direct threat. 9.131 Section 9.131... DEPARTMENT OF HOUSING AND URBAN DEVELOPMENT § 9.131 Direct threat. (a) This part does not require the agency..., privileges, advantages and accommodations of that agency when that individual poses a direct threat to...

  16. 76 FR 76935 - Impact of Implementing the Chemical Weapons Convention (CWC) on Commercial Activities Involving...

    Science.gov (United States)

    2011-12-09

    ... Bureau of Industry and Security Impact of Implementing the Chemical Weapons Convention (CWC) on... implementation of the Chemical Weapons Convention (CWC), through the Chemical Weapons Convention Implementation Act (CWCIA), and the Chemical Weapons Convention Regulations (CWCR), has had on commercial...

  17. Achieving competitive excellence in nuclear energy: The threat of proliferation; the challenge of inertial confinement fusion

    International Nuclear Information System (INIS)

    Nuclear energy will have an expanding role in meeting the twenty-first-century challenges of population and economic growth, energy demand, and global warming. These great challenges are non-linearly coupled and incompletely understood. In the complex global system, achieving competitive excellence for nuclear energy is a multi-dimensional challenge. The growth of nuclear energy will be driven by its margin of economic advantage, as well as by threats to energy security and by growing evidence of global warming. At the same time, the deployment of nuclear energy will be inhibited by concerns about nuclear weapons proliferation, nuclear waste and nuclear reactor safety. These drivers and inhibitors are coupled: for example, in the foreseeable future, proliferation in the Middle East may undermine energy security and increase demand for nuclear energy. The Department of Energy's nuclear weapons laboratories are addressing many of these challenges, including nuclear weapons builddown and nonproliferation, nuclear waste storage and burnup, reactor safety and fuel enrichment, global warming, and the long-range development of fusion energy. Today I will focus on two major program areas at the Lawrence Livermore National Laboratory (LLNL): the proliferation of nuclear weapons and the development of inertial confinement fusion (ICF) energy

  18. The CBRNE Threat Needs New Dedicated Analysers

    International Nuclear Information System (INIS)

    Introduction: After the 9-11 attack by terrorists several governments realized their vulnerability towards creative asymmetric attacks. Due to increasing complexity of our society we create more vulnerability towards terror attacks. More chemical substances than we realize can be misused to destabilize our modern society. Recently aircraft passengers were confronted with new regulations, which limit the amount of fluid, which a passenger can bring on board with hand luggage. How far should we go limiting the allowance to bring liquids and substances on board? It indicates that we need new analytic instruments for screening the safety of luggage in all types of transport. Study Design: An inventory was made of the present demand for safe transport and its vulnerability to terror attacks. Also the safety and safety awareness in public buildings, offices and industrial complexes was assessed. Knowing the demand for a certain safety level, an inventory was made to identify analytical equipment, which can be used to check passengers and luggage on possible threats. The same can be used for protecting public areas, offices and industrial complexes. Results And Discussion: It is amazing how some governments, financially driven, underestimate the consequences of CBRNE incidences and disasters. Both threats due to release of dangerous substances just by accident and deliberate abuse of chemicals and/or biologicals by terror organizations is underestimated. Financial rationales are often the cause that the preparedness is less that technically could be possible. Still some commercial companies realize the importance of safety and preparedness towards terror attacks and take their precautions. Several detection systems are now under development and a new market of safety devices comes into existence. Conclusion: Key question is how far we would like to go with defending us with technical devices against potential terror attacks. Also the design of buildings, transport

  19. Pass Em’ Right: Assessing the Threat of WMD Terrorism from America’s Christian Patriots

    Directory of Open Access Journals (Sweden)

    Paul D. Brister

    2011-05-01

    Full Text Available Within the field of terrorism studies, great effort has been devoted to the topic of weapons of mass destruction (WMD and their potential usage in the hands of terrorist organisations. This article deepens the discussion of WMD terrorism by focusing upon an oft-overlooked movement that resides within American borders. The Christian Patriot Movement – which rightfully claims the likes of Timothy McVeigh – is a phenomenon that has gone largely unnoticed as American counterterrorism efforts focus largely upon Islamist terrorist organizations. Here we aim to bring the Patriots back into discussions of terrorist threats by assessing their potential to use WMD. We conclude that, although the Patriots have demonstrated intent to employ such weapons, they lack the overall capability to design, acquire, or employ a WMD of significant lethality. We end by looking at the pathways which the Patriots are currently exploring to narrow the divide between intent and capability.       

  20. Analysis and studies on the threats to the composite material from laser

    Science.gov (United States)

    Xu, Wei; Yao, Weixing; Wang, Liwei; Wang, Guoliang; Xie, Fang

    2015-10-01

    It is always an attracting research field for the interaction between laser and matters. The interaction between laser and matters is used not only in the natural science, but also in practical application, for example, laser machine, laser weapon, laser ablations and so on. In this paper, we will give the model for the damage effect of the composite materials caused by the superpower laser weapons. Mechanism of the laser damage on the composite materials have been researched and modeled by the numerical analysis methods. Through the designed model, we analyzed the temperature and the stress fields of the composite material after the superpower lasers attacks with different power densities. By analyzing these modeling results, we achieved some conclusions on the threats to the composite materials from the superpower lasers. From the results, we have obtained the Irradiated threshold from the Laser. This paper will provide the theoretical foundations for the anti-laser design of the composite materials.

  1. Emergency management of chemical weapons injuries.

    Science.gov (United States)

    Anderson, Peter D

    2012-02-01

    The potential for chemical weapons to be used in terrorism is a real possibility. Classes of chemical weapons include nerve agents, vesicants (blister agents), choking agents, incapacitating agents, riot control agents, blood agents, and toxic industrial chemicals. The nerve agents work by blocking the actions of acetylcholinesterase leading to a cholinergic syndrome. Nerve agents include sarin, tabun, VX, cyclosarin, and soman. The vesicants include sulfur mustard and lewisite. The vesicants produce blisters and also damage the upper airways. Choking agents include phosgene and chlorine gas. Choking agents cause pulmonary edema. Incapacitating agents include fentanyl and its derivatives and adamsite. Riot control agents include Mace and pepper spray. Blood agents include cyanide. The mechanism of toxicity for cyanide is blocking oxidative phosphorylation. Toxic industrial chemicals include agents such as formaldehyde, hydrofluoric acid, and ammonia. PMID:22080590

  2. Is there any future for nuclear weapons?

    International Nuclear Information System (INIS)

    Nuclear weapons occupy a paradoxal place both in the collective imagination and in the historical reality: on the one hand everybody dreads the apocalypse horror, and on the other hand, dissuasion appears as an unchanging and quite comfortable situation. However, the world has become multipolar in this domain as well. The geopolitical map is reconstructing. Doctrinal revisions, initiatives against nuclear weapons proliferation, and nuclear disarmament measures are now on the agenda. The best foreign and French experts examine for the first time the consequences of these evolutions. They analyse in particular the split up risks and the potential consequences of a nuclear conflict in regions where atomic arms have become a key-component of the strategic landscape: Middle-Est, Far-East, Southern Asia. The choices France and its allies will have to face are examined as well. (J.S.)

  3. Making Weapons for the Terracotta Army

    Directory of Open Access Journals (Sweden)

    Marcos Martinón-Torres

    2011-10-01

    Full Text Available The Terracotta Army of the First Emperor of China is one of the most emblematic archaeological sites in the world. Many questions remain about the logistics of technology, standardisation and labour organisation behind the creation of such a colossal construction in just a few decades over 2,000 years ago. An ongoing research project co-ordinated between the UCL Institute of Archaeology and the Emperor Qin Shihang's Terracotta Army Museum is beginning to address some of these questions. This paper outlines some results of the typological, metric, microscopic, chemical and spatial analyses of the 40,000 bronze weapons recovered with the Terracotta Warriors. Thanks to a holistic approach developed specifically for this project, it is possible to reveal remarkable aspects of the organisation of the Qin workforce in production cells, of the standardisation, efficiency and quality-control procedures employed, and of the sophisticated technical knowledge of the weapon-makers.

  4. Weapon Target Assignment with Combinatorial Optimization Techniques

    Directory of Open Access Journals (Sweden)

    Asim Tokgöz

    2013-07-01

    Full Text Available Weapon Target Assignment (WTA is the assignment of friendly weapons to the hostile targets in order to protect friendly assets or destroy the hostile targets and considered as a NP-complete problem. Thus, it is very hard to solve it for real time or near-real time operational needs. In this study, genetic algorithm (GA, tabu search (TS, simulated annealing (SA and Variable Neighborhood Search (VNS combinatorial optimization techniques are applied to the WTA problem and their results are compared with each other and also with the optimized GAMS solutions. Algorithms are tested on the large scale problem instances. It is found that all the algorithms effectively converge to the near global optimum point(s (a good quality and the efficiency of the solutions (speed of solution might be improved according to the operational needs. VNS and SA solution qualities are better than both GA and TS.

  5. Manhattan project II: Abolishing nuclear weapons

    International Nuclear Information System (INIS)

    Most people seem to think that the era of nuclear danger is over, that it ended along with the Cold War. Whatever residual problems remain in terms of proliferation or possible terrorism, they believe, are being dealt urgently and adequately by their national leaders. Unfortunately, they are wrong on both counts. Although the risk of nuclear war between the NATO and former Warsaw Pact powers has virtually vanished, the chance that some nuclear weapons will kill many people, may be higher than before. The elimination of nuclear weapons, meaning rejection of terrorism, must be accomplished by multilateral collaboration. To recover fundamental moral bearings, as well as to preserve life and civilization, the USA, Russia, Great Britain, France, China, India and Pakistan must cease to be terrorist states

  6. Weapon plutonium in accelerator driven power system

    International Nuclear Information System (INIS)

    The purpose and problems of the research - creation of a safe and reliable ADS for processing of about 25 tons of weapons plutonium in 30 years on the basis of a proton-accelerator with energies 0.8-1.2 GeV and a current of 10-30 mA; liquid Pb/Bi eutectic targets; one-directionally coupled fast/thermal blanket with plutonium fuel. The approach to weapons-Pu utilization is based on the understanding of the unconditional priority of safety features of ADS over economic considerations and, accordingly, on the priority of subcritical systems over critical. The description of a variant of ADS from the point of view of possibilities of its realization in an acceptable period of time on the base of approbated technologies is presented here. 7 refs., 4 figs., 1 tab

  7. #TheWeaponizationOfSocialMedia

    DEFF Research Database (Denmark)

    Nissen, Thomas Elkjer

    In today’s conflict environment, transformed by information technology and of who can communicate and how, states, non-state actors, ad hoc activist networks and individuals create effect(s) in and through social network media in support of their objectives. #TheWeaponizationOfSocialMedia develops...... a framework for understanding how social network media shapes global politics and contemporary conflicts by examining their role as a platform for conduction intelligence collection, targeting, cyber-operations, psychological warfare and command and control activities. Through these, the...... weaponization of social media shows both the possibilities and the limitations of social network media in contemporary conflicts and makes a contribution to theorizing and studying contemporary conflicts....

