WorldWideScience

Sample records for changing national security

  1. Climate Change and National Security

    Science.gov (United States)

    2013-02-01

    atmosphere, which is causing warming of global temperatures as well as more extreme and less predictable weather patterns. While this issue is debated in...develop unique, policy-relevant solutions to complex global challenges. About the CCAPS Program The Climate Change and African Political Stability...political circles, scientists overwhelmingly agree that human-induced or anthropogenic climate change is real. Given the complexity of the issue, there

  2. A deeper look at climate change and national security.

    Energy Technology Data Exchange (ETDEWEB)

    Baker, Arnold Barry; Backus, George A.; Romig, Alton Dale, Jr.

    2010-03-01

    Climate change is a long-term process that will trigger a range of multi-dimensional demographic, economic, geopolitical, and national security issues with many unknowns and significant uncertainties. At first glance, climate-change-related national security dimensions seem far removed from today's major national security threats. Yet climate change has already set in motion forces that will require U.S. attention and preparedness. The extent and uncertainty associated with these situations necessitate a move away from conventional security practices, toward a small but flexible portfolio of assets to maintain U.S. interests. Thoughtful action is required now if we are to acquire the capabilities, tools, systems, and institutions needed to meet U.S. national security requirements as they evolve with the emerging stresses and shifts of climate change.

  3. Global Climate Change: National Security Implications

    Science.gov (United States)

    2008-05-01

    Probably long term, the single most important issue we face as a global community.” Cited in sciencepolicy.colorado.edu/ prometheus /archives/climate_ change...Surface Temperature Monitoring for Malaria Early Warning in Botswana,” American Journal of Tropical Medicine and Hygiene, Vol. 73, No. 1, 2005, pp...1950,” Tropical Medicine and International Health, Vol. 7, No. 8, pp. 657-677, August 2002. 9. Price-Smith, Contagion and Chaos. 10. E. Worral et

  4. The Intersection of National Security and Climate Change

    Energy Technology Data Exchange (ETDEWEB)

    Hund, Gretchen [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Fankhauser, Jana G. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Kurzrok, Andrew J. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Sandusky, Jessica A. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States)

    2014-07-29

    On June 4, 2014, the Henry M. Jackson Foundation and the Pacific Northwest National Laboratory hosted a groundbreaking symposium in Seattle, Washington, that brought together 36 leaders from federal agencies, state and local governments, NGOs, business, and academia. The participants examined approaches and tools to help decision makers make informed choices about the climate and security risks they face. The following executive summary is based on the day’s discussions and examines the problem of climate change and its impact on national security, the responses to date, and future considerations.

  5. Climate Change and its Implications to National Security

    Directory of Open Access Journals (Sweden)

    M. Rashid

    2011-01-01

    Full Text Available Problem statement: Climate change is increasingly one of the most serious national security threats which will have significant impacts on natural and coastal resources, ecosystem, human health and settlements, thereby affecting human wellbeing. At the same time, it is likely to influence of large scale human migration, economic and social depression over scarce natural resources and political systems necessary involve an even higher degree of uncertainty. Crucial for action is addressing climate change threats to small island states and states that are least developed, as environmental destabilization may lead to a major economic, environmental and political crisis that may not just affect these states but the world as a whole. Approach: Literatures were identified for review through a comprehensive search by using electronic and non-electronic databases. Related published literature and documents were searched in a systematic way using a range of key words relating to climate change impacts and national security. Results: The literature review indicates that climate change undermine national security dimensions by increasing environmental degradation, resources scarcity, large scale human migration as well as damage of infrastructure. The review also indicate that climate change undermine environmental dimensions by increasing sea level rise, extreme weather events, freshwater scarcity, land degradation and pollution; undermine economic dimensions by reducing access to and the quality of natural resources and human health, in addition to undermine of political dimensions with the possibility of increased environmental refugees, severe storms and failed economics. Conclusion: Reducing climate-induced threats that contributes to national security, there will need to develop an integrated approach in local and national levels and implement sustainable adaptive strategies as well as climate security.

  6. National Security and the Accelerating Risks of Climate Change

    Science.gov (United States)

    2014-05-01

    the physical compo- nents of our national critical infrastructure, while also limiting their capacities. The nation depends on critical...histories ever mentioned such warmth . In both cases, the reply was no. “That really brought this home—here we’re talking to the Inuit, the people who have...change can be detrimental to the physical components of infrastructure and information systems, while also limiting their capacities. ← The

  7. The 2015 National Security Strategy: Authorities, Changes, Issues for Congress

    Science.gov (United States)

    2016-04-05

    diplomacy and potential military operations during the remainder of the Obama Administration. The section devoted to international security in the...challenges, and opportunities the United States faces; international, regional, transnational, hybrid, terrorist, cyber , asymmetric, and weapons of mass...to realize, and the role that the U.S. intends to play on the world stage. 53 Quadrennial Diplomacy and Development Review (QDDR) In 2010, the

  8. The 2015 National Security Strategy: Authorities, Changes, Issues for Congress

    Science.gov (United States)

    2016-02-26

    2010. The 2015 document states that its purpose is to “set out the principles and priorities to guide the use of American power and influence in the...between nations. It also takes a tougher line with both China and with Russia, while emphasizing the desirability for cooperation with both. The 2015...President submits to Congress the budget for the next fiscal year under section 1105 of Title 31. (3) Not later than 150 days after the date on which a new

  9. National Security and the Threat of Climate Change

    Science.gov (United States)

    2007-01-01

    behavior or cataclys- mic mega-disasters such as floods, hurricanes, earthquakes or tsunamis . Problems of this scope may overwhelm the capacity of...predicted effects of climate change over the coming decades include extreme weather events, drought, flooding, sea level rise, retreating glaciers ...to affect all of those things. In some areas of the Middle East, tensions over water already exist. Mountain glaciers are an especially threatened

  10. Climate Change Effects: Issues for International and US National Security

    Science.gov (United States)

    2009-07-01

    scientific understanding of global climate and other environmental and disaster-related phenomena , and consider the implications for both fundamental...Conference “From Bali to Poznan – New Issues, New Challenges.” Conference 12/14/07 H.R. 1585: 2008 Defense Authorization Bill passed House and...Article 12/03/07- 12/14/07 Thirteenth Session of the Conference of the Parties to the UN Framework Convention on Climate Change, Bali . - Closing

  11. Energy and national security.

    Energy Technology Data Exchange (ETDEWEB)

    Karas, Thomas H.

    2003-09-01

    On May 19 and 20, 2003, thirty-some members of Sandia staff and management met to discuss the long-term connections between energy and national security. Three broad security topics were explored: I. Global and U.S. economic dependence on oil (and gas); II. Potential security implications of global climate change; and III. Vulnerabilities of the U.S. domestic energy infrastructure. This report, rather than being a transcript of the workshop, represents a synthesis of background information used in the workshop, ideas that emerged in the discussions, and ex post facto analysis of the discussions. Each of the three subjects discussed at this workshop has significant U.S. national security implications. Each has substantial technology components. Each appears a legitimate area of concern for a national security laboratory with relevant technology capabilities. For the laboratory to play a meaningful role in contributing to solutions to national problems such as these, it needs to understand the political, economic, and social environments in which it expects its work to be accepted and used. In addition, it should be noted that the problems of oil dependency and climate change are not amenable to solution by the policies of any one nation--even the one that is currently the largest single energy consumer. Therefore, views, concerns, policies, and plans of other countries will do much to determine which solutions might work and which might not.

  12. Global climate change and international security. Report on a conference held at Argonne National Laboratory, May 8--10, 1991

    Energy Technology Data Exchange (ETDEWEB)

    Rice, M.

    1991-12-31

    On May 8--10, 1991, the Midwest Consortium of International Security Studies (MCISS) and Argonne National Laboratory cosponsored a conference on Global Climate Change and International Security. The aim was to bring together natural and social scientists to examine the economic, sociopolitical, and security implications of the climate changes predicted by the general circulation models developed by natural scientists. Five themes emerged from the papers and discussions: (1) general circulation models and predicted climate change; (2) the effects of climate change on agriculture, especially in the Third World; (3) economic implications of policies to reduce greenhouse gas emissions; (4) the sociopolitical consequences of climate change; and (5) the effect of climate change on global security.

  13. Energy and National Security

    Science.gov (United States)

    Abelson, Philip H.

    1973-01-01

    Discussed in this editorial is the need for a broad and detailed government policy on energy use. Oil companies can not be given complete responsibility to demonstrate usage of different energy sources. The government should construct plants because energy is connected with national security. (PS)

  14. Implosion lessons from national security, high reliability spacecraft, electronics, and the forces which changed them

    CERN Document Server

    Temple, L Parker

    2012-01-01

    Implosion is a focused study of the history and uses of high-reliability, solid-state electronics, military standards, and space systems that support our national security and defense. This book is unique in combining the interdependent evolution of and interrelationships among military standards, solid-state electronics, and very high-reliability space systems. Starting with a brief description of the physics that enabled the development of the first transistor, Implosion covers the need for standardizing military electronics, which began during World War II and continu

  15. Energy Security is National Security

    Science.gov (United States)

    2011-03-11

    pillar to make up 25% of generation. The four pillars are: Nuclear, Natural Gas, Oil and. Renewables like biomass , hydroelectric, solar, wind and...are rampant in the Alberta tar sands from the massive environmental damage caused from exploiting the tar sands. Several pipelines have been blown-up...reparations for its role in climate change. Despite the massive growth in Biomass fuels, the U.S. . . has only achieved 10% of its energy from renewable

  16. 76 FR 34761 - Classified National Security Information

    Science.gov (United States)

    2011-06-14

    ... Classified National Security Information AGENCY: Marine Mammal Commission. ACTION: Notice. SUMMARY: This... information, as directed by Information Security Oversight Office regulations. FOR FURTHER INFORMATION CONTACT..., ``Classified National Security Information,'' and 32 CFR part 2001, ``Classified National Security......

  17. The Asia-Pacific Maritime Security Strategy: Achieving U.S. National Security Objectives in a Changing Environment

    Science.gov (United States)

    2015-07-27

    For example, Malaysia attempts to restrict foreign military activities within its Exclusive Economic Zone (EEZ), and Vietnam attempts to require...ASIA-PACIFIC Maritime Security Strategy Report Documentation Page Form ApprovedOMB No. 0704-0188 Public reporting burden for the collection of...Operations and Reports , 1215 Jefferson Davis Highway, Suite 1204, Arlington VA 22202-4302. Respondents should be aware that notwithstanding any other

  18. Idaho National Laboratory/Nuclear Power Industry Strategic Plan for Light Water Reactor Research and Development An Industry-Government Partnership to Address Climate Change and Energy Security

    Energy Technology Data Exchange (ETDEWEB)

    Electric Power Research

    2007-11-01

    The dual issues of energy security and climate change mitigation are driving a renewed debate over how to best provide safe, secure, reliable and environmentally responsible electricity to our nation. The combination of growing energy demand and aging electricity generation infrastructure suggests major new capacity additions will be required in the years ahead.

  19. The Role of the DOE Weapons Laboratories in a Changing National Security Environment: CNSS Papers No. 8, April 1988

    Science.gov (United States)

    Hecker, S. S.

    1988-04-01

    The contributions of the Department of Energy (DOE) nuclear weapons laboratories to the nation's security are reviewed in testimony before the Subcommittee on Procurement and Military Nuclear Systems of the House Armed Services Committee. Also presented are contributions that technology will make in maintaining the strategic balance through deterrence, treaty verification, and a sound nuclear weapons complex as the nation prepares for significant arms control initiatives. The DOE nuclear weapons laboratories can contribute to the broader context of national security, one that recognizes that military strength can be maintained over the long term only if it is built upon the foundations of economic strength and energy security.

  20. The role of the DOE weapons laboratories in a changing national security environment: CNSS papers No. 8, April 1988

    Energy Technology Data Exchange (ETDEWEB)

    Hecker, S.S.

    1988-01-01

    The contributions of the Department of Energy (DOE) nuclear weapons laboratories to the nation's security are reviewed in testimony before the Subcommittee on Procurement and Military Nuclear Systems of the House Armed Services Committee. Also presented are contributions that technology will make in maintaining the strategic balance through deterrence, treaty verification, and a sound nuclear weapons complex as the nation prepares for significant arms control initiatives. The DOE nuclear weapons laboratories can contribute to the broader context of national security, one that recognizes that military strength can be maintained over the long term only if it is built upon the foundations of economic strength and energy security. 9 refs.

  1. 75 FR 707 - Classified National Security Information

    Science.gov (United States)

    2010-01-05

    ... National Security Information Memorandum of December 29, 2009--Implementation of the Executive Order ``Classified National Security Information'' Order of December 29, 2009--Original Classification Authority #0... 13526 of December 29, 2009 Classified National Security Information This order prescribes a...

  2. The National Homeland Security Research Center

    Data.gov (United States)

    Federal Laboratory Consortium — The National Homeland Security Research Center advances our nation's security by providing scientific products and expertise to improve the ability to respond to and...

  3. Climate Change, National Security, and the Quadrennial Defense Review. Avoiding the Perfect Storm

    Science.gov (United States)

    2008-01-01

    and in the wrong place. For example, the Amazon Basin is in the grip of a record drought that has been linked to climate-change-induced warming of...precipitation patterns are changing globally, droughts are longer and more severe, heavy rainfall events are increasing in frequency, and tropical cyclones...as a result of global climate change are droughts , floods, and heat waves. While droughts and floods have occurred many times in US and world

  4. Rethinking National Security

    Science.gov (United States)

    1990-10-01

    1989. (U 162 .H29 1989) Hanrieder. Wolfram F., ed. Global Peace and Security: Trend# and Challone . Boulder: Westvlew, 1987. (JX 1952 .G0538 1987...41. Haley. P. Iduard. and Jack Merritt. Nuclear Itratefl, &M Cotl. sA hs Lalut. Boulder: Uestview, 19868. (U 263 .1765 1988) Halloran. Bernard F.. ed...press, Stanford University, 1987. (UA 23 .W38934 1987) Weinberg, Alvin Martin, and Jack N. Barkenbus. Stratojlc Defenses adn AM Con New York: Paragon

  5. Two Degrees of Separation: Abrupt Climate Change and the Adverse Impact to US National Security

    Science.gov (United States)

    2009-04-01

    trend of increasing GHG emissions is marginally impacting or irrelevant altogether. “Other factors, including sun spots, solar winds, variations ...climate variations over a wide range of time scales, making it a natural sensor of climate variability and providing a visible expression of climate...many observed changes in phenology and distribution have been associated with rising water temperatures, as well as changes in salinity, oxygen levels

  6. Road Map for National Security: Imperative for Change The Phase III Report of the U.S. Commission on National Security/21st Century

    Science.gov (United States)

    2007-11-02

    Africa. A problem involving drug cultivation and political rebellion in Colombia cannot be addressed without involving Panama, Venezuela, Bolivia ...institutional reward for honorable military service and integral to the covenant between those who serve in the military and the nation itself. Given the...Senate Government Affairs Committee and Senate Permanent Subcommittee on Investigations; Attorney General of New Hampshire; President, National

  7. National Security Implications of Climate-related Risks and a Changing Climate

    Science.gov (United States)

    2015-07-23

    management . U.S. Central Command (USCENTCOM) similarly monitors resource scarcity (e.g., water, food , energy) in its arid AOR, and accounts for...private sector, and academia to focus on projected climate changes in the Arctic. Resources and Timeline • Acquisition and supply chain requirements...over basic resources such as food and water.1 These impacts are already occurring, and the scope, scale, and intensity of these impacts are projected

  8. Impacts of Climate Change on Colombia’s National and Regional Security

    Science.gov (United States)

    2009-10-01

    their banks. Sev- Magdalena River 112 km northwest of Bogota , eral local cities were flooded, and at one point the is Colombia’s most important...22311-1850 8. PERFORMING ORGANIZATION REPORT NUMBER D0021520.A1 9. SPONSORING / MONITORING AGENCY NAME(S) AND ADDRESS(ES) British Embassy Bogota 10...individually threatened by flooding or sea-level rise, and changes in river levels, sea levels, and the frequency and intensity of El Nifio/La Nifia

  9. The Age of Consequences: The Foreign Policy and National Security Implications of Global Climate Change

    Science.gov (United States)

    2007-11-01

    Krakatau (1882) cost 36,000. The famous eruption of Mt. Vesuvius in AD 79 killed about 3,600, while the worst in U.S. history, Mt. St. Helens in...progressive desiccation — secular climate change —in the West African Sahel drove mounted slave raiders deeper and deeper into West Africa in the years...the experience of 1631 when Naples avoided harm in a great eruption of Mt. Vesuvius . The New Madrid earthquakes of 1811–12, following on serious

  10. National Security Strategy

    Science.gov (United States)

    2010-05-01

    isolation that denies us the ability to shape outcomes. Indeed, America has never succeeded through isolationism . As the nation that helped to build our...more and spending less; by resisting protectionism and promoting trade that is free and fair; by coordinating our actions with other countries, and

  11. National Security Policy: Mexico.

    Science.gov (United States)

    1986-04-01

    President Lazaro Cardenas expropriated the 2 assets of seventeen foreign oil companies to include major United States companies and formed a national oil...Ironically, it was a military man General Lazaro Cardenas , who as president from 1935 to 1940 eliminated the preeminence of the military in

  12. Ingenuity and National Security

    Science.gov (United States)

    2013-06-01

    battlefields in Cuba, the U.S. Army was as valorous as ever, but for every American soldier killed by the enemy (381), more than four died due to the...strategic challenges facing the U.S. potentially requiring joint Army Navy Action. Taft envisioned joint Army-Navy staff action during crisis ...national interests and democratic way of life in the world, increasingly found itself engaged in regional crisis unrelated to the containment of

  13. 14 CFR 1260.31 - National security.

    Science.gov (United States)

    2010-01-01

    ... 14 Aeronautics and Space 5 2010-01-01 2010-01-01 false National security. 1260.31 Section 1260.31... Provisions § 1260.31 National security. National Security October 2000 Normally, NASA grants do not involve... who will have access to the information must obtain the appropriate security clearance in advance...

  14. National Security Strategy: What About the Environment

    Science.gov (United States)

    2006-02-27

    and South Korea, to seabed mining and drilling rights in countries surrounding the Caspian Sea. According to Ambassador Jan Kubis , Secretary General of...national economy, distribute wealth, and provide basic goods and services. Kubis notes, “Such environmental pressures 8 could make social polarization...the U.S. interest (Washington, D.C.: Jewish Institute for National Security Affairs, 2001), x. 21 7 Ibid. 8 Jan Kubis , “Initiative For Change,” Our

  15. Nuclear Physics for National Security

    Science.gov (United States)

    Mayo, Douglass

    2006-10-01

    Being a nuclear physicist and working at a national laboratory provides many opportunities to ply one's skills in support of national security and the benefit of all mankind. Over the last 40 years, Los Alamos National Laboratory has been pioneering the field of Domestic and International Safeguards through the research and development of instrumentation and systems used to monitor nuclear materials and nuclear facilities. With a projected increase in the use of nuclear energy, effective systems must be designed to reduce the possibility that nuclear materials may be diverted for used in weapons. The recent focus has been the many applications of radiation detection used for safeguarding nuclear material and to support Homeland Security. There is a critical need for trained nuclear scientists who can understand and overcome measurement complexities, combinations of multiple sensor inputs, data reduction, and automated analysis for these applications. This talk will focus on the opportunities and experiences afforded physicists in the support of national security, beyond the weapons program and travel to interesting locales.

  16. 10 CFR 605.18 - National security.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 4 2010-01-01 2010-01-01 false National security. 605.18 Section 605.18 Energy DEPARTMENT... PROGRAM § 605.18 National security. Activities under ER's Financial Assistance Program shall not involve classified information (i.e., Restricted Data, formerly Restricted Data, National Security...

  17. 10 CFR 602.16 - National security.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 4 2010-01-01 2010-01-01 false National security. 602.16 Section 602.16 Energy DEPARTMENT... ASSISTANCE PROGRAM § 602.16 National security. Activities under the Epidemiology and Other Health Studies..., Formerly Restricted Data, National Security Information). However, if in the opinion of the recipient...

  18. Global climate change and international security.

    Energy Technology Data Exchange (ETDEWEB)

    Karas, Thomas H.

    2003-11-01

    This report originates in a workshop held at Sandia National Laboratories, bringing together a variety of external experts with Sandia personnel to discuss 'The Implications of Global Climate Change for International Security.' Whatever the future of the current global warming trend, paleoclimatic history shows that climate change happens, sometimes abruptly. These changes can severely impact human water supplies, agriculture, migration patterns, infrastructure, financial flows, disease prevalence, and economic activity. Those impacts, in turn, can lead to national or international security problems stemming from aggravation of internal conflicts, increased poverty and inequality, exacerbation of existing international conflicts, diversion of national and international resources from international security programs (military or non-military), contribution to global economic decline or collapse, or international realignments based on climate change mitigation policies. After reviewing these potential problems, the report concludes with a brief listing of some research, technology, and policy measures that might mitigate them.

  19. Global climate change and international security

    Energy Technology Data Exchange (ETDEWEB)

    Rice, M.

    1991-01-01

    On May 8--10, 1991, the Midwest Consortium of International Security Studies (MCISS) and Argonne National Laboratory cosponsored a conference on Global Climate Change and International Security. The aim was to bring together natural and social scientists to examine the economic, sociopolitical, and security implications of the climate changes predicted by the general circulation models developed by natural scientists. Five themes emerged from the papers and discussions: (1) general circulation models and predicted climate change; (2) the effects of climate change on agriculture, especially in the Third World; (3) economic implications of policies to reduce greenhouse gas emissions; (4) the sociopolitical consequences of climate change; and (5) the effect of climate change on global security.

  20. 78 FR 63232 - President's National Security Telecommunications Advisory Committee

    Science.gov (United States)

    2013-10-23

    ... SECURITY President's National Security Telecommunications Advisory Committee AGENCY: National Protection... Committee Meeting. SUMMARY: The President's National Security Telecommunications Advisory Committee (NSTAC... related to national security and emergency preparedness (NS/EP) telecommunications policy. During...

  1. 77 FR 65393 - President's National Security Telecommunications Advisory Committee

    Science.gov (United States)

    2012-10-26

    ... SECURITY President's National Security Telecommunications Advisory Committee AGENCY: National Protection... Committee Teleconference. SUMMARY: The President's National Security Telecommunications Advisory Committee... national security and emergency preparedness (NS/EP) telecommunications policy. Agenda: The NSTAC...

  2. 15 CFR 742.4 - National security.

    Science.gov (United States)

    2010-01-01

    ... 15 Commerce and Foreign Trade 2 2010-01-01 2010-01-01 false National security. 742.4 Section 742.4... INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE EXPORT ADMINISTRATION REGULATIONS CONTROL POLICY-CCL BASED CONTROLS § 742.4 National security. (a) License requirements. It is the policy of the United States...

  3. Rethinking climate change as a security threat

    Energy Technology Data Exchange (ETDEWEB)

    Schoch, Corinne

    2011-10-15

    Once upon a time climate change was a strictly environment and development issue. Today it has become a matter of national and international security. Efforts to link climate change with violent conflict may not be based on solid evidence, but they have certainly captured the attention of governments. They have played a vital role in raising the much-needed awareness of climate change as an issue that deserves global action. But at what cost? Focusing on climate change as a security threat alone risks devolving humanitarian responsibilities to the military, ignoring key challenges and losing sight of those climate-vulnerable communities that stand most in need of protection.

  4. Department of National Security Affairs [presentation

    OpenAIRE

    2016-01-01

    A slide presentation. The Department of National Security Affairs (NSA) offers fully accredited programs leading to the Master of Arts in Security Studies, as well as a Ph.D. program in Security Studies. In addition to specializing in traditional security domains such as nuclear proliferation, arms control, maritime strategy, interstate wars, insurgency, terrorism and homeland security, the NSA department conducts cutting edge research and education in the areas of cyber warfare, space politi...

  5. Bioethics and the national security state.

    Science.gov (United States)

    Moreno, Jonathan D

    2004-01-01

    In previous work, I have described the history and ethics of human experiments for national security purposes during he cold war and developed the bioethical issues that will be apparent in the "war on terror". This paper is an attempt to bring these two previous lines of work together under the rubric of the "national security state," a concept familiar to Cold War historians and political scientists. The founding of the national security state was associated with the first articulations of informed consent requirements by national security agencies. My analysis indicates that strengthened consent standards, though conventionally thought to be antithetical crisis, can be seen as an attempt by the postwar national security state to protect itself from critics of expanded governmental power. During the coming years the renewed mission of the national security state in the war on terror should impel students of bioethics to consider its implications for the field.

  6. 77 FR 44641 - President's National Security Telecommunications Advisory Committee

    Science.gov (United States)

    2012-07-30

    ... SECURITY President's National Security Telecommunications Advisory Committee AGENCY: National Protection... Committee Teleconference. SUMMARY: The President's National Security Telecommunications Advisory Committee... security and emergency preparedness telecommunications policy. Agenda: The NSTAC members will receive...

  7. Next Generation National Security Leaders

    Energy Technology Data Exchange (ETDEWEB)

    Mahy, Heidi A.; Fankhauser, Jana G.; Stein, Steven L.; Toomey, Christopher

    2012-07-19

    It is generally accepted that the international security community faces an impending challenge in its changing leadership demographics. The workforce that currently addresses nonproliferation, arms control, and verification is moving toward retirement and there is a perceived need for programs to train a new set of experts for both technical- and policy-related functions to replace the retiring generation. Despite the perceived need, there are also indicators that there are not sufficient jobs for individuals we are currently training. If we had “right-sized” the training programs, there would not be a shortage of jobs. The extent and scope of the human resource crisis is unclear, and information about training programs and how they meet existing needs is minimal. This paper seeks to achieve two objectives: 1) Clarify the major human resource problem and potential consequences; and 2) Propose how to characterize the requirement with sufficient granularity to enable key stakeholders to link programs aimed at developing the next generations of experts with employment needs. In order to accomplish both these goals, this paper recommends establishing a forum comprised of key stakeholders of this issue (including universities, public and private sectors), and conducting a study of the human resources and resource needs of the global security community. If there is indeed a human resource crisis in the global security field, we cannot address the problem if we are uninformed. The solution may lie in training more (or fewer) young professions to work in this community – or it may lie in more effectively using our existing resources and training programs.

  8. National Security Policy and Security Challenges of Maldives

    Science.gov (United States)

    2014-06-13

    Constitution 2008. Translated by Dheena Hussein. Male’, Maldives: Republic of Maldives, 2008. Ministry of Tourism , Arts and Culture. Tourism Year... tourism . Maldives faces numerous challenges to its security manifest in economic, political, information, military, social and physical domains. In...threat of radical Islamist terrorism to the tourism industry, foreign influence and organized crime. 15. SUBJECT TERMS National Security Policy

  9. Ten national cyber security strategies: A comparison

    NARCIS (Netherlands)

    Luiijf, H.A.M.; Besseling, K. van; Spoelstra, M.; Graaf, P. de

    2013-01-01

    A number of nations developed and published a national cyber security strategy (NCSS). Most of them were published in the period 2009 - 2011. Despite the fact that each of these NCSS intends to address the cyber security threat, large differences exist between the NCSS approaches. This paper analyse

  10. 78 FR 28237 - President's National Security Telecommunications Advisory Committee

    Science.gov (United States)

    2013-05-14

    ... SECURITY President's National Security Telecommunications Advisory Committee AGENCY: National Protection... Advisory Committee Meeting. SUMMARY: The President's National Security Telecommunications Advisory... Telecommunications Advisory Committee, National Protection and Programs Directorate, Department of Homeland...

  11. Water security-National and global issues

    Science.gov (United States)

    Tindall, James A.; Campbell, Andrew A.

    2010-01-01

    Potable or clean freshwater availability is crucial to life and economic, environmental, and social systems. The amount of freshwater is finite and makes up approximately 2.5 percent of all water on the Earth. Freshwater supplies are small and randomly distributed, so water resources can become points of conflict. Freshwater availability depends upon precipitation patterns, changing climate, and whether the source of consumed water comes directly from desalination, precipitation, or surface and (or) groundwater. At local to national levels, difficulties in securing potable water sources increase with growing populations and economies. Available water improves living standards and drives urbanization, which increases average water consumption per capita. Commonly, disruptions in sustainable supplies and distribution of potable water and conflicts over water resources become major security issues for Government officials. Disruptions are often influenced by land use, human population, use patterns, technological advances, environmental impacts, management processes and decisions, transnational boundaries, and so forth.

  12. National Security Technology Incubator Evaluation Process

    Energy Technology Data Exchange (ETDEWEB)

    None, None

    2007-12-31

    This report describes the process by which the National Security Technology Incubator (NSTI) will be evaluated. The technology incubator is being developed as part of the National Security Preparedness Project (NSPP), funded by a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This report includes a brief description of the components, steps, and measures of the proposed evaluation process. The purpose of the NSPP is to promote national security technologies through business incubation, technology demonstration and validation, and workforce development. The NSTI will focus on serving businesses with national security technology applications by nurturing them through critical stages of early development. An effective evaluation process of the NSTI is an important step as it can provide qualitative and quantitative information on incubator performance over a given period. The vision of the NSTI is to be a successful incubator of technologies and private enterprise that assist the NNSA in meeting new challenges in national safety and security. The mission of the NSTI is to identify, incubate, and accelerate technologies with national security applications at various stages of development by providing hands-on mentoring and business assistance to small businesses and emerging or growing companies. To achieve success for both incubator businesses and the NSTI program, an evaluation process is essential to effectively measure results and implement corrective processes in the incubation design if needed. The evaluation process design will collect and analyze qualitative and quantitative data through performance evaluation system.

  13. National Security Technology Incubator Business Plan

    Energy Technology Data Exchange (ETDEWEB)

    None, None

    2007-12-31

    This document contains a business plan for the National Security Technology Incubator (NSTI), developed as part of the National Security Preparedness Project (NSPP) and performed under a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This business plan describes key features of the NSTI, including the vision and mission, organizational structure and staffing, services, evaluation criteria, marketing strategies, client processes, a budget, incubator evaluation criteria, and a development schedule. The purpose of the NSPP is to promote national security technologies through business incubation, technology demonstration and validation, and workforce development. The NSTI will focus on serving businesses with national security technology applications by nurturing them through critical stages of early development. The vision of the NSTI is to be a successful incubator of technologies and private enterprise that assist the NNSA in meeting new challenges in national safety, security, and protection of the homeland. The NSTI is operated and managed by the Arrowhead Center, responsible for leading the economic development mission of New Mexico State University (NMSU). The Arrowhead Center will recruit business with applications for national security technologies recruited for the NSTI program. The Arrowhead Center and its strategic partners will provide business incubation services, including hands-on mentoring in general business matters, marketing, proposal writing, management, accounting, and finance. Additionally, networking opportunities and technology development assistance will be provided.

  14. National Security Technology Incubator Operations Plan

    Energy Technology Data Exchange (ETDEWEB)

    None

    2008-04-30

    This report documents the operations plan for developing the National Security Technology Incubator (NSTI) program for southern New Mexico. The NSTI program will focus on serving businesses with national security technology applications by nurturing them through critical stages of early development. The NSTI program is being developed as part of the National Security Preparedness Project (NSPP), funded by Department of Energy (DOE)/National Nuclear Security Administration (NNSA). The operation plan includes detailed descriptions of the structure and organization, policies and procedures, scope, tactics, and logistics involved in sustainable functioning of the NSTI program. Additionally, the operations plan will provide detailed descriptions of continuous quality assurance measures based on recommended best practices in incubator development by the National Business Incubation Association (NBIA). Forms that assist in operations of NSTI have been drafted and can be found as an attachment to the document.

  15. Extreme Scale Computing to Secure the Nation

    Energy Technology Data Exchange (ETDEWEB)

    Brown, D L; McGraw, J R; Johnson, J R; Frincke, D

    2009-11-10

    Since the dawn of modern electronic computing in the mid 1940's, U.S. national security programs have been dominant users of every new generation of high-performance computer. Indeed, the first general-purpose electronic computer, ENIAC (the Electronic Numerical Integrator and Computer), was used to calculate the expected explosive yield of early thermonuclear weapons designs. Even the U. S. numerical weather prediction program, another early application for high-performance computing, was initially funded jointly by sponsors that included the U.S. Air Force and Navy, agencies interested in accurate weather predictions to support U.S. military operations. For the decades of the cold war, national security requirements continued to drive the development of high performance computing (HPC), including advancement of the computing hardware and development of sophisticated simulation codes to support weapons and military aircraft design, numerical weather prediction as well as data-intensive applications such as cryptography and cybersecurity U.S. national security concerns continue to drive the development of high-performance computers and software in the U.S. and in fact, events following the end of the cold war have driven an increase in the growth rate of computer performance at the high-end of the market. This mainly derives from our nation's observance of a moratorium on underground nuclear testing beginning in 1992, followed by our voluntary adherence to the Comprehensive Test Ban Treaty (CTBT) beginning in 1995. The CTBT prohibits further underground nuclear tests, which in the past had been a key component of the nation's science-based program for assuring the reliability, performance and safety of U.S. nuclear weapons. In response to this change, the U.S. Department of Energy (DOE) initiated the Science-Based Stockpile Stewardship (SBSS) program in response to the Fiscal Year 1994 National Defense Authorization Act, which requires, 'in the

  16. The Perception of National Security in Georgia

    Directory of Open Access Journals (Sweden)

    Merabishvili Gela

    2016-12-01

    Full Text Available This article examines how the on-going confrontation between Russia and the West affects perceptions of security in Georgia. Our angle is twofold: in addition to comparing previous National Security Concepts of Georgia we examine both governmental and public perceptions of security in the light of Georgia’s foreign policy priorities, its relationship with neighbouring countries and conflict resolution policy. Since Georgia declares 20 per cent of its territory to be occupied, the article focuses particularly on the crisis in Ukraine and its effect on security debates in Georgia. As the upcoming parliamentary elections in Georgia in autumn 2016 are highly important to maintain the current foreign policy course and secure achievements, the paper also tries to answer how these global and regional developments may be interpreted and reflected in the next National Security Concept of Georgia (whenever it might be published.

  17. 76 FR 40296 - Declassification of National Security Information

    Science.gov (United States)

    2011-07-08

    ... RECORDS ADMINISTRATION 36 CFR Part 1260 RIN 3095-AB64 Declassification of National Security Information... would update NARA's regulations related to declassification of classified national security information... of Executive Order 13526, Classified National Security Information, and its Implementing...

  18. 77 FR 75182 - President's National Security Telecommunications Advisory Committee

    Science.gov (United States)

    2012-12-19

    ... SECURITY President's National Security Telecommunications Advisory Committee AGENCY: National Protection... Committee Teleconference. SUMMARY: The President's National Security Telecommunications Advisory Committee... telecommunications policy. Agenda: The NSTAC members will receive an update on progress made to date by the...

  19. 76 FR 17424 - President's National Security Telecommunications Advisory Committee

    Science.gov (United States)

    2011-03-29

    ... SECURITY President's National Security Telecommunications Advisory Committee AGENCY: National Protection... Committee Meeting. SUMMARY: The President's National Security Telecommunications Advisory Committee (NSTAC... preparedness telecommunications policy. The NSTAC Chair, Mr. James Crowe, will call the meeting to order...

  20. 75 FR 16159 - President's National Security Telecommunications Advisory Committee

    Science.gov (United States)

    2010-03-31

    ... SECURITY National Communications System President's National Security Telecommunications Advisory Committee...: The President's National Security Telecommunications Advisory Committee (NSTAC) will hold its annual... and emergency preparedness telecommunications policy. Notice of this meeting is given under...

  1. 75 FR 3913 - President's National Security Telecommunications Advisory Committee

    Science.gov (United States)

    2010-01-25

    ... SECURITY National Communications System President's National Security Telecommunications Advisory Committee...: The President's National Security Telecommunications Advisory Committee (NSTAC) will be meeting by... telecommunications policy. Notice of this meeting is given under the Federal Advisory Committee Act (FACA),...

  2. 76 FR 52672 - President's National Security Telecommunications Advisory Committee

    Science.gov (United States)

    2011-08-23

    ... SECURITY President's National Security Telecommunications Advisory Committee AGENCY: National Protection... Committee Teleconference. SUMMARY: The President's National Security Telecommunications Advisory Committee... telecommunications policy. During the conference call, the NSTAC members will receive an update regarding...

  3. 77 FR 24728 - President's National Security Telecommunications Advisory Committee

    Science.gov (United States)

    2012-04-25

    ... SECURITY President's National Security Telecommunications Advisory Committee AGENCY: National Protection... Advisory Committee Meeting. SUMMARY: The President's National Security Telecommunications Advisory... telecommunications policy. Agenda: The committee will meet in open session to receive a briefing on the...

  4. 78 FR 8160 - President's National Security Telecommunications Advisory Committee

    Science.gov (United States)

    2013-02-05

    ... SECURITY President's National Security Telecommunications Advisory Committee AGENCY: National Protection... Committee Teleconference. SUMMARY: The President's National Security Telecommunications Advisory Committee... telecommunications policy. Agenda: The NSTAC members will review and discuss the draft NSTAC Report to the...

  5. 77 FR 6813 - President's National Security Telecommunications Advisory Committee

    Science.gov (United States)

    2012-02-09

    ... SECURITY President's National Security Telecommunications Advisory Committee AGENCY: National Protection... Committee Teleconference. SUMMARY: The President's National Security Telecommunications Advisory Committee... and emergency preparedness telecommunications policy. During the conference call, the NSTAC...

  6. 75 FR 29781 - President's National Security Telecommunications Advisory Committee

    Science.gov (United States)

    2010-05-27

    ... SECURITY National Communications System President's National Security Telecommunications Advisory Committee... meeting. SUMMARY: The President's National Security Telecommunications Advisory Committee (NSTAC) will be... preparedness telecommunications policy. Notice of this meeting is given under the Federal Advisory...

  7. 78 FR 45255 - President's National Security Telecommunications Advisory Committee

    Science.gov (United States)

    2013-07-26

    ... SECURITY President's National Security Telecommunications Advisory Committee AGENCY: National Protection... Committee Teleconference. SUMMARY: The President's National Security Telecommunications Advisory Committee... preparedness (NS/EP) telecommunications policy. Agenda: The NSTAC members will deliberate and vote on the...

  8. 78 FR 29145 - President's National Security Telecommunications Advisory Committee

    Science.gov (United States)

    2013-05-17

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF HOMELAND SECURITY President's National Security Telecommunications Advisory Committee AGENCY: National Protection...'s National Security Telecommunications Advisory Committee (NSTAC). The document contained...

  9. 76 FR 28443 - President's National Security Telecommunications Advisory Committee

    Science.gov (United States)

    2011-05-17

    ... users from legacy Land Mobile Radio to 4G technologies for their mobile telecommunications needs. The... SECURITY President's National Security Telecommunications Advisory Committee AGENCY: National Protection... Advisory Committee Meeting. SUMMARY: The President's National Security Telecommunications...

  10. THE NATIONAL SECURITY - MEDIA POWER LINKAGE. A THEORETICAL FRAMEWORK

    Directory of Open Access Journals (Sweden)

    KARIN MEGHEŞAN

    2013-05-01

    Full Text Available The mechanism of national security policy is an issue of increasing interests in post cold war era. But what is the impact of the media upon national security policy decision making? New world wide events show us that more than ever national policy is often at the mercy of the media. The Wiki leaks, the Murdoch inquiry, the impact of new social media on Arab democratic movements are just some examples regarding the effect of nearly simultaneous presentation of information around the world. The world is changing, and the processes by which national policy is developed may also be changing especially in the security domain. The essence of this study, as the title suggests is the idea of a „dual use” media in the national security issues. This study employs a relatively narrow definition of national security issues as only those which are concerned with national survival and preservation of our society. The media affects us as individuals and as a collective body so we will like to focus on a realistic understanding of the media-secrecy-security linkage, noting that we will do nothing else but advance and underline the main points of view from the public and scientific discourse.

  11. Global water risks and national security: Building resilience (Invited)

    Science.gov (United States)

    Pulwarty, R. S.

    2013-12-01

    The UN defines water security as the capacity of a population to safeguard sustainable access to adequate quantities of acceptable quality water for sustaining livelihoods, human well-being, and socio-economic development, for ensuring protection against water-borne pollution and water-related disasters, and for preserving ecosystems in a climate of peace and political stability. This definition highlights complex and interconnected challenges and underscores the centrality of water for environmental services and human aactivities. Global risks are expressed at the national level. The 2010 Quadrennial Defense Review and the 2010 National Security Strategy identify climate change as likely to trigger outcomes that will threaten U.S. security including how freshwater resources can become a security issue. Impacts will be felt on the National Security interest through water, food and energy security, and critical infrastructure. This recognition focuses the need to consider the rates of change in climate extremes, in the context of more traditional political, economic, and social indicators that inform security analyses. There is a long-standing academic debate over the extent to which resource constraints and environmental challenges lead to inter-state conflict. It is generally recognized that water resources as a security issue to date exists mainly at the substate level and has not led to physical conflict between nation states. In conflict and disaster zones, threats to water security increase through inequitable and difficult access to water supply and related services, which may aggravate existing social fragility, tensions, violence, and conflict. This paper will (1) Outline the dimensions of water security and its links to national security (2) Analyze water footprints and management risks for key basins in the US and around the world, (3) map the link between global water security and national concerns, drawing lessons from the drought of 2012 and elsewhere

  12. National Security Technology Incubation Project Continuation Plan

    Energy Technology Data Exchange (ETDEWEB)

    None

    2008-09-30

    This document contains a project continuation plan for the National Security Technology Incubator (NSTI). The plan was developed as part of the National Security Preparedness Project (NSPP) funded by a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This continuation plan describes the current status of NSTI (staffing and clients), long-term goals, strategies, and long-term financial solvency goals.The Arrowhead Center of New Mexico State University (NMSU) is the operator and manager of the NSTI. To realize the NSTI, Arrowhead Center must meet several performance objectives related to planning, development, execution, evaluation, and sustainability. This continuation plan is critical to the success of NSTI in its mission of incubating businesses with security technology products and services.

  13. CHANGES IN THE SECURITY AGENDA: CRITICAL SECURITY STUDIES AND HUMAN SECURITY. THE CASE OF CHINA

    OpenAIRE

    Nguyen THI THUY HANG

    2012-01-01

    Since the end of the Cold War the meaning of security has fundamentally changed. Issues which are labeled as non-traditional security namely human development, economic crises, environmental degradation, natural disaster, poverty, epidemics… have become a crucial part of the security agenda. These changes have been intensified with the development of the two approaches: Critical Security Studies and Human Security. This article explores how the meaning of security has change...

  14. Vulnerability of Energy Consumers - National Security Issue

    Directory of Open Access Journals (Sweden)

    Musatescu Virgil

    2016-04-01

    Full Text Available Energy providing is a complex problem, which includes both common features for all categories of consumers and particularities, which emerge from the declaration on human rights. As an index of the level of heat using the concept of 'energy poverty'. In counterbalance, this concept proposes the use of the notion of "vulnerability" for these purposes. The concept of "vulnerable consumer" point of view of energy is still defined in the 2012 electricity law in Romania. In this context, the paper examines the vulnerability characteristics indicating meanings on widening energy paradigm by replacing the phrase "energy poverty" by "energy welfare". The paper presents quantitative issues regarding the current situation in Romania with explaining the need treatment paradigm change simplistic approach to the problem of vulnerable consumers, which really is a matter of national security.

  15. Nevada National Security Site Radiological Control Manual

    Energy Technology Data Exchange (ETDEWEB)

    Radiological Control Managers’ Council

    2012-03-26

    This document supersedes DOE/NV/25946--801, 'Nevada Test Site Radiological Control Manual,' Revision 1 issued in February 2010. Brief Description of Revision: A complete revision to reflect a recent change in name for the NTS; changes in name for some tenant organizations; and to update references to current DOE policies, orders, and guidance documents. Article 237.2 was deleted. Appendix 3B was updated. Article 411.2 was modified. Article 422 was re-written to reflect the wording of DOE O 458.1. Article 431.6.d was modified. The glossary was updated. This manual contains the radiological control requirements to be used for all radiological activities conducted by programs under the purview of the U.S. Department of Energy (DOE) and the U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office (NNSA/NSO). Compliance with these requirements will ensure compliance with Title 10 Code of Federal Regulations (CFR) Part 835, 'Occupational Radiation Protection.' Programs covered by this manual are located at the Nevada National Security Site (NNSS); Nellis Air Force Base and North Las Vegas, Nevada; Santa Barbara and Livermore, California; and Andrews Air Force Base, Maryland. In addition, fieldwork by NNSA/NSO at other locations is covered by this manual. Current activities at NNSS include operating low-level radioactive and mixed waste disposal facilities for United States defense-generated waste, assembly and execution of subcritical experiments, assembly/disassembly of special experiments, the storage and use of special nuclear materials, performing criticality experiments, emergency responder training, surface cleanup and site characterization of contaminated land areas, environmental activity by the University system, and nonnuclear test operations, such as controlled spills of hazardous materials at the Hazardous Materials Spill Center. Currently, the major potential for occupational radiation exposure is associated with the burial of

  16. Risk assessment of climate systems for national security.

    Energy Technology Data Exchange (ETDEWEB)

    Backus, George A.; Boslough, Mark Bruce Elrick; Brown, Theresa Jean; Cai, Ximing; Conrad, Stephen Hamilton; Constantine, Paul G; Dalbey, Keith R.; Debusschere, Bert J.; Fields, Richard; Hart, David Blaine; Kalinina, Elena Arkadievna; Kerstein, Alan R.; Levy, Michael; Lowry, Thomas Stephen; Malczynski, Leonard A.; Najm, Habib N.; Overfelt, James Robert; Parks, Mancel Jordan; Peplinski, William J.; Safta, Cosmin; Sargsyan, Khachik; Stubblefield, William Anthony; Taylor, Mark A.; Tidwell, Vincent Carroll; Trucano, Timothy Guy; Villa, Daniel L.

    2012-10-01

    Climate change, through drought, flooding, storms, heat waves, and melting Arctic ice, affects the production and flow of resource within and among geographical regions. The interactions among governments, populations, and sectors of the economy require integrated assessment based on risk, through uncertainty quantification (UQ). This project evaluated the capabilities with Sandia National Laboratories to perform such integrated analyses, as they relate to (inter)national security. The combining of the UQ results from climate models with hydrological and economic/infrastructure impact modeling appears to offer the best capability for national security risk assessments.

  17. Extreme Scale Computing to Secure the Nation

    Energy Technology Data Exchange (ETDEWEB)

    Brown, D L; McGraw, J R; Johnson, J R; Frincke, D

    2009-11-10

    Since the dawn of modern electronic computing in the mid 1940's, U.S. national security programs have been dominant users of every new generation of high-performance computer. Indeed, the first general-purpose electronic computer, ENIAC (the Electronic Numerical Integrator and Computer), was used to calculate the expected explosive yield of early thermonuclear weapons designs. Even the U. S. numerical weather prediction program, another early application for high-performance computing, was initially funded jointly by sponsors that included the U.S. Air Force and Navy, agencies interested in accurate weather predictions to support U.S. military operations. For the decades of the cold war, national security requirements continued to drive the development of high performance computing (HPC), including advancement of the computing hardware and development of sophisticated simulation codes to support weapons and military aircraft design, numerical weather prediction as well as data-intensive applications such as cryptography and cybersecurity U.S. national security concerns continue to drive the development of high-performance computers and software in the U.S. and in fact, events following the end of the cold war have driven an increase in the growth rate of computer performance at the high-end of the market. This mainly derives from our nation's observance of a moratorium on underground nuclear testing beginning in 1992, followed by our voluntary adherence to the Comprehensive Test Ban Treaty (CTBT) beginning in 1995. The CTBT prohibits further underground nuclear tests, which in the past had been a key component of the nation's science-based program for assuring the reliability, performance and safety of U.S. nuclear weapons. In response to this change, the U.S. Department of Energy (DOE) initiated the Science-Based Stockpile Stewardship (SBSS) program in response to the Fiscal Year 1994 National Defense Authorization Act, which requires, 'in the

  18. CHANGES IN THE SECURITY AGENDA: CRITICAL SECURITY STUDIES AND HUMAN SECURITY. THE CASE OF CHINA

    Directory of Open Access Journals (Sweden)

    Nguyen THI THUY HANG

    2012-06-01

    Full Text Available Since the end of the Cold War the meaning of security has fundamentally changed. Issues which are labeled as non-traditional security namely human development, economic crises, environmental degradation, natural disaster, poverty, epidemics… have become a crucial part of the security agenda. These changes have been intensified with the development of the two approaches: Critical Security Studies and Human Security. This article explores how the meaning of security has changed and how the boundaries between traditional and non-traditional security have become blurred. The case of China is taken as empirical evidence to support the assertion that security has evolved beyond its traditional focus on the state.

  19. Nevada National Security Site Waste Acceptance Criteria

    Energy Technology Data Exchange (ETDEWEB)

    NSTec Environmental Management

    2010-09-03

    This document establishes the U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office (NNSA/NSO) Nevada National Security Site Waste Acceptance Criteria (NNSSWAC). The NNSSWAC provides the requirements, terms, and conditions under which the Nevada National Security Site (NNSS) will accept low-level radioactive waste and mixed low-level waste for disposal. The NNSSWAC includes requirements for the generator waste certification program, characterization, traceability, waste form, packaging, and transfer. The criteria apply to radioactive waste received at the NNSS Area 3 and Area 5 Radioactive Waste Management Complex for disposal. The NNSA/NSO and support contractors are available to assist you in understanding or interpreting this document. For assistance, please call the NNSA/NSO Waste Management Project at (702) 295-7063 or fax to (702) 295-1153.

  20. Nevada National Security Site Waste Acceptance Criteria

    Energy Technology Data Exchange (ETDEWEB)

    NSTec Environmental Management

    2011-01-01

    This document establishes the U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office (NNSA/NSO) Nevada National Security Site Waste Acceptance Criteria (NNSSWAC). The NNSSWAC provides the requirements, terms, and conditions under which the Nevada National Security Site (NNSS) will accept low-level radioactive waste and mixed low-level waste for disposal. The NNSSWAC includes requirements for the generator waste certification program, characterization, traceability, waste form, packaging, and transfer. The criteria apply to radioactive waste received at the NNSS Area 3 and Area 5 Radioactive Waste Management Complex for disposal. The NNSA/NSO and support contractors are available to assist you in understanding or interpreting this document. For assistance, please call the NNSA/NSO Waste Management Project at (702) 295-7063 or fax to (702) 295-1153.

  1. Nevada National Security Site Environmental Report 2013

    Energy Technology Data Exchange (ETDEWEB)

    Wills, C.

    2014-09-09

    This report was prepared to meet the information needs of the public and the requirements and guidelines of the U.S. Department of Energy (DOE) for annual site environmental reports. It was prepared by National Security Technologies, LLC (NSTec), for the U.S. Department of Energy, National Nuclear Security Administration Nevada Field Office (NNSA/NFO) (formerly designated as the Nevada Site Office [NNSA/NSO]). The new field office designation occurred in March 2013. Published reports cited in this 2013 report, therefore, may bear the name or authorship of NNSA/NSO. This and previous years’ reports, called Annual Site Environmental Reports (ASERs), Nevada Test Site Environmental Reports (NTSERs), and, beginning in 2010, Nevada National Security Site Environmental Reports (NNSSERs), are posted on the NNSA/NFO website at http://www.nv.energy.gov/library/publications/aser.aspx.

  2. How Does Globalization Affect the National Security?

    Directory of Open Access Journals (Sweden)

    Florinel Iftode

    2011-05-01

    Full Text Available Globalization as a process of integration of national economies has led to the creation of a single world economic system. The signs of globalization have appeared before the First World War, in fact, globalization is produced not only the economic aspect, but also the cultural one (it tends to interweave and even standardize the material and spiritual culture of mankind and informational one caused by the Internet. The globalization is the most dynamic and broader geopolitical process in the contemporary world. Among its most visible effects it includes the gradual erosion of the pivotal concepts of geopolitics, such as border, territoriality or sphere of influence, increasing the role of international policy actors - international organizations and transnational companies - to the detriment of states; these phenomena are accompanied also by the revision of ideas concerning sovereignty, nation-state and nation. Within just two decades, "the world order" has undergone considerable changes. The bipolar international system during the Cold War has become one pole with the collapse of the Soviet Union. But here, now, the world is again changing. New powers are rising, including Russia which is in a recovery of form, an emerging multipolar world is increasingly visible. All these mutations did not remain without effect on the geopolitical framework. The powers redefine their areas of influence, new geopolitical objectives gain priority on the states’ agenda. We therefore consider that it is necessary a deep analysis on how the new challenges arising from globalization tend to crystallize in the international security environment, in general, and of Romania in particular. Along with Romania, both NATO and the European Union becomes a regional dimension in the area of influence of Romania.

  3. MANAGEMENT OF RESOURCES IN DYNAMICALLY CHANGING SECURITY ENVRIONMENT

    Directory of Open Access Journals (Sweden)

    Sevdalina Dimitrova

    2014-09-01

    Full Text Available The monograph recommends integration between science and practice, experts from national bodies and scientific research potential of academic community of military universities in the field of management of resources of security and defence in accordance to the challenges in security environment caused by its dynamic and often unpredictable changes.

  4. Rand National Security Division Annual Report 2006

    Science.gov (United States)

    2007-01-01

    pubs/ monographs/MG517/ The Global Technology Revolution 2020, Executive Summary: Bio/ Nano /Materials/ Information Trends, Drivers, Barriers, and...Revolution 2020, In-Depth Analyses: Bio/ Nano /Materials/ Information Trends, Drivers, Barriers, and Social Implications. Richard Silberglitt, Philip S...Research Institute Advisory Board 34 RAND National Security Research Division Ratan N. Tata (Chair) Chairman, Tata Industries Limited, Mumbai, India

  5. US and Brazil: Prospective National Security Partners

    Science.gov (United States)

    2001-01-01

    Chapter 5, “National Security,” data as of April 1997. Maxwell, Kenneth. “George W., King Canute , and Brazil,” Article published by Council on Foreign...22. [22] Kenneth Maxwell, “George W., King Canute , and Brazil,” article published by Council on Foreign Relations, 15 Dec 2000. (Hereafter referred

  6. New rules revamp national security prosecutions

    Science.gov (United States)

    Gwynne, Peter

    2016-06-01

    Following the collapse of recent prosecutions of Chinese-American scientists on national security grounds, the US Department of Justice (DOJ) has issued new rules on such lawsuits that will require top officials in Washington to review and supervise all cases that implicitly involve spying - rather than leaving decisions to local prosecutors.

  7. Alternate Energy for National Security.

    Science.gov (United States)

    Rath, Bhakta

    2010-02-01

    Recent price fluctuations at the gas pump have brought our attention to the phenomenal increase of global energy consumption in recent years. It is now evident that we have almost reached a peak in global oil production. Several projections indicate that total world consumption of oil will rise by nearly 60 per cent between 1999 and 2020. In 1999 consumption was equivalent to 86 million barrels of oil per day, which has reached a peak of production extracted from most known oil reserves. These projections, if accurate, will present an unprecedented crisis to the global economy and industry. As an example, in the US, nearly 40 per cent of energy usage is provided by petroleum, of which nearly a third is used in transportation. The US Department of Defense (DOD) is the single largest buyer of fuel, amounting to, on the average, 13 million gallons per day. Additionally, these fuels have to meet different requirements that prevent use of ethanol additives and biodiesel. An aggressive search for alternate energy sources, both renewable and nonrenewable, is vital. The presentation will review national and DOD perspectives on the exploration of alternate energy with a focus on energy derivable from the ocean. )

  8. Critical Infrastructure Protection: Maintenance is National Security

    Directory of Open Access Journals (Sweden)

    Kris Hemme

    2015-10-01

    Full Text Available U.S. critical infrastructure protection (CIP necessitates both the provision of security from internal and external threats and the repair of physically damaged critical infrastructure which may disrupt services. For years, the U.S. infrastructure has been deteriorating, triggering enough damage and loss of life to give cause for major concern. CIP is typically only addressed after a major disaster or catastrophe due to the extreme scrutiny that follows these events. In fact, CIP has been addressed repeatedly since Presidential Decision Directive Sixty-Three (PDD Sixty-Three signed by President Bill Clinton on May Twenty-Second, 1998.[1] This directive highlighted critical infrastructure as “a growing potential vulnerability” and recognized that the United States has to view the U.S. national infrastructure from a security perspective due to its importance to national and economic security. CIP must be addressed in a preventive, rather than reactive, manner.[2] As such, there are sixteen critical infrastructure sectors, each with its own protection plan and unique natural and man-made threats, deteriorations, and risks. A disaster or attack on any one of these critical infrastructures could cause serious damage to national security and possibly lead to the collapse of the entire infrastructure. [1] The White House, Presidential Decision Directive/NSC–63 (Washington D.C.: The White House, May 22, 1998: 1–18, available at: http://www.epa.gov/watersecurity/tools/trainingcd/Guidance/pdd-63.pdf. [2] Ibid, 1.

  9. 全球国家网络安全战略的变革%Changes in the national cyber-security strategies in a global perspective

    Institute of Scientific and Technical Information of China (English)

    吴关龙; 冯潇洒

    2015-01-01

    Recently,the emergence of the national cyber-security strategy reflects the mentality of"soft law governance".Though there is no internationally concerted definition on cyber-security,all the countries of the world regard it as the foundation of their national stability and economic develop-ment.Around 2010,the emergence of the new-generation cyber-security strategy predicted the new trend of the global cyber-security strategy,whose concepts,principles and strategies have become more flexible and whose achievements and experience can shed much light on China’s current imple-mentation of its own cyber-security strategy.%国家网络安全战略的兴起体现了网络安全“软法治理”的思路。尽管各国对于网络安全的概念尚未达成统一,但无一例外将网络安全作为国家稳定和经济发展的基础。在2010年前后,新一代网络安全战略预示了全球网络安全战略的变革态势,其理念、原则和策略变得更为丰富和弹性。我国目前正在积极部署自己的网络安全战略,全球国家网络安全战略变革中的成果和经验值得我国进行深入研判。

  10. Nuclear Arms and National Security. 1983 National Issues Forum.

    Science.gov (United States)

    Melville, Keith, Ed.

    Appropriate for secondary school social studies, this booklet outlines approaches for dealing with the threat of nuclear warfare in six sections. The first section, "Learning to Live with Nuclear Weapons," introduces the topic and considers what can be done to decrease the risk of nuclear warfare without jeopardizing the nation's security. "Arms…

  11. Selecting RMF Controls for National Security Systems

    Energy Technology Data Exchange (ETDEWEB)

    Witzke, Edward L. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2015-08-01

    In 2014, the United States Department of Defense started tra nsitioning the way it performs risk management and accreditation of informatio n systems to a process entitled Risk Management Framework for DoD Information Technology or RMF for DoD IT. There are many more security and privacy contro ls (and control enhancements) from which to select in RMF, than there w ere in the previous Information Assurance process. This report is an attempt t o clarify the way security controls and enhancements are selected. After a brief overview and comparison of RMF for DoD I T with the previously used process, this report looks at the determination of systems as National Security Systems (NSS). Once deemed to be an NSS, this report addr esses the categorization of the information system with respect to impact level s of the various security objectives and the selection of an initial baseline o f controls. Next, the report describes tailoring the controls through the use of overl ays and scoping considerations. Finally, the report discusses organizatio n-defined values for tuning the security controls to the needs of the information system.

  12. National Security and the Right to Information in Europe

    DEFF Research Database (Denmark)

    Jacobsen, Amanda Lynn

    2013-01-01

    Full text available at: http://cast.ku.dk/pdf/National_Security_and_the_Right_to_Information.pdf/......Full text available at: http://cast.ku.dk/pdf/National_Security_and_the_Right_to_Information.pdf/...

  13. 76 FR 72427 - President's National Security Telecommunications Advisory Committee

    Science.gov (United States)

    2011-11-23

    ... Security Telecommunications Advisory Committee AGENCY: National Protection and Programs Directorate, DHS... President's National Security Telecommunications Advisory Committee (NSTAC) will meet on Thursday, December...) telecommunications policy. During the meeting, NSTAC members will receive feedback from the Department of...

  14. VICARS and MANAGERS: Organizing for National Security

    Science.gov (United States)

    1988-11-01

    involvement pushes the NSC staff, and especially the NSC adviser, out of the role of neutral policy coordination and into the mainstream of daily decisions...position of either ruhber- stampin ( or challenging what for all he knew had already been approved by the President. 30 Second. there is a natural...the same time, it is highly unstable: the national security adviser will be constantly lured or pushed across the line separating his role from the

  15. Nevada National Security Site Environmental Report 2011

    Energy Technology Data Exchange (ETDEWEB)

    Cathy Wills, ed

    2012-09-12

    This report was prepared to meet the information needs of the public and the requirements and guidelines of the U.S. Department of Energy (DOE) for annual site environmental reports. It was prepared by National Security Technologies, LLC (NSTec), for the U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office (NNSA/NSO). This and previous years reports, called Annual Site Environmental Reports (ASERs), Nevada Test Site Environmental Reports (NTSERs), and, beginning in 2010, Nevada National Security Site Environmental Reports (NNSSERs), are posted on the NNSA/NSO website at http://www.nv.energy.gov/library/publications/aser.aspx. This NNSSER was prepared to satisfy DOE Order DOE O 231.1B, 'Environment, Safety and Health Reporting.' Its purpose is to (1) report compliance status with environmental standards and requirements, (2) present results of environmental monitoring of radiological and nonradiological effluents, (3) report estimated radiological doses to the public from releases of radioactive material, (4) summarize environmental incidents of noncompliance and actions taken in response to them, (5) describe the NNSA/NSO Environmental Management System and characterize its performance, and (6) highlight significant environmental programs and efforts. This NNSSER summarizes data and compliance status for calendar year 2011 at the Nevada National Security Site (NNSS) (formerly the Nevada Test Site) and its two support facilities, the North Las Vegas Facility (NLVF) and the Remote Sensing Laboratory-Nellis (RSL-Nellis). It also addresses environmental restoration (ER) projects conducted at the Tonopah Test Range (TTR). Through a Memorandum of Agreement, NNSA/NSO is responsible for the oversight of TTR ER projects, and the Sandia Site Office of NNSA (NNSA/SSO) has oversight of all other TTR activities. NNSA/SSO produces the TTR annual environmental report available at http://www.sandia.gov/news/publications/environmental/index.html.

  16. Narcocultura: a threat to Mexican national security?

    OpenAIRE

    Fugate, Ashleigh A.

    2012-01-01

    Approved for public release; distribution is unlimited. This project analyzes the collective identity and narratives surrounding the culture of the drug trafficking organizations (DTOs), or narcocultura, in Mexico. It questions whether the visible cultural artifacts of the DTOs reflect a cultural identity or if they create an identity that threatens Mexican national security. The analysis establishes that narcocultura is a relevant framework to study Mexican transnational organized crime (...

  17. National Security Space Launch at a Crossroads

    Science.gov (United States)

    2016-05-13

    critical” breach occurs when the program acquisition or the procurement unit cost increases 25% or more over the current baseline estimate or 50% or more...Force’s ability to continue with its current three-phase EELV acquisition strategy. These include ongoing concerns over program and launch costs ...space for national security missions. The current strategy for the EELV (Evolved Expendable Launch Vehicle) program dates from the 1990s and has since

  18. Nevada National Security Site Waste Acceptance Criteria

    Energy Technology Data Exchange (ETDEWEB)

    none,

    2013-06-01

    This document establishes the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Field Office (NNSA/NFO), Nevada National Security Site Waste Acceptance Criteria (NNSSWAC). The NNSSWAC provides the requirements, terms, and conditions under which the Nevada National Security Site (NNSS) will accept the following: • DOE hazardous and non-hazardous non-radioactive classified waste • DOE low-level radioactive waste (LLW) • DOE mixed low-level waste (MLLW) • U.S. Department of Defense (DOD) classified waste The LLW and MLLW listed above may also be classified waste. Classified waste is the only waste accepted for disposal that may be non-radioactive and shall be required to meet the waste acceptance criteria for radioactive waste as specified in this document. Classified waste may be sent to the NNSS as classified matter. Section 3.1.18 provides the requirements that must be met for permanent burial of classified matter. The NNSA/NFO and support contractors are available to assist the generator in understanding or interpreting this document. For assistance, please call the NNSA/NFO Environmental Management Operations (EMO) at (702) 295-7063, and the call will be directed to the appropriate contact.

  19. Nevada National Security Site Waste Acceptance Criteria

    Energy Technology Data Exchange (ETDEWEB)

    NSTec Environmental Management

    2012-02-28

    This document establishes the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Site Office (NNSA/NSO), Nevada National Security Site Waste Acceptance Criteria (NNSSWAC). The NNSSWAC provides the requirements, terms, and conditions under which the Nevada National Security Site (NNSS) will accept DOE non-radioactive classified waste, DOE non-radioactive hazardous classified waste, DOE low-level radioactive waste (LLW), DOE mixed low-level waste (MLLW), and U.S. Department of Defense (DOD) classified waste for permanent disposal. Classified waste is the only waste accepted for disposal that may be non-radioactive and will be required to meet the waste acceptance criteria for radioactive waste as specified in this document. The NNSA/NSO and support contractors are available to assist you in understanding or interpreting this document. For assistance, please call the NNSA/NSO Waste Management Project (WMP) at (702) 295-7063, and your call will be directed to the appropriate contact.

  20. 75 FR 10507 - Information Security Oversight Office; National Industrial Security Program Policy Advisory...

    Science.gov (United States)

    2010-03-08

    ... RECORDS ADMINISTRATION Information Security Oversight Office; National Industrial Security Program Policy... submitted to the Information Security Oversight Office (ISOO) no later than Wednesday, March 17, 2010. ISOO... regulation 41 CFR 101-6, announcement is made for a meeting of the National Industrial Security...

  1. 48 CFR 6.302-6 - National security.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 1 2010-10-01 2010-10-01 false National security. 6.302-6... COMPETITION REQUIREMENTS Other Than Full and Open Competition 6.302-6 National security. (a) Authority. (1... for when the disclosure of the agency's needs would compromise the national security unless the...

  2. 48 CFR 606.302-6 - National security.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 4 2010-10-01 2010-10-01 false National security. 606.302... ACQUISITION PLANNING COMPETITION REQUIREMENTS Other Than Full and Open Competition 606.302-6 National security. (b) This subsection applies to all acquisitions involving national security information,...

  3. Department of Energy award DE-SC0004164 Climate and National Security: Securing Better Forecasts

    Energy Technology Data Exchange (ETDEWEB)

    Reno Harnish

    2011-08-16

    The Climate and National Security: Securing Better Forecasts symposium was attended by senior policy makers and distinguished scientists. The juxtaposition of these communities was creative and fruitful. They acknowledged they were speaking past each other. Scientists were urged to tell policy makers about even improbable outcomes while articulating clearly the uncertainties around the outcomes. As one policy maker put it, we are accustomed to making these types of decisions. These points were captured clearly in an article that appeared on the New York Times website and can be found with other conference materials most easily on our website, www.scripps.ucsd.edu/cens/. The symposium, generously supported by the NOAA/JIMO, benefitted the public by promoting scientifically informed decision making and by the transmission of objective information regarding climate change and national security.

  4. 49 CFR 1542.107 - Changed conditions affecting security.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Changed conditions affecting security. 1542.107... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Airport Security Program § 1542.107 Changed conditions affecting security. (a) After approval of the...

  5. 75 FR 82037 - National Protection and Programs Directorate; President's National Security Telecommunications...

    Science.gov (United States)

    2010-12-29

    ... Programs Directorate; President's National Security Telecommunications Advisory Committee AGENCY: National... Committee Meeting. SUMMARY: The President's National Security Telecommunications Advisory Committee (NSTAC... telecommunications policy. The new NSTAC Chair, James Crowe, Chief Executive Officer (CEO), Level 3...

  6. Change of Computer Security Officer

    CERN Multimedia

    IT Department

    2008-01-01

    After many years of successfully protecting the CERN site in her role as Computer Security Officer (CSO), Denise Heagerty is being assigned to a new role within the IT Department. David Myers has been appointed to the position of CSO for one year from 1st September. W. von Rüden, IT Department Head

  7. Nevada National Security Site Environmental Report 2012

    Energy Technology Data Exchange (ETDEWEB)

    Wills, Cathy

    2013-09-11

    This report was prepared to meet the information needs of the public and the requirements and guidelines of the U.S. Department of Energy (DOE) for annual site environmental reports. It was prepared by National Security Technologies, LLC (NSTec), for the U.S. Department of Energy, National Nuclear Security Administration Nevada Field Office (NNSA/NFO) (formerly designated as the Nevada Site Office [NNSA/NSO]). The new field office designation occurred in March 2013. Published reports cited in this 2012 report, therefore, may bear the name or authorship of NNSA/NSO. This and previous years’ reports, called Annual Site Environmental Reports (ASERs), Nevada Test Site Environmental Reports (NTSERs), and, beginning in 2010, Nevada National Security Site Environmental Reports (NNSSERs), are posted on the NNSA/NFO website at http://www.nv.energy.gov/library/publications/aser.aspx. This NNSSER was prepared to satisfy DOE Order DOE O 231.1B, “Environment, Safety and Health Reporting.” Its purpose is to (1) report compliance status with environmental standards and requirements, (2) present results of environmental monitoring of radiological and nonradiological effluents, (3) report estimated radiological doses to the public from releases of radioactive material, (4) summarize environmental incidents of noncompliance and actions taken in response to them, (5) describe the NNSA/NFO Environmental Management System and characterize its performance, and (6) highlight significant environmental programs and efforts. This NNSSER summarizes data and compliance status for calendar year 2012 at the Nevada National Security Site (NNSS) (formerly the Nevada Test Site) and its two support facilities, the North Las Vegas Facility (NLVF) and the Remote Sensing Laboratory–Nellis (RSL-Nellis). It also addresses environmental restoration (ER) projects conducted at the Tonopah Test Range (TTR) and the Nevada Test and Training Range (NTTR). Through a Memorandum of Agreement, NNSA/NFO is

  8. Security Economics and Critical National Infrastructure

    Science.gov (United States)

    Anderson, Ross; Fuloria, Shailendra

    There has been considerable effort and expenditure since 9/11 on the protection of ‘Critical National Infrastructure' against online attack. This is commonly interpreted to mean preventing online sabotage against utilities such as electricity,oil and gas, water, and sewage - including pipelines, refineries, generators, storage depots and transport facilities such as tankers and terminals. A consensus is emerging that the protection of such assets is more a matter of business models and regulation - in short, of security economics - than of technology. We describe the problems, and the state of play, in this paper. Industrial control systems operate in a different world from systems previously studied by security economists; we find the same issues (lock-in, externalities, asymmetric information and so on) but in different forms. Lock-in is physical, rather than based on network effects, while the most serious externalities result from correlated failure, whether from cascade failures, common-mode failures or simultaneous attacks. There is also an interesting natural experiment happening, in that the USA is regulating cyber security in the electric power industry, but not in oil and gas, while the UK is not regulating at all but rather encouraging industry's own efforts. Some European governments are intervening, while others are leaving cybersecurity entirely to plant owners to worry about. We already note some perverse effects of the U.S. regulation regime as companies game the system, to the detriment of overall dependability.

  9. Overview of Scientific Freedom and National Security

    Science.gov (United States)

    Lerch, Irving

    2000-04-01

    The subject of our scrutiny is very much in the news, punctuated with nouns and modifiers both inflammatory and mundane such as espionage, justice, scientific accountability and scientific freedom. And while our discussion will focus on these issues, I want to raise some of the pragmatic questions that bear on the foundation of our support for international science. Beneath questions of guilt and the loss of secrets in the Wen Ho Lee case lay the inherent tension between the tradition of open exchange in the scientific enterprise and the need to protect the nation's security. How this balance is to be achieved in a democratic society has bedeviled us ever since the Manhattan project heralded the emergence of science and technology as instruments of great national power. If we do not find this balance, we run the risk of damaging some of the most important intellectual treasures that the US has produced the Department of Energy's national laboratories and the entire system that we call the international scientific enterprise. For while the superheated charges of lax security and criminal negligence have led some to call for ``firewalls" to isolate and protect the secrets in our weapons labs, such measures may have severe consequences for weapons and non-weapons labs alike and their many associated universities. It's estimated that from 70% to as much as 80% in the expansion of our economy is technology-driven, derived from the most productive system of scientific innovation in the world. This is also true of our national security. Science is indispensable to the development and maintenance of the nation's arsenals. The Department of Energy's Nuclear Stockpile Stewardship Program is central to the safety and reliability of American nuclear weapons and to our hope for a worldwide ban on nuclear tests. But this program will fail without a continuing intense development effort based on cutting-edge science. And a great deal of the science needed is being pursued in

  10. Y-12 National Security Complex Water Assessment

    Energy Technology Data Exchange (ETDEWEB)

    Elam, Shana E.; Bassett, P.; McMordie Stoughton, Kate

    2010-11-01

    The Department of Energy's Federal Energy Management Program (FEMP) sponsored a water assessment at the Y 12 National Security Complex (Y 12) located in Oak Ridge, Tennessee. Driven by mandated water reduction goals of Executive Orders 13423 and 13514, the objective of the water assessment is to develop a comprehensive understanding of the current water-consuming applications and equipment at Y 12 and to identify key areas for water efficiency improvements that could be applied not only at Y-12 but at other Federal facilities as well. FEMP selected Pacific Northwest National Laboratory to coordinate and manage the water assessment. PNNL contracted Water Savers, LLC to lead the technical aspects of the water assessment. Water Savers provided key technical expertise in water auditing, metering, and cooling systems. This is the report of that effort, which concluded that the Y-12 facility could realize considerable water savings by implementing the recommended water efficiency opportunities.

  11. Mexican petroleum and US national security

    Energy Technology Data Exchange (ETDEWEB)

    Fagen, R.R.

    US vulnerability to energy supplies is reviewed in terms of action taken by the Organizaion of Petroleum Exporting Countries (OPEC) during the 1970s and the outlook for supply and price disruptions in the 1980s. The US position is then related to the Mexican petroleum boom and the benefits that increasing exports from a non-OPEC country like Mexico can have on world oil trade. US political and security interests will encourage a rapid increase in Mexican production, and the US will be concerned with how Mexico develops its relationships with the US and with other oil-producing countries. Changing economic and social relationships are inevitable and could lead to serioUS political unrest over questions of equity and immigrations. The difficulty of articulating US security interests without interfering in Mexican domestic affairs will require careful diplomacy.

  12. India's National Action Plan on Climate Change

    OpenAIRE

    Pandve, Harshal T.

    2009-01-01

    Climate change is one of the most critical global challenges of our times. Recent events have emphatically demonstrated our growing vulnerability to climate change. Climate change impacts will range from affecting agriculture – further endangering food security – to sea-level rise and the accelerated erosion of coastal zones, increasing intensity of natural disasters, species extinction, and the spread of vector-borne diseases. India released its much-awaited National Action Plan on Climate C...

  13. Legal Transparency as a National Security Strategy

    Directory of Open Access Journals (Sweden)

    Yoni Eshpar

    2013-05-01

    Full Text Available The act of taking initiative is considered the preferred modus operandi within the various spheres that shape and define the concept of Israel’s national security: on the battlefield and in diplomacy, as well as on the media front. Conventional wisdom within all these spheres is that one should not be dragged along by the force of events, nor should one ever allow an adversary to define the terms of the battle. The legal realm, however, would appear to be an exception to this rule. Although recognition of its importance has greatly increased in recent years, thinking on the subject remains limited to the defensive and reactive; in other words, thinking is limited to the question of how to furnish the political and operational echelon with professional advice and the proper means of defense against court petitions, lawsuits, commissions of inquiry, and other legal proceedings in Israel and abroad. These are important tasks, but is it the sum total of the law’s ability to contribute to security? What about a more comprehensive legal strategy that is more proactive and takes the initiative? What benefit, if any, would it have, and at what price? This article addresses these questions by reviewing the public legal campaign, unprecedented in form and scope, waged by the Obama administration throughout its first term.

  14. 75 FR 37253 - Classified National Security Information

    Science.gov (United States)

    2010-06-28

    ... Special access programs. 2001.50 Telecommunications, automated information systems, and network security... Telecommunications, automated 4.1, 4.2 information systems, and network security. 2001.51 Technical security 4.1 2001... and Records Administration Information Security Oversight Office 32 CFR Parts 2001 and 2003...

  15. Nevada National Security Site Radiation Protection Program

    Energy Technology Data Exchange (ETDEWEB)

    none,

    2013-04-30

    Title 10 Code of Federal Regulations (CFR) Part 835, “Occupational Radiation Protection,” establishes radiation protection standards, limits, and program requirements for protecting individuals from ionizing radiation resulting from the conduct of U.S. Department of Energy (DOE) activities. 10 CFR 835.101(a) mandates that DOE activities be conducted in compliance with a documented Radiation Protection Program (RPP) as approved by DOE. This document promulgates the RPP for the Nevada National Security Site (NNSS), related (on-site or off-site) U.S. Department of Energy, National Nuclear Security Administration Nevada Field Office (NNSA/NFO) operations, and environmental restoration off-site projects. This RPP section consists of general statements that are applicable to the NNSS as a whole. The RPP also includes a series of appendices which provide supporting detail for the associated NNSS Tennant Organizations (TOs). Appendix H, “Compliance Demonstration Table,” contains a cross-walk for the implementation of 10 CFR 835 requirements. This RPP does not contain any exemptions from the established 10 CFR 835 requirements. The RSPC and TOs are fully compliant with 10 CFR 835 and no additional funding is required in order to meet RPP commitments. No new programs or activities are needed to meet 10 CFR 835 requirements and there are no anticipated impacts to programs or activities that are not included in the RPP. There are no known constraints to implementing the RPP. No guides or technical standards are adopted in this RPP as a means to meet the requirements of 10 CFR 835.

  16. Status of Educational Efforts in National Security Workforce

    Energy Technology Data Exchange (ETDEWEB)

    None

    2008-03-31

    This report documents the status of educational efforts for the preparation of a national security workforce as part of the National Security Preparedness Project, being performed by the Arrowhead Center of New Mexico State University under a DOE/NNSA grant. The need to adequately train and educate a national security workforce is at a critical juncture. Even though there are an increasing number of college graduates in the appropriate fields, many of these graduates choose to work in the private sector because of more desirable salary and benefit packages. This report includes an assessment of the current educational situation for the national security workforce.

  17. Y‑12 National Security Complex

    Data.gov (United States)

    Federal Laboratory Consortium — The Y‑12 National Security Complex is a premier manufacturing facility dedicated to making our nation and the world a safer place and plays a vital role in the...

  18. Strategic Analysis on Objectives of National Grain Security

    Institute of Scientific and Technical Information of China (English)

    Hong; YANG

    2015-01-01

    Price of global agricultural products rises with great fluctuation. China’s food price also increases constantly. This leads to high concern of both at home and abroad for food and grain security. On the basis of making an overall analysis on current situation of grain security and making judgment on future grain security in China,this paper analyzed objectives,strategies and policies of national grain security in the new period. Finally,it came up with strategies and policy recommendations for improving agricultural production and guaranteeing national grain security.

  19. Arctic security in an age of climate change

    Energy Technology Data Exchange (ETDEWEB)

    Kraska, James (ed.)

    2013-03-01

    Publisher review: This book examines Arctic defense policy and military security from the perspective of all eight Arctic states. In light of climate change and melting ice in the Arctic Ocean, Canada, Russia, Denmark (Greenland), Norway and the United States, as well as Iceland, Sweden and Finland, are grappling with an emerging Arctic security paradigm. This volume brings together the world's most seasoned Arctic political-military experts from Europe and North America to analyze how Arctic nations are adapting their security postures to accommodate increased shipping, expanding naval presence, and energy and mineral development in the polar region. The book analyzes the ascent of Russia as the first 'Arctic superpower', the growing importance of polar security for NATO and the Nordic states, and the increasing role of Canada and the United States in the region.(Author)

  20. 39 CFR 267.5 - National Security Information.

    Science.gov (United States)

    2010-07-01

    ... 39 Postal Service 1 2010-07-01 2010-07-01 false National Security Information. 267.5 Section 267.5 Postal Service UNITED STATES POSTAL SERVICE ORGANIZATION AND ADMINISTRATION PROTECTION OF INFORMATION § 267.5 National Security Information. (a) Purpose and scope. The purpose of this section is to provide regulations implementing Executive...

  1. 10 CFR 871.1 - National security exemption.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 4 2010-01-01 2010-01-01 false National security exemption. 871.1 Section 871.1 Energy DEPARTMENT OF ENERGY AIR TRANSPORTATION OF PLUTONIUM § 871.1 National security exemption. (a) The following... order to preserve the chemical, physical, or isotopic properties of the item. The Deputy...

  2. Nevada National Security Site Environmental Report 2010

    Energy Technology Data Exchange (ETDEWEB)

    C. Wills, ed.

    2011-09-13

    This NNSSER was prepared to satisfy DOE Order DOE O 231.1B, “Environment, Safety and Health Reporting.” Its purpose is to (1) report compliance status with environmental standards and requirements, (2) present results of environmental monitoring of radiological and nonradiological effluents, (3) report estimated radiological doses to the public from releases of radioactive material, (4) summarize environmental incidents of noncompliance and actions taken in response to them, (5) describe the NNSA/NSO Environmental Management System and characterize its performance, and (6) highlight significant environmental programs and efforts. This NNSSER summarizes data and compliance status for calendar year 2010 at the Nevada National Security Site (NNSS) (formerly the Nevada Test Site) and its two support facilities, the North Las Vegas Facility (NLVF) and the Remote Sensing Laboratory–Nellis (RSL-Nellis). It also addresses environmental restoration (ER) projects conducted at the Tonopah Test Range (TTR). Through a Memorandum of Agreement, NNSA/NSO is responsible for the oversight of TTR ER projects, and the Sandia Site Office of NNSA (NNSA/SSO) has oversight of all other TTR activities. NNSA/SSO produces the TTR annual environmental report available at http://www.sandia.gov/news/publications/environmental/index.html.

  3. Medical Diplomacy: A Tool for Enabling National Security Strategy Objectives

    Science.gov (United States)

    2012-04-06

    Biosurveillance Coordinating Unit CDC Oversees the National Biosurveillance Strategy. Outlined in Homeland Security Presidential Directive-21...addresses global disease outbreaks National Biosurveillance System DHS National Biosurveillance Information Center Around-the-clock domestic... biosurveillance Medical countermeasures National Institute of Allergy and Infectious Diseases, NIH Conduct and support research aimed at developing

  4. Food security in a changing climate

    Science.gov (United States)

    Pulwarty, Roger; Eilerts, Gary; Verdin, James

    2012-01-01

    By 2080 the effects of climate change—on heat waves, floods, sea level rise, and drought—could push an additional 600 million people into malnutrition and increase the number of people facing water scarcity by 1.8 billion. The precise impacts will, however, strongly depend on socioeconomic conditions such as local markets and food import dependence. In the near term, two factors are also changing the nature of food security: (1) rapid urbanization, with the proportion of the global population living in urban areas expanding from 13 percent in 1975 to greater than 50 percent at present, and (2) trade and domestic market liberalization since 1993, which has promoted removal of import controls, deregulation of prices, and the loss of preferential markets for many small economies. Over the last two years, the worst drought in decades has devastated eastern Africa. The resulting food-security crisis has affected roughly 13 million people and has reminded us that there is still a long way to go in addressing current climate-related risks. In the face of such profound changes and uncertainties, our approaches to food security must evolve. In this article, we describe four key elements that, in our view, will be essential to the success of efforts to address the linked challenges of food security and climate change.

  5. The Security Impact of Oil Nationalization: Alternate Futures Scenarios

    Directory of Open Access Journals (Sweden)

    Peter Johnston

    2010-01-01

    Full Text Available This article highlights the security impact of oil nationalization, develops and analyzes four energy security scenarios, and suggests options to reduce the potential negative impact of oil nationalization. In addition to the use of oil as a weapon, nationalization of oil can also lead to competition for scarce resources among states, facilitate the funding of terrorists or insurgents, contribute to destabilizing regional arms races, influence intra-state conflict, and sustain antagonistic political agendas.

  6. Energy Industry in China: Marketization and National Energy Security

    Institute of Scientific and Technical Information of China (English)

    DanShi

    2005-01-01

    Opening up the market, breaking the monopoly, and allowing the market to decide prices these are the major items on the agenda for the marketization of China's energy industry, and have a direct bearing on national energy security. Research into China's energy security has so far focused on such fields as strategic energy reserves, stability of energy imports, and diversification of import channels. Little has been done in the study of national energy security from the perspective of marketization of the energy industry. However, opening up the energy market and marketizing the energy industry are not only major commitments to China's accession to WTO, they serve the nation's energy security needs as well. This paper takes a look at the actual results of opening up the energy market, the structure of that market, and the nation's energy pricing mechanisms, and on the basis of the findings, raises suggestions on how to tackle the energy security issue.

  7. External Service Providers to the National Security Technology Incubator

    Energy Technology Data Exchange (ETDEWEB)

    None

    2008-02-28

    This report documents the identification and assessment of external service providers to the National Security Technology Incubator (NSTI) program for southern New Mexico. The NSTI is being developed as part of the National Security Preparedness Project (NSPP), funded by a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant to Arrowhead Center, New Mexico State University. This report contains 1) a summary of the services to be provided by NSTI; 2) organizational descriptions of external service providers; and 3) a comparison of NSTI services and services offered by external providers.

  8. 76 FR 62433 - Delegation of Authority to the Office of Disaster Management and National Security

    Science.gov (United States)

    2011-10-07

    ... departmental leadership on all aspects of disaster and national security preparedness, response, and recovery... Directives. 5. Integrate current and future disaster and national security programs into departmentwide..., including but not limited to: Homeland Security Presidential Directive--20: National Continuity Policy...

  9. Strong Artificial Intelligence and National Security: Operational and Strategic Implications

    Science.gov (United States)

    2015-05-18

    FINAL 3. DATES COVERED (From - To) 4. TITLE AND SUBTITLE Strong Artificial Intelligence and National Security 5a...Prominent business and science leaders believe that technological advances will soon allow humankind to develop artificial intelligence (AI) that...its potential strategic pitfalls. 15. SUBJECT TERMS Artificial Intelligence 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT

  10. NTELLIGENT INFORMATION SYSTEMS. AN IMPORTANT AID TO NATIONAL SECURITY

    Directory of Open Access Journals (Sweden)

    Laurentiu BARCAN

    2015-04-01

    Full Text Available Securing organizational processes is an objective and a permanent objective of organizations active in the field of national security, and to this end there are different solutions, both software and hardware. A modern solution may be the efficient use of Business Process Management and Business Process Execution Language as tools to optimize and streamline decision flows.

  11. National Aeronautics and Space Administration's (NASA) Automated Information Security Handbook

    Science.gov (United States)

    Roback, E.

    1991-01-01

    The NASA Automated Information Security Handbook provides NASA's overall approach to automated information systems security including discussions of such aspects as: program goals and objectives, assignment of responsibilities, risk assessment, foreign national access, contingency planning and disaster recovery, awareness training, procurement, certification, planning, and special considerations for microcomputers.

  12. National Pending of Social Security Hearing Requests by Format

    Data.gov (United States)

    Social Security Administration — Report refers to the National total of cases pending at the hearing level and the number and percentages of those cases that were in either electronic format (EF) or...

  13. Organizational resilience in national security bureaucracies: Realistic and practicable?

    DEFF Research Database (Denmark)

    Dalgaard-Nielsen, Anja

    2017-01-01

    Resilience is increasingly highlighted as a necessary organizational property in national security bureaucracies. This article explores the resulting management dilemmas via interviews with Danish executives, who attempt to balance resilience, fiscal austerity and democratic accountability...

  14. The Economic Component of National Security – Current Issues

    Directory of Open Access Journals (Sweden)

    Maria Constantinescu

    2014-12-01

    Full Text Available The main purpose of this paper is to underline the main current approaches regarding the economic component of national security, with conclusions focused on the globalization effects on the national economies and the national security of the states. The dynamics of the unfolding political and economic events determines the need for the analysis – further developed in the paper - of the relevant variables and of the way these are involved in the intricate equations describing the current political, economic and social environment. One of the main results of the analysis is that national security represents a goal for any country wishing to provide sustainable welfare for its citizens, and this sustainable welfare cannot be achieved without sustainable economic security and development

  15. National Security Reform 2010: A Mid-Term Assessment

    Science.gov (United States)

    2011-08-01

    foundation for the NSC’s function was laid under Tru- man. See, for example, John P. Burke , “The National Security Ad- visor and Staff: Transition... Edmund Muskie, and Brent Scowcroft, The Tower Commission Report: The Full Text of the President’s Special Re- view Board, New York: Random House, 1987...446. 15. George H. W. Bush and Brent Scowcroft, A World Trans- formed, New York: Alfred A. Knopf, 1998, p. 31. 16. Burke , “The National Security

  16. Demographic changes and nationalism.

    Science.gov (United States)

    Vishnevskii, A G

    1995-01-01

    This article examines the different characteristics of the many peoples inhabiting what used to be the Soviet Union and communist Eastern Europe, including Yugoslavia. The differences among these nationalities, or ethnic groups, are illustrated using the example of demographic modernization, showing how different peoples have or have not passed through the demographic transition process. The author looks at ethnic differences in mortality, fertility, natural increase, and migration, as well as economic and social inequalities among ethnic groups. The prospects for inter-ethnic conflict are assessed.

  17. India's National Action Plan on Climate Change.

    Science.gov (United States)

    Pandve, Harshal T

    2009-04-01

    Climate change is one of the most critical global challenges of our times. Recent events have emphatically demonstrated our growing vulnerability to climate change. Climate change impacts will range from affecting agriculture - further endangering food security - to sea-level rise and the accelerated erosion of coastal zones, increasing intensity of natural disasters, species extinction, and the spread of vector-borne diseases. India released its much-awaited National Action Plan on Climate Change (NAPCC) to mitigate and adapt to climate change on June 30, 2008, almost a year after it was announced. The NAPCC runs through 2017 and directs ministries to submit detailed implementation plans to the Prime Minister's Council on Climate Change by December 2008. This article briefly reviews the plan and opinion about it from different experts and organizations.

  18. 10 CFR 76.119 - Security facility approval and safeguarding of National Security Information and Restricted Data.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 2 2010-01-01 2010-01-01 false Security facility approval and safeguarding of National Security Information and Restricted Data. 76.119 Section 76.119 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) CERTIFICATION OF GASEOUS DIFFUSION PLANTS Safeguards and Security § 76.119 Security facility approval and safeguarding of National...

  19. U.S. National Security: A Selected Bibliography

    Science.gov (United States)

    2013-12-01

    2013): 35-39. ProQuest Grygiel, Jakub. "Educating for National Security." Orbis 57, no. 2 (Spring 2013): 201–216. Full Text Zuniga-Brown, Tamara...34 Orbis 55, no. 4 (Fall 2011): 541-557. Full Text 13 Reveron, Derek S., and James L. Cook. "From National to Theater: Developing Strategy." Joint Force

  20. Oil Politics and National Security in Nigeria

    Science.gov (United States)

    2010-12-01

    Staff College Nigeria, January 23, 2008), 8. 4 Adam Groves, “ Shell and Society: Securing the Niger Delta,” International Relations, accessed July 8...Counterinsurgency.”39 They argue that Shell Nigeria’s adoption of a range of measures including social development were ineffective because some of the...taxes on cash crops grown in other parts of Nigeria (palm oil and cocoa in the south west, and groundnut/peanuts in the north), which meant that the

  1. Marketing Plan for the National Security Technology Incubator

    Energy Technology Data Exchange (ETDEWEB)

    None

    2008-03-31

    This marketing plan was developed as part of the National Security Preparedness Project by the Arrowhead Center of New Mexico State University. The vision of the National Security Technology Incubator program is to be a successful incubator of technologies and private enterprise that assist the NNSA in meeting new challenges in national safety and security. The plan defines important aspects of developing the incubator, such as defining the target market, marketing goals, and creating strategies to reach the target market while meeting those goals. The three main marketing goals of the incubator are: 1) developing marketing materials for the incubator program; 2) attracting businesses to become incubator participants; and 3) increasing name recognition of the incubator program on a national level.

  2. 75 FR 733 - Implementation of the Executive Order, ``Classified National Security Information''

    Science.gov (United States)

    2010-01-05

    ... December 29, 2009 Implementation of the Executive Order, ``Classified National Security Information... entitled, ``Classified National Security Information'' (the ``order''), which substantially advances my... Information Security Oversight Office (ISOO) a copy of the department or agency regulations implementing...

  3. Security in cyberspace targeting nations, infrastructures, individuals

    CERN Document Server

    Giacomello, Giampiero

    2014-01-01

    Today, the Internet has become a source of information that no country or company can forgo. It is not only used to communicate or entertain, but most importantly to operate utilities and public services such as banking or air traffic. As the reliance on computer networks across societies and economies keeps growing, so do security risks in cyberspace - referred to as ""cybersecurity."" Cybersecurity means protecting information and control systems from those who seek to compromise them. It also involves actors, both malicious or protective, policies and their societal consequences. This colle

  4. Climate change - Agricultural land use - Food security

    Science.gov (United States)

    Nagy, János; Széles, Adrienn

    2015-04-01

    In Hungary, plougland decreased to 52% of its area by the time of political restructuring (1989) in comparison with the 1950s. Forested areas increased significantly (18%) and lands withdrawn from agricultural production doubled (11%). For today, these proportions further changed. Ploughlands reduced to 46% and forested areas further increased (21%) in 2013. The most significat changes were observed in the proportion of lands withdrawn from agricultural production which increased to 21%. Temperature in Hungary increased by 1°C during the last century and predictions show a further 2.6 °C increase by 2050. The yearly amount of precipitation significantly decreased from 640 mm to 560 mm with a more uneven temporal distribution. The following aspects can be considered in the correlation between climate change and agriculture: a) impact of agriculture on climate, b) future impact of climate change on agriculture and food supply, c) impact of climate change on food security. The reason for the significant change of climate is the accumulation of greenhouse gases (GHG) which results from anthropological activities. Between 2008 and 2012, Hungary had to reduce its GHG emission by 6% compared to the base period between 1985-1987. At the end of 2011, Hungarian GHG emission was 43.1% lower than that of the base period. The total gross emission was 66.2 million CO2 equivalent, while the net emission which also includes land use, land use change and forestry was 62.8 million tons. The emission of agriculture was 8.8 million tons (OMSZ, 2013). The greatest opportunity to reduce agricultural GHG emission is dinitrogen oxides which can be significantly mitigated by the smaller extent and more efficient use of nitrogen-based fertilisers (precision farming) and by using biomanures produced from utilised waste materials. Plant and animal species which better adapt to extreme weather circumstances should be bred and maintained, thereby making an investment in food security. Climate

  5. Independent Assessment of the Afghan National Security Forces

    Science.gov (United States)

    2014-01-01

    equipment, such as night vision goggles and weapons- mounted lights and lasers that are not part of the conventional ANA forces’ supply chain. U.S...MiG-21 and other helicopters at Shindand airbase, these aircraft were useless without pilots and technicians provided by Dostum in a deal brokered...force posture , and capabilities required to make the Afghan National Security Forces (ANSF) capable of providing security for their own country so as

  6. Economic Conflict and National Security Research

    Science.gov (United States)

    1977-02-22

    infectious diseases or cancer can have epidemological consequences that go beyond national boundaries. The recent attention to DNA research in America...claims "it doesn’t have the time" is merely asserting, with a kind of childish petulance, that it Im- atiently wants the fruits of economic growth n

  7. Security vs. Nations: a lost battle?

    CERN Multimedia

    Computer Security Team

    2013-01-01

    “Know the enemy” is one of the basic recommendations of the ancient Chinese military strategist Sun Tzu (544–496 BC). In the cyber-world, the usual suspects are not only script kiddies, criminals and hacktivists, but also nation states.   Companies worldwide have prepared their defences to fight off the first three. Likewise, CERN, despite its wish for academic freedom, is constantly considering how best to prevent successful attacks. But when nation states are the antagonists, defence is impossible (unless you have plenty of money). Today, the most popular computing services in the western hemisphere are run from the US. We already know that the US and the UK are tapping into Facebook, Google, Yahoo and others (see our Bulletin article on “Prison or “Prism”? Your data in custody”). But what about one level down? Nowadays, IT hardware (routers, laptops, smartphones, etc.) is built in China. How can we be sure that these ...