  8. Factors influencing the proliferation of nuclear weapons

    International Nuclear Information System (INIS)

    Although predicting that there will be more nuclear weapons in the future is safe enough, predicting how many more countries over what period of time, which ones under what circumstances, and how much more of what kind of nuclear-weapons capability for each is more difficult. Predicting what effect more will have is a related question that is even more difficult. This chapter identifies some of the factors that will determine the answers: including the supply policies of nuclear-exporting counties, the international nuclear-fuel cycle, superpower security policies, the health of the non-proliferation regime, cataclysmic events and international reaction, and preventive and preemptive strikes. The author concludes that more proliferation will only be better if we accept the greater probability of catastrophic wars in exchange for less frequent conventional conflicts, but he tempers this with the observation that the policies of governments can influence the course of proliferation

  9. Weapons test seismic investigations at Yucca Mountain

    International Nuclear Information System (INIS)

    Yucca Mountain, located on and adjacent to the Nevada Test Site, is being characterized as part of an ongoing effort to identify a potential high-level nuclear waste repository. This site will be subjected to seismic ground motions induced by underground nuclear explosions. A knowledge of expected ground motion levels from these tests will enable the designers to provide for the necessary structural support in the designs of the various components of the repository. The primary objective of the Weapons Test Seismic Investigation project is to develop a method to predict the ground motions expected at the repository site as a result of future weapons tests. This paper summarizes the data base presently assembled for the Yucca Mountain Project, characteristics of expected ground motions, and characterization of the two-dimensional seismic properties along paths between Yucca Mountain and the testing areas of the Nevada Test Site

  10. Storage of weapons-grade plutonium

    International Nuclear Information System (INIS)

    With the end of the cold war, the United States has started to reduce its nuclear weapons stockpiles and will place special nuclear material (plutonium and uranium) into storage. The existing plutonium storage facilities are designed for short-term storage or to support operation of adjacent processing facilities. The U.S. Department of Energy (DOE) is proposing to construct and operate a new plutonium storage facility as part of the reconfigured weapons complex, called Complex-21, to provide safe and secure long-term storage of plutonium materials. This facility will be required to meet new, more stringent requirements such as potential third-party inspection, enhanced safeguard and security requirements, and reduced personnel radiation exposure limits

  11. Stereotype threat prevents perceptual learning

    OpenAIRE

    Rydell, Robert J.; Shiffrin, Richard M.; Boucher, Kathryn L.; Van Loo, Katie; Rydell, Michael T.

    2010-01-01

    Stereotype threat (ST) refers to a situation in which a member of a group fears that her or his performance will validate an existing negative performance stereotype, causing a decrease in performance. For example, reminding women of the stereotype “women are bad at math” causes them to perform more poorly on math questions from the SAT and GRE. Performance deficits can be of several types and be produced by several mechanisms. We show that ST prevents perceptual learning, defined in our task...

  12. New Threat to World Economy

    Institute of Scientific and Technical Information of China (English)

    2007-01-01

    The aggregate amount of money and credit in the global economy has risen sharply over the past 30 years,with its growth rate and stock far exceeding that of the real economy or real assets of the world.This is the view of Xiang Songzuo,professor at the Huazhong University of Science and Technology,whose opinion was first published in a recent article in China Business News.Xiang said this situation is a real threat to the world economy.Excerpts of his article are reprinted below:

  13. Symbian `vulnerability' and Mobile Threats

    CERN Document Server

    Gharibi, Wajeb

    2012-01-01

    Modern technologies are becoming ever more integrated with each other. Mobile phones are becoming increasing intelligent, and handsets are growing ever more like computers in functionality. We are entering a new era - the age of smart houses, global advanced networks which encompass a wide range of devices, all of them exchanging data with each other. Such trends clearly open new horizons to malicious users, and the potential threats are self evident. In this paper, we study and discuss one of the most famous mobile operating systems 'Symbian'; its vulnerabilities and recommended protection technologies.

  14. Wireless LAN Security Threats & Vulnerabilities

    Directory of Open Access Journals (Sweden)

    Md. Waliullah

    2014-01-01

    Full Text Available Wireless LANs are everywhere these days from home to large enterprise corporate networks due to the ease of installation, employee convenience, avoiding wiring cost and constant mobility support. However, the greater availability of wireless LANs means increased danger from attacks and increased challenges to an organisation, IT staff and IT security professionals. This paper discusses the various security issues and vulnerabilities related to the IEEE 802.11 Wireless LAN encryption standard and common threats/attacks pertaining to the home and enterprise Wireless LAN system and provide overall guidelines and recommendation to the home users and organizations.

  15. Nuclear energy and nuclear weapons proliferation

    International Nuclear Information System (INIS)

    A summary of the report dispatched in the middle of 1978 by the Atlantic Council of United States, organized by North American citizens, is presented. The report considers the relation between the production of nucleoelectric energy and the capacity of proliferation of nuclear weapons. The factors which affect the grade of proliferation risk represented by the use of nuclear energy in the world comparing this risk with the proliferation risks independently of nuclear energy, are examined. (M.C.K.)

  16. Polonium-210 as Weapon for Mass Destruction

    International Nuclear Information System (INIS)

    Properties of Po-210 make it possible for its use as weapon of mass destruction. Po-210 occurs naturally in minute quantities in the human body, in Uranium ore (< 0.1 mg Po-210 / ton ) and as a product of Radon-222 gas decay chain. Po-210 also occurs as deposition on vegetation (tobacco leaves). Po-210 is produced by bombardment of Bi-209 with neutrons in a nuclear reactor. Russia produces 8 grams per year for export to USA market

  17. A Proposed Taxonomy of Software Weapons

    OpenAIRE

    Karresand, Martin

    2002-01-01

    The terms and classification schemes used in the computer security field today are not standardised. Thus the field is hard to take in, there is a risk of misunderstandings, and there is a risk that the scientific work is being hampered. Therefore this report presents a proposal for a taxonomy of software based IT weapons. After an account of the theories governing the formation of a taxonomy, and a presentation of the requisites, seven taxonomies from different parts of the computer securit...

  18. Nuclear weapons and NATO-Russia relations

    Energy Technology Data Exchange (ETDEWEB)

    Cornwell, G.C.

    1998-12-01

    Despite the development of positive institutional arrangements such as Russian participation in the NATO-led peacekeeping force in Bosnia and the NATO- Russia Permanent Joint Council, the strategic culture of Russia has not changed in any fundamental sense. Russian strategic culture has not evolved in ways that would make Russian policies compatible with those of NATO countries in the necessary economic, social, technological, and military spheres. On the domestic side, Russia has yet to establish a stable democracy and the necessary legal, judicial, and regulatory institutions for a free-market economy. Russia evidently lacks the necessary cultural traditions, including concepts of accountability and transparency, to make these adaptations in the short-term. Owing in part to its institutional shortcomings, severe socioeconomic setbacks have afflicted Russia. Russian conventional military strength has been weakened, and a concomitant reliance by the Russians on nuclear weapons as their ultimate line of defense has increased. The breakdown in the infrastructure that supports Russian early warning and surveillance systems and nuclear weapons stewardship defense, coupled with a tendency towards has exacerbated Russian anxiety and distrust toward NATO. Russia`s reliance on nuclear weapons as the ultimate line of defense, coupled with a tendency toward suspicion and distrust toward NATO, could lead to dangerous strategic miscalculation and nuclear catastrophe.

  19. Non-proliferation of nuclear weapons

    International Nuclear Information System (INIS)

    During the turbulant transitional events in world politics in the nineties, the control of nuclear weapons plays a major role. While the superpowers are reducing their nuclear arsenal, the danger of nuclear anarchy in the world remains virulent. The NPT of 1968 is up for review soon. The falling apart of the former communist sphere of power, and the regions of conflict in the Third World present new risks for the proliferation of nuclear arms. For unified Germany, which explicitly renounced nuclear weapons, this situation presents difficult questions concerning national safety policies and international responsibility. This volume presents contributions which take a new look at topical and long-term problems of nuclear NP politics. The authors evaluate the conditions under which the NP regime came into being, and assess short- and long-term possibilities and risks. The following papers are included: 1.) Basic controversies during the negotiations concerning the Treaty on non-proliferation of nuclear weapons (Ungerer); 2.) Prologation of the NPT 1995 and appropriate problems concerning safety and control (Haefele/Lauppe); 3.) Consequences of the Iraq case for NP policy (Ficher); 4.) Problems of nuclear technology control (Mueller); 5.) Framework conditions of a nuclear world system (Haeckel). (orig./HP)

  20. The Chemical Weapons Convention -- Legal issues

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1997-08-01

    The Chemical Weapons Convention (CWC) offers a unique challenge to the US system of constitutional law. Its promise of eliminating what is the most purely genocidal type of weapon from the world`s arsenals as well as of destroying the facilities for producing these weapons, brings with it a set of novel legal issues. The reservations about the CWC expressed by US business people are rooted in concern about safeguarding confidential business information and protecting the constitutional right to privacy. The chief worry is that international verification inspectors will misuse their power to enter commercial property and that trade secrets or other private information will be compromised as a result. It has been charged that the Convention is probably unconstitutional. The author categorically disagrees with that view and is aware of no scholarly writing that supports it. The purpose of this presentation is to show that CWC verification activities can be implemented in the US consistently with the traditional constitutional regard for commercial and individual privacy. First, he very briefly reviews the types of verification inspections that the CWC permits, as well as some of its specific privacy protections. Second, he explains how the Fourth Amendment right to privacy works in the context of CWC verification inspections. Finally, he reviews how verification inspections can be integrated into these constitutional requirements in the SU through a federal implementing statute.

  1. Western Option - Disarmament of Russian Weapon Plutonium

    International Nuclear Information System (INIS)

    The Western Option concept describes an approach to the conversion of weapon-grade plutonium from Russian nuclear warheads under the special aspects of meeting the criteria of irreversible utilization. Putting this concept of plutonium conversion into non-weapon-grade material into effect would make a major contribution to improving security worldwide. This study is based on an agreement between the Russian Federation and the United States of America concluded in September 2000. It provides for the conversion of 34 t of weapon-grade plutonium in each of the two states. This goal is also supported by other G8 countries. While the United States performs its part of the agreement under its sole national responsibility, the Russian program needs financial support by Western states. Expert groups have pointed out several options as a so-called basic scenario. The funds of approx. US Dollar 2 billion required to put them into effect have not so far been raised. The Western Option approach described in this contribution combines results of the basic scenario with other existing experience and with technical solutions available for plutonium conversion. One of the attractions of the Western Option lies in its financial advantages, which are estimated to amount to approx. US Dollar 1 billion. (orig.)

  2. The German Debate on Tactical Nuclear Weapons

    International Nuclear Information System (INIS)

    This report analyses the debate in Germany about tactical nuclear weapons deployments in Europe. It is mainly based on interviews conducted with senior officials from the German Federal Foreign Ministry, the Federal Ministry of Defence, senior members of Parliament as well as experts from research institutes and think-tanks. The interviews focused on the more recent past in the German debate as well as the future of tactical nuclear weapon deployments in Germany and Europe. The report concludes that while a change of Germany's position on tactical nuclear weapons is unlikely to change in the short-term, several developments will make it unlikely that the continued involvement of Germany in NATO nuclear sharing will have to be debated in the medium term. Should the next Parliamentary elections, which will take place in 2009 at the latest, result in a Social Democrat-led government, a push for a reduction of Germany's involvement in NATO nuclear sharing appears possible. A conservative-led government is likely to maintain the nuclear status quo within NATO

  3. Nuclear weapons and the World Court ruling

    International Nuclear Information System (INIS)

    based on the initiatives by non-governmental organizations, the World Health Organisation (WHO) Assembly asked the International Court of Justice for an advisory opinion in 1993 whether, considering the environmental and health consequences, the use of nuclear weapons by a state in war or other armed conflict would be a breach of its obligations under international law. The World Court decided that it was not able to give an advisory opinion as requested, because of the fact that questions of use of force and such like were beyond the scope of specialized agencies like the WHO. The Court has ruled that the international community, especially the five nuclear weapon states have not only an obligation to negotiate a treaty for total nuclear disarmament, but also have an obligation to conclude such treaty. We may expect that the nuclear weapon states will cynically disregard the ruling of the World Court as they have been doing to the basic obligation itself in pursuit of nuclear hegemony. But the remaining 150 countries or so also bear a responsibility to keep nudging the recalcitrant states into implementing their commitments to disarm

  4. The threat of illicit trafficking

    International Nuclear Information System (INIS)

    Intelligence services, the army, the navy, the air force and the police together work to avoid illicit trafficking around the world by taking actions as follows: examining the risks and threats of illicit trafficking of radioactive material by terrorists or criminals; gaining a better understanding of current and future patterns and trends in the illicit trafficking of radioactive material; determining progress on efforts to establish detection capabilities at borders and to exchange information on developments in detection technology and response methodologies through installation of radiation detection equipment; strengthening existing networks and cooperation for sharing information on illicit trafficking reports on incidents involving smuggling, theft, loss and illegal disposal, illegal possession and transfer, and attempted illegal sales of the material; examining how an enhanced export/import regime can assist in combating illicit trafficking control through unauthorized movement of radioactive material; sharing information on activities intended to implement international obligations, recommendations and guidance relevant to nuclear security; suggest actions by which the international effort, through the IAEA, would be strengthened. This paper examines the threat and context of illicit nuclear trafficking of radioactive material, what is being done to combat such trafficking and highlights where more needs to be done

  5. Threat sensitivity in bipolar disorder.

    Science.gov (United States)

    Muhtadie, Luma; Johnson, Sheri L

    2015-02-01

    Life stress is a major predictor of the course of bipolar disorder. Few studies have used laboratory paradigms to examine stress reactivity in bipolar disorder, and none have assessed autonomic reactivity to laboratory stressors. In the present investigation we sought to address this gap in the literature. Participants, 27 diagnosed with bipolar I disorder and 24 controls with no history of mood disorder, were asked to complete a complex working memory task presented as "a test of general intelligence." Self-reported emotions were assessed at baseline and after participants were given task instructions; autonomic physiology was assessed at baseline and continuously during the stressor task. Compared to controls, individuals with bipolar disorder reported greater increases in pretask anxiety from baseline and showed greater cardiovascular threat reactivity during the task. Group differences in cardiovascular threat reactivity were significantly correlated with comorbid anxiety in the bipolar group. Our results suggest that a multimethod approach to assessing stress reactivity-including the use of physiological parameters that differentiate between maladaptive and adaptive profiles of stress responding-can yield valuable information regarding stress sensitivity and its associations with negative affectivity in bipolar disorder. (PsycINFO Database Record (c) 2015 APA, all rights reserved). PMID:25688436

  6. Measures to implement the Chemical Weapons Convention

    Energy Technology Data Exchange (ETDEWEB)

    Tanzman, E.; Kellman, B.

    1999-11-05

    This seminar is another excellent opportunity for those involved in preventing chemical weapons production and use to learn from each other about how the Chemical Weapons Convention (CWC) can become a foundation of arms control in Africa and around the world. The author is grateful to the staff of the Organization for the Prohibition of Chemical Weapons (OPCW) for inviting him to address this distinguished seminar. The views expressed in this paper are those of the authors alone, and do not represent the position of the government of the US nor or of any other institution. In 1993, as the process of CWC ratification was beginning, concerns arose that the complexity of integrating the treaty with national law would cause each nation to implement the Convention without regard to what other nations were doing, thereby causing inconsistencies among States Parties in how the Convention would be carried out. As a result the Manual for National Implementation of the Chemical Weapons Convention was prepared and presented it to each national delegation at the December 1993 meeting of the Preparatory Commission in The Hague. During its preparation, the Manual was reviewed by the Committee of Legal Experts on National Implementation of the Chemical Weapons Convention, a group of distinguished international jurists, law professors, legally-trained diplomats, government officials, and Parliamentarians from every region of the world, including Mica. In February 1998, the second edition of the Manual was published in order to update it in light of developments since the CWC entered into force on 29 April 1997. The second edition 1998 clarified the national implementation options to reflect post-entry-into-force thinking, added extensive references to national implementing measures that had been enacted by various States Parties, and included a prototype national implementing statute developed by the authors to provide a starting point for those whose national implementing

  7. Measures to implement the Chemical Weapons Convention

    International Nuclear Information System (INIS)

    This seminar is another excellent opportunity for those involved in preventing chemical weapons production and use to learn from each other about how the Chemical Weapons Convention (CWC) can become a foundation of arms control in Africa and around the world. The author is grateful to the staff of the Organization for the Prohibition of Chemical Weapons (OPCW) for inviting him to address this distinguished seminar. The views expressed in this paper are those of the authors alone, and do not represent the position of the government of the US nor or of any other institution. In 1993, as the process of CWC ratification was beginning, concerns arose that the complexity of integrating the treaty with national law would cause each nation to implement the Convention without regard to what other nations were doing, thereby causing inconsistencies among States Parties in how the Convention would be carried out. As a result the Manual for National Implementation of the Chemical Weapons Convention was prepared and presented it to each national delegation at the December 1993 meeting of the Preparatory Commission in The Hague. During its preparation, the Manual was reviewed by the Committee of Legal Experts on National Implementation of the Chemical Weapons Convention, a group of distinguished international jurists, law professors, legally-trained diplomats, government officials, and Parliamentarians from every region of the world, including Mica. In February 1998, the second edition of the Manual was published in order to update it in light of developments since the CWC entered into force on 29 April 1997. The second edition 1998 clarified the national implementation options to reflect post-entry-into-force thinking, added extensive references to national implementing measures that had been enacted by various States Parties, and included a prototype national implementing statute developed by the authors to provide a starting point for those whose national implementing

  8. From the nuclear stalemate to a nuclear-weapon free world. In memory of Klaus Fuchs

    International Nuclear Information System (INIS)

    The following topics were dealt with: The first soviet atomic bomb and Klaus Fuchs, in illusory worlds of Andrei Sakharov, Edward Teller, and Klaus Fuchs, Klaus Fuchs as grandfather of the hydrogen bomb, memories of and thinking about Klaus Fuchs, the Scottish years of Klaus Fuchs 1937-1941, Klaus Fuchs in the mirror of the Venona documents, Gernot Zippe and the ultracentrifuge or east-west technology transfer in the cold war, secret impulses for the soviet nuclear project, responsibility of knowledge with anti-facism, philosophy, and science as well as peace as the first human right in the work of Klaus Fuchs, the request of Klaus Fuchs for a lasting peace, Klaus Fuchs in Daniel Granin's roman ''Escape to Russia'', ways to a nuclear-weapon free world, Otto Hahn and the declarations of Mainau and Goettingen, nuclear winter, initiatives of the GDR for the prohibition of weapons of mass destruction, nuclear weapons in negative entropy, militarism and antimilitarism of the nuclear age, contributions of the young Klaus Fuchs to statistical physics, nuclear disarmament and the peaceful use of nuclear energy, the responsibility of the scientists for a socially effective and efficient energy change, Berlin-Bucher contributions to a world free of biological weapons. (HSI)

  9. Agroterrorism, Biological Crimes, and Biological Warfare Targeting Animal Agriculture

    Energy Technology Data Exchange (ETDEWEB)

    Wilson, Terry M.; Logan-Henfrey, Linda; Weller, Richard E.; Kellman, Brian

    2000-04-12

    There is a rising level of concern that agriculture might be targeted for economic sabotage by terrorists. Knowledge gathered about the Soviet Union biological weapons program and Iraq following the Gulf War, confirmed that animals and agricultural crops were targets of bioweapon development. These revelations are particularly disturbing in light of the fact that both countries are States Parties to the Biological and Toxin Weapons Convention that entered into force in 1975. The potential for misusing biotechnology to create more virulent pathogens and the lack of international means to detect unethical uses of new technologies to create destructive bioweapons is of increasing concern. Disease outbreaks, whether naturally occurring or intentionally, involving agricultural pathogens that destroy livestock and crops would have a profound impact on a country's infrastructure, economy and export markets. This chapter deals with the history of agroterrorism, biological crimes and biological warfare directed toward animal agriculture, specifically, horses, cattle, swine, sheep, goats, and poultry.

  10. Stereotype threat and executive functions: which functions mediate different threat-related outcomes?

    Science.gov (United States)

    Rydell, Robert J; Van Loo, Katie J; Boucher, Kathryn L

    2014-03-01

    Stereotype threat research shows that women's math performance can be reduced by activating gender-based math stereotypes. Models of stereotype threat assert that threat reduces cognitive functioning, thereby accounting for its negative effects. This work provides a more detailed understanding of the cognitive processes through which stereotype threat leads women to underperform at math and to take risks, by examining which basic executive functions (inhibition, shifting, and updating) account for these outcomes. In Experiments 1 and 2, women under threat showed reduced inhibition, reduced updating, and reduced math performance compared with women in a control condition (or men); however, only updating accounted for women's poor math performance under threat. In Experiment 3, only updating accounted for stereotype threat's effect on women's math performance, whereas only inhibition accounted for the effect of threat on risk-taking, suggesting that distinct executive functions can account for different stereotype threat-related outcomes. PMID:24345711

  11. Why are sexually selected weapons almost absent in females?

    Institute of Scientific and Technical Information of China (English)

    Anders BERGLUND

    2013-01-01

    In sex role reversed species,predominantly females evolve sexually selected traits,such as ornaments and/or weapons.Female ornaments are common and their function well documented in many species,whether sex role reversed or not.However,sexually selected female weapons seem totally absent except for small wing spurs in three jacana species,present in both males and females.This poor female weaponry is in sharp contrast to the situation in species with conventional sex roles:males commonly have evolved sexually selected weapons as well as ornaments.At the same time,females in many taxa have naturally selected weapons,used in competition over resources or in predator defence.Why are sexually selected weapons then so rare,almost absent,in females? Here I briefly review weaponry in females and the function of these weapons,conclude that the near absence of sexually selected weapons begs an explanation,and suggest that costs of sexually selected weapons may exceed costs of ornaments.Females are more constrained when evolving sexually selected traits compared to males,at least compared to those males that do not provide direct benefits,as trait costs reduce a female's fecundity.I suggest that this constraining trade-off between trait and fecundity restricts females to evolve ornaments but rarely weapons.The same may apply to paternally investing males.Whether sexually selected weapons actually are more costly than sexually selected ornaments remains to be investigated.

  12. Enhanced Memory for both Threat and Neutral Information Under Conditions of Intergroup Threat

    Directory of Open Access Journals (Sweden)

    Yong eZhu

    2015-11-01

    Full Text Available Few studies have examined the effect of intergroup threat on cognitive outcomes such as memory. Different theoretical perspectives can inform how intergroup threat should affect memory for threat-relevant and neutral information, such as the mood-congruency approach, Yerkes-Dodson law, Easterbrook’s theory, and also evolutionary perspectives. To test among these, we conducted two experiments to examine how exposure to intergroup threats affected memory compared to control conditions. In study 1, we manipulated symbolic threat and examined participants’ memory for threat and neutral words. In study 2, memory performance was assessed following the induction of realistic threat. Across the studies, in the control condition participants showed better memory for threat-related than neutral information. However, participants under threat remembered neutral information as well as threat-related information. In addition, participants in the threat condition remembered threat-related information as well as participants in the control condition. The findings are discussed in terms of automatic vigilance processes but also the effects of threat on arousal and its effect on information processing. This latter perspective, suggests paradoxically, that under some circumstances involving an outgroup threat, non-threatening information about outgroups can be extensively processed.