  8. Environmental Degradation: Implications for National Security

    Science.gov (United States)

    1990-03-30

    and increased evaporation) through dams constructed by upstream riparian countries, water diversion, industrial and agrochemical pol]ution, salinization ...dire urban problems.35 Perhaps the best (worst?) example of this situation occurred in the Sahel region of Africa which is suffering acutely from...Desertification of the Sahel in Africa has driven hundreds of thousands of people across national boundaries. The critical role of water, and the competition

  9. National Security Policy on Government Secrecy

    Science.gov (United States)

    2007-11-02

    prevailed as a political issue. 6 The Watergate scandal caused the downfall of Nixon , leaving President Gerald Ford to help the nation recover its...pressure President Richard Nixon relaxed the requirements of the classification system by issuing EO 11652 on March 8, 1972. The directive reduced further...confidence in government. In the wake of Watergate the public pushed for greater awareness of government activities with emphasis on truthful information

  10. A Call for National Security System Transformation

    Science.gov (United States)

    2012-06-01

    Vaccinates Animals, Trains Veterinarians in Ethiopia,” United States Central Command, http://www.hoa.africom.mil/getArticleFresh.asp?art=2092&lang=0... Vaccinates Animals, Trains Veterinarians in Ethiopia,” United States Central Command, http://www.hoa.africom.mil/getArticleFresh.asp?art=2092&lang=0...Department, CJTF-HOA has resorted to “flanking and enveloping with the combat power of veterinarians , host nation military partnerships, and new

  11. Nevada National Security Site Environmental Report 2011 Summary

    Energy Technology Data Exchange (ETDEWEB)

    Cathy Wills, ed

    2012-09-12

    The U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office (NNSA/NSO) directs the management and operation of the Nevada National Security Site (NNSS). NNSA/NSO prepares the Nevada National Security Site Environmental Report (NNSSER) to provide the public an understanding of the environmental monitoring and compliance activities that are conducted on the NNSS to protect the public and the environment from radiation hazards and from nonradiological impacts. The NNSSER is a comprehensive report of environmental activities performed at the NNSS and offsite facilities over the previous calendar year. It is prepared annually to meet the requirements and guidelines of the U.S. Department of Energy (DOE) and the information needs of NNSA/NSO stakeholders. This summary provides an abbreviated and more readable version of the NNSSER. It does not contain detailed descriptions or presentations of monitoring designs, data collection methods, data tables, the NNSS environment, or all environmental program activities performed throughout the year. The NNSS is currently the nation's unique site for ongoing national security-related missions and high-risk operations. The NNSS is located about 65 miles northwest of Las Vegas. The approximately 1,360-square-mile site is one of the largest restricted access areas in the United States. It is surrounded by federal installations with strictly controlled access, as well as by lands that are open to public entry.

  12. Cyber Security Policy. A methodology for Determining a National Cyber-Security Alert Level

    Directory of Open Access Journals (Sweden)

    Dan Constantin TOFAN

    2012-01-01

    Full Text Available Nowadays, assuring the security of the national cyber-space has become a big issue that can only be tackled through collaborative approaches. Threats cannot be confined to a single computer system just as much as computer systems are rendered useless without being con-nected to a supporting network. The authors of this article propose an innovative architecture of a system designated to help governments collect and analyze data about cyber-security in-cidents, from different organizations, dispersed nationwide, and acting within various economic sectors. The collected data will make us able to determine a national cyber-security alert score that could help policy makers in establishing the best strategies for protecting the national cyber-space.

  13. Embedding security messages in existing processes: a pragmatic and effective approach to information security culture change

    CERN Document Server

    Lopienski, Sebastian

    Companies and organizations world-wide depend more and more on IT infrastructure and operations. Computer systems store vital information and sensitive data; computing services are essential for main business processes. This high dependency comes with a number of security risks, which have to be managed correctly on technological, organizational and human levels. Addressing the human aspects of information security often boils down just to procedures, training and awareness raising. On the other hand, employees and collaborators do not adopt security attitude and habits simply when told to do so – a real change in behaviour requires an established security culture. But how to introduce a security culture? This thesis outlines the need of developing or improving security culture, and discusses how this can be done. The proposed approach is to gradually build security knowledge and awareness, and influence behaviours. The way to achieve this is to make security communication pervasive by embedding security me...

  14. Obesity: A Threat to National Security?

    Science.gov (United States)

    2011-03-16

    1 William Christeson, Amy Dawson Taggert and Soren Messner-Zidell, “Too Fat to Fight: Retired Military Leaders want Junk Food out of America‟s...s Move” campaign. The purpose of this campaign is to get children up and moving and to encourage the children to eat healthy and to get at least... children , 4 it‟s threatening our families and, more importantly, it‟s threatening the future of this nation.”22 In a report entitled “Too Fat to

  15. 10 CFR 95.35 - Access to matter classified as National Security Information and Restricted Data.

    Science.gov (United States)

    2010-01-01

    ... SECURITY CLEARANCE AND SAFEGUARDING OF NATIONAL SECURITY INFORMATION AND RESTRICTED DATA Control of Information § 95.35 Access to matter classified as National Security Information and Restricted Data. (a... have access to matter revealing Secret or Confidential National Security Information or Restricted...

  16. Examining the potential impacts of climate change on international security: EU-Africa partnership on climate change

    OpenAIRE

    Dodo, Mahamat K.

    2014-01-01

    Abstract Climate Change like many global problems nowadays is recognized as a threat to the international security and cooperation. In theoretical terms, it is being securitized and included in the traditional security studies. Climate change and its accompanying environmental degradation are perceived to be a threat that can have incalculable consequences on the international community. The consequences are said to have more effects in small island developing nations and Africa where many St...

  17. Welcome to Los Alamos National Laboratory: A premier national security science laboratory

    Energy Technology Data Exchange (ETDEWEB)

    Wallace, Terry [Los Alamos National Laboratory

    2012-06-25

    Dr Wallace presents visitors with an overview of LANL's national security science mission: stockpile stewardship, protecting against the nuclear threat, and energy security & emerging threats, which are underpinned by excellence in science/technology/engineering capabilities. He shows visitors a general Lab overview of budget, staff, and facilities before providing a more in-depth look at recent Global Security accomplishments and current programs.

  18. Book Review: Conquest in Cyberspace: National Security and Information Warfare

    Directory of Open Access Journals (Sweden)

    Gary C. Kessler

    2007-06-01

    Full Text Available Libicki, M.C. (2007. Conquest in Cyberspace: National Security and Information Warfare. New York: Cambridge University Press. 323 pages, ISBN: 978-0-521-69214-4 (paper, US$80Reviewed by Gary C. Kessler (gary.kessler@champlain.eduMany books -- and even movies ("Live Free or Die Hard" -- are based upon the premise of an impending information war. In these scenarios -- made all too plausible by the increased frequency with which we read about and experience major information security incidents -- a Bad Guy exploits known computer security vulnerabilities in order to control major national infrastructures via the Internet so as to reap financial, economic, and/or personal power.(see PDF for full review

  19. Achieving Youth Employment and National Security in Nigeria: TVET Imperatives

    Science.gov (United States)

    Ogbuanya, T. C.; Ofonmbuk, Michael

    2015-01-01

    The rate of unemployment in Nigeria is alarming and could promote social vices some of which are kidnapping, armed robbery, child trafficking, Cultism, Drug peddling and ritual killing. These social vices could in no small measure constitute a threat to national security as a matter of fact. Therefore, the development of a workable Technical and…

  20. Semiconductor Technology and U.S. National Security

    Science.gov (United States)

    2010-04-21

    international community to a nation that ―is focused not on the world but on itself.Ŝ While China’s efforts to expand its economic and military strengths are...26, 2009) 39 Lieberman, 5. 40 Department of Commerce Home Page, http://www.osec.doc.gov/ omo /dmp/default. 41 Bureau of Industry and Security

  1. 76 FR 81827 - Declassification of National Security Information

    Science.gov (United States)

    2011-12-29

    ...@nara.gov . ] SUPPLEMENTARY INFORMATION: On July 8, 2011, NARA published a proposed rule (76 FR 40296... without proper authority? Authority: 44 U.S.C. 2101 to 2118; 5 U.S.C. 552; E.O. 13526, 75 FR 707, 3 CFR... Order, Classified National Security Information,'' 75 FR 733, 3 CFR, 2009 Comp., p. 412; 32 CFR...

  2. Numbers Matter: Post-2014 Afghan National Security Force End Strength

    Science.gov (United States)

    2013-03-01

    Afghan Border Police ( ABP ), and the Afghan National Civil Order Police (ANCOP).16 Two other Afghan security organizations, which did not factor...Air Force (AAF), Afghan Border Police ( ABP ), and Afghan Uniform Police (AUP), is also a significant challenge to the legitimacy of the ANSF with the

  3. 28 CFR 501.2 - National security cases.

    Science.gov (United States)

    2010-07-01

    ... Attorney General by the head of a member agency of the United States intelligence community that the unauthorized disclosure of such information would pose a threat to the national security and that there is a... General receives from the head of a member agency of the United States intelligence community...

  4. Gangs in Honduras: A Threat to National Security

    Science.gov (United States)

    2012-03-22

    accessed on November 13, 2011). 13 Elsa Falkenburger and Geoff Thale, Maras centroamericanas: Politicas Publicas y mejores practicas, (Revista CIDOB...Anual 2003: Capitulo II: Seguridad y Justicia.”. Annual report 2003: Chapter II: Security and Justice”. 67 United Nations, Human Rights reports

  5. National Security and Information Technology: The New Regulatory Option?

    Science.gov (United States)

    Irwin, Manley R.

    1987-01-01

    Summarizes recent developments in information technology research and development, telecommunication services, telephone manufacturing, telecommunication networks, information processing, and U.S. import/export policy. It is concluded that government regulation as a policy strategy depends on how one defines national security. (Author/CLB)

  6. 28 CFR 0.72 - National Security Division.

    Science.gov (United States)

    2010-07-01

    ... 28 Judicial Administration 1 2010-07-01 2010-07-01 false National Security Division. 0.72 Section 0.72 Judicial Administration DEPARTMENT OF JUSTICE ORGANIZATION OF THE DEPARTMENT OF JUSTICE..., investigative agencies, and foreign criminal justice entities (provided that any training of foreign...

  7. The National Security Language Initiative and the Teaching of Hindi

    Science.gov (United States)

    Shinge, Manjula

    2008-01-01

    This article discusses the teaching of Hindi in the USA, with special reference to the National Security Language Initiative (NSLI). Asian Indian languages are briefly described, as are the growth and diversification of the Asian Indian population in the USA. The inclusion of Hindi in the NSLI, and the implications of this decision for the…

  8. Squaring the circle? Collective and distributive effects of United Nations Security Council reform

    NARCIS (Netherlands)

    E.J. Hosli (Esther); R.F.I. Moody (Rebecca); B. O'Donovan (Bryan); S. Kaniovski (Serguei); A.C.H. Little (Anna)

    2011-01-01

    textabstractChanging the composition and voting system of the Security Council, in an effort to increase the institution's global legitimacy, is proving to be one of the most difficult hurdles to overcome for the global community of states represented in the United Nations (UN). This paper demonstra

  9. The Consequences to National Security of Jurisdictional Gray Areas Between Emergency Management and Homeland Security

    Science.gov (United States)

    2014-09-01

    outlines a holistic community preparedness approach to securing the nation. “The national preparedness system shall be designed to help guide the domestic...failed its first test.”40 As the horror of Hurricane Katrina was being witnessed globally, so too was the issue of leadership, specifically, who was in...have impacted multiple in-groups to include patriotic Bostonians, concerned Muslim-Americans, and those who felt the need to revisit the horror of 9

  10. National Character vs. National Security: Conflict in the Making?

    Science.gov (United States)

    2011-03-01

    Reformulation,” The Journal of Conflict Resolution 14, no. 2 (June 1970): 205, in JSTOR (accessed September 29, 2010). 7 Erik D. Aker, “The American...International Relations,” Background 6, no. 1-3 (Autumn 1962): 44, in JSTOR (accessed September 29, 2010). 19 Terhune, “From National Character,” 260

  11. 78 FR 48037 - Facility Security Clearance and Safeguarding of National Security Information and Restricted Data

    Science.gov (United States)

    2013-08-07

    ...] [Pages 48037-48042] [FR Doc No: 2013-18947] NUCLEAR REGULATORY COMMISSION 10 CFR Part 95 [NRC-2011-0268... National Security Information, which was published in the Federal Register on January 5, 2010 (75 FR 707... implementation of the Executive Order, issued a final rule (75 FR 37254; June 28, 2010) amending 32 CFR...

  12. National Security Letters, the USA PATRIOT Act, and the Constitution: The Tensions between National Security and Civil Rights

    Science.gov (United States)

    Gorham-Oscilowski, Ursula; Jaeger, Paul T.

    2008-01-01

    In response to the terrorist attacks of 9/11, the USA PATRIOT Act greatly expanded the ability of the Federal Bureau of Investigation to use National Security Letters (NSLs) in investigations and the contexts in which they could be used by relaxing the standards under which NSLs could be employed. NSLs allow investigators to acquire a significant…

  13. Coordinating UAV information for executing national security-oriented collaboration

    Science.gov (United States)

    Isenor, Anthony W.; Allard, Yannick; Lapinski, Anna-Liesa S.; Demers, Hugues; Radulescu, Dan

    2014-10-01

    Unmanned Aerial Vehicles (UAVs) are being used by numerous nations for defence-related missions. In some cases, the UAV is considered a cost-effective means to acquire data such as imagery over a location or object. Considering Canada's geographic expanse, UAVs are also being suggested as a potential platform for use in surveillance of remote areas, such as northern Canada. However, such activities are typically associated with security as opposed to defence. The use of a defence platform for security activities introduces the issue of information exchange between the defence and security communities and their software applications. This paper explores the flow of information from the system used by the UAVs employed by the Royal Canadian Navy. Multiple computers are setup, each with the information system used by the UAVs, including appropriate communication between the systems. Simulated data that may be expected from a typical maritime UAV mission is then fed into the information system. The information structures common to the Canadian security community are then used to store and transfer the simulated data. The resulting data flow from the defence-oriented UAV system to the security-oriented information structure is then displayed using an open source geospatial application. Use of the information structures and applications relevant to the security community avoids the distribution restrictions often associated with defence-specific applications.

  14. A 21st Century Science, Technology, and Innovation Strategy for Americas National Security

    Science.gov (United States)

    2016-05-01

    aspects of national security. With guidance from the President and Congress, strategic direction and investment priorities for national security science ...interconnected, fast- evolving science and technology landscape that presents new threats and opportunities, the policy directions called for in this...A 21ST CENTURY SCIENCE , TECHNOLOGY, AND INNOVATION STRATEGY FOR AMERICA’S NATIONAL SECURITY PRODUCT OF THE Committee on Homeland and National

  15. The Indian National Food Security Act, 2013: a commentary.

    Science.gov (United States)

    Varadharajan, Kiruba Sankar; Thomas, Tinku; Kurpad, Anura

    2014-06-01

    The National Food Security Act (NFSA) 2013, passed recently by the Indian Parliament, aims to ensure food security in India, chiefly by providing cereals at subsidized prices through the Targeted Public Distribution System (TPDS) for about two-thirds of households. The predominant line of criticism of the NFSA has been the costs of such an ambitious rights-based approach in the context of decelerating economic growth and growing fiscal deficits. We argue that the food subsidy has been increasing through the last few decades and is set to climb even higher with this act but that the incremental costs, at about 0.2% of gross domestic product, are not as high as claimed. Further, recent evidence of increasing utilization of the TPDS and decreasing corruption add credence to the act's premise that significant income transfers to poor households can be achieved, thereby promoting food security as well as dietary diversity. Several concerns remain to be addressed in the design and implementation of the act, including its proposed coverage, a cereal-centric approach, the identification of beneficiaries, and its adaptability at the state level. If these are resolved effectively, the act can prove to be a significant step forward in India's long-drawn-out battle against undernutrition and food insecurity. Finally, the NFSA also provides a fresh opportunity to reform and strengthen the TPDS, which has been an integral component of India's strategy to achieve food security at the national level.

  16. On the Perception of National Security Issues at Regional Level

    Directory of Open Access Journals (Sweden)

    Ponedelkov Aleksandr Vasilyevich

    2015-12-01

    Full Text Available The article explores the issue on the perception of the concept “national security” areas, models and methods of its maintenance by the population. The author uses materials of the sociological survey conducted by the Laboratory of problems of increasing the efficiency of state and municipal management of the South-Russian Institute of Management – branch of the Russian Presidential Academy of National Economy and Public Administration. The survey was carried out with the participation of leading experts in various aspects of national security, representing 27 Russian higher educational institutions and research centers in Moscow, Astrakhan, Barnaul, Belgorod, Dushanbe, Krasnodar, Nizhny Novgorod, Omsk, Pyatigorsk, Rostov-on-Don, Saint Petersburg, Syktyvkar, Sochi, Ufa. It is noted that as a priority political governance model that implements the basic concept of national security, respondents identified a democratic model. Most respondents believe that a unified security model in the Russian regions is ineffective, and such model should be developed taking into account the specificity of each subject. The study showed that the public’s attention to the issue of national security is not sustainable, as determined by situational factors. It is proved that the motives of anxiety formed in the Russian public mind are not sustainable, and situational. Respondents see the economic cooperation more effective incentive to maintain national interests than by force. Estimation of the population of the priority issues of security shows that most respondents appreciate the organization of work to ensure the safety and anti-terrorism security in the sphere of national relations. The findings give grounds to assert that the focus of public attention to the problem of national security does not yet occupy the leading positions. To a greater extent, respondents focused on the issues of public safety, reducing threats and risks in their daily lives

  17. Sun-Burned: Space Weather’s Impact On U.S. National Security

    Science.gov (United States)

    2013-06-01

    United States of America, May 2010, 52. 5 National Security Strategy of the United States of America, 52. Robert Gilpin , War & Change in World Politics... Gilpin , Robert . War & Change in World Politics. Cambridge: Cambridge University Press, 1981. Gurman, J. "Solar Terrestrial Relations Observatory: 3-D...Indexed ed. Princeton, NJ: Princeton University Press, 1976. Freeman, J. W. Storms in Space. New York: Cambridge University Press, 2001. Gilpin

  18. The Next EFV: Aligning Marine Corps Capabilities With National Security

    Science.gov (United States)

    2011-05-09

    currently valid OMB control number. PLEASE DO NOT RETURN YOUR FORM TO THE ABOVE ADDRESS. 1. REPORT DATE (DD-MM-YYYY) 09-05-2011 2. REPORT TYPE...addresses national security goals of countering the hybrid threat or supporting partner capacity-building. Hovercrafts can project power from the seas by...armament, or range. The proven hovercraft such as the commercial-off-the-shelf EPS M10, if retrofitted with modern weaponry, is the ideal

  19. National Security Science and Technology Initiative: Air Cargo Screening

    Energy Technology Data Exchange (ETDEWEB)

    Bingham, Philip R [ORNL; White, Tim [Pacific Northwest National Laboratory (PNNL); Cespedes, Ernesto [Idaho National Laboratory (INL); Bowerman, Biays [Brookhaven National Laboratory (BNL); Bush, John [Battelle

    2010-11-01

    The non-intrusive inspection (NII) of consolidated air cargo carried on commercial passenger aircraft continues to be a technically challenging, high-priority requirement of the Department of Homeland Security's Science and Technology Directorate (DHS S&T), the Transportation Security Agency and the Federal Aviation Administration. The goal of deploying a screening system that can reliably and cost-effectively detect explosive threats in consolidated cargo without adversely affecting the flow of commerce will require significant technical advances that will take years to develop. To address this critical National Security need, the Battelle Memorial Institute (Battelle), under a Cooperative Research and Development Agreement (CRADA) with four of its associated US Department of Energy (DOE) National Laboratories (Oak Ridge, Pacific Northwest, Idaho, and Brookhaven), conducted a research and development initiative focused on identifying, evaluating, and integrating technologies for screening consolidated air cargo for the presence of explosive threats. Battelle invested $8.5M of internal research and development funds during fiscal years 2007 through 2009. The primary results of this effort are described in this document and can be summarized as follows: (1) Completed a gap analysis that identified threat signatures and observables, candidate technologies for detection, their current state of development, and provided recommendations for improvements to meet air cargo screening requirements. (2) Defined a Commodity/Threat/Detection matrix that focuses modeling and experimental efforts, identifies technology gaps and game-changing opportunities, and provides a means of summarizing current and emerging capabilities. (3) Defined key properties (e.g., elemental composition, average density, effective atomic weight) for basic commodity and explosive benchmarks, developed virtual models of the physical distributions (pallets) of three commodity types and three

  20. Malaysia’s Participation in a United Nations Standing Force: A Question of National Security

    Science.gov (United States)

    2007-11-02

    future challenges so that Malaysia will continue to exist and sustain itself as a developed nation. As a multiracial nation, the Malaysian government...Amali bin Ahmad, Malaysian Army, 76 pages This thesis investigates whether Malaysia , as a small state, should participate in a United Nations (UN...many parties. In analyzing whether Malaysia should participate in a UN standing force, this paper explores the concept of comprehensive security to

  1. Retirement responses to social security changes.

    Science.gov (United States)

    Gohmann, S F; Clark, R L

    1989-11-01

    Workers often retire at an age later than the age at which they accept Social Security benefits. This study employed a life-cycle model of individual utility to examine the effects of Social Security provisions on the timing of benefit acceptance and retirement. The behavioral responses of older workers are estimated with a two-equation logit model using data from the Retirement History Study. The results indicate that the legislated increase in the age of eligibility for full Social Security benefits beginning in the 21st century will have relatively small effects on the ages of retirement and benefit acceptance. The mandated decrease in the earnings test tax also is predicted to have only a small effect on the behavior of older persons.

  2. Repositioning Technical and Vocational Education and Training (TVET) for Youths Employment and National Security in Nigeria

    Science.gov (United States)

    Ogbunaya, T. C.; Udoudo, Ekereobong S.

    2015-01-01

    The paper focused on repositioning Technical and Vocational Education and Training (TVET) for youth's employment and national security in Nigeria. It examined briefly the concepts of technical vocational education and training (TVET), youths, unemployment and national security as well as the effects of unemployment on national security in Nigeria.…

  3. 10 CFR 2.903 - Protection of restricted data and national security information.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 1 2010-01-01 2010-01-01 false Protection of restricted data and national security... Restricted Data and/or National Security Information § 2.903 Protection of restricted data and national security information. Nothing in this subpart shall relieve any person from safeguarding Restricted Data...

  4. The Impact of Migration Processes on the National Security of Kazakhstan

    Science.gov (United States)

    Korganova, Saipzhamal S.; Taubayeva, Mirash Y.; Sultanov, Serik A.; Rysbayeva, Saule Zh.; Sultanova, Valida I.; Zhumabekov, Madiyr U.; Raximshikova, Mavluda K.

    2016-01-01

    The purpose of this study is to analyze the impact of migration processes on the national security of Kazakhstan. However, it should be noted that national security is an expression of national interests and it is provided by means of resources and efforts of a particular state. Consequently, social security is an expression of the public…

  5. Mass and Elite Views on Nuclear Security: US National Security Surveys 1993-1999

    Energy Technology Data Exchange (ETDEWEB)

    HERRON,KERRY G.; JENKINS-SMITH,HANK C.; HUGHES,SCOTT D.

    2000-06-01

    This is the fourth report in an ongoing series of studies examining how US perspectives about nuclear security are evolving in the post-Cold War era. In Volume 1 the authors present findings from a nationwide telephone survey of randomly selected members of the US general public conducted from 13 September to 14 October 1999. Results are compared to findings from previous surveys in this series conducted in 1993, 1995, and 1997, and trends are analyzed. Key areas of investigation reported in Volume 1 include evolving perceptions of nuclear weapons risks and benefits, preferences for related policy and spending issues, and views about three emerging issue areas: deterrent utility of precision guided munitions; response options to attacks in which mass casualty weapons are used; and expectations about national missile defenses. In this volume they relate respondent beliefs about nuclear security to perceptions of nuclear risks and benefits and to policy preferences. They develop causal models to partially explain key preferences, and they employ cluster analysis to group respondents into four policy relevant clusters characterized by similar views and preferences about nuclear security within each cluster. Systematic links are found among respondent demographic characteristics, perceptions of nuclear risks and benefits, policy beliefs, and security policy and spending preferences. In Volume 2 they provide analysis of in-depth interviews with fifty members of the US security policy community.

  6. Changing principles in European social security

    NARCIS (Netherlands)

    van Oorschot, W.J.H.; Clasen, J.J.

    2002-01-01

    The provision of social security benefits rests on normative principles of social justice. Most strongly manifest in earnings-related social insurance, the principle of reciprocity has been increasingly questioned on grounds of equity, adequacy and fiscal viability, in the wake of socio-economic cha

  7. Public perspectives on nuclear security. US national security surveys, 1993--1997

    Energy Technology Data Exchange (ETDEWEB)

    Herron, K.G.; Jenkins-Smith, H.C. [Univ. of New Mexico, Albuquerque, NM (United States). UNM Inst. for Public Policy

    1998-08-01

    This is the third report in a series of studies to examine how US attitudes about nuclear security are evolving in the post-Cold War era and to identify trends in public perceptions and preferences relevant to the evolution of US nuclear security policy. It presents findings from three surveys: a nationwide telephone survey of randomly selected members of the US general public; a written survey of randomly selected members of American Men and Women of Science; and a written survey of randomly selected state legislators from all fifty US states. Key areas of investigation included nuclear security, cooperation between US and Russian scientists about nuclear issues, vulnerabilities of critical US infrastructures and responsibilities for their protection, and broad areas of US national science policy. While international and US national security were seen to be slowly improving, the primary nuclear threat to the US was perceived to have shifted from Russia to China. Support was found for nuclear arms control measures, including mutual reductions in stockpiles. However, respondents were pessimistic about eliminating nuclear armaments, and nuclear deterrence continued to be highly values. Participants favored decreasing funding f/or developing and testing new nuclear weapons, but supported increased investments in nuclear weapons infrastructure. Strong concerns were expressed about nuclear proliferation and the potential for nuclear terrorism. Support was evident for US scientific cooperation with Russia to strengthen security of Russian nuclear assets. Elite and general public perceptions of external and domestic nuclear weapons risks and external and domestic nuclear weapons benefits were statistically significantly related to nuclear weapons policy options and investment preferences. Demographic variables and individual belief systems were systematically related both to risk and benefit perceptions and to policy and spending preferences.

  8. Sustainable Agriculture and Climate Change: Producing Potatoes (Solanum tuberosum L. and Bush Beans (Phaseolus vulgaris L. for Improved Food Security and Resilience in a Canadian Subarctic First Nations Community

    Directory of Open Access Journals (Sweden)

    Christine D. Barbeau

    2015-05-01

    Full Text Available Aboriginal people in Canada experience disproportionately high rates of diet-related illnesses, such as obesity and diabetes. Food insecurity has been identified as a contributing factor to these illnesses along with a loss of traditional lifestyle. Current food systems within northern subarctic and arctic regions of Canada rely heavily on imported foods that are expensive (when available, and are environmentally unsustainable. A warming subarctic and arctic climate present challenges, but also offers the opportunity for local agricultural production that can increase food security and promote a more sustainable food system. In this study the feasibility of sustainably growing potatoes (Solanum tuberosum L. utilizing agroforestry practices to enhance food security in remote subarctic communities is explored through a case study in Fort Albany First Nation in northern Ontario, Canada. Potato crops were grown over a two-year period and rotated into plots that had been planted with green bush beans (Phaseolus vulgaris L.. Results showed that potatoes and bush beans could be grown successfully in the subarctic without the use of greenhouses with yields comparable to more conventional high-input agricultural methods. In subarctic Canada, sustainable local food production can help to promote social capital, healthier lifestyles, and food security.

  9. Strategies for Overcoming Key Barriers to Development of a National Security Workforce

    Energy Technology Data Exchange (ETDEWEB)

    None

    2008-06-30

    This report documents the strategies for overcoming identified key barriers to development of an adequate national security workforce as part of the National Security Preparedness Project (NSPP) being performed under a Department of Energy (DOE) National Nuclear Security Administration (NNSA) grant. Many barriers currently exist that prevent the development of an adequate number of properly trained national security personnel. The identified strategies to address the barriers will focus on both short-term and long-term efforts, as well as strategies to capture legacy knowledge of retiring national security workforce personnel.

  10. Physics and National Security: The Spectrum of Opportunities

    Science.gov (United States)

    Davis, Jay

    2011-03-01

    Physicists reflexively tend to approach their role in addressing national security problems by reaching for technologies and inventing devices or systems. While this is appropriate, the space for contribution is much larger. The application of technology is frequently constrained by doctrinal, operational, financial, and logistic constraints, not to mention those of security. The speaker, who has played a role in technology development, field operations, advisory processes, and policy considerations will discuss the role physicists can have in definition of the threat space, creation and assessment of technologies needed, and helping with response and recovery. In particular, he will address the opportunities and risks for both academic and industrial physicists in trying to assist in these matters, i.e., when in career to address such problems, what are the obstacles or consequences, and when do you know you have contributed?

  11. Coping with global environmental change, disasters and security. Threats, challenges, vulnerabilities and risks

    Energy Technology Data Exchange (ETDEWEB)

    Brauch, Hans Guenter [Freie Univ. Berlin (Germany). Dept. of Political and Social Sciences; UNU-EHS, Bonn (DE). College of Associated Scientists and Advisors (CASA); Oswald Spring, Ursula [National Univ. of Mexico, Cuernavaca (MX). Regional Multidisciplinary Research Centre (CRIM); Mesjasz, Czeslaw [Cracow Univ. of Exonomics (Poland). Faculty of Management; Grin, John [Amsterdam Univ. (Netherlands). Dept. of Political Science; Dutch Knowledge network for Systems Innovations and Transitions (KSI), Amsterdam (Netherlands); Kameri-Mbote, Patricia [Strathmore Univ., Nairobi (Kenya). Dept. of Law; International Environmental Law Research Centre, Nairobi (Kenya); Chourou, Bechir [Univ. of Tunis-Carthage, Hammam-Chatt (Tunisia); Dunay, Pal [Geneva Centre for Security Policy (Switzerland). International Training Course in Security Policy; Birkmann, Joern (eds.) [United Nations Univ. (UNU), Bonn (DE). Inst. for Environment and Human Security (EHS)

    2011-07-01

    This policy-focused Global Environmental and Human Security Handbook for the Anthropo-cene (GEHSHA) addresses new security threats, challenges, vulnerabilities and risks posed by global environmental change and disasters. In 6 forewords, 5 preface essays 95 peer reviewed chapcountries analyse in 10 parts concepts of military and political hard security and economic, social, environmental soft security with a regional focus on the Near East, North and Sub-Sahara Africa and Asia and on hazards in urban centres. The major focus is on coping with global environmental change: climate change, desertification, water, food and health and with hazards and strategies on social vulnerability and resilience building and scientific, international, regional and national political strategies, policies and measures including early warning of conflicts and hazards. The book proposes a political geo-ecology and discusses a 'Fourth Green Revolution' for the Anthropocene era of earth history. (orig.)

  12. Bringing about change: the introduction of secure units.

    Science.gov (United States)

    Stocking, B

    1992-05-01

    The introduction of regional secure units into the NHS was studied as one example of the diffusion of patient care innovations. As well as the general history of secure units events in four Regions were studied in detail for the period from 1974 up to mid-1983. It is concluded that secure units became gradually more acceptable over time as (i) the need for such units was recognized, (ii) the climate of opinion changed in psychiatric hospitals from seeing secure units as a retrograde step, following the acceptance of more open door policies, to seeing secure units as a prestige development which might safeguard the future of a particular hospital, (iii) government loosened the definitions of what secure units should be and how they should operate so that there was more room for different regions to assess their own needs. Regions which were able to move relatively fast on secure unit development were those where there was already a 'product champion' present to promote the ideas, usually a forensic psychiatrist, and where there was also managerial support and designated responsibility for secure unit development at local and regional level. It is concluded that while public reaction was a hindrance it did not slow down secure unit development as much as might have been expected.

  13. The Paris Agreement on Climate Change: Agriculture and Food Security

    NARCIS (Netherlands)

    Verschuuren, Jonathan

    2016-01-01

    Climate change has a profound impact on agriculture and on food security. At the same time agriculture contributes to climate change to a considerable extent. Fortunately there is also much to gain since the agricultural sector holds significant climate change mitigation potential through reductions

  14. Long-term security of energy supply and climate change

    Energy Technology Data Exchange (ETDEWEB)

    Turton, H. [International Institute for Applied Systems Analysis, Laxenburg (Austria). ECS; Barreto, L. [Paul Scherrer Institute, Villigen (Switzerland). Energy Economics Group

    2006-10-15

    Security of energy supply and climate change are central concerns for policy makers and important dimensions of the long-term quest for a sustainable global energy system. This paper examines the role of several policy instruments in managing energy security and climate risks and stimulating technological change towards a more secure and climate-benign global energy system in the long-term future. The analysis has been conducted with ERIS, a multi-regional energy-systems ''bottom-up'' optimization model with technology learning. Our analysis provides some policy insights and identifies synergies and trade-offs relating to the potential for security of supply policies to promote the uptake of new technologies, reduce the cost of pursuing climate change mitigation policies, and facilitate a possible transition to a hydrogen economy. (author)

  15. Long-term security of energy supply and climate change

    Energy Technology Data Exchange (ETDEWEB)

    Hal Turton; Leonardo Barreto [International Institute for Applied Systems Analysis (IIASA), Laxenburg (Austria). Environmentally Compatible Energy Strategies (ECS)

    2006-10-15

    Security of energy supply and climate change are central concerns for policy makers and important dimensions of the long-term quest for a sustainable global energy system. This paper examines the role of several policy instruments in managing energy security and climate risks and stimulating technological change towards a more secure and climate-benign global energy system in the long-term future. The analysis has been conducted with ERIS, a multi-regional energy-systems 'bottom-up' optimization model with technology learning. The analysis provides some policy insights and identifies synergies and trade-offs relating to the potential for security of supply policies to promote the uptake of new technologies, reduce the cost of pursuing climate change mitigation policies, and facilitate a possible transition to a hydrogen economy. 44 refs., 13 figs., 1 tab.

  16. 78 FR 73202 - Review and Revision of the National Critical Infrastructure Security and Resilience (NCISR...

    Science.gov (United States)

    2013-12-05

    ... Infrastructure Security and Resilience. As part of a comprehensive national review process, DHS solicits public... infrastructure. Input is welcome from stakeholder groups, private and public entities, and individuals on content... SECURITY Review and Revision of the National Critical Infrastructure Security and Resilience...

  17. A Core National Security Interest: Framing Atrocities Prevention

    Directory of Open Access Journals (Sweden)

    Matthew Levinger

    2015-11-01

    Full Text Available This essay analyzes President Barack Obama’s communication strategies in his speeches and presidential statements concerning threats of mass atrocities in Libya, Syria, and Iraq from 2011 through 2015. It examines how he has used three rhetorical “frames” to explain events in these countries and to advocate specific U.S. policy responses: the “legalistic” (or “liberal internationalist”, the “moralistic,” and the “security” frame. Obama utilized primarily the legalistic frame to justify U.S. military intervention in Libya in 2011, and he relied mainly on the security frame (focusing on terrorist threats against U.S. nationals to justify the deployment of U.S. military forces against ISIL in Iraq and Syria in 2014−2015. Obama’s rhetorical framing of the violence perpetrated by the Syrian regime of Bashar al-Assad since 2011 has been less consistent. Hardly ever in these speeches did Obama suggest that mass atrocities per se constituted a threat to U.S. national security—despite the declaration in Obama’s 2011 Presidential Study Directive on Mass Atrocities that “preventing mass atrocities and genocide is a core national security interest” of the United States. Utilizing an approach to linguistic analysis developed by Roman Jakobson, the paper shows how Obama has employed rhetorical devices that emphasize the boundaries between the “in-group” of the American national community and the “out-groups” in other countries who are threatened by mass atrocities. Because members of an in-group are typically depicted as warranting greater concern than members of out-groups, Obama’s assignment of victimized communities to out-group status has effectively justified inaction by the U.S. government in the face of genocidal violence.

  18. National Strategies Capabilities for a Changing World

    Science.gov (United States)

    2000-11-01

    addition of unneeded items to the defense budget are examples of actions taken in Congress that thwart bipartisanship . Presidential leadership is...are unclear. On the subject of Congress’s role in national security, Senator Levin’s call for greater bipartisanship and a less parochial approach

  19. Potential National Security Applications of Nuclear Resonance Fluorescence Methods

    Energy Technology Data Exchange (ETDEWEB)

    Warren, Glen A.; Peplowski, Patrick N.; Caggiano, Joseph A.

    2009-06-09

    The objective of this report is to document the initial investigation into the possible research issues related to the development of NRF-based national security applications. The report discusses several potential applications ranging from measuring uranium enrichment in UF6 canisters to characterization of gas samples. While these applications are varied, there are only a few research issues that need to be addressed to understand the limitation of NRF in solving these problems. These research issues range from source and detector development to measuring small samples. The next effort is to determine how best to answer the research issues, followed by a prioritization of those questions to ensure that the most important are addressed. These issues will be addressed through either analytical calculations, computer simulations, analysis of previous data or collection of new measurements. It will also be beneficial to conduct a thorough examination of a couple of the more promising applications in order to develop concrete examples of how NRF may be applied in specific situations. The goals are to develop an understanding of whether the application of NRF is limited by technology or physics in addressing national security applications, to gain a motivation to explore those possible applications, and to develop a research roadmap so that those possibilities may be made reality.

  20. Nuclear proliferation and national security in India and Pakistan

    Energy Technology Data Exchange (ETDEWEB)

    Joeck, N.H.A.

    1986-01-01

    This study develops an inventory of propositions from secondary literature about nuclear proliferation incentives and constraints. From this comprehensive inventory are derived eight dimensions of proliferation. Once a state has acquired the necessary technology and material to develop weapons, the critical factors that motivate proliferation are insecurity, alliance protection, and a threat of national extinction. The eight dimensions are then evaluated with respect to two critical states, India and Pakistan, both of which are on the brink of developing nuclear weapons. Extensive interviews were conducted in the United States, India, and Pakistan of senior Indian, Pakistani, and American military official, diplomats, politicians, scholars, and journalists. Based on these interviews, it is clear that Indians and Pakistanis feel themselves caught in a dilemma. Although the initial motivation for developing weapons was indeed found to be insecurity, as expected, it is generally assumed that the effect of proliferation will in fact be to render both states even less secure than they were before beginning their nuclear programs. India and Pakistan are a critical pair of states as they are in a position to assess the probable consequences of nuclear proliferation and back away from it. In so doing, they could set an example to other states of why nuclear proliferation is not in the security interest of nations.

  1. Nevada National Security Site Integrated Groundwater Sampling Plan, Revision 0

    Energy Technology Data Exchange (ETDEWEB)

    Marutzky, Sam; Farnham, Irene

    2014-10-01

    The purpose of the Nevada National Security Site (NNSS) Integrated Sampling Plan (referred to herein as the Plan) is to provide a comprehensive, integrated approach for collecting and analyzing groundwater samples to meet the needs and objectives of the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Field Office (NNSA/NFO) Underground Test Area (UGTA) Activity. Implementation of this Plan will provide high-quality data required by the UGTA Activity for ensuring public protection in an efficient and cost-effective manner. The Plan is designed to ensure compliance with the UGTA Quality Assurance Plan (QAP). The Plan’s scope comprises sample collection and analysis requirements relevant to assessing the extent of groundwater contamination from underground nuclear testing. This Plan identifies locations to be sampled by corrective action unit (CAU) and location type, sampling frequencies, sample collection methodologies, and the constituents to be analyzed. In addition, the Plan defines data collection criteria such as well-purging requirements, detection levels, and accuracy requirements; identifies reporting and data management requirements; and provides a process to ensure coordination between NNSS groundwater sampling programs for sampling of interest to UGTA. This Plan does not address compliance with requirements for wells that supply the NNSS public water system or wells involved in a permitted activity.

  2. A brief history of Sandia's National security missions.

    Energy Technology Data Exchange (ETDEWEB)

    Drewien, Celeste A. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); O' Canna, Myra Lynn [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Stikar, John Anthony. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2014-09-01

    To help members of the workforce understand what factors contribute to Sandia National Laboratories national security mission, the authors describe the evolution of Sandias core mission and its other mission components. The mission of Sandia first as a division of Los Alamos and later as Sandia Corporation underlies our core nuclear weapon mission of today. Sandias mission changed in 1963 and twice more in the 1970s. This report should help staff and management appreciate the need for mission evolution. A clear definition and communication of a consistent corporate mission statement is still needed.

  3. 10 CFR 2.905 - Access to restricted data and national security information for parties; security clearances.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 1 2010-01-01 2010-01-01 false Access to restricted data and national security information for parties; security clearances. 2.905 Section 2.905 Energy NUCLEAR REGULATORY COMMISSION RULES OF PRACTICE FOR DOMESTIC LICENSING PROCEEDINGS AND ISSUANCE OF ORDERS Special Procedures Applicable to Adjudicatory Proceedings Involving...

  4. 77 FR 55777 - Security Zones; Dignitary Arrival/Departure and United Nations Meetings, New York, NY

    Science.gov (United States)

    2012-09-11

    ... locations of the security zones that are located near the United Nations Headquarters in Manhattan, New York... establish two permanent security zones near the United Nations Headquarters located on the East River at... the United Nations Headquarters located on the East River at East 43rd Street, Manhattan, New...

  5. Agroforestry, climate change, and food security

    Science.gov (United States)

    Successfully addressing global climate change effects on agriculture will require a holistic, sustained approach incorporating a suite of strategies at multiple spatial scales and time horizons. In the USA of the 1930’s, bold and innovative leadership at high levels of government was needed to enact...

  6. Water Security and Climate Change: The Need for Adaptive Governance

    Directory of Open Access Journals (Sweden)

    Tuula Honkonen

    2017-01-01

    Full Text Available Climate change will bring about unprecedented economic, social and environmental effects, which require both the mitigation of greenhouse gas emissions and adaptation to its adverse effects. Water is the main element through which the impacts of climate change will be felt. Climate change results in increased uncertainties, complexities, stress and potential for conflicts within water management, both among and within states. New forms of governance are needed if the world is to respond to the need to adapt to changes in freshwater supply and to manage water security risks. This paper suggests that adaptive governance should to be main-streamed into all water regulation to ensure the availability of and access to safe water resources and to prevent water-related conflicts. The paper discusses the concept of water security in the context of climate change, the threats that climate change poses to water security, and the concept and implications of adaptive governance as a possible solution. The application of adaptive governance requires a certain degree of institutional and normative flexibility, instruments and institutions that can respond and adapt to changes and manage the level of uncertainty associated with the impacts of climate change. The governance institutions, methods and instruments should be responsive to new information and different kinds of uncertainties, while reflecting the vulnerabilities, capacities, needs and priorities of both societies and ecosystems in the face of climate change. Water security risks could be reduced by increased hydrosolidarity among states, which would present the challenges posed by climate change on water governance and security as primarily an opportunity for new forms of cooperation.

  7. Advanced Technologies for Intelligent Systems of National Border Security

    CERN Document Server

    Simek, Krzysztof; Świerniak, Andrzej

    2013-01-01

    One of the world’s leading problems in the field of national security is protection of borders and borderlands. This book addresses multiple issues on advanced innovative methods of multi-level control of both ground (UGVs) and aerial drones (UAVs). Those objects combined with innovative algorithms become autonomous objects capable of patrolling chosen borderland areas by themselves and automatically inform the operator of the system about potential place of detection of a specific incident. This is achieved by using sophisticated methods of generation of non-collision trajectory for those types of objects and enabling automatic integration of both ground and aerial unmanned vehicles. The topics included in this book also cover presentation of complete information and communication technology (ICT) systems capable of control, observation and detection of various types of incidents and threats. This book is a valuable source of information for constructors and developers of such solutions for uniformed servi...

  8. Food security in the context of global environmental change

    Energy Technology Data Exchange (ETDEWEB)

    Rosenberg, N.J.

    1993-11-01

    United Nations predictions and other sources indicate that world population could grow to 8.5 billion by 2025 (Keyfitz 1989) and 11 billion by the end of the coming century (UNFPA 1990). As new information becomes available on the effectiveness of population control programs, the rise of virulent diseases and other factors, these numbers change--sometimes smaller, sometimes larger still. Whatever the numbers actually turn out to be, global agricultural production will have to increase several-fold from present levels to feed and clothe the growing population and to improve worldwide standards of nutrition. The capacity of global agriculture to ensure food security through increased and sustained agricultural production depends on our ability to manage, conserve and in some cases increase the resource base available to the industry of agriculture. The resources that underpin agriculture are land, water and genetic diversity. The first two of these are the subject of this paper. Genetic diversity is the subject of another paper in this volume.

  9. 75 FR 43944 - Defense Science Board; Task Force on Trends and Implications of Climate Change for National and...

    Science.gov (United States)

    2010-07-27

    ... Climate Change for National and International Security will meet in closed session August 18-19, and... Office of the Secretary Defense Science Board; Task Force on Trends and Implications of Climate Change for National and International Security AGENCY: Department of Defense (DoD). ACTION: Notice...

  10. 75 FR 34438 - Defense Science Board Task Force on Trends and Implications of Climate Change for National and...

    Science.gov (United States)

    2010-06-17

    ... Change for National and International Security will meet in closed session on July 14-15 and on July 29... of the Secretary Defense Science Board Task Force on Trends and Implications of Climate Change for National and International Security AGENCY: Department of Defense (DoD). ACTION: Notice of...

  11. The Regionally-Oriented National Schools, an Innovative Tool for National and Regional Security Building

    Science.gov (United States)

    2012-04-04

    REQUIREMENTS FOR THE DEGREE OF MASTER OF MILITARY STUDIES AUTHOR: Chef de bataillon Tugdual Barbarin Armee de Terre , Troupes de Marine- France AY 11...national and regional security building Author: Chef de bataillon Tugdual Barbarin, Armée de Terre , Troupes de Marines (France) Thesis...assertion, people are rarely able to provide precise examples demonstrating this influence. At best, they evoke outdated clichés which do not reflect the

  12. Simulating human behavior for national security human interactions.

    Energy Technology Data Exchange (ETDEWEB)

    Bernard, Michael Lewis; Hart, Dereck H.; Verzi, Stephen J.; Glickman, Matthew R.; Wolfenbarger, Paul R.; Xavier, Patrick Gordon

    2007-01-01

    This 3-year research and development effort focused on what we believe is a significant technical gap in existing modeling and simulation capabilities: the representation of plausible human cognition and behaviors within a dynamic, simulated environment. Specifically, the intent of the ''Simulating Human Behavior for National Security Human Interactions'' project was to demonstrate initial simulated human modeling capability that realistically represents intra- and inter-group interaction behaviors between simulated humans and human-controlled avatars as they respond to their environment. Significant process was made towards simulating human behaviors through the development of a framework that produces realistic characteristics and movement. The simulated humans were created from models designed to be psychologically plausible by being based on robust psychological research and theory. Progress was also made towards enhancing Sandia National Laboratories existing cognitive models to support culturally plausible behaviors that are important in representing group interactions. These models were implemented in the modular, interoperable, and commercially supported Umbra{reg_sign} simulation framework.

  13. Climate Change, Agriculture and Food Security in Tanzania

    DEFF Research Database (Denmark)

    Arndt, Channing; Farmer, William; Strzepek, Kenneth

    2012-01-01

    Due to their reliance on rain-fed agriculture, both as a source of income and consumption, many low-income countries are considered to be the most vulnerable to climate change. Here, we estimate the impact of climate change on food security in Tanzania. Representative climate projections are used...... in calibrated crop models to predict crop yield changes for 110 districts in Tanzania. These results are in turn imposed on a highly disaggregated, recursive dynamic economy-wide model of Tanzania. We find that, relative to a no-climate-change baseline and considering domestic agricultural production...... as the channel of impact, food security in Tanzania appears likely to deteriorate as a consequence of climate change. The analysis points to a high degree of diversity of outcomes (including some favorable outcomes) across climate scenarios, sectors, and regions. Noteworthy differences in impacts across...

  14. Climate change and national crop wild relative conservation planning.

    Science.gov (United States)

    Phillips, Jade; Magos Brehm, Joana; van Oort, Bob; Asdal, Åsmund; Rasmussen, Morten; Maxted, Nigel

    2017-02-18

    Climate change is likely to be one of the most important factors affecting our future food security. To mitigate negative impacts, we will require our crops to be more genetically diverse. Such diversity is available in crop wild relatives (CWRs), the wild taxa relatively closely related to crops and from which diverse traits can be transferred to the crop. Conservation of such genetic resources resides within the nation where they are found; therefore, national-level conservation recommendations are fundamental to global food security. We investigate the potential impact of climate change on CWR richness in Norway. The consequences of a 1.5 and 3.0 °C temperature rise were studied for the years 2030, 2050, 2070, 2080 and then compared to the present climate. The results indicate a pattern of shifting CWR richness from the south to the north, with increases in taxa turnover and in the numbers of threatened taxa. Recommendations for in situ and ex situ conservation actions over the short and long term for the priority CWRs in Norway are presented. The methods and recommendations developed here can be applied within other nations and at regional and global levels to improve the effectiveness of conservation actions and help ensure global food security.

  15. Utilizing Current Commercial-off-the-Shelf Facial Recognition and Public Live Video Streaming to Enhance National Security

    Science.gov (United States)

    2014-09-01

    COMMERCIAL-OFF-THE-SHELF FACIAL RECOGNITION AND PUBLIC LIVE VIDEO STREAMING TO ENHANCE NATIONAL SECURITY by Victor F. Cruz September 2014...UTILIZING CURRENT COMMERCIAL-OFF-THE-SHELF FACIAL- RECOGNITION AND PUBLIC LIVE VIDEO STREAMING TO ENHANCE NATIONAL SECURITY 5. FUNDING NUMBERS...biometrics technologies. 14. SUBJECT TERMS Facial recognition, systems engineering, live video streaming , security cameras, national security

  16. 77 FR 12623 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2012-03-01

    ... RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy... open to the public. However, due to space limitations and access procedures, the name and telephone number of individuals planning to attend must be submitted to the Information Security Oversight...

  17. 78 FR 64024 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2013-10-25

    ... RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy... Industrial Security Program policy matters. DATES: The meeting will be held on November 14, 2013 from 10:00 a... open to the public. However, due to space limitations and access procedures, the name and...

  18. 78 FR 38077 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2013-06-25

    ... RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy... Industrial Security Program policy matters. DATES: The meeting will be held on July 17, 2013 from 10:00 a.m... open to the public. However, due to space limitations and access procedures, the name and...

  19. From School Militarization to School Securitization: National Security Finds Its Place in Schools

    Science.gov (United States)

    Nguyen, Nicole

    2017-01-01

    This ethnography explores daily life at Milton High School, a US public school with its own specialized Homeland Security program. From "military grunts" serving in distant theaters of war to Transportation Security Administration (TSA) agents defending the US borderlands to National Security Administration (NSA) technicians monitoring…

  20. Disposal of Low-Level Waste (LLW) at the Nevada National Security Site (NNSS)

    Energy Technology Data Exchange (ETDEWEB)

    none, none

    2014-05-14

    DOE Office of Environmental Management presentation at the 2014 Annual Meeting of the National Transportation Stakeholders Forum on the disposal of low-level waste at the Nevada National Security Site.

  1. Food security, irrigation, climate change, and water scarcity in India

    Science.gov (United States)

    Hertel, T. W.; Taheripour, F.; Gopalakrishnan, B. N.; Sahin, S.; Escurra, J.

    2015-12-01

    This paper uses an advanced CGE model (Taheripour et al., 2013) coupled with hydrological projections of future water scarcity and biophysical data on likely crop yields under climate change to examine how water scarcity, climate change, and trade jointly alter land use changes across the Indian subcontinent. Climate shocks to rainfed and irrigated yields in 2030 are based on the p-DSSAT crop model, RCP 2.6, as reported under the AgMIP project (Rosenzweig et al., 2013), accessed through GEOSHARE (Villoria et al, 2014). Results show that, when water scarcity is ignored, irrigated areas grow in the wake of climate change as the returns to irrigation rise faster than for rainfed uses of land within a given agro-ecological zone. When non-agricultural competition for future water use, as well as anticipated supply side limitations are brought into play (Rosegrant et al., 2013), the opportunity cost of water rises across all river basins, with the increase ranging from 12% (Luni) to 44% (Brahmaputra). As a consequence, irrigated crop production is curtailed in most regions (Figure 1), with the largest reductions coming in the most water intensive crops, namely rice and wheat. By reducing irrigated area, which tends to have much higher yields, the combined effects of water scarcity and climate impacts require an increase in total cropped area, which rises by about 240,000 ha. The majority of this area expansion occurs in the Ganges, Indus, and Brahmari river basins. Overall crop output falls by about 2 billion, relative to the 2030 baseline, with imports rising by about 570 million. The combined effects of climate change and water scarcity for irrigation also have macro-economic consequences, resulting in a 0.28% reduction in GDP and an increase in the consumer price index by about 0.4% in 2030, compared the baseline. The national welfare impact on India amounts to roughly 3 billion (at 2007 prices) in 2030. Assuming a 3% social discount rate, the net present value of the

  2. 3 CFR - Implementation of the Executive Order, “Classified National Security Information”

    Science.gov (United States)

    2010-01-01

    ... 3 The President 1 2010-01-01 2010-01-01 false Implementation of the Executive Order, âClassified National Security Informationâ Presidential Documents Other Presidential Documents Memorandum of December 29, 2009 Implementation of the Executive Order, “Classified National Security Information” Memorandum for the Heads of Executive Departments...

  3. 10 CFR 95.25 - Protection of National Security Information and Restricted Data in storage.

    Science.gov (United States)

    2010-01-01

    ... Protection of National Security Information and Restricted Data in storage. (a) Secret matter, while... 10 Energy 2 2010-01-01 2010-01-01 false Protection of National Security Information and Restricted Data in storage. 95.25 Section 95.25 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) FACILITY...

  4. American History and National Security: Supplementary Lessons for High School Courses.

    Science.gov (United States)

    Patrick, John J., Ed.; And Others

    Effective citizen participation implies the acquisition of skills and knowledge necessary for discussing and deciding national security issues. This book was developed to provide teachers with resources to design and strengthen national security education. The 30 self-contained lessons supplement and enrich current textbook treatment of national…

  5. National Security in the Nuclear Age: Public Library Proposal and Booklist. May 1987 Update.

    Science.gov (United States)

    Dane, Ernest B.

    To increase public understanding of national security issues, this document proposes that a balanced and up-to-date collection of books and other materials on national security in the nuclear age be included in all U.S. public libraries. The proposal suggests that the books be grouped together on an identified shelf. Selection criteria for the…

  6. 75 FR 43492 - Federal Advisory Committee; National Security Education Board; Charter Renewal

    Science.gov (United States)

    2010-07-26

    ... of the Secretary Federal Advisory Committee; National Security Education Board; Charter Renewal... notice that it is renewing the charter for the National Security Education Board (hereafter referred to as the Board). FOR FURTHER INFORMATION CONTACT: Jim Freeman, Deputy Committee Management Officer...

  7. Personal, Electronic, Secure: National Library of Medicine Hosts Health Records Conference

    Science.gov (United States)

    ... Bar Home Current Issue Past Issues EHR Personal, Electronic, Secure: National Library of Medicine Hosts Health Records Conference Past Issues / ... 1st at Indy 500 / EHR/PHR Basics / Personal, Electronic, Secure National Library of Medicine Hosts Health Records Conference Summer 2009 ...

  8. Global Food Security in a Changing Climate: Considerations and Projections

    Science.gov (United States)

    Walsh, M. K.; Brown, M. E.; Backlund, P. W.; Antle, J. M.; Carr, E. R.; Easterling, W. E.; Funk, C. C.; Murray, A.; Ngugi, M.; Barrett, C. B.; Ingram, J. S. I.; Dancheck, V.; O'Neill, B. C.; Tebaldi, C.; Mata, T.; Ojima, D. S.; Grace, K.; Jiang, H.; Bellemare, M.; Attavanich, W.; Ammann, C. M.; Maletta, H.

    2015-12-01

    Global food security is an elusive challenge and important policy focus from the community to the globe. Food is provisioned through food systems that may be simple or labyrinthine, yet each has vulnerabilities to climate change through its effects on food production, transportation, storage, and other integral food system activities. At the same time, the future of food systems is sensitive to socioeconomic trajectories determined by choices made outside of the food system, itself. Constrictions for any reason can lead to decreased food availability, access, utilization, or stability - that is, to diminished food security. Possible changes in trade and other U.S. relationships to the rest of the world under changing conditions to the end of the century are considered through integrated assessment modelling under a range of emissions scenarios. Climate change is likely to diminish continued progress on global food security through production disruptions leading to local availability limitations and price increases, interrupted transport conduits, and diminished food safety, among other causes. In the near term, some high-latitude production export regions may benefit from changes in climate. The types and price of food imports is likely to change, as are export demands, affecting U.S. consumers and producers. Demands placed on foreign assistance programs may increase, as may demand for advanced technologies. Adaptation across the food system has great potential to manage climate change effects on food security, and the complexity of the food system offers multiple potential points of intervention for decision makers at every level. However, effective adaptation is subject to highly localized conditions and socioeconomic factors, and the technical feasibility of an adaptive intervention is not necessarily a guarantee of its application if it is unaffordable or does not provide benefits within a relatively short time frame.

  9. Implementation of Strategies to Leverage Public and Private Resources for National Security Workforce Development

    Energy Technology Data Exchange (ETDEWEB)

    None

    2009-04-01

    This report documents implementation strategies to leverage public and private resources for the development of an adequate national security workforce as part of the National Security Preparedness Project (NSPP), being performed under a U.S. Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. There are numerous efforts across the United States to develop a properly skilled and trained national security workforce. Some of these efforts are the result of the leveraging of public and private dollars. As budget dollars decrease and the demand for a properly skilled and trained national security workforce increases, it will become even more important to leverage every education and training dollar. This report details some of the efforts that have been implemented to leverage public and private resources, as well as implementation strategies to further leverage public and private resources.

  10. India′s National Action Plan on Climate Change

    Directory of Open Access Journals (Sweden)

    Pandve Harshal

    2009-01-01

    Full Text Available Climate change is one of the most critical global challenges of our times. Recent events have emphatically demonstrated our growing vulnerability to climate change. Climate change impacts will range from affecting agriculture - further endangering food security - to sea-level rise and the accelerated erosion of coastal zones, increasing intensity of natural disasters, species extinction, and the spread of vector-borne diseases. India released its much-awaited National Action Plan on Climate Change (NAPCC to mitigate and adapt to climate change on June 30, 2008, almost a year after it was announced. The NAPCC runs through 2017 and directs ministries to submit detailed implementation plans to the Prime Minister′s Council on Climate Change by December 2008. This article briefly reviews the plan and opinion about it from different experts and organizations.

  11. 76 FR 44751 - Suspension of Entry of Aliens Subject to United Nations Security Council Travel Bans and...

    Science.gov (United States)

    2011-07-27

    ... to United Nations Security Council Travel Bans and International Emergency Economic Powers Act... the United Nations Charter to carry out the decisions of the United Nations Security Council imposed... a United Nations Security Council resolution referenced in Annex A to this proclamation. (b)...

  12. REGULATION OF MIGRATORY PROCESSES AS BASIS OF RUSSIAN NATIONAL SECURITY

    Directory of Open Access Journals (Sweden)

    V. A. Silantyeva

    2016-01-01

    Full Text Available The article deals with modern problems of migration, given the attempt to identify the causes of the migratory crisis in Europe, shows the state migration policy of Russia. Despite features of migration policy in separately taken European state, consequences of migratory processes for the countries of Europe the general. In Russia long time there was no complete system of the migratory legislation. However in recent years Russia has considerably progressed in the solution of migratory problems: the Concept of the state migration policy of the Russian Federation for the period till 2025 within which the principles and the main activities of the Russian Federation in the sphere of migration are established is accepted. It, in our opinion, has allowed reducing the number of labor migrants and those who illegally work in the territory of the Russian Federation. Based on the study of existing theoretical approaches, standards and applicable regulations made some conclusions about the nature of migration control. It was found that the effective implementation of the state migration policy will contribute to socioeconomic and demographic development, national security and maintain stability in society.

  13. Evaluating Factors of Security Policy on Information Security Effectiveness in Developing Nations: A Case of Nigeria

    Science.gov (United States)

    Okolo, Nkiru Benjamin

    2016-01-01

    Information systems of today face more potential security infringement than ever before. The regular susceptibility of data to breaches is a function of systems users' disinclination to follow appropriate security measures. A well-secured system maintains integrity, confidentiality, and availability, while providing appropriate and consistent…

  14. National stroke audit: a tool for change?

    OpenAIRE

    2001-01-01

    Objectives—To describe the standards of care for stroke patients in England, Wales and Northern Ireland and to determine the power of national audit, coupled with an active dissemination strategy to effect change.

  15. 75 FR 22151 - National Maritime Security Advisory Committee; Vacancies

    Science.gov (United States)

    2010-04-27

    .... Maritime Labor. International and Inter-modal Supply Chain. Maritime Hazardous Materials Handling/Shipping... infrastructure; Promoting international cooperation and multilateral solutions to maritime security...

  16. 78 FR 55089 - National Maritime Security Advisory Committee; Meeting

    Science.gov (United States)

    2013-09-09

    ... via a web enabled interactive online format and teleconference line. To participate via teleconference... advice, consults with, and makes recommendations to the Secretary of Homeland Security, via...

  17. 78 FR 16699 - National Maritime Security Advisory Committee; Meeting

    Science.gov (United States)

    2013-03-18

    ... web enabled interactive online format and teleconference line. To participate via teleconference, dial..., consults with, and makes recommendations to the Secretary of Homeland Security, via the Commandant of...

  18. Climate Change Dynamics and Imperatives for Food Security in Nigeria

    Directory of Open Access Journals (Sweden)

    Olumide D. Onafeso

    2016-02-01

    Full Text Available Decadal variability in African rainfall is projected from General Circulation Models (GCMs to continue under elevated greenhouse gas scenarios. Effects on rain intensity, spatio-temporal variability of growing seasons, flooding, drought, and land-use change impose feedbacks at regional-local scales. Yet, empirical knowledge of associated impacts on crop yield is limited; thus, we examined the imperatives for food security in Nigeria. Bivariate correlation and multiple regression suggests impending drought in the northern region where livestock farming is predominant. Relative contributions of climate independent variables in determining crop yield by backward selection procedures with stepwise approach indexed the impacts of annual climate variability by a parameter computed as annual yield minus mean annual yield divided by the standard deviation. Results show Z-distribution approximately 5 to + 5, when 3 indicate impacts significant at 95% confidence levels. In conclusion, we established the interwoven relationship between climatic change and food security.

  19. Framework of SAGI Agriculture Remote Sensing and Its Perspectives in Supporting National Food Security

    Institute of Scientific and Technical Information of China (English)

    SHI Yun; JI Shun-ping; SHAO Xiao-wei; TANG Hua-jun; WU Wen-bin; YANG Peng; ZHANG Yong-jun; Shibasaki Ryosuke

    2014-01-01

    Remote sensing, in particular satellite imagery, has been widely used to map cropland, analyze cropping systems, monitor crop changes, and estimate yield and production. However, although satellite imagery is useful within large scale agriculture applications (such as on a national or provincial scale), it may not supply sufifcient information with adequate resolution, accurate geo-referencing, and specialized biological parameters for use in relation to the rapid developments being made in modern agriculture. Information that is more sophisticated and accurate is required to support reliable decision-making, thereby guaranteeing agricultural sustainability and national food security. To achieve this, strong integration of information is needed from multi-sources, multi-sensors, and multi-scales. In this paper, we propose a new framework of satellite, aerial, and ground-integrated (SAGI) agricultural remote sensing for use in comprehensive agricultural monitoring, modeling, and management. The prototypes of SAGI agriculture remote sensing are ifrst described, followed by a discussion of the key techniques used in joint data processing, image sequence registration and data assimilation. Finally, the possible applications of the SAGI system in supporting national food security are discussed.

  20. Landscape ecological security response to land use change in the tidal flat reclamation zone, China.

    Science.gov (United States)

    Zhang, Runsen; Pu, Lijie; Li, Jianguo; Zhang, Jing; Xu, Yan

    2016-01-01

    As coastal development becomes a national strategy in Eastern China, land use and landscape patterns have been affected by reclamation projects. In this study, taking Rudong County, China as a typical area, we analyzed land use change and its landscape ecological security responses in the tidal flat reclamation zone. The results show that land use change in the tidal flat reclamation zone is characterized by the replacement of natural tidal flat with agricultural and construction land, which has also led to a big change in landscape patterns. We built a landscape ecological security evaluation system, which consists of landscape interference degree and landscape fragile degree, and then calculated the landscape ecological security change in the tidal flat reclamation zone from 1990 to 2008 to depict the life cycle in tidal flat reclamation. Landscape ecological security exhibited a W-shaped periodicity, including the juvenile stage, growth stage, and maturation stage. Life-cycle analysis demonstrates that 37 years is required for the land use system to transform from a natural ecosystem to an artificial ecosystem in the tidal flat reclamation zone.

  1. Y-12 National Security Complex National Historic Preservation Act Historic Preservation Plan

    Energy Technology Data Exchange (ETDEWEB)

    None

    2003-09-30

    The Historic Preservation Plan (HPP) recognizes that the Y-12 National Security Complex is a vital and long-term component of DOE and NNSA. In addition to NNSA missions, the Office of Science and Energy, the Office of Nuclear Energy, and the Office of Environmental Management have properties located at Y-12 that must be taken into consideration. The HPP also recognizes that the challenge for cultural resource management is incorporating the requirements of NNSA, SC, NE, and EM missions while preserving and protecting its historic resources. The HPP seeks to find an effective way to meet the obligations at Y-12 for historic and archeological protection while at the same time facilitating effective completion of ongoing site mission activities, including removal of obsolete or contaminated facilities, adaptive reuse of existing facilities whenever feasible, and construction of new facilities in order to meet site mission needs. The Y-12 Historic Preservation Plan (HPP) defines the preservation strategy for the Y-12 National Security Complex and will direct efficient compliance with the NHPA and federal archaeological protection legislation at Y-12 as DOE and NNSA continues mission activities of the site.

  2. Private Military and Security Companies - Counterinsurgency and Nation Building Strategy

    Science.gov (United States)

    2013-04-25

    120. 37 James J. Carafano, 115. 38 James J. Carafano, 117. 39 Peter Aps, “As Iraq, Afghan wars end, private security firms adapt,” Reuters , October...Bibliography Aps, Peter. “As Iraq, Afghan wars end, private security firms adapt,” Reuters ...International Peace Research Institute, The private military services industry, Online. Thomson , Janice E. Mercenaries, Pirates, and

  3. 77 FR 1076 - National Maritime Security Advisory Committee; Meeting

    Science.gov (United States)

    2012-01-09

    ... 9, 2012. Additionally, this meeting will be broadcasted via a web enabled interactive online format... advice, consults with, and makes recommendations to the Secretary of Homeland Security, via the.... 109-347) NMSAC continues to be consulted in regards to the Global Supply Chain Security...

  4. Livestock and food security: vulnerability to population growth and climate change.

    Science.gov (United States)

    Godber, Olivia F; Wall, Richard

    2014-10-01

    Livestock production is an important contributor to sustainable food security for many nations, particularly in low-income areas and marginal habitats that are unsuitable for crop production. Animal products account for approximately one-third of global human protein consumption. Here, a range of indicators, derived from FAOSTAT and World Bank statistics, are used to model the relative vulnerability of nations at the global scale to predicted climate and population changes, which are likely to impact on their use of grazing livestock for food. Vulnerability analysis has been widely used in global change science to predict impacts on food security and famine. It is a tool that is useful to inform policy decision making and direct the targeting of interventions. The model developed shows that nations within sub-Saharan Africa, particularly in the Sahel region, and some Asian nations are likely to be the most vulnerable. Livestock-based food security is already compromised in many areas on these continents and suffers constraints from current climate in addition to the lack of economic and technical support allowing mitigation of predicted climate change impacts. Governance is shown to be a highly influential factor and, paradoxically, it is suggested that current self-sufficiency may increase future potential vulnerability because trade networks are poorly developed. This may be relieved through freer trade of food products, which is also associated with improved governance. Policy decisions, support and interventions will need to be targeted at the most vulnerable nations, but given the strong influence of governance, to be effective, any implementation will require considerable care in the management of underlying structural reform.

  5. 10 CFR 2.913 - Review of Restricted Data or other National Security Information received in evidence.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 1 2010-01-01 2010-01-01 false Review of Restricted Data or other National Security... Adjudicatory Proceedings Involving Restricted Data and/or National Security Information § 2.913 Review of Restricted Data or other National Security Information received in evidence. At the close of the reception...

  6. How Robust Refugee Protection Policies Can Strengthen Human and National Security

    Directory of Open Access Journals (Sweden)

    Donald Kerwin

    2016-09-01

    Full Text Available This paper makes the case that refugee protection and national security should be viewed as complementary, not conflicting state goals. It argues that refugee protection can further the security of refugees, affected states, and the international community. Refugees and international migrants can also advance national security by contributing to a state’s economic vitality, military strength, diplomatic standing, and civic values. The paper identifies several strategies that would, if implemented, promote both security and refugee protection. It also outlines additional steps that the US Congress should take to enhance US refugee protection policies and security. Finally, it argues for the efficacy of political engagement in support of pro-protection, pro-security policies, and against the assumption that political populism will invariably impede support for refugee protection.

  7. National security risks? Uncertainty, austerity and other logics of risk in the UK government’s National Security Strategy

    NARCIS (Netherlands)

    Hammerstad, A.; Boas, I.J.C.

    2015-01-01

    Risk scholars within Security Studies have argued that the concept of security has gone through a fundamental transformation away from a threat-based conceptualisation of defence, urgency
    and exceptionality to one of preparedness, precautions and prevention of future risks, some of which are cal

  8. 78 FR 2953 - National Cybersecurity Center of Excellence (NCCoE) Secure Exchange of Electronic Health...

    Science.gov (United States)

    2013-01-15

    ... variety of client devices (desktops, laptops, and mobile devices) and the range of healthcare data... National Institute of Standards and Technology National Cybersecurity Center of Excellence (NCCoE) Secure... Technology, Department of Commerce. ACTION: Notice. SUMMARY: The National Institute of Standards...

  9. Markets, Climate Change and Food Security in West Africa

    Science.gov (United States)

    Brown, Molly E.; Hintermann, Beat; Higgins, Nathaniel

    2009-01-01

    West Africa is one of the most food insecure regions of the world. Sharply increased food and energy prices in 2008 brought the role of markets in food access and availability around the world into the spotlight, particularly in urban areas. The period of high prices had the immediate consequence of sharply increasing the number of hungry people in the region without boosting farmer incomes significantly. In this article, the interaction between markets, food prices, agricultural technology and development is explored in the context of West Africa. To improve food security in West Africa, sustained commitment to investment in the agriculture sector will be needed to provide some protection against global swings in both production and world markets. Climate change mitigation programs are likely to force global energy and commodity price increases in the coming decades, putting pressure on regions like West Africa to produce more food locally to ensure stability in food security for the most vulnerable.

  10. The National Security Strategy of the Republic of Albania

    Science.gov (United States)

    2004-01-01

    applied consequently in a democratic system . 33. Vital interests guaranteeing, such as: exercise of sovereignty, protection of independence and...balance of security in favor of political means, of the institutions of security and diplomacy, and the dimension and human dignity in a democratic ... system . The use of military force will be executed only to guarantee the constitutional right to protect the vital interests of the country by all

  11. Ares V: Game Changer for National Security Launch

    Science.gov (United States)

    Sumrall, Phil; Morris, Bruce

    2009-01-01

    NASA is designing the Ares V cargo launch vehicle to vastly expand exploration of the Moon begun in the Apollo program and enable the exploration of Mars and beyond. As the largest launcher in history, Ares V also represents a national asset offering unprecedented opportunities for new science, national security, and commercial missions of unmatched size and scope. The Ares V is the heavy-lift component of NASA's dual-launch architecture that will replace the current space shuttle fleet, complete the International Space Station, and establish a permanent human presence on the Moon as a stepping-stone to destinations beyond. During extensive independent and internal architecture and vehicle trade studies as part of the Exploration Systems Architecture Study (ESAS), NASA selected the Ares I crew launch vehicle and the Ares V to support future exploration. The smaller Ares I will launch the Orion crew exploration vehicle with four to six astronauts into orbit. The Ares V is designed to carry the Altair lunar lander into orbit, rendezvous with Orion, and send the mated spacecraft toward lunar orbit. The Ares V will be the largest and most powerful launch vehicle in history, providing unprecedented payload mass and volume to establish a permanent lunar outpost and explore significantly more of the lunar surface than was done during the Apollo missions. The Ares V consists of a Core Stage, two Reusable Solid Rocket Boosters (RSRBs), Earth Departure Stage (EDS), and a payload shroud. For lunar missions, the shroud would cover the Lunar Surface Access Module (LSAM). The Ares V Core Stage is 33 feet in diameter and 212 feet in length, making it the largest rocket stage ever built. It is the same diameter as the Saturn V first stage, the S-IC. However, its length is about the same as the combined length of the Saturn V first and second stages. The Core Stage uses a cluster of five Pratt & Whitney Rocketdyne RS-68B rocket engines, each supplying about 700,000 pounds of thrust

  12. The national forum on climate change

    Energy Technology Data Exchange (ETDEWEB)

    Averill, N. [National Round Table on the Environment and the Economy, Ottawa, ON (Canada)

    1998-09-01

    The mandate of the National Round Table on the Environment and the Economy (NRTEE) is to identify, explain and promote the principles and practices of sustainable development at the national level. In early 1998, NRTEE held a national forum on climate change at which the potential impacts of climate change on Canada were discussed and the most appropriate response for Canada was debated. Many scientists agree that the buildup of human-generated greenhouse gases in the atmosphere could have disastrous impacts on weather patterns, ecosystems and economic activity worldwide. At the Kyoto conference, all developed countries, including Canada, agreed to set targets to reduce greenhouse gas emissions. The NRTEE forum provided an opportunity to discuss the general approaches that Canada can take to deal with climate change and at what cost. The choices and trade-offs that Canadians will face were also discussed.

  13. 77 FR 34029 - National Security Education Board Members Meeting; Cancellation of Meeting

    Science.gov (United States)

    2012-06-08

    ... and National Security Education Office, 1101 Wilson Boulevard, Suite 1210, Arlington, VA 22209... Security Education Board meeting. The purpose of the meeting was to review and make recommendations to the... Education Office (DLNSEO), 1101 Wilson Boulevard, Suite 1210, Arlington, Virginia 22209-2248; (703)...

  14. From DDR to Security Promotion: Connecting national programs to community initiatives

    NARCIS (Netherlands)

    Verkoren, W.; Willems, R.C.; Kleingeld, J.; Rouw, H.

    2010-01-01

    Disarmament, demobilization and reintegration (DDR) is a set of activities that forms part of strategies for peacebuilding after civil war. DDR has become the standard way of addressing security threats in immediate post-conflict situations. However, DDR is designed to promote national security, rat

  15. 42 CFR 403.812 - HIPAA privacy, security, administrative data standards, and national identifiers.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 2 2010-10-01 2010-10-01 false HIPAA privacy, security, administrative data... Prescription Drug Discount Card and Transitional Assistance Program § 403.812 HIPAA privacy, security, administrative data standards, and national identifiers. (a) HIPAA covered entities. An endorsed sponsor is...

  16. 78 FR 54349 - Self-Regulatory Organizations; National Securities Clearing Corporation; Order Approving Proposed...

    Science.gov (United States)

    2013-09-03

    ... securities executed on national stock exchanges and in the OTC market, as provided in Rule 7 and Procedure II..., 2013), 78 FR 42989 (July 18, 2013) (SR-NSCC-2013-09) (``Notice''). I. Description NSCC is amending...

  17. 76 FR 80205 - Instituting a National Action Plan On Women, Peace, And Security

    Science.gov (United States)

    2011-12-23

    ... be created pursuant to the process outlined in Presidential Policy Directive 1 and shall identify and... leadership and substantive participation in peace processes, conflict prevention, peacebuilding, transitional... and National Security Advisor shall, consistent with Presidential Policy Directive 1 or any...

  18. Identification of Strategies to Leverage Public and Private Resources for National Security Workforce Development

    Energy Technology Data Exchange (ETDEWEB)

    None

    2009-02-01

    This report documents the identification of strategies to leverage public and private resources for the development of an adequate national security workforce as part of the National Security Preparedness Project (NSPP).There are numerous efforts across the United States to develop a properly skilled and trained national security workforce. Some of these efforts are the result of the leveraging of public and private dollars. As budget dollars decrease and the demand for a properly skilled and trained national security workforce increases, it will become even more important to leverage every education and training dollar. The leveraging of dollars serves many purposes. These include increasing the amount of training that can be delivered and therefore increasing the number of people reached, increasing the number and quality of public/private partnerships, and increasing the number of businesses that are involved in the training of their future workforce.

  19. The Role of Non-Governmental Organization (NGO in Advocating the National Security Bill

    Directory of Open Access Journals (Sweden)

    Yusa Djuyandi

    2016-05-01

    Full Text Available The role run by a coalition of NGOs in advocating the National Security Bill aimed at encouraging the birth of national security policy to appropriate to the purpose of reform. However, until now the role of NGOs in advocating National Security Bill has not been able to encourage the authorities to reconstruct the draft of national security policy that is consistent with the objectives of security sector reform. This study is conducted to analyze the role of NGOs in the security sector reform in Indonesia, particularly through the advocacy of the National Security Bill. The method used in this study is a qualitative method. The result shows that NGOs, which are members of the KMSRK, have been running the multiple roles, such as: popularly involved in policy making, providing political education to the community, promoting or encouraging reform, and promoting the interests of the community. The study also suggests the existence of new findings of the role of NGOs, which is forming a coherent unity of interests.

  20. Research Agenda for Understanding Transboundary Ecosystem Changes and Eco-security in Southwestern China

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    The longitudinal range-gorge region (LRGR) in Southwestern China, characterized by longitudinal mountain ranges and deep valleys,includes the basins of four major international rivers:, the Yuanjiang-Red, Lancang Mekong, Nujiang Salween and Irrawaddy. This region is classified as one of the world's biodiversity hotspots, and provides an important ecological and economic corridor linking China and Southeast Asian countries. Over the past half century, it has served as a resource base for timber and minerals needed to fuel economic development, which resulted in rapid and drastic changes in ecosystem and species diversity. Proposed and ongoing development programs, such as China's Great Western Development campaign, Greater Mekong Subregional Economic Cooperation (GMS)and China-ASEAN free trade zone development ("10+1"), threaten to bring unprecedented disturbance to the region's ecosystems. Present and emerging threats to eco-security have caught tremendous attention worldwide. Therefore, studies on such problems are critical for enhancing ecosystem health and transboundary eco-security.This paper indicates several multi-disciplinary and cross-sector studies on transboundary resources in this region that will meet three major national needs: 1) identifying core scientific issues of ecological development and infrastructure construction in high plateau and mountainous areas for the Western Development campaign; 2) developing maintenance mechanisms and control methodologies for transboundary eco-security and resource base development; 3) providing scientific grounds for multi-lateral diplomacy, trade and economic cooperation, and conflict resolution as part of China's opening-up to south Asia. The key subjects to be solved include dynamics and major drive forces of this area, ecological effects caused by major projects construction, and transboundary eco-security and its controlling. The research projects proposed in this article will develop theories on ecosystem

  1. Do needs for security and certainty predict cultural and economic conservatism? A cross-national analysis.

    Science.gov (United States)

    Malka, Ariel; Soto, Christopher J; Inzlicht, Michael; Lelkes, Yphtach

    2014-06-01

    We examine whether individual differences in needs for security and certainty predict conservative (vs. liberal) position on both cultural and economic political issues and whether these effects are conditional on nation-level characteristics and individual-level political engagement. Analyses with cross-national data from 51 nations reveal that valuing conformity, security, and tradition over self-direction and stimulation (a) predicts ideological self-placement on the political right, but only among people high in political engagement and within relatively developed nations, ideologically constrained nations, and non-Eastern European nations, (b) reliably predicts right-wing cultural attitudes and does so more strongly within developed and ideologically constrained nations, and (c) on average predicts left-wing economic attitudes but does so more weakly among people high in political engagement, within ideologically constrained nations, and within non-Eastern European nations. These findings challenge the prevailing view that needs for security and certainty organically yield a broad right-wing ideology and that exposure to political discourse better equips people to select the broad ideology that is most need satisfying. Rather, these findings suggest that needs for security and certainty generally yield culturally conservative but economically left-wing preferences and that exposure to political discourse generally weakens the latter relation. We consider implications for the interactive influence of personality characteristics and social context on political attitudes and discuss the importance of assessing multiple attitude domains, assessing political engagement, and considering national characteristics when studying the psychological origins of political attitudes.

  2. Reconnection production-consumption: change to achieve food and nutritional security, as well as rural development.

    Directory of Open Access Journals (Sweden)

    Shirley Rodríguez-González

    2015-06-01

    Full Text Available The aim of this study was to analyze the importance of changing the conventional food system to achieve food and nutritional security, as well as rural development. This text was divided into three sections. In the first one, the conventional food system and its consequences were characterized, showing the need for a change that seeks the integration of social, environmental, and health dimensions. The second part addressed the interventions related to the food supply system made by the Government, which are fundamental to achieve food and nutrition security, as well as to promote development processes in rural areas. Finally, the experience of Brazil’s National School Feeding Programme was presented. That program links food produced by small producers with the National School Feeding Program, allowing the reconnection of production and consumers through institutional markets. That link created incentives for food and nutrition security of small farmers and, at the same time, improved the availability of higher- quality food for vulnerable populations and promotedeating patterns that allow the preservation of food culture.

  3. The Arctic as a test case for an assessment of climate impacts on national security.

    Energy Technology Data Exchange (ETDEWEB)

    Taylor, Mark A.; Zak, Bernard Daniel; Backus, George A.; Ivey, Mark D.; Boslough, Mark Bruce Elrick

    2008-11-01

    The Arctic region is rapidly changing in a way that will affect the rest of the world. Parts of Alaska, western Canada, and Siberia are currently warming at twice the global rate. This warming trend is accelerating permafrost deterioration, coastal erosion, snow and ice loss, and other changes that are a direct consequence of climate change. Climatologists have long understood that changes in the Arctic would be faster and more intense than elsewhere on the planet, but the degree and speed of the changes were underestimated compared to recent observations. Policy makers have not yet had time to examine the latest evidence or appreciate the nature of the consequences. Thus, the abruptness and severity of an unfolding Arctic climate crisis has not been incorporated into long-range planning. The purpose of this report is to briefly review the physical basis for global climate change and Arctic amplification, summarize the ongoing observations, discuss the potential consequences, explain the need for an objective risk assessment, develop scenarios for future change, review existing modeling capabilities and the need for better regional models, and finally to make recommendations for Sandia's future role in preparing our leaders to deal with impacts of Arctic climate change on national security. Accurate and credible regional-scale climate models are still several years in the future, and those models are essential for estimating climate impacts around the globe. This study demonstrates how a scenario-based method may be used to give insights into climate impacts on a regional scale and possible mitigation. Because of our experience in the Arctic and widespread recognition of the Arctic's importance in the Earth climate system we chose the Arctic as a test case for an assessment of climate impacts on national security. Sandia can make a swift and significant contribution by applying modeling and simulation tools with internal collaborations as well as with

  4. The new PR of states: How nation branding practices affect the security function of public diplomacy

    DEFF Research Database (Denmark)

    Rasmussen, Rasmus Kjærgaard; Merkelsen, Henrik

    2012-01-01

    terrorism to national security initially served as a catalyst for new public diplomacy initiatives. But as the initiatives were implemented within a framework of nation branding the focus on risk reduction became subjected to a marketing logic and a new focus on economic objectives took over. The paper......This paper investigates how the role of public relations practice in public diplomacy is undergoing a transformation as a consequence of the influence from nation branding. A case study of the Danish government's response to the so-called Cartoon Crisis illustrates how the threat from international...... points to a possible future status of public diplomacy under the influence of nation branding: Public diplomacy may maintain a function pertinent to national security but as this function is incapable of managing real risks it will only serve as auto-communication that legitimizes security policy towards...

  5. The environmental dimension of national security: A test of systems analysis methods

    Science.gov (United States)

    Porfiriev, Boris N.

    1992-11-01

    The systems approach permits us to analyze national security as a cluster of interconnected elements, in which the environmental dimension appears to be the most important one. The environmental problem is divided into two main aspects: environmental security per se and the impact of environment on the overall status of a nation's security. It is argued here that the quality of life and health serve as both the main objective and the principal criterion of environmental security in a social system. Indices of these two factors are used in this article as indicators of the state of this type of security. They confirm that vast areas of Russia, the Ukraine, and Central Asia (especially the Aral Sea region) should be considered as presenting a substantial risk to local people and even producing global impacts on both natural and man-made systems. Environmental factors that destabilize national security are also divided into two groups: those that impact social systems directly and negatively (mainly natural disasters) and technological and sociopolitical agents that cause indirect impacts, in both war and peace time, as well as in the civil and military sectors of the economy. Developments in the former Soviet Union (the Commonwealth of Independent States) are used as an illustration of the consequences that such impacts may have on the status of national security.

  6. Homeland Security: Developing National Doctrine to Guide State Strategy Development

    Science.gov (United States)

    2012-03-01

    reminders to stop procrastinating and newfound cooking skills, I not only would never have finished, I also may have starved. xvi THIS PAGE INTENTIONALLY...doctrine in developing a homeland security doctrine. There are limitations, however, in that the military model is a narrow view. To overcome this

  7. 77 FR 25721 - National Maritime Security Advisory Committee; Meeting

    Science.gov (United States)

    2012-05-01

    ... broadcasted via a Web-enabled interactive online format and teleconference. To participate via teleconference..., consults with, and makes recommendations to the Secretary of Homeland Security, via the Commandant of the... Initiative. Per the SAFE Port Act (Pub. L. 109-347) the Coast Guard consults with the NMSAC on the...

  8. The National Criticality Experiments Research Center at the Device Assembly Facility, Nevada National Security Site: Status and Capabilities, Summary Report

    Energy Technology Data Exchange (ETDEWEB)

    S. Bragg-Sitton; J. Bess; J. Werner

    2011-09-01

    The National Criticality Experiments Research Center (NCERC) was officially opened on August 29, 2011. Located within the Device Assembly Facility (DAF) at the Nevada National Security Site (NNSS), the NCERC has become a consolidation facility within the United States for critical configuration testing, particularly those involving highly enriched uranium (HEU). The DAF is a Department of Energy (DOE) owned facility that is operated by the National Nuclear Security Agency/Nevada Site Office (NNSA/NSO). User laboratories include the Lawrence Livermore National Laboratory (LLNL) and Los Alamos National Laboratory (LANL). Personnel bring their home lab qualifications and procedures with them to the DAF, such that non-site specific training need not be repeated to conduct work at DAF. The NNSS Management and Operating contractor is National Security Technologies, LLC (NSTec) and the NNSS Safeguards and Security contractor is Wackenhut Services. The complete report provides an overview and status of the available laboratories and test bays at NCERC, available test materials and test support configurations, and test requirements and limitations for performing sub-critical and critical tests. The current summary provides a brief summary of the facility status and the method by which experiments may be introduced to NCERC.

  9. State of security at US colleges and universities: a national stakeholder assessment and recommendations.

    Science.gov (United States)

    Greenberg, Sheldon F

    2007-09-01

    In 2004 the US Department of Justice, Office of Community Oriented Policing Services, sponsored a National Summit on Campus Public Safety. The summit brought together various stakeholders including campus police and security officials, local police chiefs, college and university faculty and administrators, federal officials, students and parents, and community leaders to address the issues and complexities of campus safety. Delegates to the summit identified key issues in campus safety and security, which included establishing a national center on campus safety, balancing traditional open environments with the need to secure vulnerable sites, improving coordination with state and local police, reducing internal fragmentation, elevating professionalism, and increasing eligibility of campus police and security agencies to compete for federal law enforcement funds. Focus on "active shooters" on campus, resulting from the Virginia Tech incident, should not diminish attention placed on the broader, more prevalent safety and security issues facing the nation's educational campuses. Recommendations resulting from the summit called for establishing a national agenda on campus safety, formation of a national center on campus public safety, and increased opportunity for campus police and security agencies to compete for federal and state funds.

  10. National Information Systems Security Conference (19th) held in Baltimore, Maryland on October 22-25, 1996. Volume 1

    Science.gov (United States)

    1996-10-25

    Program Committee Edward Borodkin, National Computer Security Center Christopher Bythewood, National Computer Security Center Sally Meglarthary, Estee ...Research Laboratory Estee Lauder Deloitte & Touche Information System Security Stanford research Institute, International Trusted Information...address this, the working group recommended that the evaluation submittal be self contained and not contain links to sites on the Internet. This is

  11. National Nuclear Security Administration Nonproliferation Graduate Fellowship Program Annual Report in Brief: October 2007 - May 2008

    Energy Technology Data Exchange (ETDEWEB)

    Berkman, Clarissa O.; Fankhauser, Jana G.; Sandusky, Jessica A.

    2009-05-01

    This abbreviated Annual Report covers program activities of the National Nuclear Security Administration (NNSA) Nonproliferation Graduate Fellowship Program (NGFP) from October 2007 through May 2008--the timeframe between the last Annual Report (which covered activities through September 2007) and the next report (which will begin with June 2008 activities). In that timeframe, the NGFP continued building a solid foundation as the program began reaping the benefits of recently implemented changes. This report is organized by Fellowship class and the pertinent program activities for each, including: October 2007 Recruiting events and final applications (Class of 2008) Winter 2007 Selection and hiring (Class of 2008) Spring 2008 Career development roundtables (Class of 2007) Orientation planning (Class of 2008) Recruitment planning and university outreach (Class of 2009) May 2008 Closing ceremony (Class of 2007)

  12. 77 FR 40779 - Assignment of National Security and Emergency Preparedness Communications Functions

    Science.gov (United States)

    2012-07-11

    ... Directive-1 of February 13, 2009 (Organization of the National Security Council System) (PPD-1). Sec. 2.2... President, Vice President, and senior national leadership, including: communications with or among ] the... leadership; Continuity of Government communications; and communications among the executive, judicial,...

  13. THE CYBERSECURITY OF AUTOMATED CONTROL SYSTEMS AS A KEY COMPONENT OF NATIONAL SECURITY

    Directory of Open Access Journals (Sweden)

    Galin R. Ivanov

    2016-10-01

    Full Text Available This article focuses on the current problems raised by the necessity to provide and ensure national cybersecurity. Moreover, it suggests measures for adequate counteraction to present-day cyber threats to automated control systems employed in the sector of national security.

  14. 78 FR 31847 - Designation of National Security Positions in the Competitive Service, and Related Matters

    Science.gov (United States)

    2013-05-28

    ... OF PERSONNEL MANAGEMENT 5 CFR Part 732 and Chapter IV OFFICE OF THE DIRECTOR OF NATIONAL INTELLIGENCE 5 CFR Chapter IV RIN 3206-AM73 Designation of National Security Positions in the Competitive Service... Intelligence. ACTION: Proposed rule and withdrawal of prior proposed rule. SUMMARY: The U.S. Office...

  15. National Security Threats at the U.S.-Mexico Border

    Science.gov (United States)

    2011-04-24

    civil authorities in numbers sufficient to operate and expand their nefarious enterprise with reasonable freedom and security. This process has also been...have no desire to be involved in politics or governance. Corruption is utilized, along with violence, to obtain freedom of action for their criminal...Each troop was also screened for tattoos indicating gang affiliation. Finally, volunteers who lived within 70 miles of the border were

  16. Understanding Law Enforcement Support to National Security Problems and Prospects

    Science.gov (United States)

    2008-04-04

    isolationism and protectionism , retreat and retrenchment – appeals to those who find our challenges too great and fail to see our opportunities...left future generations less secure. This Administration has chosen the path of confidence. We choose leadership over isolationism , and the pursuit...of free and fair trade and open markets over protectionism . We choose to deal with challenges now rather than leaving them for future generations

  17. National Security Implications of Long-Term Deficit Spending

    Science.gov (United States)

    2010-02-01

    play out, the relationship with China in the near-term is a codependent one. The United States needs China to continue buying debt securities and...synergistic relationship to one where China would in fact act In the current environment, it is unlikely China would begin a sell-off of its position...benefits both parties. 17 against United States financial interests. Certainly nobody knows exactly what type of relationship the United States and

  18. The Role of the National Guard in Homeland Security

    Science.gov (United States)

    2007-05-01

    became the tool to militarily protect the westward expansion. In 1790, under Harmer , and in 1791 under St. Clair, forces which consisted of primarily...militia with additional regular units were defeated by Indians in the Northwest frontier. Both Harmer and St. Clair defended themselves by...and Charles W. Yost. Army Forces for Homeland Security. Santa Monica, CA: RAND Corporation, 2004. Davis, Lynn E., and Jeremy Shapiro, ed. The U.S

  19. Summary of Independent Assessment of the Afghan National Security Forces

    Science.gov (United States)

    2014-02-01

    Afghan National Police (ANP), which are the Afghan Border Police ( ABP ), Afghan National Civil Order Police (ANCOP), Afghan Uniform Police (AUP...intentionally left blank 43 Acronyms AACP Afghan Anti-Crime Police AAF Afghan Air Force ABP Afghan Border Police ALP Afghan

  20. THE FACTOR OF ENERGY-INFORMATION SECURITY IN THE FRAMEWORK OF GLOBAL CIVILIZATION-RELATED CHANGES

    Directory of Open Access Journals (Sweden)

    Alexey Viktorovich SUHORUKHIH

    2015-01-01

    Full Text Available The paper examined the grounds having involved global social and cultural changes, and emphasized the precedence taken by an energy-information component to the geopolitical dynamics of the civilization continuum. The study emphasized the relevance of new facets in social and cultural insight urged to respond to challenges of direct mental hazards emerging over the world, and requirement of energy-information security the civilization has sought for, assumed to be the framework for considering spiritual culture as a «strategic reserve» for the mental setup of the nation, for the purpose of generating new forms of civil society. 

  1. Cost of Peace Accounting and National Security in Nigeria: Does it Really Matter?

    Directory of Open Access Journals (Sweden)

    Okoro Godsday Edesiri

    2016-12-01

    Full Text Available The cost of ensuring national security is very high, but measuring this cost has received little attention. One way of recording and ascertaining the financial resources expended on national security is via “Peace Accounting. Peace Accounting is an innovative idea that is taking a firm root in Nigeria and the world over. Peace accounting deals with ascertaining and reporting the financial resources accompanying domestic violence such as insecurity, political violence, insurgency, militancy, economic predicament, corruption and all other costs associated with national security. However, this paper gauged the costs of peace accounting and its implication for national security in Nigeria. In a bid to do this, secondary data were obtained from the Central Bank of Nigeria Statistical Bulletin and the International Monetary Fund Cross Country Macroeconomic Statistics from 1996-2015. Ordinary Least Square estimation technique was employed in analyzing the data and analysis performed via SPSS. The study found that expenditure on internal security, cost of peace keeping and gross fixed capital formation are dynamics of peace accounting. Furthermore, cost of peace keeping is statistically significant except that expenditure on internal security and gross fixed capital formation were statistically flawed. Expenditure on internal security has negative impact on GPI. On the basis of the above, we recommend among others that countries like Nigeria faced with security challenges should engage professionals/experts that can help develop peace accounting models aimed at measuring the cost of peace. Also, special attention should be paid to expenditure on internal security since it has negative effect on GPI.

  2. National Institute for Global Environmental Change

    Energy Technology Data Exchange (ETDEWEB)

    Werth, G.C.