  13. Enhanced Memory for both Threat and Neutral Information Under Conditions of Intergroup Threat.

    Science.gov (United States)

    Zhu, Yong; Zhao, Yufang; Ybarra, Oscar; Stephan, Walter G; Yang, Qing

    2015-01-01

    Few studies have examined the effect of intergroup threat on cognitive outcomes such as memory. Different theoretical perspectives can inform how intergroup threat should affect memory for threat-relevant and neutral information, such as the mood-congruency approach, Yerkes-Dodson law, Easterbrook's theory, and also evolutionary perspectives. To test among these, we conducted two experiments to examine how exposure to intergroup threats affected memory compared to control conditions. In study 1, we manipulated symbolic threat and examined participants' memory for threat and neutral words. In study 2, memory performance was assessed following the induction of realistic threat. Across the studies, in the control condition participants showed better memory for threat-related than neutral information. However, participants under threat remembered neutral information as well as threat-related information. In addition, participants in the threat condition remembered threat-related information as well as participants in the control condition. The findings are discussed in terms of automatic vigilance processes but also the effects of threat on arousal and its effect on information processing. This latter perspective, suggests paradoxically, that under some circumstances involving an outgroup threat, non-threatening information about outgroups can be extensively processed. PMID:26635669

  14. Weapons of Mass Destruction Technology Evaluation and Training Range

    Energy Technology Data Exchange (ETDEWEB)

    Kevin Larry Young

    2009-05-01

    The Idaho National Laboratory (INL) has a long history for providing technology evaluation and training for military and other federal level Weapons of Mass Destruction (WMD) response agencies. Currently there are many federal organizations and commercial companies developing technologies related to detecting, assessing, mitigating and protecting against hazards associated with a WMD event. Unfortunately, very few locations exist within the United States where WMD response technologies are realistically field tested and evaluated using real chemical, biological, radiological, nuclear and explosive materials. This is particularly true with biological and radiological hazards. Related to this lack of adequate WMD, multi-hazard technology testing capability is the shortage of locations where WMD response teams can train using actual chemical, biological, and radiological material or highly realistic simulates. In response to these technology evaluation and training needs, the INL has assembled a consortium of subject matter experts from existing programs and identified dedicated resources for the purpose of establishing an all-hazards, WMD technology evaluation and training range. The author describes the challenges associated with creating the all-hazards WMD technology evaluation and training range and lists the technical, logistical and financial benefits of an all-hazards technology evaluation and training range. Current resources and capabilities for conducting all-hazard technology evaluation and training at the INL are identified. Existing technology evaluation and training programs at the INL related to radiological, biological and chemical hazards are highlighted, including successes and lessons learned. Finally, remaining gaps in WMD technology evaluation and training capabilities are identified along with recommendations for closing those gaps.

  15. Autonomous bio-chemical decontaminator (ABCD) against weapons of mass destruction

    Science.gov (United States)

    Hyacinthe, Berg P.

    2006-05-01

    The proliferation of weapons of mass destruction (WMD) and the use of such elements pose an eminent asymmetric threat with disastrous consequences to the national security of any nation. In particular, the use of biochemical warfare agents against civilians and unprotected troops in international conflicts or by terrorists against civilians is considered as a very peculiar threat. Accordingly, taking a quarantine-before-inhalation approach to biochemical warfare, the author introduces the notion of autonomous biochemical decontamination against WMD. In the unfortunate event of a biochemical attack, the apparatus proposed herein is intended to automatically detect, identify, and more importantly neutralize a biochemical threat. Along with warnings concerning a cyber-WMD nexus, various sections cover discussions on human senses and computer sensors, corroborating evidence related to detection and neutralization of chemical toxins, and cyber-assisted olfaction in stand alone, peer-to-peer, and network settings. In essence, the apparatus can be used in aviation and mass transit security to initiate mass decontamination by dispersing a decontaminant aerosol or to protect the public water supply against a potential bioterrorist attack. Future effort may involve a system-on-chip (SoC) embodiment of this apparatus that allows a safer environment for the emerging phenomenon of cyber-assisted olfaction and morph cell phones into ubiquitous sensors/decontaminators. Although this paper covers mechanisms and protocols to avail a neutralizing substance, further research will need to explore the substance's various pharmacological profiles and potential side effects.

  16. Antigovernment Groups. A Growing Threat to US Security

    Energy Technology Data Exchange (ETDEWEB)

    Swift, Alicia L. [Los Alamos National Laboratory

    2016-04-25

    Domestic terrorism is a growing threat in the United States, particularly from the 998 right-wing antigovernment (AG) groups in existence in 2015. In the years since the September 11, 2001 attacks in New York City, right-wing anti-government acts have oc- curred more often and killed more people in the United States than Muslim extremists. Such AG group members are often in uenced by racist, anti-Semitic, or anti-Islamic views, believe conspiracy theories about the government, and often refuse to pay taxes or participate in frivolous lawsuits in order to intentionally waste the government's time. There is, however, a violent element to these groups which participates in events ranging from the armed take-over of federal land in Oregon, to an armed stand-o with federal agents in Nevada, to the bombing of the Oklahoma City building which killed 168 people. Such acts may be conducted by a few individuals, as is the case of the Oklahoma City bombing, or an entire group. Such groups have a wide range of capabilities, with typical weapons including legal and illegal rearms, with a focus on purchasing fully automatic weapons; hand grenades, with some homemade; deadly tox- ins, like ricin (in multiple cases) and sodium cyanide (in one case); transportation, such as all-terrain vehicles (ATVs); arson, with the intent of destroying federal property; and explosives, often in large numbers and including pipe bombs, truck bombs, IEDs, and other homemade explosives. The growing acceptance of these violent methods by Republican congressmen and governors, however, only increases visibility of such groups and encourages their behavior. Coupled with the removal of the Department of Homeland Security's division responsible for monitoring such groups, the result could prove disastrous for the safety of United States citizens.

  17. Real threat of nuclear smuggling

    International Nuclear Information System (INIS)

    Trade in uranium and plutonium during the past five years has given smuggling unprecedented relevance to international security. Yet there is considerable controversy over the threat nuclear smuggling poses. Even though serious efforts are being made to attack the problem at the source, the international community has been slow to respond to the dangers that nuclear smuggling presents. We suggest that systematic multinational measures be taken as soon as possible to inhibit theft at the source, to disrupt trafficking and to deter buyers. The U.S., Germany, Russia and other nations with an interest in the nuclear problem should set up a 'flying squad' with an investigative arm, facilities for counter terrorist and counter extortion actions and a disaster management team. This paper discusses these issues. 3 refs

  18. World's soils are under threat

    Science.gov (United States)

    Montanarella, Luca; Pennock, Daniel Jon; McKenzie, Neil; Badraoui, Mohamed; Chude, Victor; Baptista, Isaurinda; Mamo, Tekalign; Yemefack, Martin; Singh Aulakh, Mikha; Yagi, Kazuyuki; Hong, Suk Young; Vijarnsorn, Pisoot; Zhang, Gan-Lin; Arrouays, Dominique; Black, Helaina; Krasilnikov, Pavel; Sobocká, Jaroslava; Alegre, Julio; Henriquez, Carlos Roberto; de Lourdes Mendonça-Santos, Maria; Taboada, Miguel; Espinosa-Victoria, David; AlShankiti, Abdullah; Kazem AlaviPanah, Sayed; El Mustafa Elsheikh, Elsiddig Ahmed; Hempel, Jon; Camps Arbestain, Marta; Nachtergaele, Freddy; Vargas, Ronald

    2016-02-01

    The Intergovernmental Technical Panel on Soils has completed the first State of the World's Soil Resources Report. Globally soil erosion was identified as the gravest threat, leading to deteriorating water quality in developed regions and to lowering of crop yields in many developing regions. We need to increase nitrogen and phosphorus fertilizer use in infertile tropical and semi-tropical soils - the regions where the most food insecurity among us are found - while reducing global use of these products overall. Stores of soil organic carbon are critical in the global carbon balance, and national governments must set specific targets to stabilize or ideally increase soil organic carbon stores. Finally the quality of soil information available for policy formulation must be improved - the regional assessments in the State of the World's Soil Resources Report frequently base their evaluations on studies from the 1990s based on observations made in the 1980s or earlier.

  19. Sensor-guided threat countermeasure system

    Science.gov (United States)

    Stuart, Brent C.; Hackel, Lloyd A.; Hermann, Mark R.; Armstrong, James P.

    2012-12-25

    A countermeasure system for use by a target to protect against an incoming sensor-guided threat. The system includes a laser system for producing a broadband beam and means for directing the broadband beam from the target to the threat. The countermeasure system comprises the steps of producing a broadband beam and directing the broad band beam from the target to blind or confuse the incoming sensor-guided threat.

  20. Beeinflusst Stereotype Threat die Leseleistung von Jungen?

    OpenAIRE

    Eckert, Christine

    2012-01-01

    Ein durchgängiger Befund internationaler Schulleistungsvergleichsstudien bezieht sich auf die niedrigere Lesekompetenz von Jungen im Vergleich zu Mädchen (OECD, 2010). Ziel der vorliegenden Arbeit war, zu prüfen, welchen Einfluss negative Stereotype – im Sinne der Stereotype Threat-Theorie (Steele & Aronson, 1995) – auf die Leseleistung von Jungen haben. Basierend auf Befunden aus der Lese- und Stereotype Threat-Forschung wurde ein Mediator-Moderator-Modell des Stereotype Threat-Effekts (vgl....

  1. Gender, Stereotype Threat and Mathematics Test Scores

    OpenAIRE

    Ming Tsui; Xu, Xiao Y.; Edmond Venator

    2011-01-01

    Problem statement: Stereotype threat has repeatedly been shown to depress womens scores on difficult math tests. An attempt to replicate these findings in China found no support for the stereotype threat hypothesis. Our math test was characterized as being personally important for the student participants, an atypical condition in most stereotype threat laboratory research. Approach: To evaluate the effects of this personal demand, we conducted three experiments. Results: ...

  2. Reaction to New Security Threat Class

    OpenAIRE

    Elovici, Yuval; Rokach, Lior

    2014-01-01

    Each new identified security threat class triggers new research and development efforts by the scientific and professional communities. In this study, we investigate the rate at which the scientific and professional communities react to new identified threat classes as it is reflected in the number of patents, scientific articles and professional publications over a long period of time. The following threat classes were studied: Phishing; SQL Injection; BotNet; Distributed Denial of Service; ...

  3. Al-Qaeda’s Quest for Non-Conventional Weapons, 1996-2006 : The history behind the hype

    OpenAIRE

    2007-01-01

    The aim of the thesis has been to describe the nature of al-Qaeda’s interest in non-conventional weapons, as reflected by the network’s own statements and activities in the period from 1996-2006. The analysis has been divided into two parts: First, I have critically examined primary and secondary source material in order to develop a comprehensive understanding of the history of al-Qaeda’s pursuit for non-conventional weapons. Second, I have discussed why there is a lack of chemical, biologic...

  4. [Chikungunya fever - A new global threat].

    Science.gov (United States)

    Montero, Antonio

    2015-08-01

    The recent onset of epidemics caused by viruses such as Ebola, Marburg, Nipah, Lassa, coronavirus, West-Nile encephalitis, Saint Louis encephalitis, human immunodeficiency virus, dengue, yellow fever and Venezuelan hemorrhagic fever alerts about the risk these agents represent for the global health. Chikungunya virus represents a new threat. Surged from remote African regions, this virus has become endemic in the Indic ocean basin, the Indian subcontinent and the southeast of Asia, causing serious epidemics in Africa, Indic Ocean Islands, Asia and Europe. Due to their epidemiological and biological features and the global presence of their vectors, chikungunya represents a serious menace and could become endemic in the Americas. Although chikungunya infection has a low mortality rate, its high attack ratio may collapse the health system during epidemics affecting a sensitive population. In this paper, we review the clinical and epidemiological features of chikungunya fever as well as the risk of its introduction into the Americas. We remark the importance of the epidemiological control and mosquitoes fighting in order to prevent this disease from being introduced into the Americas. PMID:25087211

  5. Cardiac fibrillation risk of Taser weapons.

    Science.gov (United States)

    Leitgeb, Norbert

    2014-06-01

    The debate on potential health hazards associated with delivering electric discharges to incapacitated subjects, in particular on whether electric discharge weapons are lethal, less lethal or non-lethal, is still controversial. The cardiac fibrillation risks of Taser weapons X26 and X3 have been investigated by measuring the delivered high-tension pulses in dependence on load impedance. Excitation thresholds and sinus-to-Taser conversion factors have been determined by numerical modeling of endocardial, myocardial, and epicardial cells. Detailed quantitative assessment of cardiac electric exposure has been performed by numerical simulation at the normal-weighted anatomical model NORMAN. The impact of anatomical variation has been quantified at an overweight model (Visible Man), both with a spatial resolution of 2 × 2 × 2 mm voxels. Spacing and location of dart electrodes were systematically varied and the worst-case position determined. Based on volume-weighted cardiac exposure assessment, the fibrillation probability of the worst-case hit was determined to 30% (Taser X26) and 9% (Taser X3). The overall risk assessment of Taser application accounting for realistic spatial hit distributions was derived from training sessions of police officers under realistic scenarios and by accounting for the influence of body (over-)weight as well as gender. The analysis of the results showed that the overall fibrillation risk of Taser use is not negligible. It is higher at Taser X26 than at Taser X3 and amounts to about 1% for Europeans with an about 20% higher risk for Asians. Results demonstrate that enhancement as well as further reduction of fibrillation risk depends on responsible use or abuse of Taser weapons. PMID:24776896

  6. Nuclear power, nuclear weapons, and international stability

    International Nuclear Information System (INIS)

    The National Energy Plan included as one of its key components a revision of this country's long-standing policy on the development of civilian nuclear power. The proposed change, which would have the effect of curtailing certain aspects of the U.S. nuclear-power program and of placing new restrictions on the export of nuclear materials, equipment, and services, was based explicitly on the assumption that there is a positive correlation between the worldwide spread of nuclear-power plants and their associated technology on the one hand, and the proliferation of nuclear weapons and the risk of nuclear war on the other. The authors advance here the heretical proposition that the supposed correlation may go the other way, and that the recent actions and statements of the U.S. Government have taken little account of this possibility. In brief, they suggest that if the U.S. were to forgo the option of expanding its nuclear-energy supply, the global scarcity of usable energy resources would force other countries to opt even more vigorously for nuclear power and, moreover, to do so in ways that would tend to be internationally destabilizing. Thus, actions taken with the earnest intent of strengthening world security would ultimately weaken it. They believe further that any policy that seeks to divide the world into nuclear ''have'' and ''have not'' nations by attempting to lock up the assets of nuclear technologywill lead to neither a just nor a sustainable world society but to the inverse. In any event the technology itself probably cannot be effectively contained. They believe that the dangers of nuclear proliferation can be eliminated only by building a society that sees no advantage in having nuclear weapons in the first place. Accordingly, they view the problem of the proliferation of nuclear weapons as an important issue not just in the context of nuclear power but in a larger context

  7. A Statistical Model for Generating a Population of Unclassified Objects and Radiation Signatures Spanning Nuclear Threats

    International Nuclear Information System (INIS)

    This report describes an approach for generating a simulated population of plausible nuclear threat radiation signatures spanning a range of variability that could be encountered by radiation detection systems. In this approach, we develop a statistical model for generating random instances of smuggled nuclear material. The model is based on physics principles and bounding cases rather than on intelligence information or actual threat device designs. For this initial stage of work, we focus on random models using fissile material and do not address scenarios using non-fissile materials. The model has several uses. It may be used as a component in a radiation detection system performance simulation to generate threat samples for injection studies. It may also be used to generate a threat population to be used for training classification algorithms. In addition, we intend to use this model to generate an unclassified 'benchmark' threat population that can be openly shared with other organizations, including vendors, for use in radiation detection systems performance studies and algorithm development and evaluation activities. We assume that a quantity of fissile material is being smuggled into the country for final assembly and that shielding may have been placed around the fissile material. In terms of radiation signature, a nuclear weapon is basically a quantity of fissile material surrounded by various layers of shielding. Thus, our model of smuggled material is expected to span the space of potential nuclear weapon signatures as well. For computational efficiency, we use a generic 1-dimensional spherical model consisting of a fissile material core surrounded by various layers of shielding. The shielding layers and their configuration are defined such that the model can represent the potential range of attenuation and scattering that might occur. The materials in each layer and the associated parameters are selected from probability distributions that span the

  8. Nuclear weapons, a danger for our world

    International Nuclear Information System (INIS)

    This report is about an exhibition about the danger of the increasing amount of nuclear-weapons and was presented in the occasion of the second special meeting of the UN General Assembly (1982). This report describes the causes of a nuclear-war and analyses the causes of the bomb-drop of Hiroshima and Nagasaki as well as possible causes of a bombing of New York City and long-term-consequences of nuclear radiation. Furthermore it lists problems with a higher priority than the armament of nuclear-arms. (kancsar)

  9. Interdicting a Nuclear‐Weapons Project

    OpenAIRE

    Brown, G.G.; Carlyle, W.M.; Harney, R.C.; Skroch, E.; Wood, R.K.

    2009-01-01

    Operations Research, 57, pp. 866‐877. Center for Infrastructure Defense (CID) Paper. Operations Research, 57, pp. 866-877. The article of record as published may be located at http://dx.doi.org/10.1287/opre.1080.0643 A “proliferator” seeks to complete a first small batch of fission weapons as quickly as possible, whereas an “interdictor” wishes to delay that completion for as long as possible. We develop and solve a max-min model that identifies resource- limited interdiction acti...

  10. Nuclear Weapons in Asia: Perils and Prospects

    Directory of Open Access Journals (Sweden)

    Stephen J. Cimbala

    2014-03-01

    Full Text Available The spread of nuclear weapons in Asia threatens nuclear deterrence and crisis stability in the region and o!ers unique challenges to United States and allied security. The article contrasts two possible futures for nuclear Asia: a relatively more constrained proliferation regime with tiered levels of agreed deployment ceilings among states; and an unconstrained nuclear arms race in Asia. Not only regional tensions, but also the overlap between regional and global antagonisms and ambitions might upset nuclear deterrence stability in Asia.

  11. The Belgium debate on tactical nuclear weapons

    International Nuclear Information System (INIS)

    This publication proposes a discussion about the opinions and positions of the various Belgium political actors and authorities regarding nuclear weapons. After a synthesis of several interviews with different actors, the author analyses the debate content, and more precisely the positions of peace movements, of the government, and of political parties. Several documents are proposed in appendix: a presentation of the evolution on Belgium nuclear missions, a government's answer to parliamentary resolutions regarding non-proliferation and nuclear disarmament, and a working paper submitted by Belgium, Norway and the Netherlands in the perspective of the 2005 Conference of Parties on the Non-Proliferation Treaty

  12. Postulated accident scenarios in weapons disassembly

    Energy Technology Data Exchange (ETDEWEB)

    Payne, S.S. [Dept. of Energy, Albuquerque, NM (United States)

    1997-06-01

    A very brief summary of three postulated accident scenarios for weapons disassembly is provided in the paper. The first deals with a tetrahedral configuration of four generic pits; the second, an infinite planar array of generic pits with varying interstitial water density; and the third, a spherical shell with internal mass suspension in water varying the size and mass of the shell. Calculations were performed using the Monte Carlo Neutron Photon transport code MCNP4A. Preliminary calculations pointed to a need for higher resolution of small pit separation regimes and snapshots of hydrodynamic processes of water/plutonium mixtures.

  13. Environmental Detection of Clandestine Nuclear Weapon Programs

    Science.gov (United States)

    Kemp, R. Scott

    2016-06-01

    Environmental sensing of nuclear activities has the potential to detect nuclear weapon programs at early stages, deter nuclear proliferation, and help verify nuclear accords. However, no robust system of detection has been deployed to date. This can be variously attributed to high costs, technical limitations in detector technology, simple countermeasures, and uncertainty about the magnitude or behavior of potential signals. In this article, current capabilities and promising opportunities are reviewed. Systematic research in a variety of areas could improve prospects for detecting covert nuclear programs, although the potential for countermeasures suggests long-term verification of nuclear agreements will need to rely on methods other than environmental sensing.

  14. Contributions concerning the effects of nuclear weapons

    International Nuclear Information System (INIS)

    The radiation fields resulting from the nuclear explosions at Hiroshima and Nagasaki have been re-assessed and re-evaluated, so that a new approach was possible for assessing the effects of neutrons on man, also of other than military neutron sources, but particularly the effects of neutron weapons on man and mammals. The other main topic of the contributions is protection of the population against neutron radiation environments by buildings such as shelters, or by ordinary basement rooms. There also is a glossary with terms and definitions. (DG)

  15. Postulated accident scenarios in weapons disassembly

    International Nuclear Information System (INIS)

    A very brief summary of three postulated accident scenarios for weapons disassembly is provided in the paper. The first deals with a tetrahedral configuration of four generic pits; the second, an infinite planar array of generic pits with varying interstitial water density; and the third, a spherical shell with internal mass suspension in water varying the size and mass of the shell. Calculations were performed using the Monte Carlo Neutron Photon transport code MCNP4A. Preliminary calculations pointed to a need for higher resolution of small pit separation regimes and snapshots of hydrodynamic processes of water/plutonium mixtures

  16. Thermal radiation from a nuclear weapon burst

    International Nuclear Information System (INIS)

    The different methods and correlations used to calculate the propagation of thermal radiation are reviewed and compared. A simple method to account for radiation enhancement by reflection from a superior cloud deck or snow cover, as well as attenuation of radiation by cloud cover below the burst is presented. The results show that the thermal reach may vary considerably. Additional calculation show that a significant fraction of the thermal energy may be incident after the arrival of the shock wave. Results for a range of weapon yields are presented, and the implications for blast-induced (secondary) fire starts are discussed

  17. DOE site-specific threat assessment

    International Nuclear Information System (INIS)

    A facility manager faced with the challenges of protecting a nuclear facility against potential threats must consider the likelihood and consequences of such threats, know the capabilities of the facility safeguards and security systems, and make informed decisions about the cost-effectivness of safeguards and security upgrades. To help meet these challenges, the San Francisco Operations Office of the Department of Energy, in conjunction with the Lawrence Livermore Laboratory, has developed a site-specific threat assessment approach and a quantitative model to improve the quality and consistency of site-specific threat assessment and resultant security upgrade decisions at sensitive Department of Energy facilities. 5 figs

  18. The real value of nuclear-weapon-free zones

    International Nuclear Information System (INIS)

    The international community has greeted the establishment of two new nuclear weapon-free zones with praise. Africa and South Asia are the regions which will join, once the respective treaties are ratified and in force, Latin America and the South Pacific to ensure that extensive areas of the earth remain free of nuclear weapons. The usual reaction to these accomplishments is to hail them as important contributions to international peace and security, and as meaningful steps towards a world free of nuclear weapons. The nuclear weapon-free zones have their value but this value relates mainly to the countries within the zone. The interest of nuclear-weapon states are not really affected, or, if they are, the influence is not significant. One should bear in mind that the really important and meaningful nuclear weapon-free zones have yet to be achieved

  19. Performance calculation and simulation system of high energy laser weapon

    Science.gov (United States)

    Wang, Pei; Liu, Min; Su, Yu; Zhang, Ke

    2014-12-01

    High energy laser weapons are ready for some of today's most challenging military applications. Based on the analysis of the main tactical/technical index and combating process of high energy laser weapon, a performance calculation and simulation system of high energy laser weapon was established. Firstly, the index decomposition and workflow of high energy laser weapon was proposed. The entire system was composed of six parts, including classical target, platform of laser weapon, detect sensor, tracking and pointing control, laser atmosphere propagation and damage assessment module. Then, the index calculation modules were designed. Finally, anti-missile interception simulation was performed. The system can provide reference and basis for the analysis and evaluation of high energy laser weapon efficiency.