    1992-04-01

    This document is the Semi-Annual Report of the National Institute for Global Environmental Change for the reporting period July 1 to December 31, 1991. The report is in two parts. Part I presents the mission of the Institute, examples of progress toward that mission, a brief description of the revised management plan, and the financial report. Part II presents the statements of the Regional Center Directors along with progress reports of the projects written by the researchers themselves.

  3. USGS science for the Nation's changing coasts; shoreline change assessment

    Science.gov (United States)

    Thieler, E. Robert; Hapke, Cheryl J.

    2011-01-01

    The coastline of the United States features some of the most popular tourist and recreational destinations in the world and is the site of intense residential, commercial, and industrial development. The coastal zone also has extensive and pristine natural areas, with diverse ecosystems providing essential habitat and resources that support wildlife, fish, and human use. Coastal erosion is a widespread process along most open-ocean shores of the United States that affects both developed and natural coastlines. As the coast changes, there are a wide range of ways that change can affect coastal communities, habitats, and the physical characteristics of the coast?including beach erosion, shoreline retreat, land loss, and damage to infrastructure. Global climate change will likely increase the rate of coastal change. A recent study of the U.S. Mid-Atlantic coast, for example, found that it is virtually certain that sandy beaches will erode faster in the future as sea level rises because of climate change. The U.S. Geological Survey (USGS) is responsible for conducting research on coastal change hazards, understanding the processes that cause coastal change, and developing models to predict future change. To understand and adapt to shoreline change, accurate information regarding the past and present configurations of the shoreline is essential. A comprehensive, nationally consistent analysis of shoreline movement is needed. To meet this national need, the USGS is conducting an analysis of historical shoreline changes along open-ocean coasts of the conterminous United States and parts of Alaska and Hawaii, as well as the coasts of the Great Lakes.

  4. United States National Security Interests and the Republic of Mexico.

    Science.gov (United States)

    1983-06-01

    The perceptions that have been colored by history are sharpened by differences and dispari- ties separating the two nations. Octavio Paz , a...Stoessel, Jr., "Foreign Policy Priorities in Asia," Current Policy, No. 274, (April 24, 1981), p. 1. 14 Octavio Paz , Mexico and the U.S.: Positions and... Paz expressed it, "our countries are neighbors condemned to live alongside each other." The relationship began even before the two nations existed

  5. 78 FR 28936 - Self-Regulatory Organizations; National Securities Clearing Corporation; Notice of Filing and No...

    Science.gov (United States)

    2013-05-16

    ... Change As part of its liquidity risk management regime, NSCC maintains a 364-day committed, revolving... non-defaulting Members. Any borrowing would be secured principally by (i) securities deposited by... defaulting Member upon payment of its net settlement obligation. NSCC's Clearing Fund, which operates as...

  6. Security and Prosperity: Reexamining the Connection Between Economic, Homeland and National Security

    Science.gov (United States)

    2015-09-01

    economic power for political as well as economic purposes by oil exporting countries.”258 While this was in reference to the Organization of Petroleum... Exporting Countries (OPEC) embargo of the late 1970s, it accurately summarizes that economic actions are not just a lever the U.S. uses on others; it...otherwise? This already exists and demonstrates the connection between security and prosperity. We see in Argentina and Greece that these governments are

  7. Food Security Through the Eyes of AVHRR: Changes and Variability of African Food Production

    Science.gov (United States)

    Vrieling, A.; de Beurs, K. M.; Brown, M. E.

    2008-12-01

    Food security is defined by FAO as a situation that exists when all people, at all times, have physical, social and economic access to sufficient, safe and nutritious food that meets their dietary needs and food preferences for an active and healthy life. Despite globalization and food trade, access to food remains a major problem for an important part of Africa's population. As a contribution to the food security analysis we identify at a coarse scale where trends and high interannual variability of food production occur within Africa. We use the 8-km resolution AVHRR NDVI 15-day composites of the GIMMS group (1981-2006). Two methods were applied to extract phenology indicators from the dataset. The indicators are start of season, length of season, time of maximum NDVI, maximum NDVI, and cumulated NDVI over the season. To focus the analysis on food production we spatially aggregate the annual indicators at sub-national level using a general crop mask. Persistent changes during the 26-year period were assessed using trend analysis on the yearly aggregated indicators. These trends may indicate changes in production, and consequent potential increases of food insecurity. We evaluate then where strong interannual variability of phenology indicators occurs. This relates to regular shortages of food availability. For Africa, field information on phenology or accurate time series of production figures at the sub-national scale are scarce. Validating the outcome of the AVHRR analysis is consequently difficult. We propose to use crop-specific national FAOSTAT yield statistics. For this purpose, we aggregate phenology outputs per country using specific masks for the major staple food crops. Although data quality and scale issues influence results, for several countries and crops significant positive correlations between indicators and crop production exist. We conclude that AVHRR-derived phenology information can provide useful inputs to food security analysis.

  8. Climate Change and Famine: Implications for Remote Sensing Applications to Enhance Food Security

    Science.gov (United States)

    Underwood, L. W.; Brown, M. E.; Ross, K. W.

    2009-12-01

    Agriculture and climate are tightly linked, and climate change is transforming that linkage in ways that are not broadly understood. Increasing global mean temperatures and extreme weather events are expected to have a profound effect on future crop production and food availability; especially considering the persistent effects current climactic variability has on food insecurity today. Over the next several decades, projected changes in weather patterns pose a serious threat to food security, particularly in semi-arid tropical regions already food insecure. These changes are amplifying the need for expanding decision support tools and earlier early warning so that decision makers will have longer time horizons for planning and preparedness. Our research is helping evaluate what remote sensing data will be most useful in meeting this need. Multiple national/international organizations have created decision support tools that summarize information about food security status in key regions. These include the U.N. Food and Agriculture Organization’s Global Information and Early Warning Service (GIEWS), the U.S. Department of Agriculture’s CropExplorer and U.S. Agency for International Development’s Famine Early Warning System Network (FEWS NET). FEWS NET early warning of agricultural production declines that may affect food security is characterized by weekly weather hazard assessments, and relies upon vegetation, temperature and rainfall data derived from remote sensing to identify abnormal weather related conditions. Previously published research utilized a questionnaire to elicit inputs from professionals who use Earth science data to address FEWS NET’s institutional needs. This work identified that rainfall and vegetation products are valued as data that provide actionable food security information. The questionnaire also led to key findings regarding planned FEWS NET enhancements, and that the focus of a recent NASA-funded project on developing new

  9. Fulcrum of Power: Essays on the United States Air Force and National Security

    Science.gov (United States)

    2003-01-01

    attacking Teller for “factual error and emotionalism,” eight scientists (Jay Orear, William F. Schreiber, Gerald Holton , Salvadore E. Luria, Edwin E...upon national security affairs and diplomacy. I have included essays on Generals James H. Doolittle and George C. Kenney in order to add some spice to...develop- ment of air forces have assumed greater urgency and significance. In 1934, James H. “Jimmy” Doolittle noted that “the future security of our

  10. World society and the transformation of national defense: exploring world cultural impact on security and military

    OpenAIRE

    2009-01-01

    In this paper, I explore the applicability of sociological institutionalism for the analysis of security and the military. Based on cross-sectional data from 50 countries, I show how values linked to the nation state and security are related to world cultural ideas and the diffusion of rationalized organizational models. Such linkage could explain the transformation of the military as a common and worldwide trend, being based on political and societal preconditions that converge across countr...

  11. A Policy and Program for Invigorating Science and Technology for National Security

    Science.gov (United States)

    2014-04-01

    that S&T is appropriately harnessed to continue its valued contribution to our nation’s security. The purpose of the policy will be to:  define...Commonwealth resources by ensuring the right research is being done, by the most appropriate providers,  ensure the research team/s are held accountable ...policy will realise the leadership role of DSTO as Australia’s national security S&T coordinator and program manager. As the coordinator, DSTO will be

  12. Strengthening Sovereignty: Security and Sustainability in an Era of Climate Change

    Directory of Open Access Journals (Sweden)

    Rymn J. Parsons

    2011-08-01

    Full Text Available Using Pakistan and the Arctic as examples, this article examines security challenges arising from climate change. Pakistan is in crisis, and climate change, a transnational phenomenon perhaps better characterized as radical enviro-transformation, is an important reason. Its survival as a state may depend to great extent on how it responds to 2010’s devastating floods. In the Arctic, the ice cap is melting faster than predicted, as temperatures there rise faster than in almost any other region. Unmanaged, a complex interplay of climate-related conditions, including large-scale “ecomigration”, may turn resource competition into resource conflict. Radical enviro-transformation has repeatedly overborne the resilience of societies. War is not an inevitable by-product of such transformation, but in the 21st Century climate-related instability, from resource scarcity and “ecomigration”, will likely create increasingly undesirable conditions of insecurity. Weak and failing states are one of today’s greatest security challenges. The pace of radical enviro-transformation, unprecedented in human history, is accelerating, especially in the Arctic, where a new, open, rich, and accessible maritime environment is coming into being. The international community must work together to enhance security and stability, promote sustainability, and strengthen sovereignty. Radical enviro-transformation provides ample reason and plentiful opportunity for preventative, collaborative solutions focused broadly on adaptation to climate change, most particularly the effects of “ecomigration”. Nations must work together across the whole of government and with all instruments of national power to create conditions for human transformation—social, political, and economic—to occur stably and sustainably, so as to avoid or lessen the prospects for and consequences of conflict. Collaborative international solutions to environmental issues, i.e., solutions that

  13. Regional climate change and national responsibilities

    Science.gov (United States)

    Hansen, James; Sato, Makiko

    2016-03-01

    Global warming over the past several decades is now large enough that regional climate change is emerging above the noise of natural variability, especially in the summer at middle latitudes and year-round at low latitudes. Despite the small magnitude of warming relative to weather fluctuations, effects of the warming already have notable social and economic impacts. Global warming of 2 °C relative to preindustrial would shift the ‘bell curve’ defining temperature anomalies a factor of three larger than observed changes since the middle of the 20th century, with highly deleterious consequences. There is striking incongruity between the global distribution of nations principally responsible for fossil fuel CO2 emissions, known to be the main cause of climate change, and the regions suffering the greatest consequences from the warming, a fact with substantial implications for global energy and climate policies.

  14. National Atmospheric Release Advisory Center (NARAC) Capabilities for Homeland Security

    Energy Technology Data Exchange (ETDEWEB)

    Sugiyama, G; Nasstrom, J; Baskett, R; Simpson, M

    2010-03-08

    The Department of Energy's National Atmospheric Release Advisory Center (NARAC) provides critical information during hazardous airborne releases as part of an integrated national preparedness and response strategy. Located at Lawrence Livermore National Laboratory, NARAC provides 24/7 tools and expert services to map the spread of hazardous material accidentally or intentionally released into the atmosphere. NARAC graphical products show affected areas and populations, potential casualties, and health effect or protective action guideline levels. LLNL experts produce quality-assured analyses based on field data to assist decision makers and responders. NARAC staff and collaborators conduct research and development into new science, tools, capabilities, and technologies in strategically important areas related to airborne transport and fate modeling and emergency response. This paper provides a brief overview of some of NARAC's activities, capabilities, and research and development.

  15. Insight into Foreign Thoughtworlds for National Security Decision Makers

    Science.gov (United States)

    2004-01-01

    disposition, tendencies of action); cultural/historical context; memories and life experience; beliefs ( religion , ideology, worldview); motivations......and choice. Witness also the growth in popular support for euthanasia and assisted suicide. Other nations, in most of which disease and death are a

  16. Japanese Technology and U.S. National Security

    Science.gov (United States)

    1990-12-01

    and Exploit Them," by Jacque Gorlin and "Make Federal Subsidies a Last Resort," by Claude Barfield pits economist against economist. 88 partnership...1990, p. 80. Gorlin , Jacques. "Pick Key Industries and Exploit Them." The New York Times, National Edition, 19 Feb. 1989, p. C2. Gregory, Gene. Japanese

  17. National Security Strategy 2015 – a Step towards the New Phase of Russia’s Development

    Directory of Open Access Journals (Sweden)

    Vladimir Aleksandrovich Ilyin

    2016-03-01

    Full Text Available December 31, 2015, Russian President Vladimir Putin signed the new National Security Strategy. Having analysed the key provisions of this document, we conclude that this event can be regarded as a new and historically significant step toward the strengthening of the Russian statehood and transition to a new stage of development. The National Security Strategy–2015 stipulates that “the implementation of the government policy of the Russian Federation in the sphere of national security is carried out through the concerted actions of all the elements of its system under the supervision of the President of the Russian Federation and with the coordinating role of the Security Cou ncil of the Russian Federation”. Thus, the President takes on personal responsibility for ensuring the implementation of priority directions of state policy in the sphere of national security, and this is not only a timely step, it also demonstrates Vladimir Putin’s ability to assume the historical role of leader when Russia experiences hard times

  18. China National Unified System for Certification on Information Security Products Entering the Stage of Implementation

    Institute of Scientific and Technical Information of China (English)

    2005-01-01

    @@ Recently, China National Administrative Committee for Certification on Information Security Products was officially established,symbolizing that the established national unified system for certification on information security products has entered the stage of implementation. Director of General Administration of Quality Supervision,Inspection and Quarantine of P. R.China (AQSIQ) Li Changjiang, Director of Certification and Accreditation Administration of P. R. China(CNCA) Wang Fengqing and Vice Director of the State Council Office for informationization work Qu Weizhi addressed at the establishing meeting.

  19. Illegal Immigration: Causes, Consequences, and National Security Implications

    Science.gov (United States)

    2010-03-01

    Countries, Globalization, Economy, Climate Change, Xenophobia, Unemployment, Welfare, Poverty , Stability, Exclusion, Enforcement, Wages, Visa...Destination, Transit, Source Countries, Globalization, Economy, Climate Change, Xenophobia, Unemployment, Welfare, Poverty , Stability, Exclusion...emphasized by the 9 process of globalization. Indeed globalization and rapidly-evolving technology are widening the gap between poor and rich

  20. The Source Physics Experiments (SPE) at the Nevada National Security Site (NNSS): An Overview

    Science.gov (United States)

    Snelson, C. M.; Chipman, V.; White, R. L.; Emmitt, R.; Townsend, M.; Barker, D.; Lee, P.

    2012-12-01

    Understanding the changes in seismic energy as it travels from the near field to the far field is the ultimate goal in monitoring for explosive events of interest. This requires a clear understanding of explosion phenomenology as it relates to seismic, infrasound, and acoustic signals. Although there has been much progress in modeling these phenomena, this has been primarily based in the empirical realm. As a result, the logical next step in advancing the seismic monitoring capability of the United States is to conduct field tests that can expand the predictive capability of the physics-based modeling currently under development. The Source Physics Experiment at the Nevada National Security Site (SPE) is the first step in this endeavor to link the empirically based with the physics-based modeling. This is a collaborative project between National Security Technologies (NSTec), Lawrence Livermore National Laboratory (LLNL), Los Alamos National Laboratory (LANL), Sandia National Laboratories (SNL), the Defense Threat Reduction Agency (DTRA), and the Air Force Technical Applications Center (AFTAC). The test series require both the simple and complex cases to fully characterize the problem, which is to understand the transition of seismic energy from the near field to the far field; to understand the development of S-waves in explosives sources; and how anisotropy controls seismic energy transmission and partitioning. The current series is being conducted in a granite body called the Climax Stock. This location was chosen for several reasons, including the fairly homogenous granite; the location of previous nuclear tests in the same rock body; and generally the geology has been well characterized. The simple geology series is planned for 7 shots using conventional explosives in the same shot hole surrounded by Continuous Reflectometry for Radius vs. Time Experiment (CORRTEX), Time of Arrival (TOA), Velocity of Detonation (VOD), down-hole accelerometers, surface

  1. The Impact of Obesity on National and Homeland Security

    Science.gov (United States)

    2013-09-01

    neurological system that heroin, morphine , alcohol, and cannabinoids interact with. Our taste buds are more sensitive when hungry as well...Carbohydrate CSR Corporate Social Responsibility FAO Food and Agricultural Organization of the United Nations GED General Equivalency Degree GDP...business.8 Some authors postulate that our obesity problem is one with a negative impact globally and may begin to interact with food scarcity and

  2. How to Say National Security in 1,001 Languages

    Science.gov (United States)

    2011-01-01

    guage more easily. Science shows that an adult probably cannot learn to speak a language as fluently as a child who has learned it from birth.24...would benefit only linguists, for- eign nationals entering our services, and those raised in bilingual families. The ser- vices could address this...the new standard could be based on a lan- guage someone did not learn as a child —a second language for most people, perhaps a third or fourth for a

  3. Terrorism: National Security Policy and the Home Front.

    Science.gov (United States)

    1995-05-15

    the centuries of political powerlessness, the Imami Shii clergy developed a theory of general agency which justified their claim to be the...universally valid moral law of Islam transcends the territorial and national limitations which an anthropocentric philosophy of history imposes on communism and...Muslim community divided along the lines it has preserved until this day. 30. E. Kohlberg , “The Development of the Imami Shi’s Doctrine of Jihad

  4. Enhancing National Security by Strengthening the Legal Immigration System

    Science.gov (United States)

    2009-12-01

    benefit. Furthermore, the GAO recommended that immigration officials need to balance the duel objectives of detecting and deterring fraud and...Commission 2004, p. 387). Reforms to the immigration system must effectively balance the duel objectives of enhancing integrity and maintaining an...6. Eyad Ismoil Eyad Ismoil, a Jordanian national, had been acquainted with Yousef since childhood (Reeve, 1999). He was issued a student visa

  5. The National Security Doctrine and Policies of the Brazilian Government.

    Science.gov (United States)

    1977-07-15

    so widely accepted that they are the dominant vocabulary and frame of reference. The armed forces in an oversight function set the tone of and limits... frame of reference for the regime, extending deeply into the legal system. I • Charges the military with a major responsibility for the national b destiny...25. Amaral Gurgel, Segurance e Democracia , Rio de Janeiro: Livraria Jose Olymplo Editora e Biblioteca do Exército Editora, 1975, pp. 158-159. This

  6. Thinking Different about U.S. National Security

    Science.gov (United States)

    2011-04-18

    with the question of when, as Nietzsche suggested, the U.S. may become the monster it fights. An isolationist policy is also difficult because of the...occupying force or nation. xii. Scott Atran. The Moral Logic and Growth of Suicide Terrorism, The Washington Quarterly 29, no. 2 (Spring 2006...22 23 BIBLIOGRAPHY Atran, Scott. "The Moral Logic and Growth of Suicide Terrorism." The Washington Quarterly 29, no. 2 (Spring

  7. Independent Assessment of the Afghan National Security Forces

    Science.gov (United States)

    2014-02-01

    2011. “ UNHCR Global Report 2012: Pakistan.” UNHCR.org, Official Website of the United Nations High Commissioner for Refugees , at http...include cross-border trade; repatriation and resettlement of Afghan refugees currently in Paki- stan; and countering improvised explosive devices...these include: expand- ing road networks and cross-border trade, repatriation and resettle- ment of Afghan refugees living in Pakistan, continued

  8. The National Guard: A Future Homeland Security Paradigm?

    Science.gov (United States)

    2007-11-02

    Arabia (1995); bombing of a U.S. military complex “Khobar Towers” in Saudi Arabia (1996); U.S. Embassy bombings in Nairobi, Kenya and Dar Ex Salaam...on the U.S, its forces, and allies. The Triad continues to be the foundation of America’s national strategy of deterrence. The Triad consists of...ballistic missile submarines, land- based intercontinental ballistic missiles and long-range bombers. Each component, or leg, of the Triad provides a

  9. After Iraq: The Search for a Sustainable National Security Strategy

    Science.gov (United States)

    2009-01-01

    ideational as well as material-structural. For example, the United States will strive not merely to keep the People’s Republic of China (PRC...political consequences, albeit not ones that fully satisfied the Vietnamese.37 Ho Chi Minh was bullied by China and Russia into tolerating the...take action that would amount to national suicide , the United States signed on at the highest level for Thomas C. Schelling’s concept of “the threat

  10. Development of an industrial complex for ensuring national competitiveness and economic security

    Directory of Open Access Journals (Sweden)

    A. V. Kalach

    2016-01-01

    Full Text Available Living standards depends on the state of the country’s industrial complex. In a message to Russian President Vladimir Putin's Federal Assembly was asked to implement in 2015 a national technological initiative, the development of industries of the new technological order. As a result of the predominance of the industry of the sixth technological order should occur major changes in the structure of production factors and significance. It follows the inevitability of structural changes in the system of economic institutions and mechanisms of economic security and competitiveness of the state achieve the main goal of the state program “The development of industry and increase its competitiveness” is carried out through the following the directions of sub-programs: investment goods (chemical complex development composite materials, industrial biotechnology, power engineering, machine tool industry, agricultural machinery, machinery specialized production, transport engineering; goods (light industry, children;s products industry, the automotive industry; military-industrial complex; infrastructure (development of engineering activities, industrial parks; semi-finished goods and materials (timber industry, metallurgy, industrial development of rare-earth metals. At the current pace of technological and economic development, the 6 th technological structure will come into proliferation phase in 2010–2020, and in the phase of maturity – 40-ies of XXI century. At the same time in 2020–2025 there will be a new scientific-technical and technological revolution, which will become the basis for developing, synthesizing advances in the above basic technologies. In this paper, we proposed as a tool to ensure the economic security of the state to use the acceleration system of technical development of the industrial complex.

  11. New interfaces between security and development : changing concepts and approaches

    OpenAIRE

    2006-01-01

    "For some years the nexus of development and security has been a key conceptual and also political issue. The associated debates are wide-ranging, extending from the basic question of the relationship between development and security to the concrete interaction of military and civil actors in a given post-conflict situation. The present volume seeks to contribute to this debate by considering various dimensions of the subject." (excerpt). Contents: Mark Duffield: Human security: linking devel...

  12. Social Media Platforms as a Tool for Sharing Emotions. A Perspective upon the National Security Agencies

    Directory of Open Access Journals (Sweden)

    Ramona-Diana LEON

    2016-05-01

    Full Text Available Emotions importance increases even more in the context of the national security agencies. Since their mission is to protect and defend the citizens against attacks and also to provide leadership and justice services to other agencies and partners, the aim of the information they post on social media should be twofold: on the one hand, it should reflect the attitudes, values and beliefs, supported by the institution, and on the other hand, it should have an impact on citizens feeling of security. But, do they manage to meet these demands? Are they focusing on impressing the audience or they concentrate on sharing specific emotions? Is it a marketing strategy or a knowledge strategy? Starting from these, the purpose of this research is to set a nexus between emotions and the use of social media by the national security organizations. In other words, we aim (i to determine the main types of emotions, (ii to establish whether these are shared within the social media platforms, (iii to identify the purpose for which the national security organizations use social media, (iv to determine whether social media could serve as Ba for the national security organizations. In order to achieve these objectives, we employ an ethic approach and develop a longitudinal study based on quantitative and qualitative content analysis. The results prove that social media platforms may serve as Ba since they appear as a shared space which fosters individual and collective knowledge creation and sharing. The national security agencies  use social media platforms for combining the classical four types of Ba: originating Ba (it shares its emotions, feelings and thoughts through its posts, interacting Ba (through the generated reactions and comments, it ensures the development of shared models and the conversion of tacit knowledge into explicit knowledge, cyber Ba (by fostering the virtual interaction among its followers and exercising Ba (by facilitating the creation of

  13. Imported Oil and U.S. National Security

    Science.gov (United States)

    2009-01-01

    Organization of the Petroleum Exporting Countries PDVSA Petróleos de Venezuela S.A. PNA Palestinian National Authority RDF Rapid Deployment Force RDTE...7.5 billion in 1998 to $25.1 billion in 2006; $38.6 billion if social spending by Petróleos de Venezuela S.A. ( PDVSA ), Ven- ezuela’s state-owned oil...agreements were signed, encompassing industrial cooperation, transport, agriculture, and sports. In addition, PDVSA and the Cuban state oil com- pany

  14. The Paradox of German Foreign and Security Policy: With Respect to National Energy Security

    Science.gov (United States)

    2009-05-21

    16 Alexander Wendt, “Identity and Structural Change in International Politics” in Yosef Lapid and Friedrich Kratochwil (eds.), The Return of...Identity and Structural Change in International Politics” in Yosef Lapid and Friedrich Kratochwil (eds.), The Return of Culture and Identity in IR Theory

  15. Blood and Treasure: The U.S. Debt and Its Implications for National Defense and Security

    Science.gov (United States)

    2012-12-01

    no small part, deficit spending is attractive in the short term of individual election cycles because, whether it’s “pork-barrel spending” or more...Especially in this, an election year, critical voices charge that the claims of national security on the national budget are disproportionate. Without...men, including veterans, looked for work, hawked apples on sidewalks , dined in soup kitchens, passed the time in shantytowns dubbed “Hoovervilles,” and

  16. The US Army and the New National Security Strategy

    Science.gov (United States)

    2003-01-01

    for Strategic Plans and Policy on the Joint Staff Maj. Gen. Charles F. "Chuck" Wald , USAF, presented a briefing in the Pentagon entitled "Operation...of a decade. But if you can change that 10 percent, you can, in fact, change the capability of the entire force" ( Wolfowitz , 2002). 288 The U.S. Army...Four Weapons Programs," Inside theArmy, October 14, 2002. Wolfowitz , Paul, Deputy Secretary of Defense, remarks delivered to the Ameri- can Institute of

  17. 17 CFR 140.20 - Designation of senior official to oversee Commission use of national security information.

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Designation of senior official to oversee Commission use of national security information. 140.20 Section 140.20 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION ORGANIZATION, FUNCTIONS, AND PROCEDURES OF THE COMMISSION Functions § 140.20 Designation...

  18. Underground Test Area Activity Quality Assurance Plan Nevada National Security Site, Nevada. Revision 2

    Energy Technology Data Exchange (ETDEWEB)

    Krenzien, Susan [Navarro-Intera, LLC (N-I), Las Vegas, NV (United States); Farnham, Irene [Navarro-Intera, LLC (N-I), Las Vegas, NV (United States)

    2015-06-01

    This Quality Assurance Plan (QAP) provides the overall quality assurance (QA) requirements and general quality practices to be applied to the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Field Office (NNSA/NFO) Underground Test Area (UGTA) activities. The requirements in this QAP are consistent with DOE Order 414.1D, Change 1, Quality Assurance (DOE, 2013a); U.S. Environmental Protection Agency (EPA) Guidance for Quality Assurance Project Plans for Modeling (EPA, 2002); and EPA Guidance on the Development, Evaluation, and Application of Environmental Models (EPA, 2009). If a participant’s requirement document differs from this QAP, the stricter requirement will take precedence. NNSA/NFO, or designee, must review this QAP every two years. Changes that do not affect the overall scope or requirements will not require an immediate QAP revision but will be incorporated into the next revision cycle after identification. Section 1.0 describes UGTA objectives, participant responsibilities, and administrative and management quality requirements (i.e., training, records, procurement). Section 1.0 also details data management and computer software requirements. Section 2.0 establishes the requirements to ensure newly collected data are valid, existing data uses are appropriate, and environmental-modeling methods are reliable. Section 3.0 provides feedback loops through assessments and reports to management. Section 4.0 provides the framework for corrective actions. Section 5.0 provides references for this document.

  19. 75 FR 17305 - National Industrial Security Program Directive No. 1

    Science.gov (United States)

    2010-04-06

    ..., 2010, changing the Federal Docket Management System (FDMS) Docket Number from NARA-09-0005 to ISOO-09... deadlines, reduced accountability, and created the risk that the deadlines would be treated as advisory only... procurement process, delays beyond 60 days should require approval at the Assistant Secretary level....

  20. The Social Structure of a National Securities Market.

    Science.gov (United States)

    Baker, Wayne E.

    1984-01-01

    Behavior by traders in the stock options market is not governed strictly by economic criteria. Trading among participants exhibited distinct social structural patterns that dramatically affected the direction and magnitude of price changes. Findings are discussed in relationship to microeconomic theory, and implications for public policy are…

  1. Cost-Benefit Analysis Methodology: Install Commercially Compliant Engines on National Security Exempted Vessels?

    Science.gov (United States)

    2015-11-05

    technologies follow: 1. Selective catalytic reduction (SCR) 2. Diesel particulate filter (DPF) – electrically regenerated active (ERADPF...insurmountable obstacles such as vessel range, engine room space, SLM, additional electric power, etc. Recommendations are developed on the basis of both...Cost-Benefit Analysis Methodology: Install Commercially Compliant Engines on National Security Exempted Vessels? Jonathan DeHart 1 (M

  2. 10 CFR 2.911 - Admissibility of restricted data or other national security information.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 1 2010-01-01 2010-01-01 false Admissibility of restricted data or other national security information. 2.911 Section 2.911 Energy NUCLEAR REGULATORY COMMISSION RULES OF PRACTICE FOR DOMESTIC LICENSING PROCEEDINGS AND ISSUANCE OF ORDERS Special Procedures Applicable to Adjudicatory Proceedings Involving Restricted Data and/or...

  3. 10 CFR 2.907 - Notice of intent to introduce restricted data or national security information.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 1 2010-01-01 2010-01-01 false Notice of intent to introduce restricted data or national security information. 2.907 Section 2.907 Energy NUCLEAR REGULATORY COMMISSION RULES OF PRACTICE FOR DOMESTIC LICENSING PROCEEDINGS AND ISSUANCE OF ORDERS Special Procedures Applicable to Adjudicatory Proceedings Involving Restricted Data...

  4. 31 CFR 9.4 - Criteria for determining effects of imports on national security.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 1 2010-07-01 2010-07-01 false Criteria for determining effects of imports on national security. 9.4 Section 9.4 Money and Finance: Treasury Office of the Secretary of the... of government, loss of skills or investment, or other serious effects shall be considered. (b)...

  5. 78 FR 62893 - Self-Regulatory Organizations; National Securities Clearing Corporation; Notice of Filing...

    Science.gov (United States)

    2013-10-22

    ... Supplemental Liquidity Deposits to Its Clearing Fund Designed To Increase Liquidity Resources To Meet Its Liquidity Needs October 15, 2013. On March 21, 2013, National Securities Clearing Corporation (``NSCC... proposal by NSCC to amend its Rules & Procedures (the ``NSCC Rules'') to provide for supplemental...

  6. 78 FR 62846 - Self-Regulatory Organizations; National Securities Clearing Corporation; Notice of Filing...

    Science.gov (United States)

    2013-10-22

    ... Supplemental Liquidity Deposits to Its Clearing Fund Designed To Increase Liquidity Resources To Meet Its Liquidity Needs October 15, 2013. On March 21, 2013, National Securities Clearing Corporation (``NSCC...'') to provide for supplemental liquidity deposits to its Clearing Fund (the ``NSCC Clearing Fund'')...

  7. The Growth of the Japanese Economy: Challenges to American National Security

    Science.gov (United States)

    1991-09-01

    conception of national security to emphasize geoeconomics rather than geopolitics had a certain logic, but it was very difficult case to make in domestic...that both: West Germany and Japan had grown accustomed to the conve- nient dual role of geopolitical client and geoeconomic free rider. As economically

  8. Developing a Comprehensive Approach Could Help DOD Better Manage National Security Risks in the Supply Chain

    Science.gov (United States)

    2016-02-01

    Manage National Security Risks in the Supply Chain Why GAO Did This Study DOD depends on... supply chain . In addition, we interviewed DOD and other agencies’ officials with knowledge of the defense industrial base and management of the...recommendations and acquisition policy guidance on supply chain management and supply chain vulnerability throughout the entire supply chain , from

  9. Policy Analysis in National Security Affairs: New Methods for a New Era

    Science.gov (United States)

    2006-01-01

    consequences. A second- or even third-place option might be elevated to front- runner status because it suffers from fewer such impediments. Such...defense strategy, and national security policy. In this are- na, DOD’s organizational structure has become a maze of different and often competing

  10. Social Software and National Security: An Initial Net Assessment

    Science.gov (United States)

    2009-04-01

    compound used in a cleaning product using a novel mechanism) with experts outside the company who nevertheless have expertise and are able to solve...Social software has affected recent events around the world, including: the narco - terrorism of Colombia, the Russia-Georgia conflict, Facebook-organized...Supporting Social Software The success of anything novel proposed in this paper depends on strong, enduring leadership that encourages change. While

  11. 33 CFR 165.164 - Security Zones: Dignitary Arrival/Departure and United Nations Meetings, New York, NY.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Security Zones: Dignitary Arrival/Departure and United Nations Meetings, New York, NY. 165.164 Section 165.164 Navigation and Navigable Waters... Guard District § 165.164 Security Zones: Dignitary Arrival/Departure and United Nations Meetings,...

  12. 36 CFR 1260.22 - Who is responsible for the declassification of classified national security White House...

    Science.gov (United States)

    2010-07-01

    ... declassification of classified national security White House originated information in NARA's holdings? 1260.22... for the declassification of classified national security White House originated information in NARA's... was originated by: (1) The President; (2) The White House staff; (3) Committees, commissions,...

  13. National Environmental Change Information System Case Study

    Science.gov (United States)

    Goodman, S. J.; Ritschard, R.; Estes, M. G., Jr.; Hatch, U.

    2001-01-01

    The Global Hydrology and Climate Center and NASA's Marshall Space Flight Center conducted a fact-finding case study for the Data Management Working Group (DMWG), now referred to as the Data and Information Working Group (DIWG), of the U.S. Global Change Research Program (USGCRP) to determine the feasibility of an interagency National Environmental Change Information System (NECIS). In order to better understand the data and information needs of policy and decision makers at the national, state, and local level, the DIWG asked the case study team to choose a regional water resources issue in the southeastern United States that had an impact on a diverse group of stakeholders. The southeastern United States was also of interest because the region experiences interannual climatic variations and impacts due to El Nino and La Nina. Jointly, with input from the DIWG, a focus on future water resources planning in the Apalachicola-Chattahoochee-Flint (ACF) River basins of Alabama, Georgia, and Florida was selected. A tristate compact and water allocation formula is currently being negotiated between the states and U.S. Army Corps of Engineers (COE) that will affect the availability of water among competing uses within the ACF River basin. All major reservoirs on the ACF are federally owned and operated by the U.S. Army COE. A similar two-state negotiation is ongoing that addresses the water allocations in the adjacent Alabama-Coosa-Tallapoosa (ACT) River basin, which extends from northwest Georgia to Mobile Bay. The ACF and ACT basins are the subject of a comprehensive river basin study involving many stakeholders. The key objectives of this case study were to identify specific data and information needs of key stakeholders in the ACF region, determine what capabilities are needed to provide the most practical response to these user requests, and to identify any limitations in the use of federal data and information. The NECIS case study followed the terms of reference

  14. [The national food and nutrition policy and its dialogue with the national food and nutrition security policy].

    Science.gov (United States)

    Alves, Kelly Poliany de Souza; Jaime, Patricia Constante

    2014-11-01

    Food is one of the determinants and conditions of health and an inherent right of all people. The consequences of food and nutrition insecurity in the population, such as obesity, malnutrition and specific nutritional deficiencies, impact the health sector and have historically meant that it has assumed the responsibility for food and nutrition programs and policies in Brazil. However, ensuring food and nutrition security requires a combination of public policies, among which the National Food and Nutrition Policy of the Unified Health System (SUS) plays a fundamental role. This paper seeks to contribute to the debate on intersectoriality and health promotion based on presenting the National Food and Nutrition Policy and discussing its role as interface between the SUS and the National Food and Nutrition Security Policy and System. This perspective strongly suggests the combination of efforts to promote health and food and nutrition security in order to optimize initiatives developed in different sectors and accompanied by different policy councils that are not interrelated, enabling enhanced government and civil society action on the determinants of health and nutrition.

  15. Preempting the Storm: Mitigating America’s National Security Vulnerability to Disruptive Magnetic Events

    Science.gov (United States)

    2011-02-16

    change of the magnetic flux through the circuit. Sadiku , M. N. O. (2007). Elements of Electromagnetics (fourth ed.). New York (USA)/Oxford (UK...Peter Ogden. "The Security Implications of Climate Change." The Washington Quarterly. Sadiku , M. N. O. Elements of Electromagnetics. New York

  16. Risk Management as Strategic Change in National Homeland Security Policy

    Science.gov (United States)

    2007-09-01

    organizations. Similar to the previous discussion of conflict biguity in public policy implementation, these factors are the degree of agreement ree of...4. Networking and Collaboration Laurence O’Toole has written of the growing need for and the emergence of networks and collaboration in public...there is no unifying theory about networking in the public sector, Nancy Roberts c 242 Laurence O’Toole, Jr., “Treating Networks Seriously: Practical

  17. 国家安全与情报工作关系的嬗变研究%On the Evolution of Relationship between National Security and Intelligence Work

    Institute of Scientific and Technical Information of China (English)

    江焕辉

    2015-01-01

    With the increasingly diversified factors affecting national security, the connotation of national security has already had more important changes, and the role and functions of intelligence in national security has changed a lot accordingly. Using cases and compara-tive analysis, it is found that the evolution of the relationship between national security and intelligence issues is mainly reflected by the connotations of national security, intelligence, counter-intelligence and intelligence work and the relationships among them. It is conclu-ded that concerning the present situation of traditional intelligence work, changes are necessary in the fields of philosophy, the rule of law, and mechanisms for improved intelligence work under the new security threat.%受多元化的安全问题的影响,国家安全概念的内涵已会发生重要的变化,而情报在国家安全中扮演的角色及发挥的功能也将改变。通过案例、对比分析等方法发现国家安全与情报工作关系的嬗变问题主要通过对国家安全、情报、反情报、情报工作的涵义及相互关系中体现。最终面对传统情报工作的现状,新安全威胁下情报工作都需要从理念、法治、机制等领域予以变革。

  18. «SOFT POWER» IN THE CONTEXT OF ISSUES OF NATIONAL SECURITY

    Directory of Open Access Journals (Sweden)

    A. A. SAMOKHIN

    2016-01-01

    Full Text Available This article analyzes the approaches to the understanding of the terms "hard" and "soft" power. In this work is also exposed the nature of the tools used in the process of "soft" foreign influences: ideological, axiological, informative, cultural, inter alia, covering several areas such as education, sports, fashion, popular culture, etc. The analysis of the evolution of approaches to the use of "soft power "in the second half of 20 century, and especially to use “soft” instruments, including in the framework of bipolar confrontation of the “cold war” era is carried out. The changes in the use of "soft" effects in the 21 century, a were envisaged. Also is revealed the tendency to make greater use of hybrid instruments based on a combination of "hard" and "soft" power, which are considered today as the most appropriate mechanism to ensure its own national security and the implementation of foreign policy objectives, from the point of view of the prevailing conditions of the international agenda. The main risks of destructive and illegal use of "soft power" in relations between states, manifested in exerting political pressure on sovereign States, interfering in their internal affairs, destabilization, manipulation of public opinion and consciousness, are determined. The article defines the problems of counteraction to destructive "soft" influence, as one of the most urgent tasks of national security. The possibility of using the tools of "soft power" in Russia's foreign policy practice is disclosed. The most promising directions in this area, including the development of institutions of public diplomacy; civil society; religious institutions; media, revealing the position of Russia on the most pressing international issues, education and science are identified.

  19. Opinions about Component Energetic Security

    OpenAIRE

    Elena GOLUMBEANU (GEORGESCU)

    2012-01-01

    Collective security (international) represent the morphological expression of individual security components. According to the Report presented at the United Nations Development Programme, collective security (international) as well as national security, is the expression of seven synergistic dimensions as follows: economic security, food security, environmental security, personal security, community security, political security and individual security. As part of economic security, energy an...

  20. Underground Test Area Activity Quality Assurance Plan Nevada National Security Site, Nevada. Revision 1

    Energy Technology Data Exchange (ETDEWEB)

    Farnham, Irene [Navarro-Intera, LLC (N-I), Las Vegas, NV (United States); Krenzien, Susan [Navarro-Intera, LLC (N-I), Las Vegas, NV (United States)

    2012-10-01

    This Quality Assurance Plan (QAP) provides the overall quality assurance (QA) requirements and general quality practices to be applied to the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Site Office (NNSA/NSO) Underground Test Area (UGTA) activities. The requirements in this QAP are consistent with DOE Order 414.1C, Quality Assurance (DOE, 2005); U.S. Environmental Protection Agency (EPA) Guidance for Quality Assurance Project Plans for Modeling (EPA, 2002); and EPA Guidance on the Development, Evaluation, and Application of Environmental Models (EPA, 2009). NNSA/NSO, or designee, must review this QAP every two years. Changes that do not affect the overall scope or requirements will not require an immediate QAP revision but will be incorporated into the next revision cycle after identification. Section 1.0 describes UGTA objectives, participant responsibilities, and administrative and management quality requirements (i.e., training, records, procurement). Section 1.0 also details data management and computer software requirements. Section 2.0 establishes the requirements to ensure newly collected data are valid, existing data uses are appropriate, and environmental-modeling methods are reliable. Section 3.0 provides feedback loops through assessments and reports to management. Section 4.0 provides the framework for corrective actions. Section 5.0 provides references for this document.

  1. Physics of societal issues calculations on national security, environment, and energy

    CERN Document Server

    Hafemeister, David

    2014-01-01

    This book provides the reader with essential tools needed to analyze complex societal issues and demonstrates the transition from physics to modern-day laws and treaties. This second edition features new equation-oriented material and extensive data sets drawing upon current information from experts in their fields. Problems to challenge the reader and extend discussion are presented on three timely issues:   •        National Security: Weapons, Offense, Defense, Verification, Nuclear Proliferation, Terrorism •        Environment: Air/Water, Nuclear, Climate Change, EM Fields/Epidemiology •        Energy: Current Energy Situation, Buildings, Solar Buildings, Renewable  Energy, Enhanced End-Use Efficiency, Transportation, Economics   Praise for the first edition: "This insight is needed in Congress and the Executive Branch. Hafemeister, a former Congressional fellow with wide Washington experience, has written a book for physicists, chemists and engineers who want to learn science...

  2. Physics of societal issues calculations on national security, environment, and energy

    CERN Document Server

    Hafemeister, David

    2007-01-01

    Why this book on the Physics of Societal Issues? The subdivisions of physics - nuclear physics, particle physics, condensed-matter physics, biophysics - have their textbooks, while the subdivision of physics and society lacks an equation-oriented text on the physics of arms, energy and the environment. Physics of Societal Issues is intended for undergraduate and doctoral students who may work on applied topics, or who simply want to know why things are the way they are. Decisions guiding policies on nuclear arms, energy and the environment often seem mysterious and contradictory. What is the science behind the deployment of MIRVed ICBMs, the quest for space-based beam weapons, the fear of powerline EM fields, the wholesale acceptance of SUVs, the issues of climactic change, and the failure of the pre-embargo market to produce buildings and appliances that now save over 50 power plants? Physics of Societal Issues is three "mini-texts" in one: National Security (5 chapters): Weapons, offense, defense, verificat...

  3. Evolving perceptions of security - US National Security surveys 1993--1995. Progress report, September 30, 1995--November 14, 1995

    Energy Technology Data Exchange (ETDEWEB)

    Herron, K.G.; Jenkins-Smith, H.C. [Univ. of New Mexico, Albuquerque, NM (United States)

    1996-06-01

    This study analyzes findings from a national survey of 2,490 randomly selected members of the US public conducted between September 30 and November 14, 1995. It provides an over time comparison of public perceptions about nuclear weapons risks and benefits and key nuclear policy issues between 1993 and 1995. Other areas of investigation include policy preferences regarding nuclear proliferation, terrorism, US/Russian nuclear cooperation, and personal security. Public perceptions of post-cold war security were found to be evolving in unexpected ways. The perceived threat of nuclear conflict involving the US had not declined, and the threat of nuclear conflict between other countries and fears of nuclear proliferation and terrorism had increased. Perceived risks associated with managing the US nuclear arsenal were also higher. Perceptions of external and domestic benefits from US nuclear weapons were not declining. Support was found for increasing funding for nuclear weapons safety, training, and maintenance, but most respondents favored decreasing funding for developing and testing new nuclear weapons. Strong support was evident for programs and funding to prevent nuclear proliferation and terrorism. Though skeptical that nuclear weapons can be eliminated, most respondents supported reducing the US nuclear arsenal, banning nuclear test explosions, and ending production of fissile materials to make nuclear weapons. Statistically significant relationships were found between perceptions of nuclear weapons risks and benefits and policy and spending preferences. Demographic variables and basic social and political beliefs were systematically related both to risk and benefit perceptions and policy and spending options.

  4. Changes at the National Geographic Society

    Science.gov (United States)

    Schwille, Kathleen

    2016-01-01

    For more than 125 years, National Geographic has explored the planet, unlocking its secrets and sharing them with the world. For almost thirty of those years, National Geographic has been committed to K-12 educators and geographic education through its Network of Alliances. As National Geographic begins a new chapter, they remain committed to the…

  5. Indigenous Nations' Responses to Climate Change

    Science.gov (United States)

    Grossman, Zoltan

    2008-01-01

    On August 1st, 2007, Indigenous nations from within the United States, Canada, Australia, and Aotearoa (New Zealand) signed a treaty to found the United League of Indigenous Nations. The Treaty of Indigenous Nations offers a historic opportunity for sovereign Indigenous governments to build intertribal cooperation outside the framework of the…

  6. On the Overall National Security Concept and the Design of the Sino-ASEAN Security Cooperation Mechanism%总体国家安全观与中国-东盟安全合作机制的设计

    Institute of Scientific and Technical Information of China (English)

    刘胜湘; 辛田

    2016-01-01

    当前,东南亚地区安全形势纷繁复杂,中国-东盟现有安全合作机制已无法有效适应现实安全需求的变化。从总体国家安全观的角度看,中国-东盟现有安全合作机制存在诸多问题,主要是缺乏统一的安全观念、内外安全不平衡、缺乏综合性安全合作体系和缺乏共同体意识等。要解决这些安全问题,需要改革和完善中国-东盟安全合作机制。总体国家安全观为中国-东盟安全合作机制的改革和完善提供了新思路,它强调内部安全与外部安全、传统安全与非传统安全、自身安全与共同安全的平衡。改革和完善中国-东盟安全合作机制需要强调这三种安全平衡,并以此为基础,通过增信释疑构建中国-东盟安全合作新机制和中国-东盟安全命运共同体。这需要中国和东盟双方的长期合作与努力。%At present,the security situation in Southeast Asia becomes very complex,and new security issues are emerging,and traditional and non-traditional security issues are intertwined;therefore,all countries’security demands,concepts,strategies in this area have changed.The existing security cooperation mechanism is rendered unable to meet the new security needs of China and of ASEAN.From the perspective of the overall national security concept,there are lots of problems in the existing Sino-ASEAN security cooperation mechanism, including the absence of the unified security concept,the imbalance between internal and external security,and the lack of an integrated security cooperation system and the sense of community.To solve these problems,we must rethink and redesign the Sino-ASENA security cooperation mechanism.The overall national security concept provides a new method for China and ASEAN to redesign the security cooperation mechanism.The overall national security concept emphasizes the balance between internal and external security,traditional and non

  7. Regional, national and international security requirements for the transport of nuclear cargo by sea

    Energy Technology Data Exchange (ETDEWEB)

    Booker, P.A.; Barnwell, I. [Marine Operations, BNFL International Transport and British Nuclear Group Security (United Kingdom)

    2004-07-01

    Since the beginning of the nuclear age in the 1940's, the world has focused on the immense possibilities of nuclear power with both its destructive and productive capabilities. The civil nuclear industry in the UK, as in most nuclear weapons states, grew from the military facilities built in the post war years under the political climate of the Cold War. In the early years of the industry, civil and defence nuclear facilities were inextricably linked both in public perceptions and the regulatory infrastructure under which they operated. The nuclear arms race and the spread of communism overshadowed people's perceptions of there being two separate uses of nuclear material. This was a double edged sword which initially allowed the industry to develop largely unhindered by public concerns but latterly meant the industry could not break away from its roots and to many is still perceived as a dangerous and destructive force. Regulatory frameworks governing all aspects of the industry have developed both nationally and internationally driven by valid public concerns, political agendas and an international consensus that the unregulated use of nuclear material has catastrophic possibilities on an international scale. With the internationalisation of the civil nuclear industry and the costs associated with developing facilities to fully support each stage of the fuel cycle, from enrichment, fuel manufacturing, reprocessing and waste remediation, it became inevitable that a transport infrastructure would develop to make best use of the facilities. Regulations, both national and international are implicit in ensuring the security of nuclear material in transit. Due to the physical size of many of the irradiated fuel packages and implications of the changes to transport safety regulations, international transports of nuclear material, other than within mainland Europe, is predominantly carried out by sea.

  8. Strategies to Address Identified Education Gaps in the Preparation of a National Security Workforce

    Energy Technology Data Exchange (ETDEWEB)

    None

    2008-06-30

    This report will discuss strategies available to address identified gaps and weaknesses in education efforts aimed at the preparation of a skilled and properly trained national security workforce.The need to adequately train and educate a national security workforce is at a critical juncture. Even though there are an increasing number of college graduates in the appropriate fields, many of these graduates choose to work in the private sector because of more desirable salary and benefit packages. This is contributing to an inability to fill vacant positions at NNSA resulting from high personnel turnover from the large number of retirements. Further, many of the retirees are practically irreplaceable because they are Cold War scientists that have experience and expertise with nuclear weapons.

  9. Perspectives of the National Army of the Republic of Moldova under The New Regional Security Architecture

    Directory of Open Access Journals (Sweden)

    Gheorghe MEREUŢĂ

    2014-12-01

    Full Text Available Currently, the security complex from the South-East Europe, situated in the area of modern confrontation between the major European powers (Germany, Russia, Great Britain and France, is undergoing a profound political, economic and military restructuring. The USA and NATO, within the UN and OSCE, as well as through other institutions, control the most significant local developments. The concept was imposed by the new politico-military coordinates in Europe and in the world, the limitations of armaments, and the new military relations established in the world. National Army of the Republic of Moldova (hereinafter National Army passes through a complex process of restructuring / modernization. Implemented operational measures and actions, and those that need to be implemented in the next period, refer to the development in the security environment in the area of interest of the Republic of Moldova. Classification-JEL: A23

  10. Machiavelli’s Fundamental Contribution to the National Security Concept as Revealed in The Prince

    Directory of Open Access Journals (Sweden)

    Florea SURDU

    2013-12-01

    Full Text Available Identifying the contribution of Niccolò Machiavelli to the substantiation of the national security concept, ranks him among the major promoters of the war phenomenon and state, the policy stance by one of the pillars of its stability, namely national security. Today, more than ever, "The Prince" is increasingly present, this is determined by social, political and military instability, of the 21st century and that’s why this study is a research designed to range Machiavelli among the precursors of the phenomenon of war, along with Sun Tzu and von Clausewitz. At the same time, according to 21st century thinking, we have brought in actuality, the issue of power, as a political, social and military phenomenon, highlighting the American analyst Dick Morris’ position, expressed in the "New Prince. Machiavelli in the 21st Century".

  11. PERSPECTIVE: Climate change, biofuels, and global food security

    Science.gov (United States)

    Cassman, Kenneth G.

    2007-03-01

    There is a new urgency to improve the accuracy of predicting climate change impact on crop yields because the balance between food supply and demand is shifting abruptly from surplus to deficit. This reversal is being driven by a rapid rise in petroleum prices and, in response, a massive global expansion of biofuel production from maize, oilseed, and sugar crops. Soon the price of these commodities will be determined by their value as feedstock for biofuel rather than their importance as human food or livestock feed [1]. The expectation that petroleum prices will remain high and supportive government policies in several major crop producing countries are providing strong momentum for continued expansion of biofuel production capacity and the associated pressures on global food supply. Farmers in countries that account for a majority of the world's biofuel crop production will enjoy the promise of markedly higher commodity prices and incomesNote1. In contrast, urban and rural poor in food-importing countries will pay much higher prices for basic food staples and there will be less grain available for humanitarian aid. For example, the developing countries of Africa import about 10 MMt of maize each year; another 3 5 MMt of cereal grains are provided as humanitarian aid (figure 1). In a world where more than 800 million are already undernourished and the demand for crop commodities may soon exceed supply, alleviating hunger will no longer be solely a matter of poverty alleviation and more equitable food distribution, which has been the situation for the past thirty years. Instead, food security will also depend on accelerating the rate of gain in crop yields and food production capacity at both local and global scales. Maize imports and cereal donations as humanitarian aid to the developing countries of Africa Figure 1. Maize imports (yellow bar) and cereal donations as humanitarian aid to the developing countries of Africa, 2001 2003. MMT = million metric tons. Data

  12. Escaping America’s Future: A Clarion Call for a National Energy Security Strategy

    Science.gov (United States)

    2010-06-01

    departments are implementing various efforts to overcome this oil addiction , but are not coordinating these efforts so as to avoid unintended consequences... addiction , but are not coordinating these efforts so as to avoid unintended consequences. This essay proposes the development of a National Energy Security...10 In 2007, for instance, Brazil discovered the Carioca- Sugar Loaf Oil field off of the coast of Rio de Janeiro and it is believed to hold up to

  13. Is History Relevant? Ideas for National Security Strategy in the 1990’s

    Science.gov (United States)

    1990-11-05

    Lat.n.-i e Johr~st. or~ hlatior~al Wa~ ~ College Noverr ~be~- 5s 19963 NATIONAL DEFENSE UNIVERSITY LIBRARY SPECIAL COLLECTIONS Report...i i c y a r e a s ~:.’~, as r, atic:r,a.! sec.urity. £’-.-esider, t Carte .~- tried to ’.~’-cus atter, tior~ ,-,r, r, or, t’~’aditior, al ’ti~-eats

  14. Collateral Damage? The Impact of National Security Crises on the Fourth Amendment: Protection Against Unreasonable Searches

    Directory of Open Access Journals (Sweden)

    Sara A. Chandler

    2006-04-01

    Full Text Available In January 2001, hidden cameras scanned the faces of all 100,000 Super Bowl attendees as they entered the stadium. Unbeknownst to the attendees, the scanned images were then compared with state, local, and FBI files of known criminals and terrorists. Was this measure justified in the interest of public safety and national security, or did it represent an unconstitutional violation of one’s fundamental right to privacy?

  15. Human trafficking in Southeast Asia and U.S. national security

    OpenAIRE

    Snoke, Joshua H.

    2015-01-01

    Approved for public release; distribution is unlimited The United States government finds human trafficking to be an important subject and is placing increasing focus on the issue. The Southeast Asian portion of the Western Pacific encompasses a substantial portion of global trafficking, much of which has a final destination in the United States. This thesis asks the following question: How does trafficking in persons (TIP) affect U.S. national security interests and regional stability in ...

  16. Underground Test Area Activity Communication/Interface Plan, Nevada National Security Site, Nevada, Revision 0

    Energy Technology Data Exchange (ETDEWEB)

    Farnham, Irene [Navarro, Las Vegas, NV (United States); Rehfeldt, Kenneth [Navarro, Las Vegas, NV (United States)

    2016-10-01

    The purpose of this plan is to provide guidelines for effective communication and interfacing between Underground Test Area (UGTA) Activity participants, including the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Field Office (NNSA/NFO) and its contractors. This plan specifically establishes the following: • UGTA mission, vision, and core values • Roles and responsibilities for key personnel • Communication with stakeholders • Guidance in key interface areas • Communication matrix

  17. Decision Making During National Security Crisis: The Case of the JFK Administration

    OpenAIRE

    Beckner, Lauren Renee

    2012-01-01

    Decision-making during crises is an important task that many elected officials face during their time in office. This thesis seeks to identify principles that make up a sound policy decision-making process and may lead to more positive outcomes. The analysis here is a comparative case study of three national security crises that faced the John F. Kennedy administration: the Bay of Pigs, the Cuban Missile Crisis, and the Vietnam conflict. Each case is examined for the presence of indicators...

  18. Global Warming: Its Implications for U.S. National Security Policy

    Science.gov (United States)

    2009-03-19

    The approach to this topic will be to look at the science behind anthropogenic global warming . Is man largely responsible for causing global warming due...paper will then investigate the nexus between global warming and U.S. national security policy. It will address the challenges facing U.S. leaders and...policy makers as they tackle the issue of global warming and its implications for U.S. policy. Finally it will conclude with recommendations for those

  19. Coping with global environmental change, disasters and security: threats, challenges, vulnerabilities and risks

    NARCIS (Netherlands)

    Brauch, H.G.; Oswald Spring, Ú.; Mesjasz, C.; Grin, J.; Kameri-Mbote, P.; Chourou, B.; Dunay, P.; Birkmann, J.

    2011-01-01

    This policy-focused Global Environmental and Human Security Handbook for the Anthropo-cene (GEHSHA) addresses new security threats, challenges, vulnerabilities and risks posed by global environmental change and disasters. In 6 forewords, 5 preface essays 95 peer reviewed chapcountries analyse in 10

  20. Nevada National Security Site Environmental Report 2013 Attachment A: Site Description

    Energy Technology Data Exchange (ETDEWEB)

    Wills, C.

    2014-09-09

    This attachment expands on the general description of the Nevada National Security Site (NNSS) presented in the Introduction to the Nevada National Security Site Environmental Report 2012 (National Security Technologies, LLC [NSTec], 2013). Included are subsections that summarize the site’s geological, hydrological, climatological, and ecological setting and the cultural resources of the NNSS. The subsections are meant to aid the reader in understanding the complex physical and biological environment of the NNSS. An adequate knowledge of the site’s environment is necessary to assess the environmental impacts of new projects, design and implement environmental monitoring activities for current site operations, and assess the impacts of site operations on the public residing in the vicinity of the NNSS. The NNSS environment contributes to several key features of the site that afford protection to the inhabitants of adjacent areas from potential exposure to radioactivity or other contaminants resulting from NNSS operations. These key features include the general remote location of the NNSS, restricted access, extended wind transport times, the great depths to slow-moving groundwater, little or no surface water, and low population density. This attachment complements the annual summary of monitoring program activities and dose assessments presented in the main body of this report.

  1. Nevada National Security Site Environmental Report 2012 Attachment A: Site Description

    Energy Technology Data Exchange (ETDEWEB)

    Wills, Cathy A

    2013-09-11

    This attachment expands on the general description of the Nevada National Security Site (NNSS) presented in the Introduction to the Nevada National Security Site Environmental Report 2012 (National Security Technologies, LLC [NSTec], 2013). Included are subsections that summarize the site’s geological, hydrological, climatological, and ecological setting and the cultural resources of the NNSS. The subsections are meant to aid the reader in understanding the complex physical and biological environment of the NNSS. An adequate knowledge of the site’s environment is necessary to assess the environmental impacts of new projects, design and implement environmental monitoring activities for current site operations, and assess the impacts of site operations on the public residing in the vicinity of the NNSS. The NNSS environment contributes to several key features of the site that afford protection to the inhabitants of adjacent areas from potential exposure to radioactivity or other contaminants resulting from NNSS operations. These key features include the general remote location of the NNSS, restricted access, extended wind transport times, the great depths to slow-moving groundwater, little or no surface water, and low population density. This attachment complements the annual summary of monitoring program activities and dose assessments presented in the main body of this report.

  2. 77 FR 528 - Self-Regulatory Organizations; The National Securities Clearing Corporation; Order Granting...

    Science.gov (United States)

    2012-01-05

    ... set parameters. The alerts may take the form of visual screen changes or other notification methods... impact the timing or status of the guaranty of any transaction in CNS or Balance Order Securities. In... the actual implementation date announced to members through an Important Notice. III....

  3. 75 FR 82115 - Self-Regulatory Organizations; National Securities Clearing Corporation; Notice of Filing of...

    Science.gov (United States)

    2010-12-29

    ... Analytics Reporting Service December 23, 2010. Pursuant to Section 19(b)(1) of the Securities Exchange Act... Service (``IPS'') by providing a new Analytics Reporting Service in order to provide greater transparency... the proposed rule change. The text of these statements may be examined at the places specified in...

  4. Servitization in a Security Business: Changing the Logic of Value Creation

    Directory of Open Access Journals (Sweden)

    Arto Rajala

    2013-08-01

    Full Text Available How can a firm change its value-creation logic from providing technology to selling technology-based services? This is a question many security companies face today when trying to apply a solutions-based business model in response to recent macro- and microeconomic trends. The fact that customers increasingly demand security as a service, rather than technical equipment, challenges the basis of a security firm's value provision and alters the logic of its operation. In this article, we investigate a technology- and product-oriented security business that is now rapidly transforming into a service business. We use data from a case study to propose a 4C model (conceptualization, calculation, communication, and co-creation of value that can help security providers to objectify their service offerings and succeed in the servitization of their security businesses.

  5. Security

    Science.gov (United States)

    Technology & Learning, 2008

    2008-01-01

    Anytime, anywhere, learning provides opportunities to create digital learning environments for new teaching styles and personalized learning. As part of making sure the program is effective, the safety and security of students and assets are essential--and mandated by law. The Children's Internet Protection Act (CIPA) addresses Internet content…

  6. FORMATION OF THE SYSTEM STRENGTHENING THE MILITARY-INDUSTRIAL POTENTIAL IN THE CONCEPT OF NATIONAL SECURITY

    Directory of Open Access Journals (Sweden)

    A. Yu. Bekkiev

    2015-01-01

    Full Text Available The article deals with the problem of the system to strengthen the defense industrial capacity. Explored approaches to this problem, given that domestic authors investigated the prospects of high-tech enterprise innovation systems and their sustainability, as well as a variety of instructional approaches, foreign authors assign great importance to the strategic management and systems analysis Management by Objectives defense complex. The problems of strengthening the military-industrial complex and their solutions are presented, such as the need to improve strategic planning (scenario variability of plans, co-ordinated action to overcome threats, challenges and risks, scientific and methodological rationale for the decision-making at all levels (national, regional and organizational. The author gives a system to strengthen the military-industrial potential in the concept of national security, which includes: national values, the program of socio-economic development of the Russian Federation, foreign policy concept, the concept of strengthening the military-industrial complex in Russia's national security, the program of socio-economic development of the Voronezh region, as well as methods of analysis and strengthening the military-industrial complex. Particular attention is paid to the method of co-financing of defense enterprises and methods of quantifying the performance objectives semistructured systems.

  7. Preliminary Findings on the Health of the Nation Outcome Scales for Children and Adolescents in an Inpatient Secure Adolescent Unit

    Science.gov (United States)

    Hunt, Jenny; Wheatley, Malcolm

    2009-01-01

    To date there is limited research examining the use of the Health of the Nation Outcome Scales for Children and Adolescents (HoNOSCA) with adolescents in secure care. The aim of this article is to examine the inter-rater reliability, concurrent validity and clinical utility of HoNOSCA in an adolescent secure psychiatric unit. Twenty-four…

  8. Acceptance Factors Influencing Adoption of National Institute of Standards and Technology Information Security Standards: A Quantitative Study

    Science.gov (United States)

    Kiriakou, Charles M.

    2012-01-01

    Adoption of a comprehensive information security governance model and security controls is the best option organizations may have to protect their information assets and comply with regulatory requirements. Understanding acceptance factors of the National Institute of Standards and Technology (NIST) Risk Management Framework (RMF) comprehensive…

  9. 75 FR 4595 - BATS Y-Exchange, Inc.; Notice of Filing of Application for Registration as a National Securities...

    Science.gov (United States)

    2010-01-28

    ... COMMISSION BATS Y-Exchange, Inc.; Notice of Filing of Application for Registration as a National Securities... Y-Exchange, Inc. (``BATS Y Exchange'') submitted to the Securities and Exchange Commission... publishing this notice to solicit comments on BATS Y Exchange's Form 1. The Commission will take...

  10. Religious Fanaticism and “Boko Haram” Insurgency in Nigeria: Implications for National Security

    Directory of Open Access Journals (Sweden)

    Austin O. Omomia

    2015-04-01

    Full Text Available Nigeria is commonly adjudged as the “Giant of Africa”. No doubt, the African continent has witnessed drastic socio-political transformation between the periods 1960 to date. Ironically, since Nigeria became an independent nation on October, 1st 1960, she has been confronted with myriad of socio-political challenges. Notable among these, is religious fanaticism. This, in recent times, is encapsulated in grave religious insurgency, manifested in the “Boko Haram” challenge. This paper therefore addresses the relationship between religious fanaticism and security, how they affect each other (positively or negatively. It also examined the present security challenge in Nigeria, and attempts to advance some panaceas in achieving true security. Thus, articulating the benefits of security as genuine precursors for sustainable development of Nigeria. The paper applied historical and sociological methodology in its investigation. It is recommended among others, that the adherents of the different religions should embrace dialogue and tolerance. The government should also pursue the challenge posed by youth unemployment with the right vigour.

  11. Nevada National Security Site-Directed Research and Development FY 2011 Annual Report

    Energy Technology Data Exchange (ETDEWEB)

    Howard Bender, comp.

    2012-04-25

    This fiscal year 2011 annual report of the Site-Directed Research and Development program, the 10th anniversary edition, recognizes a full decade of innovative R&D accomplishments in support of the Nevada National Security Site (NNSS). Last year the NNSS itself was renamed to reflect a diversifying mission, and our R&D program has contributed significantly to shape emerging missions that will continue to evolve. New initiatives in stockpile stewardship science, nonproliferation, and treaty verification and monitoring have had substantial successes in FY 2011, and many more accomplishments are expected. SDRD is the cornerstone on which many of these initiatives rest. Historically supporting our main focus areas, SDRD is also building a solid foundation for new, and non-traditional, emerging national security missions. The program continues its charter to advance science and technology for a broad base of agencies including the U.S. Department of Energy (DOE), U.S. Department of Defense (DoD), U.S. Department of Homeland Security (DHS), and many others.

  12. Sustainable Livestock Production in The Perspective of National Food Security Policy

    Directory of Open Access Journals (Sweden)

    Tjeppy D Soedjana

    2013-03-01

    Full Text Available This paper presents an overview of the role that livestock play in various dimensions of food security. Food security is defined as a state of affairs where all people at all times have access to safe and nutritious food to maintain a healthy and active life. Availability, accessibility, and affordability of individuals to consume food according to their respective socio-economic conditions are important dimensions. It describes the place of livestock products in human nutrition, the contribution of livestock to the national food supply and the way that livestock can affect food access, as a direct source of food and a source of income. Access to food is the most basic human right, especially for Indonesia with more than 240 million people with annual growth of 1.3%. To secure food availability, a sustainable food production growth more than 2% per year, including animal protein sources, is needed. It is necessary to strengthen food supply by maximizing available resources; improve food distribution system to guarantee a stable food supply and public access; encourage diversified food consumption; and prevent as well as resolve food scarcity. Furthermore, within the national objectives for self-sufficiency in rice, corn, soybean, and white sugar, the current annual percapita consumption of livestock products has reached 6.96 kg (meat, 7.3 kg (eggs and 16.5 kg (milk, which indicates good progress to stimulate sustainable domestic livestock production.

  13. Developments in national climate change mitigation legislation and strategy

    NARCIS (Netherlands)

    Dubash, N.K.; Hagemann, M.; Höhne, N.; Upadhyaya, P.

    2013-01-01

    The results are presented from a survey of national legislation and strategies to mitigate climate change covering almost all United Nations member states between 2007 and 2012. This data set is distinguished from the existing literature in its breadth of coverage, its focus on national policies (ra

  14. Agriculture and food security challenge of climate change: a dynamic analysis for policy selection

    Directory of Open Access Journals (Sweden)

    Ferdous Ahmed

    2016-08-01

    Full Text Available ABSTRACT This study presents an empirical examination of climate change related to vulnerability impacts on food security and remedial adaptation options as a suitable strategy by prioritizing needs over a 50-year period. An Empirical Dynamic Commutable General Equilibrium Model for Climate and the Economy (EDCGECE is applied using future strategies for Malaysia against a baseline scenario of existing conditions, following the top-down options. The model takes into account various climatic variables, including climatic damage, carbon cycle, temperature and rainfall fluctuation, carbon emissions, vulnerability and carbon concentrations, which were adapted from national observational predictions of climatic changes caused by global warming from 2015 to 2065. The results prioritize climate change mitigation for the future. Specifically, this study estimates Malaysia’s food sustainability prospects without adaptation actions and with 5 % to 20 % adaptation actions overtime in different adaptation scenarios, as contrasted with the baseline. The results indicate that food sustainability cost in the baseline in 2015 is 859.3 million US Dollar (USD, which is about a 30-35 % shortage compared with the national targets, and that the shortage will rise over time to USD 987.3 million in 2065. However, the cost of applying different levels of adaptation for food sustainability over time is rising considerably. However, the residual damage also decreases with all adaptation actions in the different scenarios. Thus, adaptation shows a positive sign for Malaysia’s agricultural sectors. As growth values are positive and show rising trends, therefore the projected adaptation policy can be effective for food sustainability for sustainable future strategies in Malaysia.

  15. The National Security Strategy Under the United Nations and International Law

    Science.gov (United States)

    2004-03-19

    a result of that war." This was addressed in 1951 by Hans Kelsen in a legal analysis of fundamental problems with the UN Charter. He concluded that...www.zmag.org/content/print_article.cfm>; Internet; accessed 31 January 2004. 36 Charter of the United Nations, Article 107. 37 Kearly, 27–28. 38 Hans Kelsen ...the framers introduced ambiguity reveals exactly what the framers intended. Kearly cites Hans Kelsen’s authoritative research of the charter of the

  16. Swiss Neutrality and Collective Security: The League of Nations and the United Nations

    Science.gov (United States)

    2010-03-01

    Sergio Stupan, Comment la Suisse a adhéré au Pacte de la Société des Nations (Lausanne: Université de Lausanne, 1943), 77ff. 40 In accepting these...resulted in a successful referendum.153 Active pacifist movements were established during World War I. According to Sergio Stupan, these movements...may be categorized into two groups. The first group, the Franco -Swiss Freemasons, the Swiss Peace Society, and the Socialists, had an “international

  17. The Conundrum about the United Nations Security Council: A Guardian of Peace or Cause for Concern?

    Directory of Open Access Journals (Sweden)

    Berdal Aral

    2016-02-01

    Full Text Available This paper seeks to find out whether the United Nations Security Council (UN SC has been perfoming its primary task of safeguarding international peace and security effectively since the Cold War has become a matter of history. It argues that, contrary to expectations, the SC has failed to confront all credible threats to regional or international peace in a consistent and convincing manner which has dramatically diminished the reliability of this powerful UN body. This paper argues that the problem lies in the problematical structure of, and decision-making in, the SC and in its instrumentalisation at the hands of a handful of states seeking hegemony, inter alia, through this body. The Darfur and East Timor cases, taken up by the SC after the Cold War through a series of resolutions under Chapter VII of the UN Charter, are taken as test cases indicating the extent of politicisation in this organ.

  18. The Conundrum about the United Nations Security Council: A Guardian of Peace or Cause for Concern?

    Directory of Open Access Journals (Sweden)

    Berdal Aral

    2010-05-01

    Full Text Available This paper seeks to find out whether the United Nations Security Council (UN SC has been perfoming its primary task of safeguarding international peace and security effectively since the Cold War has become a matter of history. It argues that, contrary to expectations, the SC has failed to confront all credible threats to regional or international peace in a consistent and convincing manner which has dramatically diminished the reliability of this powerful UN body. This paper argues that the problem lies in the problematical structure of, and decision-making in, the SC and in its instrumentalisation at the hands of a handful of states seeking hegemony, inter alia, through this body. The Darfur and East Timor cases, taken up by the SC after the Cold War through a series of resolutions under Chapter VII of the UN Charter, are taken as test cases indicating the extent of politicisation in this organ.

  19. International and national security applications of cryogenic detectors - mostly nuclear safeguards

    Energy Technology Data Exchange (ETDEWEB)

    Rabin, Michael W [Los Alamos National Laboratory

    2009-01-01

    As with science, so with security - in both arenas, the extraordinary sensitivity of cryogenic sensors enables high-confidence detection and high-precision measurement even of the faintest signals. Science applications are more mature, but several national and international security applications have been identified where cryogenic detectors have high potential payoff. International safeguards and nuclear forensics are areas needing new technology and methods to boost speed, sensitivity, precision and accuracy. Successfully applied, improved nuclear materials analysis will help constrain nuclear materials diversion pathways and contribute to treaty verification. Cryogenic microcalorimeter detectors for X-ray, gamma ray, neutron, and alpha particle spectrometry are under development with these aims in mind. In each case the unsurpassed energy resolution of microcalorimeters reveals previously invi sible spectral features of nuclear materials. Preliminary results of quantitative analysis indicate substantial improvements are still possible, but significant work will be required to fully understand the ultimate performance limits.

  20. Situating Climate Security, The Department of Defense's Role in Mitigating Climate Change's Causes and Dealing with its Effects; Strategic Insights; v. 9, issue 2 (Fall 2010) pp. 13-25.

    OpenAIRE

    CLAUSEN, Daniel; Clausen, Michael

    2010-01-01

    This article appeared in Strategic Insights, v.9, issue 2 (Fall 2010) pp. 13-25. Approved for public display, distribution unlimited An Emerging Security Focus: Climate Security. A new concern is circulating among policymakers, think tanks, and scholars: securing the planet’s climate. For those who debate what counts as “national security,” the question over whether climate change should be framed as a security issue has been argued along well-worn lines. For those who seek a more expan...

  1. French Security Policy in Transition: Dynamics of Continuity and Change

    Science.gov (United States)

    1995-03-01

    significant social division requires a strong state. As a commentator on the French assessment in Entreprise France noted, the French analysts in this project... financement (Paris: The National Assembly, July 1993). 14 William T. Johnsen and Thomas-DareR Young, French Policy Toward NATO: Enhance Selectivity, Vice

  2. The National Security Agency (NSA eavesdropping on Americans A programme that is neither legal nor necessary

    Directory of Open Access Journals (Sweden)

    Zmarak Khan

    2006-12-01

    Full Text Available On 16 December 2005, the New York Times reported that the President had authorized the National Security Agency (NSA to spy on Americans, inside the United States, without first obtaining a warrant from the secret FISA court. Although the President has described the NSA activities to be legal and critical to our national security, the programme has started a national controversy, raising questions over its legality and necessity. Consequently, there have been pending legal challenges, congressional investigations, and public outcry over the use of such expansive presidential authority. The legal community, including the American Bar Association, considers the programme illegal. The only district court that has addressed the issue has held it to be an unconstitutional programme that violates FISA. This comment highlights several reasons for why warrantless wiretapping is illegal and unnecessary. The comment also notes public policy reasons against presidential power that is not subject to any checks from Congress or review from the judiciary. Finally, it argues that the President needs to immediately cease the programme; asks Congress to take its oversight responsibility more seriously; and reasons that the judicial review protects against abuse.

  3. Innovation priorities optimization in the context of national technological security ensuring

    Directory of Open Access Journals (Sweden)

    V.A. Omelyanenko

    2016-12-01

    Full Text Available The aim of this article. The article is devoted to the main aspects of technological security providing through increasing the efficiency of innovation development priorities selection. The features of impact of technological security for national security and international experience of its software were analyzed. The scheme of determination of innovation priorities, based on the assessment of critical technologies and strategy of socio-economic development, were proposed. The scheme of innovation priorities based on “deployment policy” concept was developed. The results of the analysis. Based on analysis of possibilities of using the capacity of international environment, eliminating the technological gap between Ukraine and leading countries in framework of technological security provision should be implemented not by increasing the one-side transfer of foreign technologies, but with the improvement and development of national critical technologies based on foreign experience. Also positive balance of international technology transfer in future can’t be achieved the growth of dumping policy with the expansion of volumes of these technologies only when the country has to spend a resources, which is beneficial only for foreign partners. This balance should be focused on system-level processes, it is necessary to speed up the development of its own technology base, that can eliminate existing or possible “technological blockade”. Conclusions and perspectives for further research. The state’s ability to engage in complicated tech activities is a characteristic of scientific, technical and technological level of its development as well as has great impact on economic situation and national security and assists enhance its international prestige. However, the development of such industries and requires the creation of efficient innovation system and international cooperation mechanisms to compensate for negative effects of unilateral

  4. DOE integrated safeguards and security (DISS) system a nation-wide distributed information system for personnel security

    Energy Technology Data Exchange (ETDEWEB)

    Block, B.

    1997-06-05

    DISS uses secure client-server and relational database technology across open networks to address the problems of security clearance request processing and tracking of security clearances for the Department of energy. The system supports the entire process from data entry by the prospective clearance holders through tracking of all DOE clearances, and use of standard DOE badges in automated access control systems throughout the DOE complex.

  5. Nevada National Security Site 2013 Data Report: Groundwater Monitoring Program Area 5 Radioactive Waste Management Site

    Energy Technology Data Exchange (ETDEWEB)

    Hudson, David B. [National Security Technologies, LLC, Las Vegas, NV (United States)

    2014-02-01

    This report is a compilation of the groundwater sampling results from the Area 5 Radioactive Waste Management Site (RWMS) at the Nevada National Security Site, Nye County, Nevada. Groundwater samples from the aquifer immediately below the Area 5 RWMS have been collected and analyzed and static water levels have been measured in this aquifer since 1993. This report updates these data to include the 2013 results. Beginning with this report, analysis results for leachate collected from the mixed-waste cell at the Area 5 RWMS (Cell 18) are also included.

  6. Nevada National Security Site 2013 Data Report: Groundwater Monitoring Program Area 5 Radioactive Waste Management Site

    Energy Technology Data Exchange (ETDEWEB)

    Hudson, David B

    2014-02-13

    This report is a compilation of the groundwater sampling results from the Area 5 Radioactive Waste Management Site (RWMS) at the Nevada National Security Site, Nye County, Nevada. Groundwater samples from the aquifer immediately below the Area 5 RWMS have been collected and analyzed and static water levels have been measured in this aquifer since 1993. This report updates these data to include the 2013 results. Beginning with this report, analysis results for leachate collected from the mixed-waste cell at the Area 5 RWMS (Cell 18) are also included.

  7. Background Information for the Nevada National Security Site Integrated Sampling Plan, Revision 0

    Energy Technology Data Exchange (ETDEWEB)

    Farnham, Irene; Marutzky, Sam

    2014-12-01

    This document describes the process followed to develop the Nevada National Security Site (NNSS) Integrated Sampling Plan (referred to herein as the Plan). It provides the Plan’s purpose and objectives, and briefly describes the Underground Test Area (UGTA) Activity, including the conceptual model and regulatory requirements as they pertain to groundwater sampling. Background information on other NNSS groundwater monitoring programs—the Routine Radiological Environmental Monitoring Plan (RREMP) and Community Environmental Monitoring Program (CEMP)—and their integration with the Plan are presented. Descriptions of the evaluations, comments, and responses of two Sampling Plan topical committees are also included.

  8. Transient effects on groundwater chemical compositions from pumping of supply wells at the Nevada National Security Site, 1951-2008

    Science.gov (United States)

    Paces, James B.; Elliott, Peggy E.; Fenelon, Joseph M.; Laczniak, Randell J.; Moreo, Michael T.

    2012-01-01

    Nuclear testing and support activities at the Nevada National Security Site have required large amounts of water for construction, public consumption, drilling, fire protection, hydraulic and nuclear testing, and dust control. To supply this demand, approximately 20,000 million gallons of water have been pumped from 23 wells completed in 19 boreholes located across the Nevada National Security Site starting as early as the 1950s. As a consequence of more or less continuous pumping from many of these wells for periods as long as 58 years, transient groundwater flow conditions have been created in the aquifers that supplied the water. To evaluate whether long-term pumping caused changes in water compositions over time, available chemical analyses of water samples from these 19 boreholes were compiled, screened, and evaluated for variability including statistically significant temporal trends that can be compared to records of groundwater pumping. Data used in this report have been extracted from a large database (Geochem08, revision 3.0, released in September 2008) containing geochemical and isotopic information created and maintained by primary contractors to the U.S. Department of Energy, National Nuclear Security Administration, Nevada Site Office. Data extracted from this source were compiled for the entire period of record, converted to uniform reporting units, and screened to eliminate analyses of poor or unknown quality, as well as clearly spurious values. The resulting data are included in accompanying spreadsheets that give values for (1) pH and specific conductance, (2) major ion concentrations, (3) trace element concentrations and environmental isotope ratios, and (4) mean, median, and variance estimates for major ion concentrations. The resulting data vary widely in quality and time-series density. An effort has been made to establish reasonable ranges of analytical uncertainty expected for each analyte and eliminate analyses that are obvious outliers

  9. Shared Security through U.S./Chinese Cooperation on Climate Change Security and Risk Reduction

    Institute of Scientific and Technical Information of China (English)

    Marcus; D.King; John; O.Rankin

    2014-01-01

    <正>In concluding remarks of the June 2013U.S.-Chinese Summit,President Barak Obama declared that neither China nor the U.S.can deal with the challenge of climate change by itself.These statements came at a time when each leader was grappling with droughts,caused or exacerbated by climate change.Reservoirs,rainfall totals and snowpack on the mountaintops remain critically low in

  10. Geology of the Source Physics Experiment Site, Climax Stock, Nevada National Security Site

    Energy Technology Data Exchange (ETDEWEB)

    Townsend, M., Prothro, L. B., Obi, C.

    2012-03-15

    A test bed for a series of chemical explosives tests known as Source Physics Experiments (SPE) was constructed in granitic rock of the Climax stock, in northern Yucca Flat at the Nevada National Security Site in 2010-2011. These tests are sponsored by the U.S. Department of Energy, National Nuclear Security Administration's National Center for Nuclear Security. The test series is designed to study the generation and propagation of seismic waves, and will provide data that will improve the predictive capability of calculational models for detecting and characterizing underground explosions. Abundant geologic data are available for the area, primarily as a result of studies performed in conjunction with the three underground nuclear tests conducted in the Climax granite in the 1960s and a few later studies of various types. The SPE test bed was constructed at an elevation of approximately 1,524 meters (m), and consists of a 91.4-centimeter (cm) diameter source hole at its center, surrounded by two rings of three 20.3-cm diameter instrument holes. The inner ring of holes is positioned 10 m away from the source hole, and the outer ring of holes is positioned 20 m from the source hole. An initial 160-m deep core hole was drilled at the location of the source hole that provided information on the geology of the site and rock samples for later laboratory testing. A suite of geophysical logs was run in the core hole and all six instruments holes to obtain matrix and fracture properties. Detailed information on the character and density of fractures encountered was obtained from the borehole image logs run in the holes. A total of 2,488 fractures were identified in the seven boreholes, and these were ranked into six categories (0 through 5) on the basis of their degree of openness and continuity. The analysis presented here considered only the higher-ranked fractures (ranks 2 through 5), of which there were 1,215 (approximately 49 percent of all fractures identified

  11. Quantitative analysis of Indonesia's reserves and energy security as an evaluation by the nation in facing global competition

    Science.gov (United States)

    Wiratama, Hadi; Yerido, Hezron; Tetrisyanda, Rizki; Ginting, Rizqy R.; Wibawa, Gede

    2015-12-01

    Energy security has become a serious concern for all countries in the world and each country has its own definiton for measuring its energy security. The objective of this study was to measure energy security of Indonesia quantitatively by comparing it with other countries and provide some recommendations for enhancing the energy security. In this study, the database was developed from various sources and was cross-checked to confirm validity of the data. Then the parameters of energy security were defined, where all of data will be processed towards the selected parameters. These parameters (e.g. Primary Energy mix, TPES/capita, FEC/capita, Self Sufficiency, Refining capacity, Overseas Energy Resources, Resources diversification) are the standards used to produce an analysis or evaluation of national energy management. Energy balances for Indonesia and 10 selected countries (USA, Germany, Russia, England, Japan, China, South Korea, Singapore, Thailand and India) were presented from 2009 to 2013. With a base index of 1.0 for Indonesia, calculated energy security index capable of representing Indonesia energy security compared relatively to other countries were also presented and discussed in detail. In 2012, Indonesia security index is ranked 11 from 11 countries, while USA and South Korea are the highest with security index of 3.36 and 2.89, respectively. According to prediction for 2025, Indonesia energy security is ranked 10 from 11 countries with only Thailand has lower security index (0.98). This result shows that Indonesia energy security was vulnerable to crisis and must be improved. Therefore this study proposed some recommendations to improve Indonesia energy security. Indonesia need to increase oil production by constructing new refinery plants, developing infrastructure for energy distribution to reduce the potential of energy shortage and accelerating the utilization of renewable energy to reduce the excessive use of primary energy. From energy policy

  12. Quantitative analysis of Indonesia’s reserves and energy security as an evaluation by the nation in facing global competition

    Energy Technology Data Exchange (ETDEWEB)

    Wiratama, Hadi; Yerido, Hezron; Tetrisyanda, Rizki; Ginting, Rizqy R.; Wibawa, Gede, E-mail: gwibawa@chem-eng.its.ac.id [Department of Chemical Engineering, Faculty of Industrial Technology, Sepuluh Nopember Institute of Technology (ITS), Kampus ITS Sukolilo, Surabaya 60111 (Indonesia)

    2015-12-29

    Energy security has become a serious concern for all countries in the world and each country has its own definiton for measuring its energy security. The objective of this study was to measure energy security of Indonesia quantitatively by comparing it with other countries and provide some recommendations for enhancing the energy security. In this study, the database was developed from various sources and was cross-checked to confirm validity of the data. Then the parameters of energy security were defined, where all of data will be processed towards the selected parameters. These parameters (e.g. Primary Energy mix, TPES/capita, FEC/capita, Self Sufficiency, Refining capacity, Overseas Energy Resources, Resources diversification) are the standards used to produce an analysis or evaluation of national energy management. Energy balances for Indonesia and 10 selected countries (USA, Germany, Russia, England, Japan, China, South Korea, Singapore, Thailand and India) were presented from 2009 to 2013. With a base index of 1.0 for Indonesia, calculated energy security index capable of representing Indonesia energy security compared relatively to other countries were also presented and discussed in detail. In 2012, Indonesia security index is ranked 11 from 11 countries, while USA and South Korea are the highest with security index of 3.36 and 2.89, respectively. According to prediction for 2025, Indonesia energy security is ranked 10 from 11 countries with only Thailand has lower security index (0.98). This result shows that Indonesia energy security was vulnerable to crisis and must be improved. Therefore this study proposed some recommendations to improve Indonesia energy security. Indonesia need to increase oil production by constructing new refinery plants, developing infrastructure for energy distribution to reduce the potential of energy shortage and accelerating the utilization of renewable energy to reduce the excessive use of primary energy. From energy policy

  13. Water Security and Hydropolitics of the Nile River: South Sudan’s National Security in the 21st Century

    Science.gov (United States)

    2011-12-16

    92. 84Cirino H. Ofuho, “Security Concerns in the Horn of Africa,” in African Regional Security in the Age of Globalisation , ed. Makumi Mwagiru...analyses are involved at this stage .99 The first step in is to quantitatively determine potential for conflict as it applies to the Nile basin water...

  14. UK National Data Guardian for Health and Care's Review of Data Security: Trust, better security and opt-outs.

    Science.gov (United States)

    Chan, Tom; Di Iorio, Concetta Tania; De Lusignan, Simon; Lo Russo, Daniel; Kuziemsky, Craig; Liaw, Siaw-Teng

    2016-12-20

    Sharing health and social care data is essential to the delivery of high quality health care as well as disease surveillance, public health, and for conducting research. However, these societal benefits may be constrained by privacy and data protection principles. Hence, societies are striving to find a balance between the two competing public interests. Whilst the spread of IT advancements in recent decades has increased the demand for an increased privacy and data protection in many ways health is a special case. UK are adopting guidelines, codes of conduct and regulatory instruments aimed to implement privacy principles into practical settings and enhance public trust. Accordingly, in 2015, the UK National Data Guardian (NDG) requested to conduct a further review of data protection, referred to as Caldicott 3.  The scope of this review is to strengthen data security standards and confidentiality. It also proposes a consent system based on an "opt-out" model rather than on "opt-in.Across Europe as well as internationally the privacy-health data sharing balance is not fixed.  In Europe enactment of the new EU Data Protection Regulation in 2016 constitute a major breakthrough, which is likely to have a profound effect on European countries and beyond.  In Australia and across North America different ways are being sought to balance out these twin requirements of a modern society - to preserve privacy alongside affording high quality health care for an ageing population.  Whilst in the UK privacy legal framework remains complex and fragmented into different layers of legislation, which may negatively impact on both the rights to privacy and health the UK is at the forefront in the uptake of international and EU privacy and data protection principles. And, if the privacy regime were reorganised in a more comprehensive manner, it could be used as a sound implementation model for other countries.

  15. Global climate change adaptation priorities for biodiversity and food security.

    Science.gov (United States)

    Hannah, Lee; Ikegami, Makihiko; Hole, David G; Seo, Changwan; Butchart, Stuart H M; Peterson, A Townsend; Roehrdanz, Patrick R

    2013-01-01

    International policy is placing increasing emphasis on adaptation to climate change, including the allocation of new funds to assist adaptation efforts. Climate change adaptation funding may be most effective where it meets integrated goals, but global geographic priorities based on multiple development and ecological criteria are not well characterized. Here we show that human and natural adaptation needs related to maintaining agricultural productivity and ecosystem integrity intersect in ten major areas globally, providing a coherent set of international priorities for adaptation funding. An additional seven regional areas are identified as worthy of additional study. The priority areas are locations where changes in crop suitability affecting impoverished farmers intersect with changes in ranges of restricted-range species. Agreement among multiple climate models and emissions scenarios suggests that these priorities are robust. Adaptation funding directed to these areas could simultaneously address multiple international policy goals, including poverty reduction, protecting agricultural production and safeguarding ecosystem services.

  16. A coastal foodscape: examining the relationship between changing fisheries and community food security on the west coast of Newfoundland

    OpenAIRE

    2014-01-01

    Fisheries make vital contributions to food security and food security is an important part of fisheries governance. However, there are relatively few in-depth studies examining the consequences of collapsed and changing fisheries for the food security of coastal communities. In this case study I use the concept of the coastal foodscape to look at the relationship between changing fisheries and community food security in the Bonne Bay region on the west coast of Newfoundland. I examine the soc...

  17. Advising Host Nations and Host Nation Security Forces: The United States Military Advisory Efforts through 2020

    Science.gov (United States)

    2014-05-22

    and Afghanistan.247 According to Robert Gilpin in Robert Betts’ Conflict After the Cold War: Arguments and Causes of War and Peace, he states that an...3, 1998. Gilpin , Robert . “Hegemonic War and International Change.” In Conflict After the Cold War: Arguments on the Causes of War and Peace, edited...Secretary of Defense, Robert Gates, both proclaimed the importance of building HNSF capacity and the advisor mission as an enduring requirement. However

  18. Changes in Arable Land Demand for Food in India and China: A Potential Threat to Food Security

    Directory of Open Access Journals (Sweden)

    Reshmita Nath

    2015-04-01

    Full Text Available India and China are two similar developing countries with huge populations, rapid economic growth and limited natural resources, therefore facing the massive pressure of ensuring food security. In this paper, we will discuss the food security situations in these two countries by studying the historical changes of food supply-demand balance with the concept of agricultural land requirements for food (LRF from 1963–2009. LRF of a country is a function of population, per capita consumption/diet, cropping yield and cropping intensity. We have attempted to discuss and compare our results in a framework which links consumption of different groups of food items to diet patterns; then, to the total land requirement for food in a scenario when population is growing rapidly and diet diversification and urbanization due to economic reform impose excessive pressure on food security of both countries. We also elaborate on the role of technology dissemination and critically analyze the achievements and drawbacks of government policies to ensure food self-sufficiency and food security of nations. Our results show that the total LRF increases approximately by 42% and 40%, whereas per capita LRF decreases significantly by about 48% and 30% from 1963–2009, for India and China, respectively. Furthermore, our studies reveal that population growth dominates most of the increase in total LRF for India; whereas diet pattern change induced by income growth drives the major increase in LRF for China. Therefore, sustainable management of agricultural land resource is an urgent need both for India and China as there will be demand for more food to meet the diet requirement for the entire population. We also demonstrate the role of India and China in future global food security programs and the challenges to implement the new land reform policies domestically.

  19. Global Climate Change, Food Security and the U.S. Food System

    Science.gov (United States)

    Brown, Molly Elizabeth; Walsh, Margaret; Hauser, Rachel; Murray, Anthony; Jadin, Jenna; Baklund, Peter; Robinson, Paula

    2013-01-01

    Climate change influences on the major pillars of food security. Each of the four elements of food security (availability,access,utilization,andstability) is vulnerable to changes in climate. For example,reductions in production related to regional drought influence food availability at multiple scales. Changes in price influences the ability of certain populations to purchase food (access). Utilization maybe affected when production zones shift, reducing the availability of preferred or culturally appropriate types of food within a region. Stability of the food supply may be highly uncertain given an increased incidence of extreme climatic events and their influence on production patterns.

  20. Terrorism as war by other means: national security and state support for terrorism

    Directory of Open Access Journals (Sweden)

    Faruk Ekmekci

    2011-01-01

    Full Text Available The conventional approach in the discipline of International Relations is to treat terrorist organizations as "non-state" actors of international relations. However, this approach is problematic due to the fact that most terrorist organizations are backed or exploited by some states. In this article, I take issue with the non-stateness of terrorist organizations and seek to answer the question of why so many states, at times, support terrorist organizations. I argue that in the face of rising threats to national security in an age of devastating wars, modern nation states tend to provide support to foreign terrorist organizations that work against their present and imminent enemies. I elaborate on my argument studying three cases of state support for terrorism: Iranian support for Hamas, Syrian support for the PKK, and American support for the MEK. The analyses suggest that, for many states, terror is nothing but war by other means.

  1. The people's role in U.S. national health security: past, present, and future.

    Science.gov (United States)

    Schoch-Spana, Monica

    2012-03-01

    Over the past decade, assumptions have been made and unmade about what officials can expect of average people confronting a bioterrorist attack or other major health incident. The reframing of the public in national discourse and doctrine from a panic-stricken mob to a band of hearty survivors is a positive development and more realistic in terms of the empirical record. So, too, is the realization that citizen contributions to national health security encompass not only individual preparedness and volunteerism but also mutual aid and collective deliberation of the tough choices posed by health disasters. In projecting what needs to occur over the next 10 years in biosecurity, 2 priority challenges emerge: retaining the lesson that a public prone to panic, social disorder, and civil unrest is a myth, and building an infrastructure to bolster the public's full contributions to health emergency management.

  2. 75 FR 4896 - Self-Regulatory Organizations; National Securities Clearing Corporation; Notice of Filing of...

    Science.gov (United States)

    2010-01-29

    ... Proposed Rule Change To Eliminate Guarantee of Payment in Connection With the Envelope Settlement Service... change is to make modifications to NSCC's Rules & Procedures (``Rules'') to eliminate NSCC's guarantee of... Rule 19b-4 thereunder \\2\\ notice is hereby given that on January 4, 2010, the National...

  3. Los Alamos National Security, LLC Request for Information from industrial entities that desire to commercialize Laboratory-developed Extremely Low Resource Optical Identifier (ELROI) tech

    Energy Technology Data Exchange (ETDEWEB)

    Erickson, Michael Charles [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2015-11-10

    Los Alamos National Security, LLC (LANS) is the manager and operator of the Los Alamos National Laboratory for the U.S. Department of Energy National Nuclear Security Administration under contract DE-AC52-06NA25396. LANS is a mission-centric Federally Funded Research and Development Center focused on solving the most critical national security challenges through science and engineering for both government and private customers.

  4. Definition of the “economic security of strategic changes at an enterprise” notion

    Directory of Open Access Journals (Sweden)

    Otenko Iryna Pavlivna

    2014-01-01

    Full Text Available Availability of a multitude of approaches to management of economic security of an enterprise and systemisation of their provisions allow development of a conceptual framework by means of identification of the essence of the “enterprise economic security” notion in the context of development processes management. The article shows that essence and composition of the “economic security of strategic changes of an enterprise” notion should not only take into account the set of views and methods of understanding and their interpretation in various aspects, but also form the basic idea and tasks of ensuring economic security of strategic changes of an enterprise, which is reflected in results of its activity through prevention and assessment of threats and formation of the state of protection and qualitative changes. The presented provision that the economic security management system should be integrated into the processes of strategic changes of an enterprise allows forming methodical provision of management of economic security of strategic changes of an enterprise and instruments of management, directions of forming of which correspond with the enterprise strategic goals.