  20. Systems engineering analysis of kinetic energy weapon concepts

    Energy Technology Data Exchange (ETDEWEB)

    Senglaub, M.

    1996-06-01

    This study examines, from a systems engineering design perspective, the potential of kinetic energy weapons being used in the role of a conventional strategic weapon. Within the Department of Energy (DOE) complex, strategic weapon experience falls predominantly in the nuclear weapons arena. The techniques developed over the years may not be the most suitable methodologies for use in a new design/development arena. For this reason a more fundamental approach was pursued with the objective of developing an information base from which design decisions might be made concerning the conventional strategic weapon system concepts. The study examined (1) a number of generic missions, (2) the effects of a number of damage mechanisms from a physics perspective, (3) measures of effectiveness (MOE`s), and (4) a design envelope for kinetic energy weapon concepts. With the base of information a cut at developing a set of high-level system requirements was made, and a number of concepts were assessed against these requirements.

  1. Fourth Generation Nuclear Weapons: Military effectiveness and collateral effects

    OpenAIRE

    Gsponer, Andre

    2005-01-01

    The paper begins with a general introduction and update to Fourth Generation Nuclear Weapons (FGNW), and then addresses some particularly important military aspects on which there has been only limited public discussion so far. These aspects concern the unique military characteristics of FGNWs which make them radically different from both nuclear weapons based on previous-generation nuclear-explosives and from conventional weapons based on chemical-explosives: yields in the 1 to 100 tons rang...

  2. Recovery of weapon plutonium as feed material for reactor fuel

    International Nuclear Information System (INIS)

    This report presents preliminary considerations for recovering and converting weapon plutonium from various US weapon forms into feed material for fabrication of reactor fuel elements. An ongoing DOE study addresses the disposition of excess weapon plutonium through its use as fuel for nuclear power reactors and subsequent disposal as spent fuel. The spent fuel would have characteristics similar to those of commercial power spent fuel and could be similarly disposed of in a geologic repository

  3. Use of Depleted Uranium Weapons in Contemporary Military Interventions

    OpenAIRE

    Okafor-Yarwood, Ifesinachi Marybenedette

    2014-01-01

    This research note examines the use of depleted uranium weapons in contemporarymilitary interventions and the hazardous effects of their use. It also demonstratesattempts made by the United States and the United Kingdom to block anyinternational efforts to ban the use of these weapons. Although there is no laboratory evidence, experiential evidence from Iraq indicates that depleted uranium weapons are dangerous to human health and the environment. This research note argues that the United Nat...

  4. The shipboard employment of a free electron laser weapon system

    OpenAIRE

    Allgaier, Gregory G.

    2003-01-01

    Approved for Public Release; Distribution is Unlimited A megawatt (MW) class Free Electron Laser (FEL) shows promise as a new weapon for antiship cruise missile defense. An FEL weapon system delivers energy at the speed of light at controllable energy levels, giving the war fighter new engagement options. Considerations for this weapon system include employment, design, and stability. In order to reach a MW class laser, system parameters must be optimized and the high power optical beam mu...

  5. Predication and Optimization of Maintenance Resources for Weapon System

    OpenAIRE

    Yabin Wang

    2011-01-01

    Maintenance resources are important part of the maintenance support system. The whole efficiency of weapon system is directly affected by the allocation of maintenance resources. Joint support for weapon system of multi-kinds of equipments is the main fashion of maintenance support in the future. However, there is a lack of the efficiency tools and methods for predication and optimization of weapon system maintenance resources presently. For the prediction requirement of maintenance resources...

  6. Granular analyzing of weapon SoS demand description

    Institute of Scientific and Technical Information of China (English)

    Zhao Qingsong; Yang Kewei; Chen Yingwu; Li Mengjun

    2009-01-01

    The systematism of weapon combat is the typical characteristic of a modern battlefield. The process of combat is complex and the demand description of weapon system of systems (SOS) is difficult. Granular analyzing is an important method for solving the complex problem in the world. Granular thinking is introduced into the demand description of weapon SoS. Granular computing and granular combination based on a relation of compatibility is proposed. Based on the level of degree and degree of detail, the granular resolution of weapon SoS is defined and an example is illustrated at the end.

  7. Open architecture applied to next-generation weapons

    Science.gov (United States)

    Rose, Leo J.; Shaver, Jonathan; Young, Quinn; Christensen, Jacob

    2014-06-01

    The Air Force Research Laboratory (AFRL) has postulated a new weapons concept known as Flexible Weapons to define and develop technologies addressing a number of challenges. Initial studies on capability attributes of this concept have been conducted and AFRL plans to continue systems engineering studies to quantify metrics against which the value of capabilities can be assessed. An important aspect of Flexible Weapons is having a modular "plug-n-play" hardware and software solution, supported by an Open Architecture and Universal Armament Interface (UAI) common interfaces. The modular aspect of Flexible Weapons is a means to successfully achieving interoperability and composability at the weapon level. Interoperability allows for vendor competition, timely technology refresh, and avoids costs by ensuring standard interfaces widely supported in industry, rather than an interface unique to a particular vendor. Composability provides for the means to arrange an open end set of useful weapon systems configurations. The openness of Flexible Weapons is important because it broadens the set of computing technologies, software updates, and other technologies to be introduced into the weapon system, providing the warfighter with new capabilities at lower costs across the life cycle. One of the most critical steps in establishing a Modular, Open Systems Architecture (MOSA) for weapons is the validation of compliance with the standard.

  8. DOE Nuclear Weapon Reliability Definition: History, Description, and Implementation

    Energy Technology Data Exchange (ETDEWEB)

    Wright, D.L.; Cashen, J.J.; Sjulin, J.M.; Bierbaum, R.L.; Kerschen, T.J.

    1999-04-01

    The overarching goal of the Department of Energy (DOE) nuclear weapon reliability assessment process is to provide a quantitative metric that reflects the ability of the weapons to perform their intended function successfully. This white paper is intended to provide insight into the current and long-standing DOE definition of nuclear weapon reliability, which can be summarized as: The probability of achieving the specified yield, at the target, across the Stockpile-To-Target Sequence of environments, throughout the weapon's lifetime, assuming proper inputs.

  9. Dismantlement and destruction of chemical, nuclear and conventional weapons

    International Nuclear Information System (INIS)

    The safe destruction and dismantling of chemical, nuclear and conventional weapons is of fundamental importance to the security of all countries represented in this volume. Expertise in the field is not confined to one country or organisation: all can benefit from each other. There is an ever present danger of proliferation of weapons of mass destruction: approximately two dozen countries have ongoing programmes to develop or acquire such weapons, and many are also gaining the capability to build air-surface delivery systems. But much can be done to prevent proliferation by reducing leakage of materials and know-how and by solving the problems of the destruction of surplus weapons systems, which has now come to be a key issue. In 13 sessions of the workshop attention was paid to (1) Dismantlement and Destruction of Chemical, Nuclear and Conventional Weapons; (2) Status of Implementation of Arms Control Treaties and Voluntary Commitments; (3) National Perspectives on Cooperation in Disarmament; (4) Stocktaking of National and Bilateral Disposal/Destruction Programmes: Chemical Weapons; (5) Stocktaking of National and Bilateral Disposal/Destruction Programmes: Nuclear Weapons; (6) Stocktaking of National and Bilateral Disposal/Destruction Programmes: Conventional Weapons. Session; (7) Experience with Currently Employed Chemical Destruction Technologies; (8) Alternative Chemical Destruction Technologies; (9) Deactivation, Dismantlement and Destruction of Delivery Systems and Infrastructure for Nuclear Weapons; (10) Storage, Safeguarding and Disposition of Fissile Materials; (11) Technologies for Conversion and Civil Use of Demilitarized Materials; (12) International Organizations; and (13) Environmental Challenges Posed by Chemical and Nuclear Disarmament

  10. Report of the Canberra commission. Eliminating nuclear weapons

    International Nuclear Information System (INIS)

    This book was originally published in Australia under the title: 'Report of the Canberra commission on the elimination of nuclear weapons'. The aim of this report in to convince any reader that the elimination of nuclear weapons has become a necessary goal at the end of this century. After a summary of the political conclusions of the commission, a first part presents the debate about nuclear weapons while a second part describes the different steps that must be followed to completely eliminate the nuclear weapons worldwide. Details about verification, legal aspects and actions are given in appendixes. (J.S.)

  11. An integrated approach to adapt physical protection to the new terrorism threats

    International Nuclear Information System (INIS)

    Full text: New terrorism (NT) differs significantly from the traditional form of terrorism insofar as it has the capability to: train and deploy suicide commandos; use sophisticated logistics; implement transnational terrorist operations; infiltrate security and diplomatic communities; and commit acts of mass disturbance and mass killings. NT does not engage in negotiations: it does not discriminate in its attacks between children, adult civilians or military personnel; and it is willing to deploy weapons of mass destruction. These characteristics require that the conventional approach to physical protection of installations dealing with nuclear and other radioactive materials (e.g., Design Basis Threat (DBT)) be adapted accordingly. This integrated approach should encompass: at the international level: revised legally binding conventions and recommendations which are more specific than current versions, providing practically applicable advice reflecting the new threat scenarios; at the national level: introducing an element of transparency for validating the national threat perception and supra-national review of the effectiveness of the counteractions taken such as regulatory approaches implementing these international agreements; at the operational level: enhancing security-related co-operation at the command and control level between the on-site security forces at nuclear installations, the response force, police and the military, as well as upgrading of the force-on-force training; and at the research level: R and D in physical protection technology and practices to keep abreast of the threats posed by the NT. (author)

  12. Disposal of Surplus Weapons Grade Plutonium

    International Nuclear Information System (INIS)

    The Office of Fissile Materials Disposition is responsible for disposing of inventories of surplus US weapons-usable plutonium and highly enriched uranium as well as providing, technical support for, and ultimate implementation of, efforts to obtain reciprocal disposition of surplus Russian plutonium. On January 4, 2000, the Department of Energy issued a Record of Decision to dispose of up to 50 metric tons of surplus weapons-grade plutonium using two methods. Up to 17 metric tons of surplus plutonium will be immobilized in a ceramic form, placed in cans and embedded in large canisters containing high-level vitrified waste for ultimate disposal in a geologic repository. Approximately 33 metric tons of surplus plutonium will be used to fabricate MOX fuel (mixed oxide fuel, having less than 5% plutonium-239 as the primary fissile material in a uranium-235 carrier matrix). The MOX fuel will be used to produce electricity in existing domestic commercial nuclear reactors. This paper reports the major waste-package-related, long-term disposal impacts of the two waste forms that would be used to accomplish this mission. Particular emphasis is placed on the possibility of criticality. These results are taken from a summary report published earlier this year

  13. TRACKING SURPLUS PLUTONIUM FROM WEAPONS TO DISPOSITION

    Energy Technology Data Exchange (ETDEWEB)

    Allender, J.; Beams, J.; Sanders, K.; Myers, L.

    2013-07-16

    Supporting nuclear nonproliferation and global security principles, beginning in 1994 the United States has withdrawn more than 50 metric tons (MT) of government-controlled plutonium from potential use in nuclear weapons. The Department of Energy (DOE), including the National Nuclear Security Administration, established protocols for the tracking of this "excess" and "surplus" plutonium, and for reconciling the current storage and utilization of the plutonium to show that its management is consistent with the withdrawal policies. Programs are underway to ensure the safe and secure disposition of the materials that formed a major part of the weapons stockpile during the Cold War, and growing quantities have been disposed as waste, after which they are not included in traditional nuclear material control and accountability (NMC&A) data systems. A combination of resources is used to perform the reconciliations that form the basis for annual reporting to DOE, to U.S. Department of State, and to international partners including the International Atomic Energy Agency.

  14. Nuclear weapons complex: What went wrong?

    International Nuclear Information System (INIS)

    The nuclear weapons complex has generated significant volumes of radioactive wastes dating back to the 1940s. Such wastes included transuranic radioisotopes-for example, plutonium-generated as byproducts of the operations. Most of these wastes at the major disposal site were not classified in the same way nuclear wastes are classified today; the definitions of high- and low-level wastes have changed over time, and, in the case of the latter, different classes have been established that determine methods for disposal and handling. Waste disposal was not a high priority during World War II. After the war, however; resources were not committed to either waste-disposal research or the development of a national waste management policy. AEC's failure to develop a national policy on radioactive waste disposal is easier to understand than to excuse. The disposal problem parallels the chemical waste disposal situation, where there were no federal and few state laws regulating chemical waste disposal until 1976, following publicity about Love Canal. This same story has been repeated for radioactive and mixed wastes and facility safety at the nation's nuclear weapon sites

  15. Tracking surplus plutonium from weapons to disposition

    International Nuclear Information System (INIS)

    Supporting nuclear nonproliferation and global security principles, beginning in 1994 the United States has withdrawn more than 50 metric tons (MT) of government-controlled plutonium from potential use in nuclear weapons. The Department of Energy (DOE), including the National Nuclear Security Administration, established protocols for the tracking of this ''excess'' and ''surplus'' plutonium, and for reconciling the current storage and utilization of the plutonium to show that its management is consistent with the withdrawal policies. Programs are underway to ensure the safe and secure disposition of the materials that formed a major part of the weapons stockpile during the Cold War, and growing quantities have been disposed as waste, after which they are not included in traditional nuclear material control and accountability (NMC and A) data systems. A combination of resources is used to perform the reconciliations that form the basis for annual reporting to DOE, to U.S. Department of State, and to international partners including the International Atomic Energy Agency.

  16. Are All Interventions Created Equal? A Multi-Threat Approach to Tailoring Stereotype Threat Interventions

    OpenAIRE

    Shapiro, Jenessa R.; Williams, Amy M.; Hambarchyan, Mariam

    2012-01-01

    To date, stereotype threat interventions have been considered interchangeable. Across 4 experiments, the present research demonstrates that stereotype threat interventions need to be tailored to the specific form of experienced stereotype threat to be effective. The Multi-Threat Framework (Shapiro & Neuberg, 2007) distinguishes between group-as-target stereotype threats—concerns that a stereotype-relevant performance will reflect poorly on the abilities of one’s group—and self-as-target stere...

  17. Enhanced Memory for both Threat and Neutral Information Under Conditions of Intergroup Threat

    OpenAIRE

    Zhu, Yong; ZHAO Yufang; Ybarra, Oscar; Stephan, Walter G.; Yang, Qing

    2015-01-01

    Few studies have examined the effect of intergroup threat on cognitive outcomes such as memory. Different theoretical perspectives can inform how intergroup threat should affect memory for threat-relevant and neutral information, such as the mood-congruency approach, Yerkes–Dodson law, Easterbrook’s theory, and also evolutionary perspectives. To test among these, we conducted two experiments to examine how exposure to intergroup threats affected memory compared to control conditions. In study...

  18. Rapid - PCR ( LightCycler ) in diagnosis of biological agents

    OpenAIRE

    Taleski, Vaso; Hadfield, Ted

    2001-01-01

    Although the historic use of biological weapons has been infrequent, a belief that state sponsored armies or terrorist organizations will use this type of weapon has never been greater which demands a capability for rapid medical response and early intervention. Molecular diagnostic methods, based on DNA amplification known as PCR (Polymerase Chain Reaction) are promising tools in fast and specific detection and identification of biological agent(s). The R.A.P.I.D.TM - PCR ( Ruggedized Adv...

  19. History of U.S. Nuclear Weapons Doctrine and a Path Forward

    Science.gov (United States)

    Chyba, Christopher

    2007-04-01

    will sketch this history, discuss the approach of the Bush Administration in more detail and assess its successes and failures, and suggest the lines of a new approach to U.S. nuclear weapons policy for the coming decades. This approach will follow that outlined in George Bunn and Christopher Chyba (eds.), ``U.S. Nuclear Weapons Policy: Confronting Today's Threats'' (Brookings, 2006, 340 pp.).

  20. Game Theoretic Risk Analysis of Security Threats

    CERN Document Server

    Bier, Vicki M

    2008-01-01

    Introduces reliability and risk analysis in the face of threats by intelligent agents. This book covers applications to networks, including problems in both telecommunications and transportation. It provides a set of tools for applying game theory TO reliability problems in the presence of intentional, intelligent threats

  1. The Smallpox Threat: The School Nurse's Role

    Science.gov (United States)

    Martin, Mary E.; Didion, Judy

    2003-01-01

    Today, with the threat of bioterrorism and war, there is a new dimension to the traditional role of the school nurse. The smallpox threat to public health will invoke the school nurse's role as an educator, liaison, and consultant in the community. This article discusses smallpox, the vaccination process, adverse effects, and postvaccination care.…

  2. Gender, Stereotype Threat and Mathematics Test Scores

    Directory of Open Access Journals (Sweden)

    Ming Tsui

    2011-01-01

    Full Text Available Problem statement: Stereotype threat has repeatedly been shown to depress women’s scores on difficult math tests. An attempt to replicate these findings in China found no support for the stereotype threat hypothesis. Our math test was characterized as being personally important for the student participants, an atypical condition in most stereotype threat laboratory research. Approach: To evaluate the effects of this personal demand, we conducted three experiments. Results: Experiment 1, where in Chinese students were tested with the added independent variable of test importance. Our results produced only marginally significant stereotype threat effects. Experiment 2, a replication of experiment 1, yielded completely different results, with no threat effects at all. Math-test scores were significantly higher in the threat condition for both men and women, consistent with the phenomena of stereotype lift and stereotype reactance. Experiment 3, which did not include the test-important variable, yielded no significant effects. Conclusion: Stereotype threat, in the mathematics domain, does not seem to be a problem for women in China. We discuss our results in terms of factors which moderate stereotype threat and societal differences in the U.S. and China.

  3. Development of the Academic Stereotype Threat Inventory

    Science.gov (United States)

    Pseekos, A. Chantelle; Dahlen, Eric R.; Levy, Jacob J.

    2008-01-01

    The authors describe the development and preliminary validation of the Academic Stereotype Threat Inventory, a self-report measurement of math-related stereotype threat among women. A preliminary version of the instrument was administered to 308 undergraduate women. Principal component analysis yielded a 3-factor solution. Convergent and…

  4. Stereotype Threat, Identity Salience, and Spatial Reasoning

    Science.gov (United States)

    McGlone, Matthew S.; Aronson, Joshua

    2006-01-01

    Stereotype threat research provides insight into how the low standardized test scores of students from stigmatized social groups may derive in part from the negative performance expectations about these groups. Because these students belong to many social groups, one means of mitigating the threat is to remind them of their membership in groups…

  5. How you perceive threat determines your behavior

    Directory of Open Access Journals (Sweden)

    Eliane Volchan

    2013-10-01

    Full Text Available The prioritization of processing emotional stimuli usually produces deleterious effects on task performance when it distracts from a task. One common explanation is that brain resources are consumed by emotional stimuli, diverting resources away from executing the task. Viewing unpleasant stimuli also generates defensive reactions, and these responses may be at least partially responsible for the effect of the emotional modulation observed in various reaction time (RT paradigms. We investigated whether modulatory effects on RT vary if we presented threat stimuli to prompt different defensive responses. To trigger different responses, we manipulated threat perception by moving the direction of threatening stimuli. Threatening or neutral stimuli were presented as distractors during a bar orientation discrimination task. The results demonstrated that threat stimuli directed towards the observer produced a decrease in RT; in contrast, threat stimuli directed away from the observer produced an increase in RT, when compared to neutral stimuli. Accelerated RT during direct threat stimuli was attributed to increased motor preparation resulting from strong activation of the defense response cascade. In contrast, no direct threat stimuli likely activated the defense cascade, but less intensively, prompting immobility. Different threat stimuli produced varying effects, which was interpreted as evidence that the modulation of RT by emotional stimuli represents the summation of attentional and motivational effects. Additionally, participants who had been previously exposed to diverse types of violent crime were more strongly influenced by direct threat stimuli. In sum, our data support the concept that emotions are indeed action tendencies.

  6. In Brief: Forecasting meningitis threats

    Science.gov (United States)

    Showstack, Randy

    2008-12-01

    The University Corporation for Atmospheric Research (UCAR), in conjunction with a team of health and weather organizations, has launched a project to provide weather forecasts to medical officials in Africa to help reduce outbreaks of meningitis. The forecasts will enable local health care providers to target vaccination programs more effectively. In 2009, meteorologists with the National Center for Atmospheric Research, which is managed by UCAR, will begin issuing 14-day forecasts of atmospheric conditions in Ghana. Later, UCAR plans to work closely with health experts from several African countries to design and test a decision support system to provide health officials with useful meteorological information. ``By targeting forecasts in regions where meningitis is a threat, we may be able to help vulnerable populations. Ultimately, we hope to build on this project and provide information to public health programs battling weather-related diseases in other parts of the world,'' said Rajul Pandya, director of UCAR's Community Building Program. Funding for the project comes from a $900,000 grant from Google.org, the philanthropic arm of the Internet search company.

  7. [Counterfeit medicines: a growing threat].

    Science.gov (United States)

    Barbereau, S

    2006-12-01

    The medical drug market has undergone considerable transformation in recent years. Like other products, medicines have been affected by globalization. Free trade policies have had a number of negative effects including a reduction in quality control not only for some products but also for raw materials and finished products. The global environment has also created conditions conducive to counterfeit medicines. The term counterfeit medicine is defined differently from one country to another in terms of quality, legality and fraudulent intent. This situation prompted the WHO to propose the following definition: "A counterfeit medicine is one which is deliberately and fraudulently mislabeled with respect to identity and/or source. Counterfeiting can apply to both branded and generic products and counterfeit products may include products with the correct ingredients or with the wrong ingredients, without active ingredients, with insufficient active ingredients or with fake packaging." Weak pharmaceutical regulation often compounded by widespread corruption in developing countries has greatly facilitated the development of this illicit market with harmful and costly effects on public health. Due to the lack of pharmocovigilance accidents involving use of counterfeit drugs go unreported. For this reason it is not possible to measure the economic impact. While counterfeiting has become a major threat in developing countries, it also affects industrialized countries. Fraudulent behavior occurs all over the world. PMID:17286014

  8. Insider threat to secure facilities: data analysis

    Energy Technology Data Exchange (ETDEWEB)

    1979-12-07

    This report is the culmination of a project in which data from several industries confronting internal security threats were collected and analyzed. The industries and threats involved are deemed to be analogous in one or more respects to potential threats confronting decision makers in the nuclear industry. The analog internal threats consist of bank frauds and embezzlements over $10,000, computer crimes of various types and insider drug thefts from drug manufactures and distributors. These data have been subjected to careful analysis utilizing both descriptive and formal statistical techniques. A number of findings are quite suggestive as to the general nature of the internal threat and are discussed and interpreted in terms of thenuclear industry analogy.