  5. Teaching for conceptual change in security awareness education: A case study in higher education

    OpenAIRE

    2009-01-01

    In educational psychology, conceptual change is a process that revises a student's understanding of a topic in response to new information. Conceptual change pedagogy is particularly effective for security awareness education because instructors must deliver concepts to people who primarily just use computer networks and information systems rather than display expertise in the underlying technology.

  6. Securing America’s Future. Realizing the Potential of the Department of Energy’s National Laboratories

    Energy Technology Data Exchange (ETDEWEB)

    Glauthier, T. J. [TJG Energy Associates, LLC, Bloomberg, VA (United States); Cohon, Jared L. [Carnegie Mellon Univ., Pittsburgh, PA (United States); Augustine, Norman R. [U.S. Dept. of Homeland Security, Washington, DC (United States); Austin, Wanda M. [Aerospace Corporation, El Segundo, CA (United States); Elachi, Charles [California Inst. of Technology (CalTech), Pasadena, CA (United States); Fleury, Paul A. [Yale Univ., New Haven, CT (United States); Hockfield, Susan J. [Massachusetts Inst. of Technology (MIT), Cambridge, MA (United States); Meserve, Richard A. [Covington and Burling LLP, Washington, DC (United States); Murray, Cherry A. [Harvard Univ., Cambridge, MA (United States)

    2015-10-23

    The Department of Energy (DOE) laboratories are national assets that have contributed profoundly to the Nation’s security, scientific leadership, and economic competitiveness. In recognition of the continuing and evolving threats to our security and the dramatic increase in global economic and scientific competition, the laboratories are and will continue to be vitally important. Yet, the contributions of the National Laboratories are not inevitable, nor have they realized their full potential. This final report of the Commission to Review the Effectiveness of the National Energy Laboratories recommends ways the laboratories could overcome challenges to more efficiently and effectively accomplish the work for which they are uniquely suited.

  7. Vegetation Change, Tree Diversity and Food Security in the Sahel

    DEFF Research Database (Denmark)

    Sambou, Antoine

    The aim of this thesis was to determine the factors that influence tree diversity and vegetation use, status and dynamics and how woody plants and palms contribute to the diets of rural communities. This thesis holds the hypothesis that changes in the land use patterns and soil salinization can...... was found in forest than other landscape elements. In contrast, tree richness was higher in croplands in Boly Serere and Poukham Tock. Factors such as land-use, soil salinity and pH had significant effects on vegetation parameters. Local people had observed a general decline of woody plants....... This was confirmed by satellite imagery analysis. Satellite images showed losses tree cover and mangrove, and an increase in shrub and herbaceous covers and tans. Human activities and environmental factors (especially salinization) appear to be the main drivers of vegetation change. Overall, the vegetation change...

  8. Police corruption and the national security challenge in Nigeria: a study of Rivers State Police Command

    Directory of Open Access Journals (Sweden)

    Ngboawaji Daniel Nte

    2011-01-01

    Full Text Available This paper tries to make a modest attempt to examine the linkage between police corruption and national security in such a developing country like Nigeria. In doing this, the study selected Rivers State - a key state in the Niger Delta for specific analysis. The study employed a combination of qualitative and quantitative research approach to get an in-depth insight into the problem under study. A sample size of 200 was selected, while a 4-Likert questionnaire was administered to the selected respondents. The study found out that police corruption in Nigeria is structural as part of the wider web of corruption in Nigeria. It also showed that poor working conditions/ poverty are aggravating factors of police corruption in Nigeria. Furthermore, poor recruitment policies also contribute to police corruption. More so, the study found out that there is an inverse relationship between police corruption and national security in Nigeria. Finally, on the basis of these findings, the study offered useful recommendations that could help stem this social problem.

  9. Nevada National Security Site Environmental Report 2011 Attachment A: Site Description

    Energy Technology Data Exchange (ETDEWEB)

    Cathy Wills, ed.

    2012-09-12

    This attachment expands on the general description of the Nevada National Security Site (NNSS) presented in the Introduction to the Nevada National Security Site Environmental Report 2011. Included are subsections that summarize the site's geological, hydrological, climatological, and ecological setting and the cultural resources of the NNSS. The subsections are meant to aid the reader in understanding the complex physical and biological environment of the NNSS. An adequate knowledge of the site's environment is necessary to assess the environmental impacts of new projects, design and implement environmental monitoring activities for current site operations, and assess the impacts of site operations on the public residing in the vicinity of the NNSS. The NNSS environment contributes to several key features of the site that afford protection to the inhabitants of adjacent areas from potential exposure to radioactivity or other contaminants resulting from NNSS operations. These key features include the general remote location of the NNSS, restricted access, extended wind transport times, the great depths to slow-moving groundwater, little or no surface water, and low population density. This attachment complements the annual summary of monitoring program activities and dose assessments presented in the main body of this report.

  10. Arctic Security: An Adaptive Approach for a Changing Climate

    Science.gov (United States)

    2009-04-01

    that is most adaptable to change. —Charles Darwin This introductory section provides a brief overview of the problem addressed in this paper and the...temperatures to melting arctic icecaps, from lower crop yields to dying forests , from unforgiving hurricanes to unrelenting droughts, we have no

  11. Climate Change and Food Security: The View from Space

    Science.gov (United States)

    Brown, Molly E.

    2012-01-01

    Global satellite data provides information on land use, rainfall, soil moisture, vegetation vigor and crop yields. Process-based products allows transformation of these data into information that can be used to assess impact of weather on commodity prices and local economic health. Trends and impact of climate change

  12. Nevada National Security Site 2014 Data Report: Groundwater Monitoring Program Area 5 Radioactive Waste Management Site

    Energy Technology Data Exchange (ETDEWEB)

    Hudson, David [NSTec

    2015-02-19

    This report is a compilation of the groundwater sampling results from the Area 5 Radioactive Waste Management Site (RWMS) at the Nevada National Security Site, Nye County, Nevada. Groundwater samples from the aquifer immediately below the Area 5 RWMS have been collected and analyzed and static water levels have been measured in this aquifer since 1993. This report updates these data to include the 2014 results. Analysis results for leachate contaminants collected from the mixed-waste cell at the Area 5 RWMS (Cell 18) are also included. During 2014, groundwater samples were collected and static water levels were measured at three wells surrounding the Area 5 RWMS. Groundwater samples were collected at wells UE5PW-1, UE5PW-2, and UE5PW-3 on March 11 and August 12, 2014, and static water levels were measured at each of these wells on March 10, June 2, August 11, and October 14, 2014. Groundwater samples were analyzed for the following indicators of contamination: pH, specific conductance, total organic carbon, total organic halides, and tritium. General water chemistry (cations and anions) was also measured. Results from samples collected in 2014 are within the limits established by agreement with the Nevada Division of Environmental Protection for each analyte. The data from the shallow aquifer indicate that there has been no measurable impact to the uppermost aquifer from the Area 5 RWMS, and there were no significant changes in measured groundwater parameters compared to previous years. Leachate from above the primary liner of Cell 18 drains into a sump and is collected in a tank at the ground surface. Cell 18 began receiving waste in January 2011. Samples were collected from the tank when the leachate volume approached the 3,000-gallon tank capacity. Leachate samples have been collected 16 times since January 2011. During 2014, samples were collected on February 25, March 5, May 20, August 12, September 16, November 11, and December 16. Each leachate sample was

  13. Nevada National Security Site 2014 Data Report: Groundwater Monitoring Program Area 5 Radioactive Waste Management Site

    Energy Technology Data Exchange (ETDEWEB)

    Hudson, David [National Security Technologies, LLC. (NSTec), Las Vegas, NV (United States)

    2015-02-01

    This report is a compilation of the groundwater sampling results from the Area 5 Radioactive Waste Management Site (RWMS) at the Nevada National Security Site, Nye County, Nevada. Groundwater samples from the aquifer immediately below the Area 5 RWMS have been collected and analyzed and static water levels have been measured in this aquifer since 1993. This report updates these data to include the 2014 results. Analysis results for leachate contaminants collected from the mixed-waste cell at the Area 5 RWMS (Cell 18) are also included. During 2014, groundwater samples were collected and static water levels were measured at three wells surrounding the Area 5 RWMS. Groundwater samples were collected at wells UE5PW-1, UE5PW-2, and UE5PW-3 on March 11 and August 12, 2014, and static water levels were measured at each of these wells on March 10, June 2, August 11, and October 14, 2014. Groundwater samples were analyzed for the following indicators of contamination: pH, specific conductance, total organic carbon, total organic halides, and tritium. General water chemistry (cations and anions) was also measured. Results from samples collected in 2014 are within the limits established by agreement with the Nevada Division of Environmental Protection for each analyte. The data from the shallow aquifer indicate that there has been no measurable impact to the uppermost aquifer from the Area 5 RWMS, and there were no significant changes in measured groundwater parameters compared to previous years. Leachate from above the primary liner of Cell 18 drains into a sump and is collected in a tank at the ground surface. Cell 18 began receiving waste in January 2011. Samples were collected from the tank when the leachate volume approached the 3,000-gallon tank capacity. Leachate samples have been collected 16 times since January 2011. During 2014, samples were collected on February 25, March 5, May 20, August 12, September 16, November 11, and December 16. Each leachate sample was

  14. Water security, global change and land-atmosphere feedbacks.

    Science.gov (United States)

    Dadson, Simon; Acreman, Michael; Harding, Richard

    2013-11-13

    Understanding the competing pressures on water resources requires a detailed knowledge of the future water balance under uncertain environmental change. The need for a robust, scientifically rigorous evidence base for effective policy planning and practice has never been greater. Environmental change includes, but is not limited to, climate change; it also includes land-use and land-cover change, including deforestation for agriculture, and occurs alongside changes in anthropogenic interventions that are used in natural resource management such as the regulation of river flows using dams, which can have impacts that frequently exceed those arising in the natural system. In this paper, we examine the role that land surface models can play in providing a robust scientific basis for making resource management decisions against a background of environmental change. We provide some perspectives on recent developments in modelling in land surface hydrology. Among the range of current land surface and hydrology models, there is a large range of variability, which indicates that the specification and parametrization of several basic processes in the models can be improved. Key areas that require improvement in order to address hydrological applications include (i) the representation of groundwater in models, particularly at the scales relevant to land surface modelling, (ii) the representation of human interventions such as dams and irrigation in the hydrological system, (iii) the quantification and communication of uncertainty, and (iv) improved understanding of the impact on water resources availability of multiple use through treatment, recycling and return flows (and the balance of consumptive and conservative uses). Through a series of examples, we demonstrate that changes in water use could have important reciprocal impacts on climate over a wide area. The effects of water management decisions on climate feedbacks are only beginning to be investigated-they are

  15. A coastal foodscape: examining the relationship between changing fisheries and community food security on the west coast of Newfoundland

    Directory of Open Access Journals (Sweden)

    Kristen N. Lowitt

    2014-09-01

    Full Text Available Fisheries make vital contributions to food security and food security is an important part of fisheries governance. However, there are relatively few in-depth studies examining the consequences of collapsed and changing fisheries for the food security of coastal communities. In this case study I use the concept of the coastal foodscape to look at the relationship between changing fisheries and community food security in the Bonne Bay region on the west coast of Newfoundland. I examine the social-ecological interactions that compose the local food system and their changing relationship to community food security, and point to directions for developing a more resilient and democratic food system.

  16. The Cultivation of National Information Security Literacy%论国民信息安全素养的培养

    Institute of Scientific and Technical Information of China (English)

    罗力

    2012-01-01

    The paper analyzes information security,information security awareness,information literacy and information security literacy and finds that the information literacy education mainly focuses on the cultivation of information ability,ignoring the information security literacy education.The author thinks that information security literacy should include information security awareness,information security knowledge,information security ability and information ethics.He then points out the reason why the national information security literacy is low,and puts forward four effective ways in promoting national information security literacy,including promoting the construction of information security laws and regulations,paying attention to multi-layer cultivation system construction,strengthening the development of teachers and teaching resources,making all advantages from kinds of organizations.%对信息安全、信息安全意识、信息素养和信息安全素养进行剖析,发现目前信息素养教育仅重在信息能力的培养,而忽视信息安全素养教育。认为信息安全素养应该包括信息安全意识、信息安全知识、信息安全能力、信息伦理道德等内容。指出国民信息安全素养低下的主要原因,提出有效提升国民信息安全素养的4种途径:推进信息安全法规建设,注重多层次培养体系建设,加强师资队伍、教学资源开发,发挥各类组织优势。

  17. Program Management at the National Nuclear Security Administration Office of Defense Nuclear Security: A Review of Program Management Documents and Underlying Processes

    Energy Technology Data Exchange (ETDEWEB)

    Madden, Michael S.

    2010-05-01

    The scope of this paper is to review the National Nuclear Security Administration Office of Defense Nuclear Security (DNS) program management documents and to examine the underlying processes. The purpose is to identify recommendations for improvement and to influence the rewrite of the DNS Program Management Plan (PMP) and the documentation supporting it. As a part of this process, over 40 documents required by DNS or its stakeholders were reviewed. In addition, approximately 12 other documents produced outside of DNS and its stakeholders were reviewed in an effort to identify best practices. The complete list of documents reviewed is provided as an attachment to this paper.

  18. U.S. Global Change Research Program National Climate Assessment Global Change Information System

    Science.gov (United States)

    Tilmes, Curt

    2012-01-01

    The program: a) Coordinates Federal research to better understand and prepare the nation for global change. b) Priori4zes and supports cutting edge scientific work in global change. c) Assesses the state of scientific knowledge and the Nation s readiness to respond to global change. d) Communicates research findings to inform, educate, and engage the global community.

  19. Assessing Impacts of Climate Change on Food Security Worldwide

    Science.gov (United States)

    Rosenzweig, Cynthia E.; Antle, John; Elliott, Joshua

    2015-01-01

    The combination of a warming Earth and an increasing population will likely strain the world's food systems in the coming decades. Experts involved with the Agricultural Model Intercomparison and Improvement Project (AgMIP) focus on quantifying the changes through time. AgMIP, a program begun in 2010, involves about 800 climate scientists, economists, nutritionists, information technology specialists, and crop and livestock experts. In mid-September 2015, the Aspen Global Change Institute convened an AgMIP workshop to draft plans and protocols for assessing global- and regional-scale modeling of crops, livestock, economics, and nutrition across major agricultural regions worldwide. The goal of this Coordinated Global and Regional Integrated Assessments (CGRA) project is to characterize climate effects on large- and small-scale farming systems.

  20. Social Change and Anomie: A Cross-National Study

    Science.gov (United States)

    Zhao, Ruohui; Cao, Liqun

    2010-01-01

    We apply Durkheim's social transitional theory to explain the variation of anomie in 30 nations in the world. Combining data from two sources--the 1995 "World Values Survey and the United Nations University's World Income Inequality Database" or WIID--we test the hypothesis that rapid sociopolitical change at the structural level disrupts social…

  1. NIH's National Institute of Nursing Research Is Changing Lives

    Science.gov (United States)

    ... Current Issue Past Issues NIH's National Institute of Nursing Research Is Changing Lives Past Issues / Spring 2008 Table ... on. From childbirth to end-of-life care, nursing research is aimed at helping patients across the entire ...

  2. The National Agriculture Imagery Program Change 2002-2015

    Data.gov (United States)

    Farm Service Agency, Department of Agriculture — The National Agriculture Imagery Program Change 2002-2015 is a web mapping application hosted on the ArcGIS online FSA Organizational Subscription. This web...

  3. Strategic information security

    CERN Document Server

    Wylder, John

    2003-01-01

    Introduction to Strategic Information SecurityWhat Does It Mean to Be Strategic? Information Security Defined The Security Professional's View of Information Security The Business View of Information SecurityChanges Affecting Business and Risk Management Strategic Security Strategic Security or Security Strategy?Monitoring and MeasurementMoving Forward ORGANIZATIONAL ISSUESThe Life Cycles of Security ManagersIntroductionThe Information Security Manager's Responsibilities The Evolution of Data Security to Information SecurityThe Repository Concept Changing Job Requirements Business Life Cycles

  4. 76 FR 55693 - Privacy Act of 1974; Department of Homeland Security National Protection and Programs Directorate...

    Science.gov (United States)

    2011-09-08

    ... organizations; domestic security and emergency management officials; and private sector entities or individuals... governments and international organizations; domestic security and emergency management officials; and private... international officials; domestic security and emergency management officials; and private sector...

  5. 北极生态安全对中国国家安全的影响及应对策略%The Arctic ecological security impact on national security of China and strategy

    Institute of Scientific and Technical Information of China (English)

    杨振姣; 崔俊; 韩硕洋; 郭培清; 范洪颖

    2013-01-01

    随着全球气候变暖,北极冰盖正加速融化,北极环境正在酝酿重大变化.北极航道会在不远的将来开通,北极会成为全球新的战略竞技场,环北极国家对北极主权和资源的竞争加剧,全球生态安全面临着重大挑战.北极环境变化对中国国家安全产生的影响是复杂的:北极冰盖融化将使中国生态安全面临着危机;能源的发现为中国提供了机遇;北极航道的开通将使中国的国际航运和国际贸易从中受益.本文在综合分析北极气候变化的基础上,进一步探讨北极生态安全与中国国家安全的关系,并分析了北极生态安全对中国国家安全的影响、原因以及中国的应对策略.这对于我国应对北极环境政治,维护中国国家安全和塑造北极地区整体安全环境有着重要的现实意义和影响.%With global warming,the Arctic ice sheet is accelerated melting,and the Arctic environment is brewing a major change.Arctic waterway will be opened in the near future,the Arctic will become one of the new global strategic arena,Circumpolar nations increased competition on the Arctic sovereignty and resources,global ecological security will face significant challenges.The impact of Arctic environmental change on China's national security is complex:Melting of the Arctic ice cap will enable China ecological security to face a crisis;Arctic energy found provide opportunities for China;What's more,China's international shipping and trade will benefit from the opening of the Arctic waterway.Based on the comprehensive analysis of the Arctic climate change,further explore the relationship between the Arctic ecological security and national security,and to analyse the Arctic ecological security impact on national security of China,accompany with its causes and coping strategies.There is a realistic significance to deal with the Arctic environmental politics,safeguard China's national security and created the Arctic overall

  6. CRIMINAL LIABILITY FOR ORGANIZING TERRORIST COMMUNITY AND PARTICIPATION IN IT AS A DIRECTION NATIONAL SECURITY

    Directory of Open Access Journals (Sweden)

    Z. K. KONDRATENKO

    2016-01-01

    Full Text Available The aim of the present work is to develop a comprehensive scientific understanding of the criminal responsibility for a terrorist organization and community participation in it as the directions of national security. To achieve this goal the author was raised a number of scientific tasks, in particular the study of certain provisions of the National Security Strategy, the main threats to the state and public security of the Russian Federation, the main directions of ensuring state and public security, public areas and ensuring public safety. In the study, the author used scientific methods (hypothesis, analysis, synthesis, deduction, and induction, special used historical, legal and technical, interdisciplinary, comparative legal, system and other methods of scientific knowledge. The author researches of the problems of qualification of crimes related to the terrorist organization and community participation in it are discussed in detail. The article analyzes the modern jurisprudence on the application of Article 205.4 and 205.5 of the Criminal Code of the Russian Federation. The author examines the conditions of qualification criminal groups as a terrorist or terrorist organization community. The author comes to the conclusion about the need to improve the legal regulation of criminal responsibility for the commission of terrorist-related crimes. So, the author proposes to supplement the dispositions of article 205.4 of the Criminal Code of the Russian Federation indicating that the terrorist community a stable group of persons can be considered, united not only in Russia, but also in other states as well as international organizations, concerned other grounds specified in Art. 205.4 of the Criminal Code. The author considers it necessary to clarify the question of qualification of crimes under Art. 205.4 and 205.5 of the Criminal Code of the Russian Federation in the Resolution of the Plenum of the Russian

  7. Guidelines for development of NASA (National Aeronautics and Space Administration) computer security training programs

    Science.gov (United States)

    Tompkins, F. G.

    1983-01-01

    The report presents guidance for the NASA Computer Security Program Manager and the NASA Center Computer Security Officials as they develop training requirements and implement computer security training programs. NASA audiences are categorized based on the computer security knowledge required to accomplish identified job functions. Training requirements, in terms of training subject areas, are presented for both computer security program management personnel and computer resource providers and users. Sources of computer security training are identified.

  8. National Computer Security Conference (15th) held in Baltimore, Maryland on October 13-16, 1992. Volume 1: Proceedings

    Science.gov (United States)

    1992-10-16

    Security, Inc. XEROX Information Systems AT&T Bell Laboratories Referees Professor Sushil Jajodia John Keenan Dr. Richard Kemmerer Dr. Steven Kent...congratulate all who have earned these awards. in 15th National Computer Security Conference Table of Contents Refereed Papers 1 Accreditation: Is it...rules]. Eric Leighninger of DRC recommends the Backus Naur Form (BNF) for policy representation. Our earlier work[1] sketched several possible

  9. Computer Security Awareness Guide for Department of Energy Laboratories, Government Agencies, and others for use with Lawrence Livermore National Laboratory`s (LLNL): Computer security short subjects videos

    Energy Technology Data Exchange (ETDEWEB)

    1993-12-31

    Lonnie Moore, the Computer Security Manager, CSSM/CPPM at Lawrence Livermore National Laboratory (LLNL) and Gale Warshawsky, the Coordinator for Computer Security Education & Awareness at LLNL, wanted to share topics such as computer ethics, software piracy, privacy issues, and protecting information in a format that would capture and hold an audience`s attention. Four Computer Security Short Subject videos were produced which ranged from 1-3 minutes each. These videos are very effective education and awareness tools that can be used to generate discussions about computer security concerns and good computing practices. Leaders may incorporate the Short Subjects into presentations. After talking about a subject area, one of the Short Subjects may be shown to highlight that subject matter. Another method for sharing them could be to show a Short Subject first and then lead a discussion about its topic. The cast of characters and a bit of information about their personalities in the LLNL Computer Security Short Subjects is included in this report.

  10. Nevada National Security Site: Site-Directed Research and Development (SDRD) Fiscal Year 2015 Annual Report

    Energy Technology Data Exchange (ETDEWEB)

    Bender, Howard A. [National Security Technologies, LLC. (NSTec), Mercury, NV (United States). Site-Directed Research and Development Program

    2016-04-01

    This report presents results of multiple research projects, new and ongoing, funded under the Site-Directed Research and Development Program for the Nevada National Security Site during federal fiscal year 2015. The Site's legacy capabilities in remote sensing combined with new paradigms for emergency response and consequence management help drive the need to develop advanced aerial sensor platforms. Likewise, dynamic materials science is a critical area of scientific research for which basic physics issues are still unresolved. New methods of characterizing materials in extreme states are vitally needed, and these efforts are paving the way with new knowledge. Projects selected in FY 2015 for the Exploratory Research portfolio exhibit a strong balance of NNSS mission relevance. Geoscience, seismology, and techniques for detecting underground nuclear events are still essential focus areas. Many of the project reports in the second major section of this annual report are ongoing continuations in multi-year lifecycles. Diagnostic techniques for stockpile and nuclear security science figured prominently as well, with a few key efforts coming to fruition, such as phase transition detection. In other areas, modeling efforts toward better understanding plasma focus physics has also started to pay dividends for major program needs.

  11. National Security and International Policy Challenges in a Post Stuxnet World

    Directory of Open Access Journals (Sweden)

    Butrimas Vytautas

    2014-12-01

    Full Text Available The international community has focused too much on addressing cybercrime and cyber hacktivist questions. The list of usual suspects responsible for cyber incidents associated with attacks involving the theft of intellectual property, sensitive private data, money and disruption of web services unfortunately has grown beyond the attention seeking student hacker, cybercriminal or social hacktivist. The public appearance of the Stuxnet family of malware designed to destroy specifically targeted critical infrastructure components in June of 2010 gave perhaps the first indication that States have entered cyberspace as one of the perpetrators of malicious cyber activity. The problem of States actively preparing and executing cyber-attacks against the critical infrastructures of other States has been largely ignored by the international community. These attacks raise national security issues concerning threats to the economic and social well-being of States. However the pervasive presence of cyber space as the common environment where all modern industrial processes take place and the interrelations developed among the critical infrastructure of other States raise cross-border security issues as well. The international community must act in order to insure that the use of this new weapon by States will not get out of hand and be the cause of new and more serious international conflicts. Three solutions and a possible model are proposed to manage this disruptive activity of States in cyberspace at the international level.

  12. Underground Test Area Quality Assurance Project Plan Nevada National Security Site, Nevada, Revision 0

    Energy Technology Data Exchange (ETDEWEB)

    Irene Farnham

    2011-05-01

    This Quality Assurance Project Plan (QAPP) provides the overall quality assurance (QA) program requirements and general quality practices to be applied to the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Site Office (NNSA/NSO) Underground Test Area (UGTA) Sub-Project (hereafter the Sub-Project) activities. The requirements in this QAPP are consistent with DOE Order 414.1C, Quality Assurance (DOE, 2005); U.S. Environmental Protection Agency (EPA) Guidance for Quality Assurance Project Plans for Modeling (EPA, 2002); and EPA Guidance on the Development, Evaluation, and Application of Environmental Models (EPA, 2009). The QAPP Revision 0 supersedes DOE--341, Underground Test Area Quality Assurance Project Plan, Nevada Test Site, Nevada, Revision 4.

  13. Annual Storm Water Report for the Y-12 National Security Complex

    Energy Technology Data Exchange (ETDEWEB)

    Beck, G.S.

    2007-01-01

    The storm water pollution prevention program at the Y-12 National Security Complex consists of two primary elements: sampling and analysis of storm water run-off and routine inspections. When prescribed, the analytical data is compared to a set of cut-off concentration values to determine how the Y-12 Complex relates to other metal fabrication industries in the State of Tennessee. The latest set of inspection results revealed the Y-12 Complex has decreased the potential for storm water pollution by reducing the amount of raw materials, scrap metal and miscellaneous debris exposed to storm water. Future sampling/analysis and inspections are expected to have a continuing positive impact on storm water at the Y-12 Complex.

  14. Annual Storm Water Report for the Y-12 National Security Complex, Oak Ridge, Tennessee

    Energy Technology Data Exchange (ETDEWEB)

    Clean Water Compliance Section of the Environment Compliance Department

    2012-01-01

    The storm water pollution prevention program at the Y-12 National Security Complex (Y-12 Complex) intends to protect the quality of storm water runoff through: (1) reducing the exposure of metal accumulation areas to precipitation, (2) implementation of Best Management Practices, (3) sampling during rain events and subsequent analysis, and (4) routine surveillances. When prescribed, the analytical data is compared to a set of cut-off concentration values to determine how the Y-12 Complex relates to other metal fabrication industries in the state of Tennessee. The quality of the storm water exiting the Y-12 Complex via East Fork Poplar Creek indicated some improvement in 2011. This improvement is attributable to the completion of several construction, demolition and remediation projects which occurred in 2010 and 2011. Emphasis will continue to be placed on site inspections and the timely implementation of improved storm water control measures as deemed necessary.

  15. Annual Storm Water Report for the Y-12 National Security Complex Oak Ridge, Tennessee

    Energy Technology Data Exchange (ETDEWEB)

    Environment Compliance Department

    2012-01-01

    The storm water pollution prevention program at the Y-12 National Security Complex (Y-12 Complex) intends to protect the quality of storm water runoff through: (1) reducing the exposure of metal accumulation areas to precipitation, (2) implementation of Best Management Practices, (3) sampling during rain events and subsequent analysis, and (4) routine surveillances. When prescribed, the analytical data is compared to a set of cut-off concentration values to determine how the Y-12 Complex relates to other metal fabrication industries in the state of Tennessee. The quality of the storm water exiting the Y-12 Complex via East Fork Poplar Creek indicated some improvement in 2011. This improvement is attributable to the completion of several construction, demolition and remediation projects which occurred in 2010 and 2011. Emphasis will continue to be placed on site inspections and the timely implementation of improved storm water control measures as deemed necessary.

  16. Building a Data Warehouse for National Social Security Fund of the Republic of Tunisia

    CERN Document Server

    Gouider, Mohamed Salah; 10.5121/ijdms.2010.2207

    2010-01-01

    The amounts of data available to decision makers are increasingly important, given the network availability, low cost storage and diversity of applications. To maximize the potential of these data within the National Social Security Fund (NSSF) in Tunisia, we have built a data warehouse as a multidimensional database, cleaned, homogenized, historicized and consolidated. We used Oracle Warehouse Builder to extract, transform and load the source data into the Data Warehouse, by applying the KDD process. We have implemented the Data Warehouse as an Oracle OLAP. The knowledge extraction has been performed using the Oracle Discoverer tool. This allowed users to take maximum advantage of knowledge as a regular report or as ad hoc queries. We started by implementing the main topic for this public institution, accounting for the movements of insured persons. The great success that has followed the completion of this work has encouraged the NSSF to complete the achievement of other topics of interest within the NSSF. ...

  17. EMPOWERING NIGERIAN YOUTHS THROUGH TECHNICAL VOCATIONAL EDUCATION AND TRAINING FOR ENHANCING NATIONAL SECURITY

    Directory of Open Access Journals (Sweden)

    Caleb Chidozie Chinedu

    2015-06-01

    Full Text Available The Nigerian government had initiated several youth empowerment programmes through TVET, but a lot of these programmes lack structure and their impact not felt by the nation’s youths. This is evident in the substantial number of youth that still lack work skills-which often results to unemployment, insecurity, loss of lives and properties and chaos. The study therefore, sought to investigate, TVET empowerment skills required by youths as a means for enhancing national security. Descriptive survey research design was used and data was obtained using a structured questionnaire known as the Empowerment Skill Inventory Checklist (ESIC. Eighty five TVET lecturers in post-secondary vocational institutions took part in the study. Findings revealed that youths require vocational skills in areas such as horticulture, business, engineering and construction works. Also recommended techniques and strategies for career development that include specific skills such as business skills, financial management skills, basic computation skills, communication skills and adaptation skills.

  18. Guidelines for developing NASA (National Aeronautics and Space Administration) ADP security risk management plans

    Science.gov (United States)

    Tompkins, F. G.

    1983-01-01

    This report presents guidance to NASA Computer security officials for developing ADP security risk management plans. The six components of the risk management process are identified and discussed. Guidance is presented on how to manage security risks that have been identified during a risk analysis performed at a data processing facility or during the security evaluation of an application system.

  19. EU POLICY IN THE FIELD OF COMBATING ILLEGAL MIGRATION IN THE CONTEXT OF RUSSIAN NATIONAL SECURITY

    Directory of Open Access Journals (Sweden)

    L. O. SAMSONOVA

    2016-01-01

    Full Text Available The article is devoted to the issue date of uncontrolled illegal immigration into the European Union, which is a threat not only to EU Member States, but also the majority of nation states, which border with the European Union. The problem of research is extremely interesting, because in today's world, migration processes have put on the agenda of a number of issues, the solution of which depends on internal and external security of the majority of states in the world. As a result of increasing globalization and increased migration are increasingly affected by the scope of national and regional security of the European countries and neighboring states with him, including the Russian Federation. The author of the article the origins of European migration were analyzed, characteristics of immigration processes in the EU, cooperation between the EU Member States in the fight against illegal immigration, the European migratory crisis of 2015. The author notes that, without taking the necessary measures to political leadership of the EU, the risk of which is uncontrolled, illegal migration each year is still increasing. However, a quick and effective solution of population problems of illegal migration from Africa and Asia to the EU currently does not exist. Cited in the article sources confirm the basic ideas of the study

  20. Resonating, Rejecting, Reinterpreting: Mapping the Stabilization Discourse in the United Nations Security Council, 2000–14

    Directory of Open Access Journals (Sweden)

    David Curran

    2015-10-01

    Full Text Available This article charts the evolution of the conceptualisation of stabilization in the UN Security Council (UNSC during the period 2001–2014. UNSC open meetings provide an important dataset for a critical review of stabilization discourse and an opportunity to chart the positions of permanent Members, rotating Members and the UN Secretariat towards this concept. This article is the first to conduct an analysis of this material to map the evolution of stabilization in this critical chamber of the UN. This dataset of official statements will be complemented by a review of open source reporting on UNSC meetings and national stabilization doctrines of the ‘P3’ – France, the UK and the US. These countries have developed national stabilization doctrines predominantly to deal with cross-governmental approaches to counterinsurgency operations conducted during the 2000s. The article therefore presents a genealogy of the concept of stabilization in the UNSC to help understand implications for its future development in this multilateral setting. This article begins by examining efforts by the P3 to ‘upload’ their conceptualisations of stabilization into UN intervention frameworks. Secondly, the article uses a content analysis of UNSC debates during 2000–2014 to explore the extent to which the conceptualisation of stabilization resonated with other Council members, were rejected in specific contexts or in general, or were re-interpreted by member states to suit alternative security agendas and interests. Therefore, the article not only examines the UNSC debates surrounding existing UN ‘stabilization operations’ (MONUSCO, MINUSTAH, MINUSCA, MINUSMA, which could be regarded as evidence that this ‘western’ concept has resonated with other UNSC members and relevant UN agencies, but also documents the appearance of stabilization in other contexts too. The article opens new avenues of research into concepts of stabilization within the UN, and

  1. 4th Quarter Transportation Report FY 2014: Radioactive Waste Shipments to and from the Nevada National Security Site (NNSS)

    Energy Technology Data Exchange (ETDEWEB)

    Gregory, Louis [National Security Technologies, LLC. (NSTec), Mercury, NV (United States)

    2014-12-02

    This report satisfies the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Field Office (NNSA/NFO) commitment to prepare a quarterly summary report of radioactive waste shipments to and from the Nevada National Security Site (NNSS) Radioactive Waste Management Complex (RWMC) at Area 5. There were no shipments sent for offsite treatment and returned to the NNSS this quarter. There was one shipment of two drums sent for offsite treatment and disposal. This report summarizes the 4th quarter of Fiscal Year (FY) 2014 low-level radioactive waste (LLW) and mixed low-level radioactive waste (MLLW) shipments. This report also includes annual summaries for FY 2014.

  2. Transition-ready technologies and expertise from the Chemical and Biological National Security Program at LLNL

    Energy Technology Data Exchange (ETDEWEB)

    Folta, P A; McBride, M T

    2006-02-22

    HSARPA has initiated a new Bioinformatics and Assay Development solicitation, BIAD2 (BAA 06-01), to address a number of technology gaps and requirements for biodetection (www.hsarpabaa.com). This solicitation will leverage the vast research and development capabilities of the private sector and academia in order to meet the needs of HSARPA and Homeland Security. In order to meet these requirements, this solicitation will: (1) Develop and validate actionable assays for the public and private sector; (2) Develop and validate new assays and novel assay methodologies to enhance existing detection systems and enable future detection platforms; (3) Develop next generation assays which are robust against novel, emerging and engineered threats; (4) Develop novel assays that detect low levels of ribonucleic acid (RNA)-based viral threats in complex backgrounds; (5) Develop novel assays to characterize the viability, degree of virulence or toxicity, and countermeasure resistance of a biological agent; and (6) Develop new bioinformatics tools to support assay development and assay validation The Lawrence Livermore National Laboratory (LLNL) Bioassays and Signature Program (BSP) develops nationally-validated detection and identification assays to cover the full range of biological threat agents, starting from human, animal, and plant pathogens on the Select Agent list. The assays that have been co-developed by the CDC and the BSP are used internationally and represent the gold standard for molecular detection of select agent pathogens for the public health community. They are also used in the DHS environmental monitoring operations such as BioWatch and DHS National Security Special Events support. These reagents have been used to process and analyze more than 5 million samples and have delivered exceptional performance for the end users, with zero false positives since their deployment. Currently, highly-multiplexed nucleic acid assays that represent the &apos

  3. MAINTAINING HIGH RESOLUTION MASS SPECTROMETRY CAPABILITIES FOR NATIONAL NUCLEAR SECURITY ADMINISTRATION APPLICATIONS

    Energy Technology Data Exchange (ETDEWEB)

    Wyrick, S.; Cordaro, J.; Reeves, G.; Mcintosh, J.; Mauldin, C.; Tietze, K.; Varble, D.

    2011-06-06

    The Department of Energy (DOE) National Nuclear Security Administration (NNSA) has a specialized need for analyzing low mass gas species at very high resolutions. The currently preferred analytical method is electromagnetic sector mass spectrometry. This method allows the NNSA Nuclear Security Enterprise (NSE) to resolve species of similar masses down to acceptable minimum detection limits (MDLs). Some examples of these similar masses are helium-4/deuterium and carbon monoxide/nitrogen. Through the 1980s and 1990s, there were two vendors who supplied and supported these instruments. However, with declining procurements and down turns in the economy, the supply of instruments, service and spare parts from these vendors has become less available, and in some cases, nonexistent. The largest NSE user of this capability is the Savannah River Site (SRS), located near Aiken, South Carolina. The Research and Development Engineering (R&DE) Group in the Savannah River National Laboratory (SRNL) investigated the areas of instrument support that were needed to extend the life cycle of these aging instruments. Their conclusions, as to the focus areas of electromagnetic sector mass spectrometers to address, in order of priority, were electronics, software and hardware. Over the past 3-5 years, the R&DE Group has designed state of the art electronics and software that will allow high resolution legacy mass spectrometers, critical to the NNSA mission, to be operated for the foreseeable future. The funding support for this effort has been from several sources, including the SRS Defense Programs, NNSA Readiness Campaign, Pantex Plant and Sandia National Laboratory. To date, electronics systems have been upgraded on one development system at SRNL, two production systems at Pantex and one production system at Sandia National Laboratory. An NSE working group meets periodically to review strategies going forward. The R&DE Group has also applied their work to the electronics for a

  4. Lawrence Livermore National Laboratory Safeguards and Security quarterly progress report ending March 31, 1996

    Energy Technology Data Exchange (ETDEWEB)

    Davis, B.; Davis, G.; Johnson, D.; Mansur, D.L.; Ruhter, W.D.; Strait, R.S.

    1996-04-01

    LLNL carries out safeguards and security activities for DOE Office of Safeguards and Security (OSS) and other organizations within and outside DOE. LLNL is supporting OSS in 6 areas: safeguards technology, safeguards and materials accountability, computer security--distributed systems, complex-wide access control, standardization of security systems, and information technology and security center. This report describes the activities in each of these areas.

  5. Report on Progress Toward Security and Stability in Afghanistan and United States Plan for Sustaining the Afghanistan National Security Forces

    Science.gov (United States)

    2011-04-01

    challenging security situation. In a recent development, President Karzai expressed his concern that PRTs are “parallel structures” competing with the...sanitation, hygiene, clean potable water, and indoor air pollution. MoPH is also concentrating its efforts on increasing the number of nurses, midwives

  6. Giving Back: Collaborations with Others in Ecological Studies on the Nevada National Security Site

    Energy Technology Data Exchange (ETDEWEB)

    Scott A. Wade (NFO); Kathryn S. Knapp (NFO); Cathy A. Wills (NSTec)

    2013-02-24

    Formerly named the Nevada Test Site, the Nevada National Security Site (NNSS) was the historical site for nuclear weapons testing from the 1950s to the early 1990s. The site was renamed in 2010 to reflect the diversity of nuclear, energy, and homeland security activities now conducted at the site. Biological and ecological programs and research have been conducted on the site for decades to address the impacts of radiation and to take advantage of the relatively undisturbed and isolated lands for gathering basic information on the occurrence and distribution of native plants and animals. Currently, the Office of the Assistant Manager for Environmental Management of the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Site Office (NNSA/NSO) oversees the radiological biota monitoring and ecological compliance programs on the NNSS. The top priority of these programs are compliance with federal and state regulations. They focus on performing radiological dose assessments for the public who reside near the NNSS and for populations of plants and animals on the NNSS and in protecting important species and habitat from direct impacts of mission activities. The NNSS serves as an invaluable outdoor laboratory. The geographic and ecological diversity of the site offers researchers many opportunities to study human influences on ecosystems. NNSA/NSO has pursued collaborations with outside agencies and organizations to be able to conduct programs and studies that enhance radiological biota monitoring and ecosystem preservation when budgets are restrictive, as well as to provide valuable scientific information to the human health and natural resource communities at large. NNSA/NSO is using one current collaborative study to better assess the potential dose to the off-site public from the ingestion of game animals, the most realistic pathway for off-site public exposure at this time from radionuclide contamination on the NNSS. A second

  7. Food security in the Asia-Pacific: climate change, phosphorus, ozone and other environmental challenges.

    Science.gov (United States)

    Butler, Colin D

    2009-01-01

    This is the second of two articles on challenges to future food security in the Asia Pacific region. It focuses on five mechanisms, which can be conceptualised as pathways by which pessimistic Malthusian scenarios, described in the first paper, may become manifest. The mechanisms are (1) climate change, (2) water scarcity, (3) tropospheric ozone pollution, (4) impending scarcity of phosphorus and conventional oil and (5) the possible interaction between future population displacement, conflict and poor governance. This article concludes that a sustainable improvement in food security requires a radical transformation in society's approach to the environment, population growth, agricultural research and the distribution of rights, opportunities and entitlements.

  8. Security an introduction

    CERN Document Server

    Purpura, Philip P

    2011-01-01

    Section I The History and Profession of SecurityDefinition, Role, and History of Security Security Defined The Contexts of Security The Roles of Security The History of Security Security in an Environment of Threats, Terrorism, and All-Hazards Threats and Hazards Terrorism National Strategies The Profession and Business of Security The Business of Security Professionalism and Security Associations Ethics Regulation of the Security Industry Security Training Higher Education Careers Section II Protecting People and AssetsSecurity Methodology Methodology Defined Security Business Proposals Secur

  9. The National Military Strategy of the United States of America 2015: The United States Military’s Contribution to National Security

    Science.gov (United States)

    2015-06-01

    our security relationship with India and build upon our partnerships with New Zealand, Singapore, Indonesia, Malaysia , Vietnam, and Bangladesh. Such...strengthening our military family . This requires cultivating a professional climate that 15 reinforces our respect for core values, promotes...Nation against asymmetric threats. To improve institutional agility, we are expanding relations with American businesses , including many of the

  10. Underground Test Area Fiscal Year 2012 Annual Quality Assurance Report Nevada National Security Site, Nevada, Revision 0

    Energy Technology Data Exchange (ETDEWEB)

    Farnham, Irene [Navarro-Intera, LLC (N-I), Las Vegas, NV (United States); Marutzky, Sam [Navarro-Intera, LLC (N-I), Las Vegas, NV (United States)

    2013-01-01

    This report is mandated by the Underground Test Area (UGTA) Quality Assurance Project Plan (QAPP) and identifies the UGTA quality assurance (QA) activities for fiscal year (FY) 2012. All UGTA organizations—U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Site Office (NNSA/NSO); Desert Research Institute (DRI); Lawrence Livermore National Laboratory (LLNL); Los Alamos National Laboratory (LANL); Navarro-Intera, LLC (N-I); National Security Technologies, LLC (NSTec); and the U.S. Geological Survey (USGS)—conducted QA activities in FY 2012. The activities included conducting assessments, identifying findings and completing corrective actions, evaluating laboratory performance, revising the QAPP, and publishing documents. In addition, processes and procedures were developed to address deficiencies identified in the FY 2011 QAPP gap analysis.

  11. Underground Test Area Fiscal Year 2013 Annual Quality Assurance Report Nevada National Security Site, Nevada, Revision 0

    Energy Technology Data Exchange (ETDEWEB)

    Krenzien, Susan [Navarro-Intera, LLC (N-I), Las Vegas, NV (United States); Marutzky, Sam [Navarro-Intera, LLC (N-I), Las Vegas, NV (United States)

    2014-01-01

    This report is required by the Underground Test Area (UGTA) Quality Assurance Plan (QAP) and identifies the UGTA quality assurance (QA) activities for fiscal year (FY) 2013. All UGTA organizations—U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Field Office (NNSA/NFO); Desert Research Institute (DRI); Lawrence Livermore National Laboratory (LLNL); Los Alamos National Laboratory (LANL); Navarro-Intera, LLC (N-I); National Security Technologies, LLC (NSTec); and the U.S. Geological Survey (USGS)—conducted QA activities in FY 2013. The activities included conducting assessments, identifying findings and completing corrective actions, evaluating laboratory performance, and publishing documents. In addition, integrated UGTA required reading and corrective action tracking was instituted.

  12. Long-term energy security in a national scale using LEAP. Application to de-carbonization scenarios in Andorra

    Science.gov (United States)

    Travesset-Baro, Oriol; Jover, Eric; Rosas-Casals, Marti

    2016-04-01

    This paper analyses the long-term energy security in a national scale using Long-range Energy Alternatives Planning System (LEAP) modelling tool. It builds the LEAP Andorra model, which forecasts energy demand and supply for the Principality of Andorra by 2050. It has a general bottom-up structure, where energy demand is driven by the technological composition of the sectors of the economy. The technological model is combined with a top-down econometric model to take into account macroeconomic trends. The model presented in this paper provides an initial estimate of energy demand in Andorra segregated into all sectors (residential, transport, secondary, tertiary and public administration) and charts a baseline scenario based on historical trends. Additional scenarios representing different policy strategies are built to explore the country's potential energy savings and the feasibility to achieve the Intended Nationally Determined Contribution (INDC) submitted in April 2015 to UN. In this climatic agreement Andorra intends to reduce net greenhouse gas emissions (GHG) by 37% as compared to a business-as-usual scenario by 2030. In addition, current and future energy security is analysed in this paper under baseline and de-carbonization scenarios. Energy security issues are assessed in LEAP with an integrated vision, going beyond the classic perspective of security of supply, and being closer to the sustainability's integrative vision. Results of scenarios show the benefits of climate policies in terms of national energy security and the difficulties for Andorra to achieving the de-carbonization target by 2030.

  13. Annual Storm Water Report for the Y-12 National Security Complex Oak Ridge, Tennessee

    Energy Technology Data Exchange (ETDEWEB)

    None

    2013-12-01

    This is the second annual storm water report prepared in accordance with the National Pollutant Discharge Elimination System (NPDES) permit issued to the Y-12 National Security Complex (Y-12 Complex) on December 1, 2011, and the corresponding Y-12 Storm Water Pollution Prevention Plan (SWP3) which became effective on September 7, 2012. However, Appendix A does contain some analytical data gathered under the previous NPDES permit and SWP3 for comparison purposes. The quality of storm water exiting the Y-12 Complex via East Fork Poplar Creek remained relatively stable from 2012 to 2013. However, there was one largely unexpected high concentration of mercury noted in an area that is not known to have previously been a mercury use area. This was noted in Sector AA, Outfall 014. This outfall is normally sampled on a rotating basis but, due this elevated concentration, will be sampled again in 2014. The Y-12 Complex will continue to implement appropriate BMPs and reduce outside material storage ares where possible. Emphasis will continue to be placed on site inspections and timely implementation of proper storm water control measures.

  14. Precipitation Depth-Duration-Frequency Analysis for the Nevada National Security Site and Surrounding Areas

    Energy Technology Data Exchange (ETDEWEB)

    Chen, Li [Desert Research Inst. (DRI), Las Vegas, NV (United States). Division of Hydrologic Sciences; Miller, Julianne J. [Desert Research Inst. (DRI), Las Vegas, NV (United States). Division of Hydrologic Sciences

    2016-08-01

    Accurate precipitation frequency data are important for Environmental Management Soils Activities on the Nevada National Security Site (NNSS). These data are important for environmental assessments performed for regulatory closure of Soils Corrective Action Unit (CAU) Sites, as well as engineering mitigation designs and post-closure monitoring strategies to assess and minimize potential contaminant migration from Soils CAU Sites. Although the National Oceanic and Atmospheric Administration (NOAA) Atlas 14 (Bonnin et al., 2011) provides precipitation frequency data for the NNSS area, the NNSS-specific observed precipitation data were not consistent with the NOAA Atlas 14 predicted data. This is primarily due to the NOAA Atlas 14 products being produced from analyses without including the approximately 30 NNSS precipitation gage records, several of which approach or exceed 50 year of record. Therefore, a study of precipitation frequency that incorporated the NNSS precipitation gage records into the NOAA Atlas 14 dataset, was performed specifically for the NNSS to derive more accurate site-specific precipitation data products. Precipitation frequency information, such as the depth-duration-frequency (DDF) relationships, are required to generate synthetic standard design storm hydrographs and assess actual precipitation events. In this study, the actual long-term NNSS precipitation gage records, some of which are the longest gage records in southern and central Nevada, were analyzed to allow for more accurate precipitation DDF estimates to be developed for the NNSS. Gridded maps of precipitation frequency for the NNSS and surrounding areas were then produced.