  9. Reducing the nuclear threat in the 21st century

    International Nuclear Information System (INIS)

    The focus of this paper is related to rising public concern - the threat of terrorism and the threat from poorly protected nuclear weapons materials. Governments, the press, and the public need to understand that the IAEA is responsible for monitoring more than 900 facilities to make sure no nuclear materials at those facilities are diverted to military use. They need to know that during 15 years of zero real growth in the IAEA's safeguards budget, the number of states who are part of the nonproliferation regime, the number of safeguarded facilities in those states, and the amount of plutonium and HEU requiring safeguards have all increased dramatically. The IAEA's safeguards system is facing a 'quiet crisis'. There is already a gap between the nuclear threat and our global response. Zero growth budgets at IAEA widen the gap. This total budget is less than ten percent of the cost of building a single nuclear power plant - and a tiny fraction of the economic cost of the non-nuclear terrorist strikes of September 11. The time has come, for member states to agree to a substantial real increase in the IAEA's regular safeguards budget. The discovery in Iraq in 1991 of a substantial covert nuclear weapons program led to the establishment, for the first time, of an Additional Protocol, with wide-ranging new inspection authorities and information access that will give the IAEA what it needs to conclude that there are no covert nuclear activities in states subject to the protocol. The adoption of this Additional Protocol is a great advance in nuclear security, but Governments, the press and public need to understand that the Board has approved Additional Protocols for only 58 member states, and only 22 of those have entered into force or are being provisionally applied. A decade after the Iraq discovery of the weakness in its safeguards regime, the IAEA does not yet have the full authority it needs to detect and expose any covert nuclear programs that may be underway around

  10. Smart CMOS sensor for wideband laser threat detection

    Science.gov (United States)

    Schwarze, Craig R.; Sonkusale, Sameer

    2015-09-01

    The proliferation of lasers has led to their widespread use in applications ranging from short range standoff chemical detection to long range Lidar sensing and target designation operating across the UV to LWIR spectrum. Recent advances in high energy lasers have renewed the development of laser weapons systems. The ability to measure and assess laser source information is important to both identify a potential threat as well as determine safety and nominal hazard zone (NHZ). Laser detection sensors are required that provide high dynamic range, wide spectral coverage, pulsed and continuous wave detection, and large field of view. OPTRA, Inc. and Tufts have developed a custom ROIC smart pixel imaging sensor architecture and wavelength encoding optics for measurement of source wavelength, pulse length, pulse repetition frequency (PRF), irradiance, and angle of arrival. The smart architecture provides dual linear and logarithmic operating modes to provide 8+ orders of signal dynamic range and nanosecond pulse measurement capability that can be hybridized with the appropriate detector array to provide UV through LWIR laser sensing. Recent advances in sputtering techniques provide the capability for post-processing CMOS dies from the foundry and patterning PbS and PbSe photoconductors directly on the chip to create a single monolithic sensor array architecture for measuring sources operating from 0.26 - 5.0 microns, 1 mW/cm2 - 2 kW/cm2.

  11. A Quantitative Threats Analysis for the Florida Manatee (Trichechus manatus latirostris)

    Science.gov (United States)

    Runge, Michael C.; Sanders-Reed, Carol A.; Langtimm, Catherine A.; Fonnesbeck, Christopher J.

    2007-01-01

    The Florida manatee (Trichechus manatus latirostris) is an endangered marine mammal endemic to the southeastern United States. The primary threats to manatee populations are collisions with watercraft and the potential loss of warm-water refuges. For the purposes of listing, recovery, and regulation under the Endangered Species Act (ESA), an understanding of the relative effects of the principal threats is needed. This work is a quantitative approach to threats analysis, grounded in the assumption that an appropriate measure of status under the ESA is based on the risk of extinction, as quantified by the probability of quasi-extinction. This is related to the qualitative threats analyses that are more common under the ESA, but provides an additional level of rigor, objectivity, and integration. In this approach, our philosophy is that analysis of the five threat factors described in Section 4(a)(1) of the ESA can be undertaken within an integrated quantitative framework. The basis of this threats analysis is a comparative population viability analysis. This involves forecasting the Florida manatee population under different scenarios regarding the presence of threats, while accounting for process variation (environmental, demographic, and catastrophic stochasticity) as well as parametric and structural uncertainty. We used the manatee core biological model (CBM) for this viability analysis, and considered the role of five threats: watercraft-related mortality, loss of warm-water habitat in winter, mortality in water-control structures, entanglement, and red tide. All scenarios were run with an underlying parallel structure that allowed a more powerful estimation of the effects of the various threats. The results reflect our understanding of manatee ecology (as captured in the structure of the CBM), our estimates of manatee demography (as described by the parameters in the model), and our characterization of the mechanisms by which the threats act on manatees. As an

  12. Major issues in threat analysis and resolving such problems: an addendum to the GAP analysis

    Directory of Open Access Journals (Sweden)

    T.D. Surasinghe

    2012-04-01

    Full Text Available Identification of regions that warrant conservation attention is a top priority among global environmental concerns. Conventionally, this objective was achieved via recognizing natural landscapes based on the number of IUCN Red Listed species, percentage of endemism and species diversity. A recent innovation in conservation biology is the use of GIS-based threat analysis models to identify key areas of conservation importance. Compared with GAP Analysis, which only identifies biodiversity-rich unprotected lands, threat analysis serves as a rigorous tool in conservation planning which specifically recognizes threats and habitat suitability to different taxa based on a spatially-explicit analysis. Threat analysis is a highly flexible process which involves building up a model with multiple independent (without autocorrelations variables that both positively and negatively affect distribution and population persistence of a concerned species. Parameters include rate of land-use change, population density, population growth rate, land management regimes, protection status, habitat suitability and land stewardship. Threat analysis models can be used to understand the current status of a particular species (or a community and can be used to project future trends about the species under consideration. This publication provides an overview of uses of GIS-based threat analyses in conservation biology and provides insights on the limitations of these models and the directions that should be taken in future.

  13. Ultra-wide-band 3D microwave imaging scanner for the detection of concealed weapons

    Science.gov (United States)

    Rezgui, Nacer-Ddine; Andrews, David A.; Bowring, Nicholas J.

    2015-10-01

    The threat of concealed weapons, explosives and contraband in footwear, bags and suitcases has led to the development of new devices, which can be deployed for security screening. To address known deficiencies of metal detectors and x-rays, an UWB 3D microwave imaging scanning apparatus using FMCW stepped frequency working in the K and Q bands and with a planar scanning geometry based on an x y stage, has been developed to screen suspicious luggage and footwear. To obtain microwave images of the concealed weapons, the targets are placed above the platform and the single transceiver horn antenna attached to the x y stage is moved mechanically to perform a raster scan to create a 2D synthetic aperture array. The S11 reflection signal of the transmitted sweep frequency from the target is acquired by a VNA in synchronism with each position step. To enhance and filter from clutter and noise the raw data and to obtain the 2D and 3D microwave images of the concealed weapons or explosives, data processing techniques are applied to the acquired signals. These techniques include background subtraction, Inverse Fast Fourier Transform (IFFT), thresholding, filtering by gating and windowing and deconvolving with the transfer function of the system using a reference target. To focus the 3D reconstructed microwave image of the target in range and across the x y aperture without using focusing elements, 3D Synthetic Aperture Radar (SAR) techniques are applied to the post-processed data. The K and Q bands, between 15 to 40 GHz, show good transmission through clothing and dielectric materials found in luggage and footwear. A description of the system, algorithms and some results with replica guns and a comparison of microwave images obtained by IFFT, 2D and 3D SAR techniques are presented.

  14. Victimization and Health Risk Factors among Weapon-Carrying Youth

    Science.gov (United States)

    Stayton, Catherine; McVeigh, Katharine H.; Olson, E. Carolyn; Perkins, Krystal; Kerker, Bonnie D.

    2011-01-01

    Objective: To compare health risks of 2 subgroups of weapon carriers: victimized and nonvictimized youth. Methods: 2003-2007 NYC Youth Risk Behavior Surveys were analyzed using bivariate analyses and multinomial logistic regression. Results: Among NYC teens, 7.5% reported weapon carrying without victimization; 6.9% reported it with victimization.…

  15. Constraining potential nuclear-weapons proliferation from civilian reactors

    International Nuclear Information System (INIS)

    Cessation of the Cold War and renewed international attention to the proliferation of weapons of mass destruction are leading to national policies aimed at restraining nuclear-weapons proliferation that could occur through the nuclear-fuel cycle. Argonne, which has unique experience, technology, and capabilities, is one of the US national laboratories contributing to this nonproliferation effort

  16. Nuclear weapons and NATO operations: Doctrine, studies, and exercises

    International Nuclear Information System (INIS)

    A listing of papers is presented on the doctrine, studies, and exercises dealing with nuclear weapons and NATO operations for the period 1950-1983. The papers deal with studies on massive retaliation, sword and shield, and flexible response. Some of the enduring issues of nuclear weapons in NATO are listed

  17. Someone at School Has a Weapon. What Should I Do?

    Science.gov (United States)

    ... animals talking about weapons and violence fascination with violent video games, television, and movies threatening or bullying others isolation from family and friends Of course, these signs don't necessarily mean that a person will become violent or bring a weapon to school. Still, you ...

  18. Factors associated with weapon use in maternal filicide.

    Science.gov (United States)

    Lewis, C F; Baranoski, M V; Buchanan, J A; Benedek, E P

    1998-05-01

    The objective of this study was to identify factors associated with weapon use in a group of filicidal women. Clinical data were gathered from the charts of sixty filicidal women evaluated at Michigan's Center for Forensic Psychiatry or through Connecticut's Psychiatric Security Review Board from 1970 to 1996. Factors associated with weapon use were determined using chi squares, ANCOVAS, and a logistic regression. Results were compared to national statistics for child homicide from the Department of Justice Uniform Crime Reports (UCR). Weapon was defined as knife or gun for the study. Weapons were used by one of four women in our study. Guns were used by 13% of filicidal women and knives by 12%. Odds ratio showed that psychotic women were eleven times more likely to kill their child with a weapon than their non-psychotic counterparts (11.2; p = .008). Psychosis was present in every mother who killed her child with a knife and in seven of eight women who killed their children with a gun. Younger children were less likely to be killed with weapons (ANCOVA; F = 8.28; p = .006). This finding was independent of presence or absence of maternal psychosis. These results show that psychotic women are more likely than non-psychotic women to kill their children with weapons. They also show that mothers are more likely to use weapons to kill older children than younger children. PMID:9608698

  19. 36 CFR 504.14 - Weapons and explosives.

    Science.gov (United States)

    2010-07-01

    ... 36 Parks, Forests, and Public Property 3 2010-07-01 2010-07-01 false Weapons and explosives. 504.14 Section 504.14 Parks, Forests, and Public Property SMITHSONIAN INSTITUTION RULES AND REGULATIONS GOVERNING SMITHSONIAN INSTITUTION BUILDINGS AND GROUNDS § 504.14 Weapons and explosives. No person while on the premises shall carry firearms,...

  20. 4 CFR 25.14 - Weapons and explosives.

    Science.gov (United States)

    2010-01-01

    ... 4 Accounts 1 2010-01-01 2010-01-01 false Weapons and explosives. 25.14 Section 25.14 Accounts GOVERNMENT ACCOUNTABILITY OFFICE GENERAL PROCEDURES CONDUCT IN THE GOVERNMENT ACCOUNTABILITY OFFICE BUILDING AND ON ITS GROUNDS § 25.14 Weapons and explosives. No person while entering or in the GAO Building or on its grounds shall carry or...