  15. Marking the enemy, marking the other : the intersection of national security and diversity.

    Energy Technology Data Exchange (ETDEWEB)

    Wilson, G. D. (Gregory D.)

    2001-01-01

    In recent years, Los Alamos National Laboratory (LANL) has alternately been criticized for being too cozy with foreign scientists and too quick to scapegoat or profile workers with foreign ancestries. In the wake of the investigation of alleged espionage that focused on Taiwanese-born American nuclear scientist Wen Ho Lee, political leaders and the news media questioned the Lab's commitment to security and the wisdom of its close collaborations with foreign scientists. Wen Ho Lee was of course an American citizen and not a foreign scientist, and many of his supporters felt that his Asian ancestry made him too convenient of a target in a case focused on Chinese espionage. Thus, charges of racial profiling and scapegoating were also aimed at the Lab, the Department of Energy, and the Federal Bureau of Investigation. In the wake of the controversy some Asian American groups have been encouraging a boycott of the national laboratories run by the Department of Energy, and at Los Alamos, the number of Asian Americans applying for jobs, post docs, and student positions is substantially down.

  16. Climate Change Education Roundtable: A Coherent National Strategy

    Science.gov (United States)

    Storksdieck, M.; Feder, M.; Climate Change Education Roundtable

    2010-12-01

    The Climate Change Education (CCE) Roundtable fosters ongoing discussion of the challenges to and strategies for improving public understanding of climate science and climate change among federal agencies, the business community, non-profit, and academic sectors. The CCE Roundtable is provides a critical mechanism for developing a coherent, national strategy to advance climate change education guided by the best available research evidence. Through its meetings and workshops, the roundtable brings together 30 federal and state policymakers, educators, communications and media experts, and members from the business and scientific community. The roundtable includes a number of ex officio members from federal agencies with dedicated interests in climate change education, including officials from the National Science Foundation’s EHR Directorate and its collaborating partner divisions, the National Oceanic and Atmospheric Administration (NOAA), the National Aeronautics and Space Administration (NASA), the Department of Interior, the Department of Energy, and the Department of Education. The issues that are addressed by the roundtable include: - ways to incorporate knowledge about learning and understanding in developing informative programs and materials for decision-makers who must cope with climate change - the design of educational programs for professionals such as local planners, water managers, and the like, to enable them to better understand the implications of climate change for their decisions - development of training programs for scientists to help them become better communicators to decision-makers about implications of, and solutions to climate change - coordinated and collaborative efforts at the national level between federal agencies and other stakeholders This presenation will describe how the roundtable is fostering a coherent direction for climate change education.

  17. Summing Up 70 Years of the United Nations: Differences on Whether the UN Security Council Has Legislative Powers

    Directory of Open Access Journals (Sweden)

    Elena Genyushkina

    2016-11-01

    Full Text Available For 70 years the United Nations has not fully clarified what kind of decision constitutes a resolution made by its Security Council (UNSC under Chapter VII of the UN Charter. When is a resolution legitimate and when does it extend beyond the UNSC’s mandate? Can a resolution be mandatory as well as supplementary, or can it change the norms of international law, which operate outside the UN. The vast majority of resolutions are intended to solve a specific situation that threatens international peace and security. Russian and foreign scholars refer to the same documents and decisions of international judicial bodies, but interpret them differently. In this article the author analyzes arguments about the existence of the UNSC’s legislative powers, using a comparative analysis formulated for this purpose. Obligations arising from article 25 of the Charter apply only to UNSC decisions adopted for implementing or controlling existing norms of international law and not newly formulated norms. Article 103 is intended for obligations under the UNCharter, and not for acts made pursuant to basic documents. The Charter does not allow the UNSC to make decisions that require acts and at the same time add or modify international law. The UNSC can create subsidiary bodies that extend the scope of discussions related to threats to peace and security, but cannot change the limits of the use of enforcement measures under articles 41 and 42. The Counter-Terrorism Committee, created by Resolution 1373 (2001, supports UN members’ sovereign efforts to prevent terrorism and the 1540 Committee helps members prevent the trafficking of nuclear material and the use of nuclear, chemical or biological weapons. There is no evidence of any customary rule of international law based on UNSC decisions. The author refutes the claim that Resolutions 1373 (2001 and 1540 (2004 support the universal agreement associated with the Counter-Terrorism Committee or the 1540 Committee

  18. RESPONSES OF WETLAND ECO-SECURITY TO LAND USE CHANGE IN WESTERN JILIN PROVINCE, CHINA

    Institute of Scientific and Technical Information of China (English)

    WANG Zhi-qiang; ZHANG Bai; YANG Guang; WANG Zong-ming; ZHANG Shu-qing

    2005-01-01

    By the use of the software of ARCGIS, dynamic changes of the landscape elements, landscape structure,conversion processes of the landscape gradients and the responses of wetland eeo-security to land use/cover changes (LUCC) in the western Jilin Province were studied from 1930 to 2000. The results show that the landscape elements of grassland, wetland, forestland and water area shrank rapidly, and wetlands underwent huge losses in the study period due to the conversion from wetland into arable land and grassland in large quantities. The responses of wetland eco-security to LUCC were inverse evolvement of wetland vegetation, loss of biodiversity, water deficiency in wetland ecosystem, the changes of the heterogeneity of wetlands and the fragmentation of the wetland habitats. Suggestions were given for protection of wetlands and the regional sustainable development.

  19. 40 CFR 1068.225 - What are the provisions for exempting engines/equipment for national security?

    Science.gov (United States)

    2010-07-01

    ... PROTECTION AGENCY (CONTINUED) AIR POLLUTION CONTROLS GENERAL COMPLIANCE PROVISIONS FOR ENGINE PROGRAMS... following items: (1) The label heading “EMISSION CONTROL INFORMATION”. (2) Your corporate name and trademark... ENGINE HAS AN EXEMPTION FOR NATIONAL SECURITY UNDER 40 CFR 1068.225.” (ii) “THIS EQUIPMENT HAS...

  20. 10 CFR 2.908 - Contents of notice of intent to introduce restricted data or other national security information.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 1 2010-01-01 2010-01-01 false Contents of notice of intent to introduce restricted data or other national security information. 2.908 Section 2.908 Energy NUCLEAR REGULATORY COMMISSION RULES OF PRACTICE FOR DOMESTIC LICENSING PROCEEDINGS AND ISSUANCE OF ORDERS Special Procedures Applicable to Adjudicatory Proceedings...

  1. 10 CFR 2.906 - Obligation of parties to avoid introduction of restricted data or national security information.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 1 2010-01-01 2010-01-01 false Obligation of parties to avoid introduction of restricted data or national security information. 2.906 Section 2.906 Energy NUCLEAR REGULATORY COMMISSION RULES OF PRACTICE FOR DOMESTIC LICENSING PROCEEDINGS AND ISSUANCE OF ORDERS Special Procedures Applicable to Adjudicatory Proceedings Involving...

  2. 78 FR 32241 - U.S. Air Force Seeks Industry Input for National Security Space Launch Assessment

    Science.gov (United States)

    2013-05-29

    ... Department of the Air Force U.S. Air Force Seeks Industry Input for National Security Space Launch Assessment AGENCY: Office of the Deputy Under Secretary of the Air Force for Space, Department of the Air Force, DOD..., Office of the Deputy Under Secretary of the Air Force for Space, seeks industry views and perspectives...

  3. Distance Learning for Food Security and Rural Development: A Perspective from the United Nations Food and Agriculture Organization.

    Science.gov (United States)

    McLean, Scott; Gasperini, Lavinia; Rudgard, Stephen

    2002-01-01

    The distance learning experiences of the United Nations Food and Agriculture Organization led to the following suggestions for applying distance learning strategies to the challenges of food security and rural development: use distance learning for the right reasons, be sensitive to context, use existing infrastructure, engage stakeholders, and…

  4. National Defense Education and Innovation Initiative: Meeting America's Economic and Security Challenges in the 21st Century

    Science.gov (United States)

    Association of American Universities, 2006

    2006-01-01

    The Association of American Universities (AAU) calls on the Administration, Congress, and academia, with the help of the business sector, to implement a 21st Century National Defense Education and Innovation Initiative aimed at meeting the economic and security challenges we will face over the next half-century. Government and America's…

  5. 47 CFR Appendix A to Part 64 - Telecommunications Service Priority (TSP) System for National Security Emergency Preparedness (NSEP)

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 3 2010-10-01 2010-10-01 false Telecommunications Service Priority (TSP) System for National Security Emergency Preparedness (NSEP) A Appendix A to Part 64 Telecommunication... RELATING TO COMMON CARRIERS Pt. 64, App. A Appendix A to Part 64—Telecommunications Service Priority...

  6. Impacts of the Climate Change on Agricultural Food Security, Traditional Knowledge and Agroecology

    Directory of Open Access Journals (Sweden)

    Murat Türkeş

    2014-02-01

    Full Text Available This paper focuses mainly on both impacts of the climate change on agriculture and food security, and multidisciplinary scientific assessment and recommendations for sustainable agro ecological solutions including traditional knowledge responding to these impacts. The climate change will very likely affect four key dimensions of the food security including availability, accessibility, utilization and sustainability of the food, due to close linkage between food and water security and climate change. In one of the most comprehensive model studies simulating impacts of global climate change on agriculture to date, it was estimated that by 2080, in a business-as-usual scenario, climate change will reduce the potential output of global agriculture by more than 3.2 per cent. Furthermore, developing countries will suffer the most with a potential 9.1 per cent decline in agricultural output, for example with a considerable decrease of 16.6 per cent in Africa. Some comprehensive studies pointed out also that all regions may experience significant decreases in crop yields as well as significant increases, depending on emission scenarios and the assumptions on effectiveness of carbon dioxide (CO2 fertilization. One of the tools that would ensure the food security by making use of local sources and traditional knowledge is agroecology. Agroecology would contribute to mitigation of the anthropogenic climate change and cooling down the Earth’s increasing surface and lower atmospheric air temperatures, because it is mainly labour-intensive and requires little uses of fossil fuels, energy and artificial fertilisers. It is also necessary to understand the ecological mechanisms underlying sustainability of traditional farming systems, and to translate them into ecological principles that make locally available and appropriate approaches and techniques applicable to a large number of farmers.

  7. United States Department of Energy National Nuclear Security Administration Sandia Field Office NESHAP Annual Report CY2014 for Sandia National Laboratories New Mexico

    Energy Technology Data Exchange (ETDEWEB)

    evelo, stacie [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Miller, Mark L. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2015-05-01

    This report provides a summary of the radionuclide releases from the United States (U.S.) Department of Energy (DOE) National Nuclear Security Administration facilities at Sandia National Laboratories, New Mexico (SNL/NM) during Calendar Year (CY) 2014, including the data, calculations, and supporting documentation for demonstrating compliance with 40 Code of Federal Regulation (CFR) 61, Subpart H--NATIONAL EMISSION STANDARDS FOR EMISSIONS OF RADIONUCLIDES OTHER THAN RADON FROM DEPARTMENT OF ENERGY FACILITIES. A description is given of the sources and their contributions to the overall dose assessment. In addition, the maximally exposed individual (MEI) radiological dose calculation and the population dose to local and regional residents are discussed.

  8. Food Security Hotspots in India under Changing Climate and Growing Populatio

    Science.gov (United States)

    Singh, N.; Cherkauer, K. A.; Ashfaq, M.; Rastogi, D.

    2015-12-01

    Global climate change, unprecedented population growth, and rapid urbanization have elevated the possibility of food and water shortages in many regions across the world. The likelihood of such shortages in the future is further exacerbated by the fact that increased greenhouse forcing and rapid growth in human population will continue for at least the next several decades. These socio-environmental changes will likely put some regions under enormous economic and environmental stress by forcing them to adapt to new conditions. India with its rapidly growing population and high rates of urbanization and industrialization is one such region whose agricultural resources will be particularly vulnerable to the impact of these changes. This study collectively reviews and analyses the possible impacts of climate change, population growth and resulting land use change on the availability of food and water in the coming decades for India. By analyzing and fusing a wide variety of existing data and research on the impact of land use change, population, and climate change, on water and food resources this study develops an understanding of the broader implications of each of the changes on food security in the region. In addition, the study focuses on the need to assess and quantify the combination of such impacts at a regional level and identify food security hotspots spatially across India that will help to narrow down regions in the country which will be severely affected and need priority adaptation and mitigation measures.

  9. 76 FR 10262 - Information Security Program

    Science.gov (United States)

    2011-02-24

    ... 46 CFR Part 503 RIN 3072-AC40 Information Security Program AGENCY: Federal Maritime Commission... relating to its Information Security Program to reflect the changes implemented by Executive Order 13526--Classified National Security Information--that took effect January 5, 2010, and which prescribes a...

  10. Lawrence Livermore National Laboratory safeguards and security quarterly progress report to the US Department of Energy quarter ending September 30, 1994

    Energy Technology Data Exchange (ETDEWEB)

    Davis, G.; Mansur, D.L.; Ruhter, W.D.; Steele, E.; Strait, R.S.

    1994-10-01

    This report presents the details of the Lawrence Livermore National Laboratory safeguards and securities program. This program is focused on developing new technology, such as x- and gamma-ray spectrometry, for measurement of special nuclear materials. This program supports the Office of Safeguards and Securities in the following five areas; safeguards technology, safeguards and decision support, computer security, automated physical security, and automated visitor access control systems.

  11. Soil Management Plan for the Oak Ridge Y-12 National Security Complex Oak Ridge, Tennessee

    Energy Technology Data Exchange (ETDEWEB)

    None

    2005-03-02

    This Soil Management Plan applies to all activities conducted under the auspices of the National Nuclear Security Administration (NNSA) Oak Ridge Y-12 National Security Complex (Y-12) that involve soil disturbance and potential management of waste soil. The plan was prepared under the direction of the Y-12 Environmental Compliance Department of the Environment, Safety, and Health Division. Soil disturbances related to maintenance activities, utility and building construction projects, or demolition projects fall within the purview of the plan. This Soil Management Plan represents an integrated, visually oriented, planning and information resource tool for decision making involving excavation or disturbance of soil at Y-12. This Soil Management Plan addresses three primary elements. (1) Regulatory and programmatic requirements for management of soil based on the location of a soil disturbance project and/or the regulatory classification of any contaminants that may be present (Chap. 2). Five general regulatory or programmatic classifications of soil are recognized to be potentially present at Y-12; soil may fall under one or more these classifications: (a) Comprehensive Environmental Response, Compensation, and Liability Act (CERCLA) pursuant to the Oak Ridge Reservation (ORR) Federal Facilities Agreement; (b) Resource Conservation and Recovery Act (RCRA); (c) RCRA 3004(u) solid waste managements units pursuant to the RCRA Hazardous and Solid Waste Amendments Act of 1984 permit for the ORR; (d) Toxic Substances and Control Act-regulated soil containing polychlorinated biphenyls; and (e) Radiologically contaminated soil regulated under the Atomic Energy Act review process. (2) Information for project planners on current and future planned remedial actions (RAs), as prescribed by CERCLA decision documents (including the scope of the actions and remedial goals), land use controls implemented to support or maintain RAs, RCRA post-closure regulatory requirements for

  12. Closure Report for Corrective Action Unit 547: Miscellaneous Contaminated Waste Sites, Nevada National Security Site, Nevada

    Energy Technology Data Exchange (ETDEWEB)

    NSTec Environmental Restoration

    2012-07-17

    This Closure Report (CR) presents information supporting closure of Corrective Action Unit (CAU) 547, Miscellaneous Contaminated Waste Sites, and provides documentation supporting the completed corrective actions and confirmation that closure objectives for CAU 547 were met. This CR complies with the requirements of the Federal Facility Agreement and Consent Order (FFACO) that was agreed to by the State of Nevada; the U.S. Department of Energy (DOE), Environmental Management; the U.S. Department of Defense; and DOE, Legacy Management (FFACO, 1996 as amended). CAU 547 consists of the following three Corrective Action Sites (CASs), located in Areas 2, 3, and 9 of the Nevada National Security Site: (1) CAS 02-37-02, Gas Sampling Assembly; (2) CAS 03-99-19, Gas Sampling Assembly; AND (3) CAS 09-99-06, Gas Sampling Assembly Closure activities began in August 2011 and were completed in June 2012. Activities were conducted according to the Corrective Action Decision Document/Corrective Action Plan (CADD/CAP) for CAU 547 (U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office [NNSA/NSO], 2011). The recommended corrective action for the three CASs in CAU 547 was closure in place with administrative controls. The following closure activities were performed: (1) Open holes were filled with concrete; (2) Steel casings were placed over vertical expansion joints and filled with cement; (3) Engineered soil covers were constructed over piping and exposed sections of the gas sampling system components; (4) Fencing, monuments, Jersey barriers, radiological postings, and use restriction (UR) warning signs were installed around the perimeters of the sites; (5) Housekeeping debris was picked up from around the sites and disposed; and (6) Radiological surveys were performed to confirm final radiological postings. UR documentation is included in Appendix D. The post-closure plan was presented in detail in the CADD/CAP for CAU 547 and is included as

  13. Closure Report for Corrective Action Unit 562: Waste Systems, Nevada National Security Site, Nevada

    Energy Technology Data Exchange (ETDEWEB)

    NSTec Environmental Restoration

    2012-08-15

    This Closure Report (CR) presents information supporting closure of Corrective Action Unit (CAU) 562, Waste Systems, and provides documentation supporting the completed corrective actions and confirmation that closure objectives for CAU 562 were met. This CR complies with the requirements of the Federal Facility Agreement and Consent Order (FFACO) that was agreed to by the State of Nevada; the U.S. Department of Energy (DOE), Environmental Management; the U.S. Department of Defense; and DOE, Legacy Management (FFACO, 1996 as amended). CAU 562 consists of the following 13 Corrective Action Sites (CASs), located in Areas 2, 23, and 25 of the Nevada National Security Site: · CAS 02-26-11, Lead Shot · CAS 02-44-02, Paint Spills and French Drain · CAS 02-59-01, Septic System · CAS 02-60-01, Concrete Drain · CAS 02-60-02, French Drain · CAS 02-60-03, Steam Cleaning Drain · CAS 02-60-04, French Drain · CAS 02-60-05, French Drain · CAS 02-60-06, French Drain · CAS 02-60-07, French Drain · CAS 23-60-01, Mud Trap Drain and Outfall · CAS 23-99-06, Grease Trap · CAS 25-60-04, Building 3123 Outfalls Closure activities began in October 2011 and were completed in April 2012. Activities were conducted according to the Corrective Action Plan for CAU 562 (U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office [NNSA/NSO], 2011). The corrective actions included No Further Action and Clean Closure. Closure activities generated sanitary waste and hazardous waste. Some wastes exceeded land disposal limits and required offsite treatment prior to disposal. Other wastes met land disposal restrictions and were disposed in appropriate onsite or offsite landfills. NNSA/NSO requests the following: · A Notice of Completion from the Nevada Division of Environmental Protection to NNSA/NSO for closure of CAU 562 · The transfer of CAU 562 from Appendix III to Appendix IV, Closed Corrective Action Units, of the FFACO

  14. THE RUSSIAN ORTHODOX CHURCH AND THE STRENGTHENING OF NATIONAL SECURITY IN TSARIST RUSSIA

    Directory of Open Access Journals (Sweden)

    M. Yu. Gorozhanina

    2016-01-01

    Full Text Available An integral component of national security is the Patriotic education. Currently, there are different approaches to the understanding of patriotism; the most successful seem to be the Orthodox concept. It was the Russian Orthodox Church played an important role in strengthening national security in tsaristRussiathrough the active moral and spiritual work among the population. There are three stages in the formation of the Orthodox concept of Patriotic education. First XI – XV centuries. Formed the basic provisions of the concept, a patriot is first and foremost a defender of the native land (presented in the image of the mother and guardian of Orthodoxy. In the second phase of the XV – XVIII centuries. n. to named above components is added a nationwide coloring, formed the Assembly of Russian saints, whose life becomes an example for educating the younger generation. Orthodox symbolism falls on Russian banners. It was under the aegis of Orthodoxy there was a Union of Russia in the time of Troubles. In General, in the second phase, existing components of the concept of international added. Creating the theory of "Moscow– the Third Rome, the Russian Orthodox Church for the first time identified the role ofRussiain the world community. On this basis, the understanding of patriotism has gained a new dimension. The purpose of "Holy Russia", which became a spiritual center of the world, the preservation of the moral principles not only at home but also in other countries. Third period n of XVIII – 1917 is associated with the development of absolutism and its crisis. By this time, the basic theoretical provisions of the concept were formulated. Therefore, the main attention was paid to development of practical methods for their implementation. Unfortunately, a strong dependence of the Russian Orthodox Church from the monarchy and the bureaucracy of the Church as an institution, the formalization of spiritually-moral work led to the events of

  15. 76 FR 68523 - Fee Schedule for the Transfer of U.S. Treasury Book-Entry Securities Held on the National Book...

    Science.gov (United States)

    2011-11-04

    ... Fiscal Service Fee Schedule for the Transfer of U.S. Treasury Book-Entry Securities Held on the National Book-Entry System AGENCY: Bureau of the Public Debt, Fiscal Service, Treasury. ACTION: Notice. SUMMARY... U.S. Treasury book-entry securities maintained on the National Book-Entry System (NBES) that...

  16. 77 FR 67062 - Fee Schedule for the Transfer of U.S. Treasury Book-Entry Securities Held on the National Book...

    Science.gov (United States)

    2012-11-08

    ... Fiscal Service Fee Schedule for the Transfer of U.S. Treasury Book-Entry Securities Held on the National Book-Entry System AGENCY: Bureau of the Public Debt, Fiscal Service, Treasury. ACTION: Notice. SUMMARY... U.S. Treasury book-entry securities maintained on the National Book-Entry System (NBES) that...

  17. 78 FR 66803 - Fee Schedule for the Transfer of U.S. Treasury Book-Entry Securities Held on the National Book...

    Science.gov (United States)

    2013-11-06

    ... Fiscal Service Bureau of the Fiscal Service Fee Schedule for the Transfer of U.S. Treasury Book-Entry Securities Held on the National Book-Entry System AGENCY: Bureau of the Fiscal Service, Fiscal Service... schedule applicable to transfers of U.S. Treasury book-entry securities maintained on the National...

  18. 75 FR 67807 - Fee Schedule for the Transfer of U.S. Treasury Book-Entry Securities Held on the National Book...

    Science.gov (United States)

    2010-11-03

    ... Fiscal Service Fee Schedule for the Transfer of U.S. Treasury Book-Entry Securities Held on the National Book-Entry System Authority: 31 CFR 357.45. AGENCY: Bureau of the Public Debt, Fiscal Service, Treasury... applicable to transfers of U.S. Treasury book-entry securities maintained on the National Book-Entry...

  19. The Changing Workforce. Highlights of the National Study, No. 1.

    Science.gov (United States)

    Galinsky, Ellen; And Others

    This report presents results of a nationally representative longitudinal study of nearly 3,400 workers. The study investigated the work and personal/family lives of workers, particularly with respect to recent rapid changes in the economy, layoffs, and downsizing. The study was conducted through a series of hour-long phone interviews. The study…

  20. Impact of climate change on crop yield and role of model for achieving food security.

    Science.gov (United States)

    Kumar, Manoj

    2016-08-01

    In recent times, several studies around the globe indicate that climatic changes are likely to impact the food production and poses serious challenge to food security. In the face of climate change, agricultural systems need to adapt measures for not only increasing food supply catering to the growing population worldwide with changing dietary patterns but also to negate the negative environmental impacts on the earth. Crop simulation models are the primary tools available to assess the potential consequences of climate change on crop production and informative adaptive strategies in agriculture risk management. In consideration with the important issue, this is an attempt to provide a review on the relationship between climate change impacts and crop production. It also emphasizes the role of crop simulation models in achieving food security. Significant progress has been made in understanding the potential consequences of environment-related temperature and precipitation effect on agricultural production during the last half century. Increased CO2 fertilization has enhanced the potential impacts of climate change, but its feasibility is still in doubt and debates among researchers. To assess the potential consequences of climate change on agriculture, different crop simulation models have been developed, to provide informative strategies to avoid risks and understand the physical and biological processes. Furthermore, they can help in crop improvement programmes by identifying appropriate future crop management practises and recognizing the traits having the greatest impact on yield. Nonetheless, climate change assessment through model is subjected to a range of uncertainties. The prediction uncertainty can be reduced by using multimodel, incorporating crop modelling with plant physiology, biochemistry and gene-based modelling. For devloping new model, there is a need to generate and compile high-quality field data for model testing. Therefore, assessment of

  1. SAFETY AND SECURITY IN THE AGE OF GLOBAL TOURISM (The changing role and conception of Safety and Security in Tourism)

    OpenAIRE

    Kovari, Istvan; Zimanyi, Krisztina

    2011-01-01

    Safety and security have always been indispensable condition for travel and tourism. Research and education also has to face the issues of security and safety in tourism in order to prepare future specialists of the industry by incorporating new results of research to academic curricula.

  2. Cyber resilience: a review of critical national infrastructure and cyber security protection measures applied in the UK and USA.

    Science.gov (United States)

    Harrop, Wayne; Matteson, Ashley

    This paper presents cyber resilience as key strand of national security. It establishes the importance of critical national infrastructure protection and the growing vicarious nature of remote, well-planned, and well executed cyber attacks on critical infrastructures. Examples of well-known historical cyber attacks are presented, and the emergence of 'internet of things' as a cyber vulnerability issue yet to be tackled is explored. The paper identifies key steps being undertaken by those responsible for detecting, deterring, and disrupting cyber attacks on critical national infrastructure in the United Kingdom and the USA.

  3. Managing for multiple resources under climate change: national forests.

    Science.gov (United States)

    Joyce, Linda A; Blate, Geoffrey M; McNulty, Steven G; Millar, Constance I; Moser, Susanne; Neilson, Ronald P; Peterson, David L

    2009-12-01

    This study explores potential adaptation approaches in planning and management that the United States Forest Service might adopt to help achieve its goals and objectives in the face of climate change. Availability of information, vulnerability of ecological and socio-economic systems, and uncertainties associated with climate change, as well as the interacting non-climatic changes, influence selection of the adaptation approach. Resource assessments are opportunities to develop strategic information that could be used to identify and link adaptation strategies across planning levels. Within a National Forest, planning must incorporate the opportunity to identify vulnerabilities to climate change as well as incorporate approaches that allow management adjustments as the effects of climate change become apparent. The nature of environmental variability, the inevitability of novelty and surprise, and the range of management objectives and situations across the National Forest System implies that no single approach will fit all situations. A toolbox of management options would include practices focused on forestalling climate change effects by building resistance and resilience into current ecosystems, and on managing for change by enabling plants, animals, and ecosystems to adapt to climate change. Better and more widespread implementation of already known practices that reduce the impact of existing stressors represents an important "no regrets" strategy. These management opportunities will require agency consideration of its adaptive capacity, and ways to overcome potential barriers to these adaptation options.

  4. A Historical Evaluation of the U15 Complex, Nevada National Security Site, Nye County, Nevada

    Energy Technology Data Exchange (ETDEWEB)

    Drollinger, Harold [Desert Research Inst., Nevada University, Reno, NV (United States); Holz, Barbara A. [Desert Research Inst., Nevada University, Reno, NV (United States); Bullard, Thomas F. [Desert Research Inst., Nevada University, Reno, NV (United States); Goldenberg, Nancy G. [Desert Research Inst., Nevada University, Reno, NV (United States); Ashbaugh, Laurence J. [Desert Research Inst., Nevada University, Reno, NV (United States); Griffin, Wayne R. [Desert Research Inst., Nevada University, Reno, NV (United States)

    2014-01-01

    This report presents a historical evaluation of the U15 Complex on the Nevada National Security Site (NNSS) in southern Nevada. The work was conducted by the Desert Research Institute at the request of the U.S. Department of Energy, National Nuclear Security Administration Nevada Field Office and the U.S. Department of Defense, Defense Threat Reduction Agency. Three underground nuclear tests and two underground nuclear fuel storage experiments were conducted at the complex. The nuclear tests were Hard Hat in 1962, Tiny Tot in 1965, and Pile Driver in 1966. The Hard Hat and Pile Driver nuclear tests involved different types of experiment sections in test drifts at various distances from the explosion in order to determine which sections could best survive in order to design underground command centers. The Tiny Tot nuclear test involved an underground cavity in which the nuclear test was executed. It also provided data in designing underground structures and facilities to withstand a nuclear attack. The underground nuclear fuel storage experiments were Heater Test 1 from 1977 to 1978 and Spent Fuel Test - Climax from 1978 to 1985. Heater Test 1 was used to design the later Spent Fuel Test - Climax experiment. The latter experiment was a model of a larger underground storage facility and primarily involved recording the conditions of the spent fuel and the surrounding granite medium. Fieldwork was performed intermittently in the summers of 2011 and 2013, totaling 17 days. Access to the underground tunnel complex is sealed and unavailable. Restricted to the surface, four buildings, four structures, and 92 features associated with nuclear testing and fuel storage experiment activities at the U15 Complex have been recorded. Most of these are along the west side of the complex and next to the primary access road and are characteristic of an industrial mining site, albeit one with scientific interests. The geomorphological fieldwork was conducted over three days in the

  5. A Historical Evaluation of the U15 Complex, Nevada National Security Site, Nye County, Nevada

    Energy Technology Data Exchange (ETDEWEB)

    Drollinger, Harold [Desert Research Inst., Nevada University, Reno, NV (United States); Holz, Barbara A. [Desert Research Inst., Nevada University, Reno, NV (United States); Bullard, Thomas F. [Desert Research Inst., Nevada University, Reno, NV (United States); Goldenberg, Nancy G. [Desert Research Inst., Nevada University, Reno, NV (United States); Ashbaough, Laurence J. [Desert Research Inst., Nevada University, Reno, NV (United States); Griffin, Wayne R. [Desert Research Inst., Nevada University, Reno, NV (United States)

    2014-01-09

    This report presents a historical evaluation of the U15 Complex on the Nevada National Security Site (NNSS) in southern Nevada. The work was conducted by the Desert Research Institute at the request of the U.S. Department of Energy, National Nuclear Security Administration Nevada Field Office and the U.S. Department of Defense, Defense Threat Reduction Agency. Three underground nuclear tests and two underground nuclear fuel storage experiments were conducted at the complex. The nuclear tests were Hard Hat in 1962, Tiny Tot in 1965, and Pile Driver in 1966. The Hard Hat and Pile Driver nuclear tests involved different types of experiment sections in test drifts at various distances from the explosion in order to determine which sections could best survive in order to design underground command centers. The Tiny Tot nuclear test involved an underground cavity in which the nuclear test was executed. It also provided data in designing underground structures and facilities to withstand a nuclear attack. The underground nuclear fuel storage experiments were Heater Test 1 from 1977 to 1978 and Spent Fuel Test - Climax from 1978 to 1985. Heater Test 1 was used to design the later Spent Fuel Test - Climax experiment. The latter experiment was a model of a larger underground storage facility and primarily involved recording the conditions of the spent fuel and the surrounding granite medium. Fieldwork was performed intermittently in the summers of 2011 and 2013, totaling 17 days. Access to the underground tunnel complex is sealed and unavailable. Restricted to the surface, four buildings, four structures, and 92 features associated with nuclear testing and fuel storage experiment activities at the U15 Complex have been recorded. Most of these are along the west side of the complex and next to the primary access road and are characteristic of an industrial mining site, albeit one with scientific interests. The geomorphological fieldwork was conducted over three days in the

  6. Climate Change, Nutrition and Food Security in Sub-Saharan Africa

    Science.gov (United States)

    Brown, Molly E.

    2010-01-01

    Food security and nutrition in sub-Saharan Africa have long been affected by variations in the weather. Vulnerability to these hazards, along with economic shocks and an adverse political environment, is often uneven in a community. Some individuals and households are more susceptible to emergencies or crises than others, and thus determining who is most vulnerable are and how they are responding to a shock or crises is essential to understand the impact on food security. Daily, quantitative and global observations derived from satellite remote sensing instruments can contribute to understanding how food production has declined due to drought, flood or other weather-related hazard, but it can say nothing about the likelihood that the people living in that area are suffering food insecurity as a result. As Amartya Sen argued, a famine can occur even when there is an absolute surplus of food in a region. Thus organizations like the US Agency for International Development's Famine Early Warning Systems Network (FEWS NET) work to integrate biophysical and socio-economic indicators together with on-the ground assessments to estimate the food security consequences of a variety of events. Climate change is likely to restructure local, regional and global agricultural systems and commodity markets. Although remote sensing information has been used to identify seasonal production declines for the past two decades, new ways of using the data will need to be developed in order to understand, document and respond to the impact of climate change on food security as it is manifested in shorter term shocks. In this article, the contribution of remote sensing is explained, along with the other factors that affect food security

  7. Access to Justice for the Wrongfully Accused in National Security Investigations

    Directory of Open Access Journals (Sweden)

    Jasminka Kalajdzic

    2009-02-01

    Full Text Available Among the casualties in the ‘war on terror’ is the presumption of innocence. It is now known that four Canadians who were the subject of investigation by the RCMP and CSIS were detained and tortured in Syria on the basis of information that originated in and was shared by Canada. None has ever been charged with a crime. On their return home, all four men called for a process that would expose the truth about the role of Canadian agencies in what happened to them, and ultimately help them clear their names and rebuild their lives. To date, in varying degrees, all four men continue to wait for that “process.” In this paper, I examine the access to justice mechanisms available to persons who are wrongfully accused of being involved in terrorist activities. Utilizing the case study of one of the four men, Abdullah Almalki, I explore the various processes available to him: (i a complaint to the relevant domestic complaints bodies, the Security Intelligence Review Committee and the Commission for Public Complaints Against the RCMP; (ii a commission of inquiry; and (iii a civil tort claim. Due in large part to the role national security confidentiality plays in these mechanisms, all three models are found to be ineffective for those seeking accountability in the national security context. Parmi les victimes de la «guerre contre le terrorisme» figure la présomption d’innocence. On sait maintenant que quatre Canadiens qui ont fait l’objet d’enquêtes par la GRC et le SCRS ont été détenus et torturés en Syrie suite à des renseignements ayant leur origine au Canada et partagés par le Canada. Nul d’entre eux n’a jamais été accusé de crime. À leur retour, tous les quatre hommes ont demandé un processus qui exposerait la vérité au sujet du rôle d’agences canadiennes dans ce qui leur est arrivé et qui éventuellement leur aiderait à rétablir leur réputation et refaire leur vie. À ce jour, à des degrés divers, tous

  8. Closure Report for Corrective Action Unit 465: Hydronuclear Nevada National Security Site, Nevada, Revision 0

    Energy Technology Data Exchange (ETDEWEB)

    Mark Burmeister and Patrick Matthews

    2012-11-01

    The corrective action sites (CASs) within CAU 465 are located within Areas 6 and 27 of the NNSS. CAU 465 comprises the following CASs: • 00-23-01, Hydronuclear Experiment, located in Area 27 of the NNSS and known as the Charlie site. • 00-23-02, Hydronuclear Experiment, located in Area 27 of the NNSS and known as the Dog site. • 00-23-03, Hydronuclear Experiment, located in Area 27 of the NNSS and known as the Charlie Prime and Anja sites. • 06-99-01, Hydronuclear, located in Area 6 of the NNSS and known as the Trailer 13 site. The purpose of this CR is to provide documentation supporting the completed corrective actions and provide data confirming that the closure objectives for CASs within CAU 465 were met. From September 2011 through July 2012, closure activities were performed as set forth in the Streamlined Approach for Environmental Restoration Plan for CAU 465: Hydronuclear, Nevada National Security Site, Nevada.

  9. Underground Test Area Activity Preemptive Review Guidance Nevada National Security Site, Nevada, Revision 0

    Energy Technology Data Exchange (ETDEWEB)

    Farnham, Irene [Navarro, Las Vegas, NV (United States); Rehfeldt, Kenneth [Navarro, Las Vegas, NV (United States)

    2016-10-01

    Preemptive reviews (PERs) of Underground Test Area (UGTA) Activity corrective action unit (CAU) studies are an important and long-maintained quality improvement process. The CAU-specific PER committees provide internal technical review of ongoing work throughout the CAU lifecycle. The reviews, identified in the UGTA Quality Assurance Plan (QAP) (Sections 1.3.5.1 and 3.2), assure work is comprehensive, accurate, in keeping with the state of the art, and consistent with CAU goals. PER committees review various products, including data, documents, software/codes, analyses, and models. PER committees may also review technical briefings including Federal Facility Agreement and Consent Order (FFACO)-required presentations to the Nevada Division of Environmental Protection (NDEP) and presentations supporting key technical decisions (e.g., investigation plans and approaches). PER committees provide technical recommendations to support regulatory decisions that are the responsibility of the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Field Office (NNSA/NFO) and NDEP.

  10. Nevada National Security Site Environmental Report 2010, Attachment A: Site Description

    Energy Technology Data Exchange (ETDEWEB)

    C. Wills, ed.

    2011-09-13

    Introduction to the Nevada National Security Site Environmental Report 2010. Included are subsections that summarize the site’s geological, hydrological, climatological, and ecological setting and the cultural resources of the NNSS. The subsections are meant to aid the reader in understanding the complex physical and biological environment of the NNSS. An adequate knowledge of the site’s environment is necessary to assess the environmental impacts of new projects, design and implement environmental monitoring activities for current site operations, and assess the impacts of site operations on the public residing in the vicinity of the NNSS. The NNSS environment contributes to several key features of the site that afford protection to the inhabitants of adjacent areas from potential exposure to radioactivity or other contaminants resulting from NNSS operations. These key features include the general remote location of the NNSS, restricted access, extended wind transport times, the great depths to slow-moving groundwater, little or no surface water, and low population density. This attachment complements the annual summary of monitoring program activities and dose assessments presented in the main body of this report.

  11. Impact of Iran's Nuclear Program, on Turkey s National Security (In light of the Theory of Balance of Power

    Directory of Open Access Journals (Sweden)

    Hossein Masoudnia

    2012-01-01

    Full Text Available Since the nuclear program of the Islamic Republic of Iran It is always have been followed global and regional responses and objections. But after the election of Ahmadinejad as president of Iran and his willingness to advance the nuclear program, Western opposition to this trend intensified to the point where many of issuing sanctions against Iran. Among the countries that have been tried as a mediator between Iran and the International Union of Europe and the United States (5 +1 will act and encourage the parties to resolve the dispute diplomatically, Turkey. Considering this background, this paper attempts to link the Iranian nuclear program and Turkey's national security in light of the balance of power theory can be analyzed. The findings confirm the assumption that Turkey's concerns about Iran's nuclear program in the context of possible changes in the regional balance of power in the Islamic Republic's pursuit of nuclear energy is the analysis and evaluation, This is because the Turkish success in achieving the goals defined in the context of the challenges faced by policy-oriented Neo-Ottomans

  12. Climate politics in the Lower Mekong Basin. National interests and transboundary cooperation on climate change

    Energy Technology Data Exchange (ETDEWEB)

    Baadsgaard Lange, R.; Moerck Jensen, K.

    2013-09-01

    Climate change is expected to intensify water security concerns in international river basins. UNFCCC and DAC-donors have been important generators of political attention to the climate agenda among governments in the Mekong Basin in relation to regional cooperation, national policy-making and capacity building. However, the formal commitment to climate action is not necessarily reflected in the everyday business of development. In this paper we use a political economy approach to understand when and how climate change becomes a political priority for the governments of Laos, Thailand and Vietnam, and for transboundary cooperation. Uneven distribution of climate hazards and vulnerabilities create different national risk perceptions and commitment to climate action. Donor funding and national development strategies are also strong drivers of climate action and inaction. Climate change is sometimes used as a scapegoat for domestic policy failures and as a tool to acquire donor funding. We recommend prioritizing climate action in the context of immediate development challenges and 'no regrets' interventions that are likely to enhance adaptive capacity and governments' commitment. (Author)

  13. Indonesian National Policy on Adaptation and Mitigation of Climate Change

    Directory of Open Access Journals (Sweden)

    Wahyu Yun Santoso

    2015-12-01

    Full Text Available From its arousal, the issue of climate change or global warming has become a distinct global trend setter in multidisciplinary discussion, including in the law perspective. Within legal discourse, the issue of climate change developed rapidly into several aspect, not only about adaptation nor mitigation, especially since the plurality of moral conviction relevant to the climate change facts. As a global matter, each country has the responsibility to adapt and mitigate with its own character and policy. This normative research aims to explore and describe in brief the Indonesian national policy in climate change adaptation and mitigation. Gradually, the contribution of Indonesia is getting firm and solid to the climate change regime, especially after the Bali Action Plan 2007.

  14. Airborne Dust Cloud Measurements at the INL National Security Test Range

    Energy Technology Data Exchange (ETDEWEB)

    Michael L. Abbott; Norm Stanley; Larry Radke; Charles Smeltzer

    2007-09-01

    On July 11, 2007, a surface, high-explosive test (<20,000 lb TNT-equivalent) was carried out at the National Security Test Range (NSTR) on the Idaho National Laboratory (INL) Site. Aircraft-mounted rapid response (1-sec) particulate monitors were used to measure airborne PM-10 concentrations directly in the dust cloud and to develop a PM-10 emission factor that could be used for subsequent tests at the NSTR. The blast produced a mushroom-like dust cloud that rose approximately 2,500–3,000 ft above ground level, which quickly dissipated (within 5 miles of the source). In general, the cloud was smaller and less persistence than expected, or that might occur in other areas, likely due to the coarse sand and subsurface conditions that characterize the immediate NSTR area. Maximum short time-averaged (1-sec) PM-10 concentrations at the center of the cloud immediately after the event reached 421 µg m-3 but were rapidly reduced (by atmospheric dispersion and fallout) to near background levels (~10 µg m-3) after about 15 minutes. This occurred well within the INL Site boundary, about 8 km (5 miles) from the NSTR source. These findings demonstrate that maximum concentrations in ambient air beyond the INL Site boundary (closest is 11.2 km from NSTR) from these types of tests would be well within the 150 µg m-3 24-hour National Ambient Air Quality Standards for PM-10. Aircraft measurements and geostatistical techniques were used to successfully quantify the initial volume (1.64E+9 m3 or 1.64 km3) and mass (250 kg) of the PM-10 dust cloud, and a PM-10 emission factor (20 kg m-3 crater soil volume) was developed for this specific type of event at NSTR. The 250 kg of PM-10 mass estimated from this experiment is almost seven-times higher than the 36 kg estimated for the environmental assessment (DOE-ID 2007) using available Environmental Protection Agency (EPA 1995) emission factors. This experiment demonstrated that advanced aircraft-mounted instruments operated by

  15. Addressing Language Barriers: Building Response Capacity for a Changing Nation

    Science.gov (United States)

    2007-01-01

    The absence of universally available language services is a national healthcare system failure, the burden of which is suffered by patients with limited English proficiency and their healthcare providers. Conceptualizing mandatory provision of language access as an unfair, unfunded mandate ignores massive and fundamental social changes taking place. Overcoming language barriers is essential to safe, quality health care. This paper, informed by the experience of Hablamos Juntos, a national demonstration project funded by the Robert Wood Johnson Foundation, argues that national and health industry investments are needed to develop population-based approaches supported by communication and information technology, and that these investments may prove useful to improving healthcare communication for English-speaking patients as well. PMID:17957423

  16. Research on Food Science and Technology Innovation Based on National Food Security: A Case Study of Hubei Province

    Institute of Scientific and Technical Information of China (English)

    Qingfang; YANG; Junying; WEI

    2015-01-01

    Based on the background of national food security,this paper analyzes the current situation of food production in Hubei Province that except food yields,overall production situation is not good. Through the food production,storage and circulation,this paper describes the role of food science and technology innovation in food security,and further points out the problems of food science and technology innovation system in Hubei Province,such as disconnection between food science and technology innovation research and food production as well as economic development,backward management system failing to adapt to the needs of agricultural transformation,and low conversion rate of food scientific and technological innovation. Based on this,this paper sets forth the recommendations for food security in Hubei Province.

  17. Climate Change Education as an Integral Part of the United Nations Framework Convention on Climate Change

    Science.gov (United States)

    Journal of Education for Sustainable Development, 2012

    2012-01-01

    The United Nations Framework Convention on Climate Change (UNFCCC), through its Article 6, and the Convention's Kyoto Protocol, through its Article 10 (e), call on governments to develop and implement educational programmes on climate change and its effects. In particular, Article 6 of the Convention, which addresses the issue of climate…

  18. Ecosystem Management: Tomorrow’s Approach to Enhancing Food Security under a Changing Climate

    Directory of Open Access Journals (Sweden)

    Mike Rivington

    2011-06-01

    Full Text Available This paper argues that a sustainable ecosystem management approach is vital to ensure the delivery of essential ‘life support’ ecosystem services and must be mainstreamed into societal conscience, political thinking and economic processes. Feeding the world at a time of climate change, environmental degradation, increasing human population and demand for finite resources requires sustainable ecosystem management and equitable governance. Ecosystem degradation undermines food production and the availability of clean water, hence threatening human health, livelihoods and ultimately societal stability. Degradation also increases the vulnerability of populations to the consequences of natural disasters and climate change impacts. With 10 million people dying from hunger each year, the linkages between ecosystems and food security are important to recognize. Though we all depend on ecosystems for our food and water, about seventy per cent of the estimated 1.1 billion people in poverty around the world live in rural areas and depend directly on the productivity of ecosystems for their livelihoods. Healthy ecosystems provide a diverse range of food sources and support entire agricultural systems, but their value to food security and sustainable livelihoods are often undervalued or ignored. There is an urgent need for increased financial investment for integrating ecosystem management with food security and poverty alleviation priorities. As the world’s leaders worked towards a new international climate change agenda in Cancun, Mexico, 29 November–10 December 2010 (UNFCCC COP16, it was clear that without a deep and decisive post-2012 agreement and major concerted effort to reduce the food crisis, the Millennium Development Goals will not be attained. Political commitment at the highest level will be needed to raise the profile of ecosystems on the global food agenda. It is recommended that full recognition and promotion be given of the linkages

  19. 我国粮食安全测度方法设计--基于FAO对粮食安全的定义%Design of national grain security evaluation methods:based on the definition of grain security by FAO

    Institute of Scientific and Technical Information of China (English)

    杜为公; 李艳芳; 徐李

    2014-01-01

    针对全球粮食生产产量下降和粮食供需的不平衡,本研究基于FAO对粮食安全的定义,设计了我国粮食安全测度方法。粮食安全测度包括“国家粮食安全”,“家庭粮食安全”,“粮食营养安全”三项指标。考虑未来粮食安全的风险,还包括“数量安全”,“质量安全”,“生态安全”三个方面指标。%Facing the global issues about decline of grain production along with the imbalance of grain distribution , this research elicits the evaluation methods of national grain security , based on the definition of grain security by FAO.Grain Security Evaluation ,which is known to be made up by three main components:National Grain Security , Household Grain Security and Nutritional Grain Security , should not exclude another three important parts , which are Quantitative Security ,Quality Security and Ecological Security ,in order to get ready for the risks about grain se-curity we may need to .undertake in the future .

  20. Critical list: the 100 nations most vulnerable to climate change

    Energy Technology Data Exchange (ETDEWEB)

    Ayers, Jessica [London School of Economics (United Kingdom); Huq, Saleemul

    2007-12-15

    Well over a billion people in 100 countries face a bleak future. In these, the nations most vulnerable to climate change, resilience has already been eroded by entrenched poverty, degraded or threatened environments and other problems. The harsher, more frequent natural disasters that are predicted could tip them over the edge into chronic famine or forced migration. Yet these are also the countries that have contributed least to climate change. It is vital that their voices and views be heard in the negotiations to determine the post-Kyoto climate regime. Equally importantly, the countries emitting the most greenhouse gases must redress the balance by establishing robust mitigation programmes and by supporting adaptation.